SlideShare a Scribd company logo
Sherif Rashad1 and Jonathan Byrd2,3, 1University of
Southern Indiana, USA, 2Colorado State University,
USA and 3Morehead State University, USA.
ABSTRACT
The goal of this research project is to design and implement a mobile
application and machine learning techniques to solve problems related to the
security of mobile devices. We introduce in this paper a behavior-based
approach that can be applied in a mobile environment to capture and learn the
behavior of mobile users. The proposed system was tested using Android OS
and the initial experimental results show that the proposed technique is
promising, and it can be used effectively to solve the problem of anomaly
detection in mobile devices.
KEYWORDS
Behavior-based Security, Anomaly Detection, Mobile Profiles, Mobile Computing.
INTRODUCTION
In this research project we explore the rapidly evolving capabilities of modern
smartphones with a goal to design an innovative approach to improve the security of
smartphones and better understand the dynamic behavior of mobile users. With an
increasing number of smartphone users, it becomes highly important to improve the
efficiency and security of these smart phones. Individual computer users interact with
machine interfaces in different ways, which includes analyzing keystroke patterns, CLI
commands, or navigation pathways through GUIs. We can often differentiate between
individual users based on these interactions.
In this project, we explore the problem of distinguishing Android phone users based on
their behavior using machine learning techniques. We have developed an Android
application that collects different features that represent user behavior information
such as battery life, number of applications running, tilt of the device, location, etc, and
use this data to learn the behavior of mobile users. This approach has a potential
application in many areas including security. Anomaly detection techniques based on
user behavior model could be used to detect malicious users who have gained access to a
device. Additionally, it could be used to detect unusual lowlevel commands run by
malware. In addition to providing interesting information, such as which features are
most salient, classifying unique users has potential real-world applications such as:
•Distinguishing between users on multi-user systems. If a single device is
shared by multiple users, an application could prevent access of
information from the incorrect user, or automatically log into accounts
based on the user behavior.
• Service/product recommendations
• Building offline behavior models to find correlations between
demographics (age, gender, location, etc.) and user behaviour .
Figure. 1 Basic Architecture of the Proposed Approach
Figure 2. Basic Relief Algorithm [12], [13]
Figure 3. The Interface of the Developed Android Collector App
CONCLUSION
The goal of this research project is to propose a smart approach for the problem of
behavior-based security of mobile devices using machine learning techniques. We
focused on the problem of anomaly detection, but the proposed approach has possible
applications in many other areas to identify the mobile users by learning the behavior of
using the mobile devices. An Android application was used to collect location and
behavior data of mobile users to build a behavior-based security system. The Relieff
feature ranking algorithm was used effectively to reduce the dimension and the volume
of the collected data. Different algorithms were used to analyze the behavior data of
mobile users. Our initial experimental results show that the proposed techniques can be
used to model the behavior of mobile users and identify the mobile users based on
behavior data with a high accuracy and a reduced set of collected data. Future work
includes improving the overall performance and considering the most relevant features
based on the mobile user. We need to test multiple users on the same device and we
expect that would provide useful data. We also need to consider more users and other
possible applications of the proposed techniques to provide new identity-based
applications and services.
International Journal of Artificial Intelligence
and Applications (IJAIA)
http://www.airccse.org/journal/ijaia/ijaia.html
For More Details : http://aircconline.com/ijaia/V9N4/9418ijaia01.pdf

More Related Content

PPTX
Thesis presentation ist
PDF
DasGreenPerezMurphy_Paper
PPTX
Privacy on Mobile Apps
PPTX
Mobile app privacy
PDF
Smartphone Forensic Challenges
PDF
Provide security about risk score in mobile application’s
PPTX
Face detection system
Thesis presentation ist
DasGreenPerezMurphy_Paper
Privacy on Mobile Apps
Mobile app privacy
Smartphone Forensic Challenges
Provide security about risk score in mobile application’s
Face detection system

What's hot (20)

PDF
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
PDF
Predicting Android Application Security and Privacy Risk With Static Code Met...
PPTX
The Patient Guide to Intelligence-Based Medicine
PPTX
Face Recognition
PDF
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
PPTX
Biometrics and its hacking
PDF
Ijciet 10 02_008
PPTX
Face recognition system
PPTX
Biometrics Identification Projects Research Help
PPTX
Project presentation by Debendra Adhikari
PDF
Which Factors Influence Practitioners' Usage of Build Automation Tools?
PPT
Face recognition attendance system
PPTX
Facial Recognition Technology
PPTX
Biometric Authentication PPT
PPTX
Face recognition
PDF
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
ODP
Face recognition application
PPTX
Face recognition system using Hidden Markov Model
PPT
Automatic Attendance system using Facial Recognition
PDF
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Predicting Android Application Security and Privacy Risk With Static Code Met...
The Patient Guide to Intelligence-Based Medicine
Face Recognition
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication
Biometrics and its hacking
Ijciet 10 02_008
Face recognition system
Biometrics Identification Projects Research Help
Project presentation by Debendra Adhikari
Which Factors Influence Practitioners' Usage of Build Automation Tools?
Face recognition attendance system
Facial Recognition Technology
Biometric Authentication PPT
Face recognition
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Face recognition application
Face recognition system using Hidden Markov Model
Automatic Attendance system using Facial Recognition
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ad

Similar to Behavior-Based Security for Mobile Devices Using Machine Learning Techniques (20)

PDF
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
PDF
I018145157
PDF
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PDF
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
PPTX
Malware Improvements in Android OS
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
PDF
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
PDF
Malware Bytes – Advanced Fault Analysis
PDF
Fraud App Detection using Machine Learning
PDF
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
PDF
A women secure mobile app for emergency usage (go safe app)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Android Malware Detection
PDF
A017360104
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
PDF
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
PDF
A Systematic Review of Android Malware Detection Techniques
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
I018145157
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
Malware Improvements in Android OS
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Malware Bytes – Advanced Fault Analysis
Fraud App Detection using Machine Learning
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
A women secure mobile app for emergency usage (go safe app)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Android Malware Detection
A017360104
Comparative Study on Intrusion Detection Systems for Smartphones
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A Systematic Review of Android Malware Detection Techniques
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Ad

More from gerogepatton (20)

PDF
International Journal of Artificial Intelligence & Applications (IJAIA)
PDF
Performance Evaluation of Block-Sized Algorithms for Majority Vote in Facial ...
PDF
3rd International Conference on Artificial Intelligence and IoT (AIIoT 2025)
PDF
International Journal of Artificial Intelligence & Applications (IJAIA)
PDF
3rd International Conference on Artificial Intelligence and IoT (AIIoT 2025)
PDF
Augmented and Synthetic Data in Artificial Intelligence
PDF
3rd International Conference on AI, Data Mining and Data Science (AIDD 2025)
PDF
July 2025 - Top 10 Read Articles in Artificial Intelligence and Applications ...
PDF
6th International Conference on Natural Language Processing and Computational...
PDF
From Insight to Impact: The Evolution of Data-Driven Decision Making in the A...
PDF
6th International Conference on Artificial Intelligence and Machine Learning ...
PDF
3rd International Conference on Artificial Intelligence and IoT (AIIoT 2025)
PDF
International Journal of Artificial Intelligence & Applications (IJAIA)
PDF
AI-Driven Vulnerability Analysis in Smart Contracts: Trends, Challenges and F...
PDF
International Journal of Artificial Intelligence & Applications (IJAIA)
PDF
6th International Conference on Artificial Intelligence and Machine Learning ...
PDF
A Thorough Introduction to Multimodal Machine Translation
PDF
International Journal of Artificial Intelligence & Applications (IJAIA)
PDF
6th International Conference on Advanced Machine Learning (AMLA 2025)
PDF
OWE-CVD: An Optimized Weighted Ensemble for Heart Disease Prediction
International Journal of Artificial Intelligence & Applications (IJAIA)
Performance Evaluation of Block-Sized Algorithms for Majority Vote in Facial ...
3rd International Conference on Artificial Intelligence and IoT (AIIoT 2025)
International Journal of Artificial Intelligence & Applications (IJAIA)
3rd International Conference on Artificial Intelligence and IoT (AIIoT 2025)
Augmented and Synthetic Data in Artificial Intelligence
3rd International Conference on AI, Data Mining and Data Science (AIDD 2025)
July 2025 - Top 10 Read Articles in Artificial Intelligence and Applications ...
6th International Conference on Natural Language Processing and Computational...
From Insight to Impact: The Evolution of Data-Driven Decision Making in the A...
6th International Conference on Artificial Intelligence and Machine Learning ...
3rd International Conference on Artificial Intelligence and IoT (AIIoT 2025)
International Journal of Artificial Intelligence & Applications (IJAIA)
AI-Driven Vulnerability Analysis in Smart Contracts: Trends, Challenges and F...
International Journal of Artificial Intelligence & Applications (IJAIA)
6th International Conference on Artificial Intelligence and Machine Learning ...
A Thorough Introduction to Multimodal Machine Translation
International Journal of Artificial Intelligence & Applications (IJAIA)
6th International Conference on Advanced Machine Learning (AMLA 2025)
OWE-CVD: An Optimized Weighted Ensemble for Heart Disease Prediction

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Pre independence Education in Inndia.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Classroom Observation Tools for Teachers
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
Basic Mud Logging Guide for educational purpose
TR - Agricultural Crops Production NC III.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
VCE English Exam - Section C Student Revision Booklet
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
Pre independence Education in Inndia.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Classroom Observation Tools for Teachers
102 student loan defaulters named and shamed – Is someone you know on the list?
PPH.pptx obstetrics and gynecology in nursing
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Institutional Correction lecture only . . .
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf

Behavior-Based Security for Mobile Devices Using Machine Learning Techniques

  • 1. Sherif Rashad1 and Jonathan Byrd2,3, 1University of Southern Indiana, USA, 2Colorado State University, USA and 3Morehead State University, USA.
  • 2. ABSTRACT The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices. KEYWORDS Behavior-based Security, Anomaly Detection, Mobile Profiles, Mobile Computing.
  • 3. INTRODUCTION In this research project we explore the rapidly evolving capabilities of modern smartphones with a goal to design an innovative approach to improve the security of smartphones and better understand the dynamic behavior of mobile users. With an increasing number of smartphone users, it becomes highly important to improve the efficiency and security of these smart phones. Individual computer users interact with machine interfaces in different ways, which includes analyzing keystroke patterns, CLI commands, or navigation pathways through GUIs. We can often differentiate between individual users based on these interactions. In this project, we explore the problem of distinguishing Android phone users based on their behavior using machine learning techniques. We have developed an Android application that collects different features that represent user behavior information such as battery life, number of applications running, tilt of the device, location, etc, and use this data to learn the behavior of mobile users. This approach has a potential application in many areas including security. Anomaly detection techniques based on user behavior model could be used to detect malicious users who have gained access to a device. Additionally, it could be used to detect unusual lowlevel commands run by malware. In addition to providing interesting information, such as which features are most salient, classifying unique users has potential real-world applications such as:
  • 4. •Distinguishing between users on multi-user systems. If a single device is shared by multiple users, an application could prevent access of information from the incorrect user, or automatically log into accounts based on the user behavior. • Service/product recommendations • Building offline behavior models to find correlations between demographics (age, gender, location, etc.) and user behaviour .
  • 5. Figure. 1 Basic Architecture of the Proposed Approach
  • 6. Figure 2. Basic Relief Algorithm [12], [13]
  • 7. Figure 3. The Interface of the Developed Android Collector App
  • 8. CONCLUSION The goal of this research project is to propose a smart approach for the problem of behavior-based security of mobile devices using machine learning techniques. We focused on the problem of anomaly detection, but the proposed approach has possible applications in many other areas to identify the mobile users by learning the behavior of using the mobile devices. An Android application was used to collect location and behavior data of mobile users to build a behavior-based security system. The Relieff feature ranking algorithm was used effectively to reduce the dimension and the volume of the collected data. Different algorithms were used to analyze the behavior data of mobile users. Our initial experimental results show that the proposed techniques can be used to model the behavior of mobile users and identify the mobile users based on behavior data with a high accuracy and a reduced set of collected data. Future work includes improving the overall performance and considering the most relevant features based on the mobile user. We need to test multiple users on the same device and we expect that would provide useful data. We also need to consider more users and other possible applications of the proposed techniques to provide new identity-based applications and services.
  • 9. International Journal of Artificial Intelligence and Applications (IJAIA) http://www.airccse.org/journal/ijaia/ijaia.html For More Details : http://aircconline.com/ijaia/V9N4/9418ijaia01.pdf