Skip to main content

Part of the book series: Proceedings in Adaptation, Learning and Optimization ((PALO,volume 1))

Abstract

There has been significant growth in the number of malware using the Android platform, especially malware that target Short Message Services (SMS). The mobile botnet has been using SMS as a channel to distribute spam, send unauthorized SMS messages without user knowledge, use command and control (C&C) channel, and attach malicious URLs. With the limitation of Android smartphone resources, a multi-agent technology can make our framework to be more robust and efficient. In this paper, we propose a multi-agent system that is currently being developed using JADE platform for observing Android Smartphone features and monitoring SMS services, as well as creating Android profiles. Our framework applies hybrid detection approaches in order to counteract botnet attacks, by investigating damaging SMS botnet activities through the examination of Smartphone behaviour. These approaches utilize multi-agent technology to recognize malicious SMS and prevent users from opening these messages, by applying behavioural analysis to find the correlation between suspicious SMS messages and the profiles reported by the agents.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acronymics. An integrated toolkit for constructing intelligent software agents,agentbuilder user’s guide, http://www.agentbuilder.com/

  2. Agüero, J., Rebollo, M., Carrascosa, C., Julián, V.: Developing intelligent agents on the android platform. Universidad Politecnica de Valencia, Spain (2010)

    Google Scholar 

  3. Almeida, T., Hidalgo, J.M.G., Silva, T.P.: Towards sms spam filtering: Results under a new dataset. International Journal of Information Security Science 2(1) (2013)

    Google Scholar 

  4. Alzahrani, A.J., Ghorbani, A.A.: Sms mobile botnet detection using a multi-agent system: Research in progress. In: Proceedings of the 1st International Workshop on Agents and CyberSecurity, ACySE 2014, pp. 2:1–2:8. ACM, New York (2014)

    Google Scholar 

  5. Bellifemine, F., Caire, G., Greenwood, D.: Developming multi-agent systems with jade (2007)

    Google Scholar 

  6. Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: Jade: A software framework for developing multi-agent applications. lessons learned. Information and Software Technology 50(1), 10–21 (2008)

    Article  Google Scholar 

  7. Busetta, P., Rönnquist, R., Hodgson, A., Lucas, A.: Jack intelligent agents-components for intelligent agents in java. AgentLink News Letter 2(1), 2–5 (1999)

    Google Scholar 

  8. Carabelea, C., Boissier, O., et al.: Multi-agent platforms on smart devices: Dream or reality. In: Proceedings of the Smart Objects Conference (SOC 2003), Grenoble, France, pp. 126–129. Citeseer (2003)

    Google Scholar 

  9. Cheng, Z.: A multi-agent security system for android platform (2012)

    Google Scholar 

  10. Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10(4), 255–268 (2006)

    Article  Google Scholar 

  11. FIPA. Fipa agent management specification (2004), http://www.fipa.org/specs/fipa00023/SC00023K.html

  12. Frantz, C., Nowostawski, M., Purvis, M.K.: Micro-agents on android: interfacing agents with mobile applications. In: Dechesne, F., Hattori, H., ter Mors, A., Such, J.M., Weyns, D., Dignum, F. (eds.) AAMAS 2011 Workshops. LNCS (LNAI), vol. 7068, pp. 488–502. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. Geer, D.: Malicious bots threaten network security. Computer 38(1), 18–20 (2005)

    Article  MathSciNet  Google Scholar 

  14. Geng, G., Xu, G., Zhang, M., Guo, Y., Yang, G., Wei, C.: The design of sms based heterogeneous mobile botnet. Journal of Computers 7(1), 235–243 (2012)

    Article  Google Scholar 

  15. Ghorbani, A., Lu, W., Tavallaee, M.: Network intrusion detection and prevention: concepts and techniques, vol. 47. Springer (2010)

    Google Scholar 

  16. Giovanni, C., Giovanni, I., Michele, I., Kevin, H.: Jade tutorial: Jade programming for android (2012), http://jade.tilab.com/doc/tutorials/JadeAndroid-Programming-Tutorial.pdf

  17. Nikraz, M., Caire, G., Bahri, P.A.: A methodology for the analysis and design of multi-agent systems using jade (2006)

    Google Scholar 

  18. Rosenberg, D.: Carrieriq: The real story (2011), http://vulnfactory.org/blog/2011/12/05/carrieriq-the-real-story/

  19. Santi, A., Guidi, M., Ricci, A.: Jaca-android: an agent-based platform for building smart mobile applications. In: Dastani, M., El Fallah Seghrouchni, A., Hübner, J., Leite, J. (eds.) LADS 2010. LNCS (LNAI), vol. 6822, pp. 95–114. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  20. Savenko, O., Lysenko, S., Kryschuk, A.: Multi-agent based approach of botnet detection in computer systems. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 171–180. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  21. Shyu, M.-L., Chen, S.-C., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. Technical report (2003)

    Google Scholar 

  22. Song, L.-P., Jin, Z., Sun, G.-Q.: Modeling and analyzing of botnet interactions. Physica A: Statistical Mechanics and its Applications 390(2), 347–358 (2011)

    Article  Google Scholar 

  23. Stone, P., Veloso, M.: Multiagent systems: A survey from a machine learning perspective. Autonomous Robots 8(3), 345–383 (2000)

    Article  Google Scholar 

  24. Tilab. Jade - java agent development framework (2011), http://jade.tilab.com/

  25. Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., La Porta, T.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 223–234. ACM (2009)

    Google Scholar 

  26. Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th Conference on USENIX Security Symposium

    Google Scholar 

  27. Dagon, D., Lee, W., Wang, C.: Botnet Detection: Countering the Largest Security Threat. Springer US, New York (2008)

    Google Scholar 

  28. Wood, M.F., DeLoach, S.A.: An overview of the multiagent systems engineering methodology. In: Ciancarini, P., Wooldridge, M.J. (eds.) AOSE 2000. LNCS, vol. 1957, pp. 207–221. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  29. Zinky, J.: Cougaar overview (2009), http://cougaar.org/wp/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdullah J. Alzahrani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Alzahrani, A.J., Ghorbani, A.A. (2015). A Multi-agent System for Smartphone Intrusion Detection Framework. In: Handa, H., Ishibuchi, H., Ong, YS., Tan, K. (eds) Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Volume 1. Proceedings in Adaptation, Learning and Optimization, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-13359-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13359-1_9

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13358-4

  • Online ISBN: 978-3-319-13359-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics