Abstract
There has been significant growth in the number of malware using the Android platform, especially malware that target Short Message Services (SMS). The mobile botnet has been using SMS as a channel to distribute spam, send unauthorized SMS messages without user knowledge, use command and control (C&C) channel, and attach malicious URLs. With the limitation of Android smartphone resources, a multi-agent technology can make our framework to be more robust and efficient. In this paper, we propose a multi-agent system that is currently being developed using JADE platform for observing Android Smartphone features and monitoring SMS services, as well as creating Android profiles. Our framework applies hybrid detection approaches in order to counteract botnet attacks, by investigating damaging SMS botnet activities through the examination of Smartphone behaviour. These approaches utilize multi-agent technology to recognize malicious SMS and prevent users from opening these messages, by applying behavioural analysis to find the correlation between suspicious SMS messages and the profiles reported by the agents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acronymics. An integrated toolkit for constructing intelligent software agents,agentbuilder user’s guide, http://www.agentbuilder.com/
Agüero, J., Rebollo, M., Carrascosa, C., Julián, V.: Developing intelligent agents on the android platform. Universidad Politecnica de Valencia, Spain (2010)
Almeida, T., Hidalgo, J.M.G., Silva, T.P.: Towards sms spam filtering: Results under a new dataset. International Journal of Information Security Science 2(1) (2013)
Alzahrani, A.J., Ghorbani, A.A.: Sms mobile botnet detection using a multi-agent system: Research in progress. In: Proceedings of the 1st International Workshop on Agents and CyberSecurity, ACySE 2014, pp. 2:1–2:8. ACM, New York (2014)
Bellifemine, F., Caire, G., Greenwood, D.: Developming multi-agent systems with jade (2007)
Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: Jade: A software framework for developing multi-agent applications. lessons learned. Information and Software Technology 50(1), 10–21 (2008)
Busetta, P., Rönnquist, R., Hodgson, A., Lucas, A.: Jack intelligent agents-components for intelligent agents in java. AgentLink News Letter 2(1), 2–5 (1999)
Carabelea, C., Boissier, O., et al.: Multi-agent platforms on smart devices: Dream or reality. In: Proceedings of the Smart Objects Conference (SOC 2003), Grenoble, France, pp. 126–129. Citeseer (2003)
Cheng, Z.: A multi-agent security system for android platform (2012)
Eagle, N., Pentland, A.: Reality mining: sensing complex social systems. Personal and Ubiquitous Computing 10(4), 255–268 (2006)
FIPA. Fipa agent management specification (2004), http://www.fipa.org/specs/fipa00023/SC00023K.html
Frantz, C., Nowostawski, M., Purvis, M.K.: Micro-agents on android: interfacing agents with mobile applications. In: Dechesne, F., Hattori, H., ter Mors, A., Such, J.M., Weyns, D., Dignum, F. (eds.) AAMAS 2011 Workshops. LNCS (LNAI), vol. 7068, pp. 488–502. Springer, Heidelberg (2012)
Geer, D.: Malicious bots threaten network security. Computer 38(1), 18–20 (2005)
Geng, G., Xu, G., Zhang, M., Guo, Y., Yang, G., Wei, C.: The design of sms based heterogeneous mobile botnet. Journal of Computers 7(1), 235–243 (2012)
Ghorbani, A., Lu, W., Tavallaee, M.: Network intrusion detection and prevention: concepts and techniques, vol. 47. Springer (2010)
Giovanni, C., Giovanni, I., Michele, I., Kevin, H.: Jade tutorial: Jade programming for android (2012), http://jade.tilab.com/doc/tutorials/JadeAndroid-Programming-Tutorial.pdf
Nikraz, M., Caire, G., Bahri, P.A.: A methodology for the analysis and design of multi-agent systems using jade (2006)
Rosenberg, D.: Carrieriq: The real story (2011), http://vulnfactory.org/blog/2011/12/05/carrieriq-the-real-story/
Santi, A., Guidi, M., Ricci, A.: Jaca-android: an agent-based platform for building smart mobile applications. In: Dastani, M., El Fallah Seghrouchni, A., Hübner, J., Leite, J. (eds.) LADS 2010. LNCS (LNAI), vol. 6822, pp. 95–114. Springer, Heidelberg (2011)
Savenko, O., Lysenko, S., Kryschuk, A.: Multi-agent based approach of botnet detection in computer systems. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 171–180. Springer, Heidelberg (2012)
Shyu, M.-L., Chen, S.-C., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. Technical report (2003)
Song, L.-P., Jin, Z., Sun, G.-Q.: Modeling and analyzing of botnet interactions. Physica A: Statistical Mechanics and its Applications 390(2), 347–358 (2011)
Stone, P., Veloso, M.: Multiagent systems: A survey from a machine learning perspective. Autonomous Robots 8(3), 345–383 (2000)
Tilab. Jade - java agent development framework (2011), http://jade.tilab.com/
Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., La Porta, T.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 223–234. ACM (2009)
Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th Conference on USENIX Security Symposium
Dagon, D., Lee, W., Wang, C.: Botnet Detection: Countering the Largest Security Threat. Springer US, New York (2008)
Wood, M.F., DeLoach, S.A.: An overview of the multiagent systems engineering methodology. In: Ciancarini, P., Wooldridge, M.J. (eds.) AOSE 2000. LNCS, vol. 1957, pp. 207–221. Springer, Heidelberg (2001)
Zinky, J.: Cougaar overview (2009), http://cougaar.org/wp/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Alzahrani, A.J., Ghorbani, A.A. (2015). A Multi-agent System for Smartphone Intrusion Detection Framework. In: Handa, H., Ishibuchi, H., Ong, YS., Tan, K. (eds) Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Volume 1. Proceedings in Adaptation, Learning and Optimization, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-13359-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-13359-1_9
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13358-4
Online ISBN: 978-3-319-13359-1
eBook Packages: EngineeringEngineering (R0)