Browse > Article
http://dx.doi.org/10.5370/JEET.2017.12.5.2051

Filtering and Intrusion Detection Approach for Secured Reconfigurable Mobile Systems  

Idriss, Rim (School of Electrical and Information Engineering, Jinan University (Zhuhai Campus)/INSAT Institute, University of Carthage)
Loukil, Adlen (INSAT Institute, University of Carthage)
Khalgui, Mohamed (INSAT Institute, University of Carthage)
Li, Zhiwu (Institute of Systems Engineering, Macau University of Science and Technology/School of Electro-Mechanical Engineering, Xidian University)
Al-Ahmari, Abdulrahman (Industrial Engineering Department, College of Engineering, King Saud University)
Publication Information
Journal of Electrical Engineering and Technology / v.12, no.5, 2017 , pp. 2051-2066 More about this Journal
Abstract
This paper deals with reconfigurable secured mobile systems where the reconfigurability has the potential of providing a required adaptability to change the system requirements. The reconfiguration scenario is presented as a run-time automatic operation which allows security mechanisms and the addition-removal-update of software tasks. In particular, there is a definite requirement for filtering and intrusion detection mechanisms that will use fewer resources and also that will improve the security on the secured mobile devices. Filtering methods are used to control incoming traffic and messages, whereas, detection methods are used to detect malware events. Nevertheless, when different reconfiguration scenarios are applied at run-time, new security threats will be emerged against those systems which need to support multiple security objectives: Confidentiality, integrity and availability. We propose in this paper a new approach that efficiently detects threats after reconfigurable scenarios and which is based on filtering and intrusion detection methods. The paper's contribution is applied to Android where the evaluation results demonstrate the effectiveness of the proposed middleware in order to detect the malicious events on reconfigurable secured mobile systems and the feasibility of running and executing such a system with the proposed solutions.
Keywords
Mobile system; Android; Reconfiguration and adaptation; Security; Filtering and detection; Multi-agent system; Modelling and evaluation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Jiang, Z. Guo, Y. Ma and N. Sang, "Measurementbased research on cryptographic algorithms for embedded real-time systems," Journal of Systems Architecture JSA, vol. 59, no. 10-Part D, pp. 1394-1404, Nov. 2013.   DOI
2 Y. Verbelen, A. Braeken, S. Kubera, A. Touhafi, J. Vliegen and N. Mentens, "Implementation of a server architecture for secure reconfiguration of embedded systems," ARPN Journal of systems and software, vol. 1, no. 9, pp. 270-279, Dec. 2011.
3 T. Thanh, T. Hoang Vu, N. Duy Phuong, D. Son Tung, C. Nguyen-Van, N. Van Cuong and P. Ngoc Nam, "Enhance performance in implementing the security of partially reconfigurable embedded systems," American Journal of Embedded Systems and Applications, vol. 2, no. 1, pp. 1-5, Jan. 2014.   DOI
4 J. F. Zhang, M. Khalgui, Z. Li, G. Frey, O. Mosbahi and H.B. Salah, "Reconfigurable coordination of distributed discrete event control systems," IEEE Transactions on Control Systems Technology, vol. 23, no. 1, pp. 323-330, Jan. 2015.   DOI
5 X. Wang, I. Khemaissia, M. Khalgui, Z. Li, O. Mosbahi and M. Zhou, "Dynamic low-power reconfiguration of real-time systems with periodic and probabilistic tasks," IEEE Transactions on Automation Science and Engineering, vol. 12, no. 1, pp. 258-271, Jan. 2015.   DOI
6 R. Robu and V. Stoicu-Tivadar, "Arff convertor tool for WEKA data mining software," In Proceedings of Computational Cybernetics and Technical Informatics ICCC-CONTI, pp. 247-251, 2010.
7 F. Yang, N. Wu, Y. Qiao, M. Zhou and Z. Li, "Scheduling of singlearm cluster tools for an atomic layer deposition process with residency time constraints," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 47, no. 3, pp. 502-516, 2017.   DOI
8 S.B. Meskina, N. Doggaz, M. Khalgui and Z. Li, "Multi-agent framework for smart grids recovery," IEEE Transactions on Systems, Man, and Cybernetics: Systems. DOI: 10.1109/TSMC.2016.2573824, 2016.   DOI
9 R. Idriss, A. Loukil and M. Khalgui, "New solutions for feasible secured reconfiguration of embedded control systems," In Proceedings of the 28th European Simulation and Modelling Conference ESM, pp. 323-330, Jan. 2014.
10 R. Idriss, A. Loukil and M. Khalgui, "New middleware for secured reconfigurable real-time systems," In Proceedings of the 14th International Conference on Intelligent Software Methodologies, Tools and Techniques SoMeT, pp. 469-483, Sep. 2015.
11 M.O. Ben Salem, O. Mosbahi, M. Khalgui, Z. Jlalia, G. Frey and M. Smida, "BROMETH: Methodology to design safe reconfigurable medical robotic systems," International Journal of Medical Robotics and Computer Assisted Surgery, DOI: 10.1002/rcs.1786, 2016.   DOI
12 M. Gasmi, O. Mosbahi, M. Khalgui, L. Gomes and Z. Li, "RNode: New pipelined approach for an effective reconfigurable wireless sensor node," IEEE Transactions on Systems, Man, and Cybernetics: Systems, DOI: 10.1109/TSMC.2016.2625817, 2016.   DOI
13 H. Grichi, O. Mosbahi, M. Khalgui and Z. Li, "RWiN: New methodology for the development of reconfigurable WSN," IEEE Transactions on Automation Science and Engineering, vol. 14, no. 1, pp. 109-125, 2017.   DOI
14 H. Grichi, O. Mosbahi, M. Khalgui and Z. Li, "New poweroriented methodology for dynamic resizing and mobility of reconfigurable wireless sensor networks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol.99, pp. 1-11, 2017.
15 M. Uzam, Z. Li, G. Gelen, and R. S. Zakariyya, "A divide-andconquer-method for the synthesis of liveness enforcing supervisors for flexible manufacturing systems," Journal of Intelligent Manufacturing, vol.27, no. 5, pp. 1111-1129, 2016.   DOI
16 Y.F Chen, Z. Li, A. Al-Ahmari, N.Q. Wu and T. Qu, "Deadlock recovery for flexible manufacturing systems modeled with Petri nets," Information Sciences, Vol.381, pp. 290-303, 2017.   DOI
17 P. Gayathri and A. Rama, "Smart shop search android mobile application," International Journal of Innovative Research in Science, Engineering and Technology, vol. 4, no. 2, pp. 146-150, Feb. 2015.
18 S. Lee and D.Y. Ju, "A novel method to avoid malicious applications on android," International Journal of Security and Its Applications, vol. 7, no. 5, pp. 121-130, Sep. 2013.   DOI
19 C-H. Huang, P-A. Hsiung and J-S. Shen, "UMLbased hardware/software co-design platform for dynamically partially reconfigurable network security systems," Journal of Systems Architecture JSA, vol. 56, no. 2-3, pp. 88-102, 2010.   DOI
20 K. Kularbphrttong, S. Somngam, C. Tongsiri and P. Roonrakwit, "A recommender system using collaborative filtering and K-Mean based on android application," In Proceedings of International Conference Applied Mathematics, Computational Science and Engineering, pp. 161-166, Dec. 2014.
21 C. Kotkar Chetan and P. Game, "Exploring security mechanisms to android device," International Journal of Advanced Computer Research, vol. 3, no. 13, pp. 216-221, Dec. 2013.
22 Q. Qian, J. Cai, M. Xie and R. Zhang, "Malicious Behavior Analysis for Android Applications," International Journal of Network Security, vol. 18, no. 1, pp. 182-192, Jan. 2016.
23 T. Hayajneh, B.J. Mohd, A. Itradat and A.N. Quttoum, "Performance and information security evaluation with firewalls," International Journal of Security and Its Applications, vol. 7, no. 6, pp. 355-372, 2013.   DOI
24 A. Magdy, M. Mahros and E. Hemayed, "Firewallbased solution for preventing privilege escalation attacks in android," International Journal of Computer Networks and Communications Security, vol. 2, no. 9, pp. 318-327, Sep. 2014.
25 C. Jindal, M. Chowkwale, R. Shethia and S.A. Shaikh, "A survey on intrusion detection systems for android smartphones," International Journal of Computer Science and Network, vol. 3, no. 6, pp. 12-17, Oct. 2014.
26 L. Dua and D. Bansal, "Review on mobile threats and detection techniques," International Journal of Distributed and Parallel Systems, vol. 5, no. 4, pp. 21-29, July. 2014.   DOI
27 H. Dhouib, A. Loukil, A. Ammari and A. Jemai, "Proactive mobile agent security: A new access control approach based on the risk analysis," In Proceedings of the digital information processing and communications ICDIPC, pp. 62-67, Aug. 2012.
28 A. Shabtai, U. Kanonov and Y. Elovici, "Intrusion detection for mobile devices using the knowledgebased, temporal abstraction method," Journal of Systems and Software, vol. 83, no. 8, pp. 1524-1537, Aug. 2010.   DOI
29 H. Khodor, S. Alaa, E. Imad, C. Ali and K. Ayman, "An implementation of intrusion detection system using genetic algorithm," International Journal of Network Security and Its Applications, vol. 4, no. 2, pp. 109-120, Mar. 2012.   DOI
30 C. Hsiao-Hwa and R.S. Hamid, "Security and communication networks," ISI Journal Citation Reports, vol. 8, no. 2, pp. 54-77, 2015.
31 D. Fischer, B. Markscheffel and T. Seyffarth, "An overview of threats and security software solutions for smartphones," International Journal for Information Security Research, vol. 3, no. 4, pp. 427-431, June. 2014.
32 A. Oyeleye Christopher, Y. Daramola Comfort and A. James, "Mob-AIDS: An intrusion detection system for the android mobile enterprise," International Journal of the Digital Information Processing and Communications, vol. 11, no. 3, pp. 161-167, May. 2014.
33 W. Jiang, K. Jiang, X. Zhang and Y. Ma, "Energy optimization of security-critical real-time applications with guaranteed security protection," Journal of Systems Architecture, vol. 61, no. 7, pp. 282-292, Aug. 2015.   DOI
34 W. Wang, R. Sanjay and M. Prabhat, "Energy-aware dynamic reconfiguration algorithms for real-Time multitasking systems," Elsevier Sustainable Computing: Informatics and Systems, vol. 1, no. 1, pp. 35-45, Mar. 2011.   DOI
35 M. Alam, and S. T. Vuong, "An intelligent multiagent based detection framework for classification of android malware," In Proceedings of the 10th International Conference of Active Media Technology, vol. 8610, pp. 226-237, 2014.
36 Y. Tong, Z. Li and A. Giua, "On the equivalence of observation structures for Petri net generators," IEEE Transactions on Automatic Control, vol. 61, no. 9, pp. 2448-2462, 2016.   DOI
37 Y. Tong, Z.W. Li, C. Seatzu and A. Giua, "Verification of state-based opacity using Petri nets," IEEE Trans. on Automatic Control, vol. 62, no. 6, pp. 2823-2837, 2017.   DOI
38 X. Wang, Z. Li and W.M. Wonham, "Dynamic multiple-period reconfiguration of real-time scheduling based on timed DES supervisory control," IEEE Transactions on Industrial Informatics, vol. 12, no. 1, pp. 101-111, 2016.   DOI
39 P. Jae-Kyung and C. Sang-Yong, "Studying security weaknesses of android system," International Journal of Security and Its Applications, vol. 9, no. 3, pp. 7-12, Mar. 2015.   DOI
40 A. J. Alzahrani and A. A. Ghorbani, "A multi-agent system for smartphone intrusion detection framework," In Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, vol. 1, pp. 101-113, 2015.
41 A. Dwived, Y.K. Rana and B.P. patel, "A Real time host and network mobile agent based intrusion detection system (HNMAIDS)," International Journal of Computer Applications, vol. 113, no. 12, pp.33-40, 2015.   DOI
42 M. Jang, and D. Kim, "Filtering illegal Android application based on feature information," In Proceedings of Research in Adaptive and Convergent Systems, pp.357-358, 2013.
43 V. Rastogi, Y. Chen and W. Enck, "AppsPlayground: automatic security analysis of smartphone applications," In Proceedings of the third ACM conference on Data and application security and privacy, pp. 209-220, 2013.
44 B. Pascal, T. Lionel, S. Gilles, R. Michel, and S. Nicolas, "Run time mapping for dynamic reconfiguration management in embedded systems," International Journal of Embedded Systems, vol. 4, no. 3-4, pp. 276-291, 2010.   DOI
45 L. Min and Q. Cao, "Runtime-based behavior dynamic analysis system for Android malware detection," Advanced Materials Research, vol. 756-759, pp. 2220-2225, 2012.
46 T. Blasing, L. Batyuk, A.D. Schimdt, S.H. Camtepe and S. Albayrak, "An Android application sandbox system for suspicious software detection," In Proc. the 5th International Conference on Malicious and Unwanted Software, DOI: 10.1109/MALWARE.2010.5665792, 2010.   DOI
47 H.C. Liu, J.X. You, Z. Li and G. Tian, " Fuzzy Petri nets for knowledge representation and reasoning: A literature review," Engineering Applications of Artificial Intelligence, vol. 60, pp. 45-56, 2017.   DOI
48 W. Li, "Evaluating the impacts of dynamic reconfiguration on the QoS of running systems," Journal of Systems and Software, vol. 84, no. 12, pp. 2123-2138, Dec. 2011.   DOI
49 Z. Zhao, P. Zhao and W. Li, "Quantitative analysis of design decisions for dynamic reconfiguration," Journal of Software, vol. 8, no. 10, pp. 2391-2396, Oct. 2013.
50 K. Vallidevi and B. Chitra, "SLA aware dynamic reconfiguration for the safe building security system," International Journal of Software Engineering and Its Applications, vol. 9, no. 2, pp. 151-162, Feb. 2015.   DOI
51 F. Zhao, J. Wang, Ju. Wang and J. Jonrinaldi, "A dynamic rescheduling model with multi-agent system and its solution method," Journal of Mechanical Engineering, vol. 58, no. 2, pp. 81-92, 2012.   DOI
52 A. Hussein Rady, "Multi-agent system for negotiation in a collaborative supply chain management," International Journal of Video Image Processing and Network Security IJVIPNS-IJENS, vol. 11, no. 5, pp.25-36, 2011.