Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development
Total Page:16
File Type:pdf, Size:1020Kb
University of the Aegean Doctoral Thesis Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development Author: Supervisor: Dimitrios Damopoulos Assist. Prof. Georgios Kambourakis A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy at the Laboratory of Information and Communication Systems Security Department of Information and Communication Systems Engineering July 2013 Declaration of Authorship I, Dimitrios Damopoulos, declare that this thesis entitled, “Anomaly-Based Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development” and the work presented in it are my own. I confirm that: ⌅ This work was done wholly while in candidature for a research degree at this University. ⌅ Where I have consulted the published work of others, this is always clearly at- tributed. ⌅ Where I have quoted from the work of others, the source is always given. With the exception of such quotations, this thesis is entirely my own work. ⌅ I have acknowledged all main sources of help. ⌅ Where the thesis is based on work done by myself jointly with others, I have made clear exactly what was done by others and what I have contributed myself. Signed: Date: June 28, 2013 i Advising Committee of this Doctoral Thesis: Georgios Kambourakis, Supervisor Department of Information and Communication Systems Engineering Stefanos Gritzalis, Advisor Department of Information and Communication Systems Engineering Elisavet Konstantinou, Advisor Department of Information and Communication Systems Engineering University of the Aegean, Greece 2013 ii Approved by the Examining Committee: Stefanos Gritzalis Professor, University of the Aegean, Greece Georgios Kambourakis Assistant Professor, University of the Aegean, Greece Vasilios Katos Assistant Professor, Democritus University of Thrace, Greece Elisavet Konstantinou Assistant Professor, University of the Aegean, Greece Konstantinos Lambrinoudakis Associate Professor, University of Piraeus, Greece Emmanouil Maragkoudakis Assistant Professor, University of the Aegean, Greece Christos Xenakis Assistant Professor, University of Piraeus, Greece University of the Aegean, Greece 2013 iii “The evolution of malwares is a continuous race between intruders and defenders. Both use the same programming methods, tools and resources either to create a smart malware or to develop intelligent protection mechanisms.” Dimitrios Damopoulos Abstract Mobile devices have evolved and experienced an immense popularity over the last few years. Nevertheless, this growth has exposed mobile devices to an increasing number of security threats. It is thus for sure that despite the variety of peripheral protection mechanisms described in the literature, and the (post)authentication and access control techniques imposed by the Operating Systems (OS) of such devices, integral protection against advanced intrusions cannot be adequately enforced. More specifically, sophisti- cated, powerful OSs, such as Android and iOS, and the services they can support bring new opportunities to attackers toward compromising the device and the data stored on it. This is along with the rise of mobile malware which is anticipated to comprise a serious threat in the near future. Therefore, the research community is constantly seeking for solutions to cope with these newly-introduced perils. Thus, a need for more intelligent and sophisticated security controls such as Intrusion Detection and Preven- tion Systems (IDPS) is deemed necessary. However, whilst much work has been devoted to mobile device IDSs in general, research on anomaly-based or behavior-based IDS has been limited leaving several problems unsolved. Motivated by this fact, this doctoral thesis focuses on the design and development of advanced anomaly IDPS for modern mobile devices. Moreover, to the best of our knowl- edge, it is the first to explore, propose and evaluate modern advanced behavioral-based mechanisms and characteristics which can be used towards enchancing the security of mobile devices. More specifically, in the context of this thesis we show that by monitoring user’s touch patterns and behaviors as they utilize popular mobile applications or services (e.g., SMS, Call, Internet), and/or by profiling native system calls produced by an active (running) service, one is able to design powerful mechanisms that can be very reliable and accurate in detecting malicious behavior produced by malwares or unauthorised device use. The IPD mechanisms proposed and evaluated in the context of the present thesis are capable of detecting new undocumented malwares or illegitimate usage of services. This is achieved by providing continuous authentication to ensure legitimate use of the device and prevent threats via intelligent post-authentication and non-repudiation response schemes. This is supported by the experimental results that attest the efficiency of the proposed mechanisms. However, particular emphasis throughout with work is put to understand, explore and present how novel mobile device security threats can be exploited to violate confiden- tiality, integrity, availability, authenticity and privacy requirements imposed by such devices. This means that, by attacking modern smartphone platforms and popular ser- vices, and considering the di↵erent attack vectors, it allowed us to create proper IDP mechanisms for modern mobile devices. Last but not least, an advanced IDP theoretical framework for modern mobile platforms is introduced o↵ering food for thought for future work in this exciting field. Acknowledgements After more than 3 years of hard doctoral work, including however moments of great joy, I would like to thank people who have contributed to this thesis. I would firstly like to express my heartfelt gratitude to my supervisor Assist. Prof. Georgios Kambourakis, who was not only my mentor, but a friend as well. His valuable advice, guidance, scientific and moral support during my research has not been only inspirational but also determinant in achieving my goals. I could not be prouder of my academic roots and hope that I can in turn pass on the research values and the dreams that he has gave to me. Special thanks go to my everlasting mentor Prof. Stefanos Gritzalis, whose knowledge, enthusiasm, skills, professionalism, and continuous support provided the ideal basis for this work to carry on in the right direction, and for important research and professional skills to be acquired. Appreciation also goes to Assist. Prof. Elisavet Konstantinou, member of my advisory committee, and Assist. Prof. Emmanouil Maragkoudakis for their guidance and advice that greatly helped me to improve my research skills. To my dear comrades and friends Mr. Lazaros Vrysis, Mr. Agruris Kranias, Mr. Kostas Kolias, Mrs. Sia Douma, Marios Anagnostopoulos, Mr. Nasos Loukas, Mrs. Sofianna Menesidou, thank you for providing a pleasant and fun environment, full of interesting discussions. I wish them to fulfill their goals and ambitions. A special thanks goes to Mrs. Lefkothea Spiliotopoulou who tirelessly encouraged me to keep working hard for my dream. I wish her all the best in her research. It is certain I would not have made it here without my parents, Ilias and Despoina, and my sister Elpida who instilled within me a love of creative pursuits, science and language, all of which finds a place in this thesis. To my family, thank you. Their love and encouragement has given me strength and inspiration throughout my research. I am grateful that these people had faith to me and my abilities and have always been by my side throughout my studies. ix Contents Declaration of Authorship i Advising Committee of this Doctoral Thesis ii Approved by the Examining Committee iii Abstract v Greek Abstract vii Acknowledgements ix List of Figures xiv List of Tables xvi Abbreviations xvii 1 Introduction 1 1.1 Motivation and Objectives ........................... 2 1.2 Methodology and Milestones ......................... 5 1.3 Contributions .................................. 6 1.4 Thesis Structure ................................ 12 2 Mobile Device Evolution 15 2.1 Mobile Cellular Evolution ........................... 16 2.2 Wireless Network Evolution .......................... 16 2.3 Mobile Device Evolution ............................ 18 2.4 Mobile Device OS Evolution .......................... 19 2.5 Mobile Device Security ............................. 24 2.6 The evolution of Mobile Malware ....................... 25 2.6.1 Mobile Service Fraud, Social Engineering Attacks and Privacy Ex- posure .................................. 27 2.6.2 Mobile Malware Categorization .................... 28 2.7 Mobile Device Security Mechanisms ..................... 31 2.7.1 User Authentication .......................... 32 x Contents xi 2.7.2 Mobile Encryption, Sandbox and User Privileges .......... 32 2.7.3 Mobile Antivirus and Firewall ..................... 34 2.8 Discussion .................................... 35 3 Background on Intrusion Detection 36 3.1 A generic IDS .................................. 37 3.1.1 Event Box ................................ 38 3.1.1.1 E-boxes Location ...................... 38 3.1.2 Analysis Box .............................. 39 3.1.2.1 Misuse-based vs. Anomaly-based Detection ........ 40 3.1.2.2