Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications

Abstract:

Attacks are usually orchestrated based upon the motivation of the attackers, who are becoming increasingly savvy, better resourced, and more committed. This article examines cyber threats and vulnerabilities through the eyes of the perpetrator. To begin, the authors discuss some counter approaches that have produced limited benefits at best, and then introduce a novel approach that details the use of mobile device resource usage to discern unauthentic mobile applications from authentic applications. This capability is indeed a step in the right direction to addressing the problem of intrusion detection in mobile devices without using traditional signatures or rule-based approaches.


AUTHORS

Photo of Lanier Watkins

Information Security Institute Johns Hopkins University
U.S.A.

Lanier Watkins is currently a Senior Professional Staff II member of the Asymmetric Operations Sector of the Johns Hopkins University Applied Physics Laboratory (JHU/APL) and an Associate Research Scientist at the JHU Information Security Institute. Prior to joining APL, served as a senior engineer and product manager at the Ford Motor Company and AT&T.

Photo of J. S. Hurley

National Defense University
USA

John S. Hurley is the course manager for Cyberspace Strategies and co-manager of the Critical Infrastructure Protection Laboratory at the National Defense University (NDU). He has also worked as senior manager of Distributed Computing at the Boeing Company, directed three research centers, and served as the co-director of the Army Center of Excellence. He is also a 2014-2015 Seminar XXI Fellow.

Photo of Shuang Xie

Information Security Institute Johns Hopkins University
U.S.A.

Shuang Xie is a software engineer at Alpine Electronics Research of America, Inc. He earned a bachelor’s degree in Security Informatics from the Shanghai Jiao Tong University, Shanghai, China in 2012, and a master’s degree in Security Informatics from the Johns Hopkins University, Baltimore, Maryland, in 2014.

Photo of Tianning Yang

Information Security Institute Johns Hopkins University
U.S.A.

Tianning Yang is a security engineer at Nav Technologies, designing security schemes and protecting confidential data related to credit reports and personally identifiable  information. She earned her bachelor’s degree in Information Security and an LLB in Law from Nankai University in 2012, and a master’s degree in Security Informatics from Johns Hopkins University in 2014.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Media Parner to JIW.

Media Partner

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com