Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications

Abstract:

Attacks are usually orchestrated based upon the motivation of the attackers, who are becoming increasingly savvy, better resourced, and more committed. This article examines cyber threats and vulnerabilities through the eyes of the perpetrator. To begin, the authors discuss some counter approaches that have produced limited benefits at best, and then introduce a novel approach that details the use of mobile device resource usage to discern unauthentic mobile applications from authentic applications. This capability is indeed a step in the right direction to addressing the problem of intrusion detection in mobile devices without using traditional signatures or rule-based approaches.


AUTHORS

Photo of Lanier Watkins

Information Security Institute Johns Hopkins University
U.S.A.

Lanier Watkins is currently a Senior Professional Staff II member of the Asymmetric Operations Sector of the Johns Hopkins University Applied Physics Laboratory (JHU/APL) and an Associate Research Scientist at the JHU Information Security Institute. Prior to joining APL, served as a senior engineer and product manager at the Ford Motor Company and AT&T.

Photo of John S. Hurley

National Defense University
USA

Dr. John S. Hurley serves as a Professor in the College of Information and Cyberspace at the National Defense University. Hurley has over 35 years’ experience in the area of information and computing technologies. He served as Senior Manager, Distributed Computing in the Networked Systems Division, for the Boeing Company, Bellevue, WA. Dr. Hurley was Professor of Electrical Engineering and Director of three research centers (Scalable and Embedded Applications Center, Materials Processing Assessment and Characterization Center, and Avalon Scalable Embedded Computing Center) and the Co-Director, Army Center of Excellence in Electronic Sensors and Combat at Clark Atlanta University, in Atlanta, GA. He is a 2015 Seminar XXl Fellow.

Photo of Shuang Xie

Information Security Institute Johns Hopkins University
U.S.A.

Shuang Xie is a software engineer at Alpine Electronics Research of America, Inc. He earned a bachelor’s degree in Security Informatics from the Shanghai Jiao Tong University, Shanghai, China in 2012, and a master’s degree in Security Informatics from the Johns Hopkins University, Baltimore, Maryland, in 2014.

Photo of Tianning Yang

Information Security Institute Johns Hopkins University
U.S.A.

Tianning Yang is a security engineer at Nav Technologies, designing security schemes and protecting confidential data related to credit reports and personally identifiable  information. She earned her bachelor’s degree in Information Security and an LLB in Law from Nankai University in 2012, and a master’s degree in Security Informatics from Johns Hopkins University in 2014.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com