You are on page 1of 16

WELCOME

MONITORING AND DETECTING


ABNORMAL BEHAVIOUR IN
MOBILE CLOUD INFRASTRUCTURE
V.DivyaShree

CONTENT REVIEW

Introduction

Existing system

Proposed system

Modules

System configuration

Conclusion

Future enhancement

INTRODUCTION
Today ,More than 200,000 Android and 300,000 iPhone applications
are available and increasing rapidly.
Mobile services changes to cloud-based mobile services with richer
communications and higher flexibility
New mobile cloud infrastructure that combines mobile devices and
cloud services.
The data stored in cloud infrastructure can be accessed at any time and
from anywhere through mobile devices

EXISTING SYSTEM
On normal mobile devices, vaccine applications detect malware through
signature-based method.
These methods can detect malware efficiently, but they cannot detect new
malware whose signature is unknown.
In mobile cloud infrastructure, malware will spread entire infrastructure.

PROPOSED SYSTEM
Focus on abnormal behavior detection on mobile cloud infrastructure.
Signature based methods fails to detect malware on virtual mobile instance in
future.
Behavior-based abnormal detection can address those problems by observing
activities in the cloud infrastructure.
Using monitored data, abnormal behavior is detected by machine learning
algorithm.
To validate our methodology, we built a test bed for mobile cloud infrastructure .

MODULES
USER MODULE:
Users are having authentication and security to access the detail which is
presented in the system.
Before accessing or searching the details user should have the account in
that otherwise they should register first.

MOBILE CLOUD SERVICE :

Service scenario are useful to discuss security threats on mobile cloud


infrastructure
We propose a new mobile cloud service as providing virtual mobile
instances through mobile cloud computing.
Virtual mobile instances through the combination of a mobile
environment and cloud computing.
Virtual mobile instances are available on mobile devices by accessing the
mobile cloud infrastructure.

MALWARE DATA
We chose Gold Miner malware applications to obtain abnormal data in our
mobile cloud infrastructure.
It gathers location and device identifiers (IMEI and IMSI), and sends the
information to its server.
The malware target is affecting each mobile instance as zombie.
And there are many other malware have the same purpose but their functionality
and behavior are different from each other.

ABNORMAL BEHAVIOR DETECTION:


Random Forest (RF) machine learning algorithm to train abnormal behavior
with our collected data set.
The RF algorithm is a combination of decision trees that each tree depends on
the values of a random vector .
We define three states of behavior that is inactive, active, abnormal
An inactive state means instance is not used and few application run in the
background
An user uses the instance and runs web browser, game and other application
then host moves to active state.
If one or more application detected as malware repeatedly, and delivering
information to remote server then host is deemed to be as abnormal state

System Configuration
H/W System Configuration
Processor

Pentium III

Speed

1.1 Ghz

RAM

256 MB(min)

Hard Disk

- 20 GB

Floppy Drive

1.44 MB

Key Board

Standard Windows Keyboard

Mouse

Two or Three Button Mouse

Monitor

SVGA

S/W System Configuration


Operating System

: Windows95/98/2000/XP

Application Server

: Tomcat5.0/6.X

Front End

: HTML, Java, Jsp

Scripts

: JavaScript

Server side Script

: Java Server Pages.

Database

: Mysql 5.0

Database Connectivity

: JDBC.

Conclusion
We presented new mobile cloud service to discuss some possible scenario for
individual users and office worker
To address security issue in mobile cloud infrastructure , we proposed abnormal
behavior monitoring methodology and architecture to detect malware
Testing can be done by using by test beds
RF machine learning algorithm shows that our proposed methodology and
architecture successfully detected abnormal behavior

Future Enhancement
For future work, we investigate service feasability of this new mobile cloud service
Monitoring of mobile cloud infrastructure focus on security issues, other monitoring
metrics focus on configuration of services and charging of users
We will also measure the performance of our proposed monitoring architecture.
For security aspects ,we will gather additional types of sample malware in order to
improve the accuracy of various machine learning algorithm.
We will consider other monitoring features to improve the accuracy of detecting
abnormal behavior

THANK YOU