+ All Categories
Home > Documents > SMS Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection

SMS Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection

Date post: 23-Feb-2016
Category:
Upload: alia
View: 39 times
Download: 0 times
Share this document with a friend
Description:
SMS Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection. Authors: Guanhua Yan, Stephan Eidenbenz , Emannuele Galli Presented by: Ishtiaq Rouf. Overview of presentation. Introduction to Short Message System (SMS) SMS architecture, tracing SMSs, SMS proxy - PowerPoint PPT Presentation
Popular Tags:
31
SMS WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTION Authors: Guanhua Yan, Stephan Eidenbenz, Emannuele Galli Presented by: Ishtiaq Rouf
Transcript
Page 1: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

SMS WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTIONAuthors: Guanhua Yan, Stephan Eidenbenz, Emannuele GalliPresented by: Ishtiaq Rouf

Page 2: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

2

Overview of presentation Introduction to Short Message System (SMS)

SMS architecture, tracing SMSs, SMS proxy Common threats to SMS systems, existing solutions

Behavior analysis Statistically accurate metrics

SMS Watchdog Detection types

Performance analysis Accuracy and usefulness of protocol

Page 3: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

3

An overview of the SMS architecture, SMS proxies, and common threats on SMS systems.

Short Message System

Page 4: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

4

Short message system (SMS)

SMSs were introduced in 1980s and have become a fabric of our lives since.

Uses the signal paths necessary to control the telephony traffic. Not an intended use! Designed for emergency only.

More than 1 trillion SMSs are delivered each year. Lucrative target for attackers.

Page 5: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

5

Threats to SMS systems Common network attacks launched

against SMS: Spamming

Sending unsolicited messages

Spoofing Falsely pretending to be a sender

Phishing Trying to steal device information

Page 6: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

6

Previously attempted solutions

IP-based solutions: Signature-based detection schemes to examine

mobile network traffic Power usage of mobile applications Machine-learning based approach to discriminate at

the level of APIs

Information-theoretical solutions: Analysis of message size, distribution, service time

distribution User clique analysis, similar to email spam protection

Page 7: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

7

Limitation of traditional methods No determination of mobility

Mobility of malicious device is not considered

One-size-fits-all solutions Attempting to use solutions that are not scaled for SMS

Power requirements Solutions are not suitable for battery-operated devices

Computational complexity Cellular phones have less computational ability compared to

servers and workstations

Page 8: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

8

Features of proposed solutions Apply a protection mechanism at the SMS Center

Implemented at the server, where most control and information are available

Collect usage data over five months to create a trace of usage Used to train a pattern recognition script An SMS proxy in Italy was used to collect data.

Four unique schemes used in combination Combination of four systems will work better than one

“silver bullet” solution

Page 9: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

9

SMS Architecture

Alphabet soup: BSS – Base Station

System SGSN – Serving

GPRS Support Node GGSN – Gateway

GPRS Support Node MSC – Mobile

Switching Center SMSC – SMS Center

Protection applied here

Page 10: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

10

An overview of statistical methods that can be useful in analyzing the trace of SMS users.

Behavior analysis

Page 11: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

11

Trace analysis “Trace” of users was collected from the SMS proxy

Interested in statistically time-invariant metrics Various statistical operations displayed different strengths

Coefficient of variation (COV) is deemed to be a better metric compared to basic functions The ratio of standard deviation to the mean

Entropy of the distributions was computed

p is the fraction of SMSs sent to the i-th unique user

Page 12: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

12

Usage analysis (1/4) Number of messages and unique

sender/receiver per day over 5 months

Increased usage as users increase with time

Page 13: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

13

Usage analysis (2/4) Average number of messages for persistent

users (daily/weekly)

Anomalous spikes make the system unreliable

Page 14: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

14

Usage analysis (3/4) Average number of receivers per persistent

user (daily/weekly)

Similar spike in usage observed

Page 15: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

15

Usage analysis (4/4) Average entropies for persistent users

(daily/weekly)

Entropy is a better measure, but not a full solution

Page 16: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

16

Window-based analysis High variation is inherent in many SMS users’

behaviors on a temporally periodic basis. A window-based approach can mitigate issues and

help bound the parameters better.

Two parameters are selected, in particular: : number of blocks created in the dataset

10 or 20 blocks created : minimum number of SMSs sent by users

considered 100 or 200 SMSs considered

Page 17: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

17

COV > 1 for window-based behaviors

Window-based behaviors of SMS users bear lower variation than their temporally periodic behaviors.

“COV > 1” means “high variation” Not useful for anomaly detection

Page 18: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

18

Similarity measure The following equation is used to get the

recipient similarity metric:

Relative entropy is used as a comparison of distributions to determine similarity: Jensen-Shannon (JS) divergence used Provides relative symmetry

Page 19: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

19

COV > 1 for similarity measure Divergence analysis shows better

performance compared to previous metrics.

Page 20: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

20

An overview of how SMS Watchdog is designed to make use of statistical analyses of behavioral patterns.

SMS Watchdog

Page 21: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

21

Threat models Two families of threats were considered:

Blending attacks Occurs when an SMS user’s account is used to

send messaged for a different person. Trojan horse Spoofing SMS proxy

Broadcast attacks Mirrors the behaviors of mobile malware that

send out phishing or spamming messages

Page 22: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

22

Workflow of SMS Watchdog The proposed solution works in three

steps: Monitoring

Maintains a window size, h, for each user that has subscribed for this service

Also keeps a count, k, of number of SMSs sent Anomaly detection

Watches for anomalous behaviors (explained later)

Alert handling Sends an alert to the SMS user using a different

medium

Page 23: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

23

Anomaly detection Anomaly detection is done in multiple steps:

Decision on detection window size Minimize the COV of the JS-divergence after grouping recipients

(to maximize the level of similarity)

Mean-based anomaly detection Leverages average number of unique recipients and average

entropy within each block (both show low variation) Checks if the mean of these two metrics vary radically

Similarity-based anomaly detection In a light-weight version, it is proposed that historic information be

condensed into a set of recipients and a distributional function

Page 24: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

24

Threat determination metric denotes a block or the test sequence

Mean-based detection: : Number of unique recipients in : Entropy of

Similarity-based detection: : Set of top recipients

S-type detection : Normalized distribution of the number of SMSs sent to

the top recipients within sequence D-type detection

Page 25: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

25

Evaluation of experimental performance observed by the authors.

Performance analysis

Page 26: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

26

False positive rates Detector parameters

70% of data used for training, 30% for testing

= 10, , n = # of SMSs = Upper bound

Low false-positive rate observed for all metrics:

Page 27: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

27

Detecting blending attacks Entire dataset was divided into pairs of two

Observations: Similarity-based (S- and D-type) schemes detect better

Contains more information in the detection metrics H- and D-type perform better than R- and S-type

Consider not only the set of unique recipients, but also the distribution of the number of SMSs send to each recipient

Page 28: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

28

Detecting broadcast attacks Test dataset of each user is intermingled with

maliciously sent messages malicious messages sent (“broadcast threshold”)

Unlike before, R-type is good at detecting the threat Considers message number only

Page 29: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

29

Hybrid detection Two hybrid schemes proposed:

R/H/S/D Any flag is treated as anomalous

S/D Only S- and D-type flags are treated as

anomalous Performance of hybrid detections

schemes:

Page 30: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

30

Self-reported limitations SMS Watchdog fails to detect the

following cases: SMS faking attacks Transient accounts that are set up for

phishing Behavioral training that is not covered

Page 31: SMS Watchdog:  Profiling Social Behaviors of SMS Users for Anomaly Detection

31

Questions?


Recommended