Lanier A Watkins, Yue Yu, Sifan Li, W. H. Robinson, A. Rubin
{"title":"Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks","authors":"Lanier A Watkins, Yue Yu, Sifan Li, W. H. Robinson, A. Rubin","doi":"10.1109/UEMCON51285.2020.9298079","DOIUrl":null,"url":null,"abstract":"In bring-your-own-device (BYOD) and guest wireless networks, the use of mobile devices within industry, government, and academic enterprise networks represents a difficult security challenge for system administrators. Devices not owned by the enterprise can pose additional risk. Our prior research demonstrated a dynamic anomaly detection method that used side-channel analysis of ping responses to infer whether devices were compromised. Initial results showed promise for a limited dataset. Our extension of this prior work now uses deep learning, twice as many features, and analyzes ten times more malware. Additional experiments demonstrate that our deep learning model generalizes to the detection of unseen threats across multiple families of malware.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298079","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In bring-your-own-device (BYOD) and guest wireless networks, the use of mobile devices within industry, government, and academic enterprise networks represents a difficult security challenge for system administrators. Devices not owned by the enterprise can pose additional risk. Our prior research demonstrated a dynamic anomaly detection method that used side-channel analysis of ping responses to infer whether devices were compromised. Initial results showed promise for a limited dataset. Our extension of this prior work now uses deep learning, twice as many features, and analyzes ten times more malware. Additional experiments demonstrate that our deep learning model generalizes to the detection of unseen threats across multiple families of malware.