Lanier A Watkins, Yue Yu, Sifan Li, W. H. Robinson, A. Rubin
{"title":"利用深度学习识别企业网络中个人移动设备的安全风险","authors":"Lanier A Watkins, Yue Yu, Sifan Li, W. H. Robinson, A. Rubin","doi":"10.1109/UEMCON51285.2020.9298079","DOIUrl":null,"url":null,"abstract":"In bring-your-own-device (BYOD) and guest wireless networks, the use of mobile devices within industry, government, and academic enterprise networks represents a difficult security challenge for system administrators. Devices not owned by the enterprise can pose additional risk. Our prior research demonstrated a dynamic anomaly detection method that used side-channel analysis of ping responses to infer whether devices were compromised. Initial results showed promise for a limited dataset. Our extension of this prior work now uses deep learning, twice as many features, and analyzes ten times more malware. Additional experiments demonstrate that our deep learning model generalizes to the detection of unseen threats across multiple families of malware.","PeriodicalId":433609,"journal":{"name":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks\",\"authors\":\"Lanier A Watkins, Yue Yu, Sifan Li, W. H. Robinson, A. Rubin\",\"doi\":\"10.1109/UEMCON51285.2020.9298079\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In bring-your-own-device (BYOD) and guest wireless networks, the use of mobile devices within industry, government, and academic enterprise networks represents a difficult security challenge for system administrators. Devices not owned by the enterprise can pose additional risk. Our prior research demonstrated a dynamic anomaly detection method that used side-channel analysis of ping responses to infer whether devices were compromised. Initial results showed promise for a limited dataset. Our extension of this prior work now uses deep learning, twice as many features, and analyzes ten times more malware. Additional experiments demonstrate that our deep learning model generalizes to the detection of unseen threats across multiple families of malware.\",\"PeriodicalId\":433609,\"journal\":{\"name\":\"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UEMCON51285.2020.9298079\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UEMCON51285.2020.9298079","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Deep Learning to Identify Security Risks of Personal Mobile Devices in Enterprise Networks
In bring-your-own-device (BYOD) and guest wireless networks, the use of mobile devices within industry, government, and academic enterprise networks represents a difficult security challenge for system administrators. Devices not owned by the enterprise can pose additional risk. Our prior research demonstrated a dynamic anomaly detection method that used side-channel analysis of ping responses to infer whether devices were compromised. Initial results showed promise for a limited dataset. Our extension of this prior work now uses deep learning, twice as many features, and analyzes ten times more malware. Additional experiments demonstrate that our deep learning model generalizes to the detection of unseen threats across multiple families of malware.