Author(s) : Deepthy J, Arun Thomas, Georgy Chacko, Linu Jose, Nikhila Gopi, Anu Varghese

Volume & Issue : VOLUME 2 / 2017 , ISSUE 2

Page(s) : 1-6


The popularity of smart mobile devices such as smart phones and tablets is gro-wing rapidly. This has made them an attractive target for cyber-criminals which resulted in a rapidly growing and evolving mobile threat as attackers experiment with new business models by targeting mobile users. The core network has also become vulnerable to distributed denial-of-service attacks such as the signaling attack with the emergence of the first large-scale mobile botnets. Moreover, complementary access meth-ods such as Wi-Fi and femto cells introduce additional vulnerabilities for the mobile users as well as the core network. In this paper, we pre-sent the NEMESYS approach to smart mobile network security, in order to develop novel secu-rity technologies for endless service, and to im-prove mobile network security through a better understanding of the various threats.


Mobile network security, femto cell security, anomaly detection, visual analy-tics, virtual mobile client honey pot.


[1]A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of mobile malware in the wild” in Proc. 1st ACM W’ shop on Security and Privacy in Smart-phones and Mobile Devices, 2011, pp. 3–14.
[2]M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, andC. Wolf,“Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices,” in Proc. 2011 IEEE Symp. on Secu-rity and Privacy, May 2011, pp. 96–111.
[3]P. Traynor, W. Enck, P. McDaniel, and T. L. Porta, “Mitigating attacks on open functionality in SMS-capable cellular networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 40–53, Feb. 2009.
[4]C. Mulliner, N. Golde, and J.-P. Seifert, “SMS of death: From analysing to attacking mobile phones on a large scale,” in Proc. 20th USENIX Conf.on Security (SEC’11), Aug. 2011, pp. 363–378.
[5]Y. Song, X. Zhu, Y. Hong, H. Zhang, and H. Tan, “A mobile communication honeypot observing sys-tem,” in Proc. 4th Inter. Conf. on Multimedia In-formation Networking and Security, Nov. 2012, pp. 861–865.
[6]L. Delosieres and D. Garcia,“Infrastructure for detecting Android malware,” in Information Sciences and Systems 2013-Proc.28th Int. Symp. on Computer and Information Sciences (ISCIS’13), ser. LNEE,E. Gelenbe and R. Lent, Eds. Springer, Oct. 2013, pp. 389–398.
[7]Erol Gelenbe, Gokce Gorbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu and George Lyberopoulos, “Security for Smart Mo--bile Networks: The NEMESYS Approach,” Ava-ilable:, Jul 2013.
[8]M. Chandramohan and H. B. K. Tan, “Detection of mobile malware in the wild” IEEE Computer, vol. 45, no. 9, pp. 65–71, Sep. 2012.
[9]Mobile device market to reach 2.6 billion units by 2016. Canalys.[Online]. Available: http:// www.
[10]Cisco visual networking index: Global mobile data traffic forecast update, 2012–2017. White Paper. [Online]. Available: com/ en/US/ solutions/collateral/ns341/ns525/ns537/ns705/ns827/white paper c11-520862.pdf
[11]C. Raiu and D. Emm. (2012, Dec.) Kaspersky security bulletin 2012: Malware evolution. Kaspersky Lab.[Online].Available: Security Bulletin 2012 Malware Evolution
[12]D. Maslennikov and Y. Namestnikov. (2012, Dec.) Kaspersky security bulletin 2012: The overall statistics for 2012. Kaspersky Lab. [Online] .Avail-able: Security Bulletin 2012 The overall statistics for 2012