Artificial Intelligence Techniques for Detecting Communication Anomalies in Smartphones
DOI:
https://doi.org/10.63282/3050-9262.IJAIDSML-V5I3P120Keywords:
Smartphone, Android Security, Machine Learning, Mobile Security, Mobile Computing, Deep LearningAbstract
Nowadays, everybody desires to possess their personal mobile device, and this has led to an increase in the number of Android users worldwide. Every device connected to the internet communicates with a multitude of applications and thus ends up having many malware attacks or threats in a mobile home. This paper takes a comparative design of predictive models based on smartphone detecting communication anomalies through AndroVul. In this paper, a framework is proposed to be developed to detect cases of communication abnormality using the AndroVul data set with the help of an Artificial Neural Network (ANN). The methodology consists of the preprocessing, feature selection and model training to do a good differentiation of the benign and malicious communication behavior. The evaluation conducted on the experiment indicates that ANN performs with 99.33% accuracy (ACC) , 99.71% precision (PRE), 99.65% recall (REC) and an F1-score (F1) of 99 which is superior to the classical models: MLP (84.31%), Random Forest (93.6%), PCA-based classifiers (89.3%), and SVM (98.2%). Such results indicate the efficiency of AI-based solutions to increase the security of communication in smartphones, and can be applied on a large scale to identify potential abnormalities of communication in the mobile environment. In general, the most important contribution is the introduction of a strong AI-based framework that improves the security of mobile communication by providing reliable, scalable, and high-performance anomaly detection.
References
[1] P. Pathak, A. Shrivastava, and S. Gupta, “A survey on various security issues in delay tolerant networks,” J Adv Shell Progr., vol. 2, no. 2, pp. 12–18, 2015.
[2] M. Louk, H. Lim, and H. Lee, “An Analysis of Security System for Intrusion in Smartphone Environment,” Sci. World J., 2014, doi: 10.1155/2014/983901.
[3] B. Amro, “Malware Detection Techniques for Mobile Devices,” Int. J. Mob. Netw. Commun. Telemat., vol. 7, no. 4/5/6, pp. 01–10, Dec. 2017, doi: 10.5121/ijmnct . 2017.7601.
[4] S. Achouche, U. B. Yalamanchi, and N. Raveendran, “Method, apparatus, and computer-readable medium for performing a data exchange on a data exchange framework,” 2019
[5] R. A. Ariyaluran Habeeb, F. Nasaruddin, A. Gani, I. A. Targio Hashem, E. Ahmed, and M. Imran, “Real-time big data processing for anomaly detection: A Survey,” Int. J. Inf. Manage., vol. 45, pp. 289–307, Apr. 2019, doi: 10.1016/j.ijinfomgt.2018.08.006.
[6] Y. Bhomia, S. Sahu, and S. Sing, “Machine learning for anomaly detection approaches, challenges, and applications,” Pharma Innov., vol. 8, no. 3S, pp. 24–27, Jan. 2019, doi: 10.22271/tpi.2019.v8.i3Sa.25252.
[7] V. M. L. G. Nerella, “Automated cross-platform database migration and high availability implementation,” Turkish J. Comput. Math. Educ., vol. 9, no. 2, pp. 823–835, 2018.
[8] J. Prakash, S. Sankaran, and J. Jithish, “Attack detection based on statistical analysis of smartphone resource utilization,” in 2019 IEEE 16th India Council International Conference, INDICON 2019 - Symposium Proceedings, 2019. doi: 10.1109/INDICON47234.2019.9030310.
[9] E. Talab, O. Mohamed, L. Begum, F. Aloul, and A. Sagahyroon, “Detecting heart anomalies using mobile phones and machine learning,” in Proceedings - 2019 IEEE 19th International Conference on Bioinformatics and Bioengineering, BIBE 2019, 2019. doi: 10.1109/BIBE.2019.00083.
[10] Z. Zulkefli, M. M. Singh, A. R. Mohd Shariff, and A. Samsudin, “Typosquat Cyber Crime Attack Detection via Smartphone,” in Procedia Computer Science, 2017. doi: 10.1016/j.procs.2017.12.203.
[11] Y. Mirsky, A. Shabtai, B. Shapira, Y. Elovici, and L. Rokach, “Anomaly detection for smartphone data streams,” Pervasive Mob. Comput., vol. 35, pp. 83–107, Feb. 2017, doi: 10.1016/j.pmcj.2016.07.006.
[12] V. G. T. Da Costa, S. Barbon, R. S. Miani, J. J. P. C. Rodrigues, and B. B. Zarpelao, “Detecting mobile botnets through machine learning and system calls analysis,” in IEEE International Conference on Communications, 2017. doi: 10.1109/ICC.2017.7997390.
[13] K. Huang, X. Ding, J. Xu, G. Chen, and W. Ding, “Monitoring sleep and detecting irregular nights through unconstrained smartphone sensing,” in Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2016. doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.30.
[14] S. Garg, “AI/ML Driven Proactive Performance Monitoring, Resource Allocation and Effective Cost Management in SaaS Operations,” Int. J. Core Eng. Manag., vol. 6, no. 6, pp. 263–273, 2019.
[15] P. I. Radoglou-Grammatikis and P. G. Sarigiannidis, “Flow anomaly-based intrusion detection system for Android mobile devices,” in 2017 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017, 2017. doi: 10.1109/MOCAST.2017.7937625.
[16] T. Salman, D. Bhamare, A. Erbad, R. Jain, and M. Samaka, “Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments,” in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), IEEE, Jun. 2017, pp. 97–103. doi: 10.1109/CSCloud . 2017.15.
[17] M. Hasan, M. M. Islam, M. I. I. Zarif, and M. M. A. Hashem, “Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches,” Internet of Things, vol. 7, Sep. 2019, doi: 10.1016/j.iot.2019.100059.
[18] L. Wen and H. Yu, “An Android malware detection system based on machine learning,” in AIP Conference Proceedings, 2017. doi: 10.1063/1.4992953.
[19] Mamidala, J. V., Enokkaren, S. J., Attipalli, A., Bitkuri, V., Kendyala, R., & Kurma, J. (2023). Machine Learning Models Powered by Big Data for Health Insurance Expense Forecasting. International Research Journal of Economics and Management Studies IRJEMS, 2(1).
[20] Nadella, V. M. (2023). Zero Trust Architecture for Telecom Operations. International Journal of Emerging Research in Engineering and Technology, 4(3), 115-129.
[21] Bitkuri, V., Kendyala, R., Kurma, J., Enokkaren, S. J., & Mamidala, J. V. (2023). Forecasting Stock Price Movements With Deep Learning Models for time Series Data Analysis. Journal of Artificial Intelligence & Cloud Computing. SRC/JAICC-531. DOI: doi. org/10.47363/JAICC/2023 (2), 489, 2-9.
[22] Nadella, V. M. (2023). Anomaly Detection and Fault Prediction using ML in Telecom Operations. International Journal of Emerging Trends in Computer Science and Information Technology, 4(3), 134-143.
[23] Kosaraju, P., & Nadella, V. M. (2022). Security and Privacy in IoT Ecosystems. Universal Library of Engineering Technology, (Issue).
[24] Singh, A. A. S. S., Mania, V., Kothamaram, R. R., Rajendran, D., Namburi, V. D. N., & Tamilmani, V. (2023). Exploration of Java-Based Big Data Frameworks: Architecture, Challenges, and Opportunities. Journal of Artificial Intelligence & Cloud Computing, 2(4), 1-8.
[25] Routhu, K. K. (2023). AI-driven succession planning in Oracle HCM Cloud: Building resilient leadership pipelines through predictive analytics. International Journal of Science, Engineering and Technology, 11(5).
[26] Tamilmani, V., Namburi, V. D., Singh Singh, A. A., Maniar, V., Kothamaram, R. R., & Rajendran, D. (2023). Real-Time Identification of Phishing Websites Using Advanced Machine Learning Methods. Available at SSRN 5837142.
[27] Routhu, K. K. (2023). AI-driven succession planning in Oracle HCM Cloud: Building resilient leadership pipelines through predictive analytics. International Journal of Science, Engineering and Technology, 11(5). https://doi.org/10.5281/zenodo.17292018
[28] From Fragmentation to Focus: The Benefits of Centralizing Procurement. (2023). International Journal of Research and Applied Innovations, 6(6), 9820-9833. https://doi.org/10.15662/
[29] Routhu, K. K. (2023). Embedding fairness into the digital enterprise, data driven DEI strategies with Oracle HCM Analytics. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 9(8), 266-274.
[30] Routhu, K. K. (2023). AI-driven skills forecasting in Oracle HCM Cloud: From static competencies to predictive workforce design. International Journal of Science, Engineering and Technology, 11(1).
[31] Padur, S. K. R. (2023). AI-Augmented Enterprise ERP Modernization: Zero-Downtime Strategies for Oracle E-Business Suite R12. 2 and Beyond. Available at SSRN 5605510.
[32] Routhu, K. K. (2022). From Case Management to Conversational HR: Redefining Help Desks with Oracle’s AI and NLP Framework. International Journal of Science, Engineering and Technology, 10(6).
[33] Vattikonda, N., Gupta, A. K., Polu, A. R., Narra, B., Buddula, D. V. K. R., & Patchipulusu, H. H. S. (2022). Blockchain Technology in Supply Chain and Logistics: A Comprehensive Review of Applications, Challenges, and Innovations. International Journal of Emerging Trends in Computer Science and Information Technology, 3(3), 72-80.
[34] Attipalli, A., BITKURI, V., Mamidala, J. V., Kendyala, R., & KURMA, J. (2022). Empowering Cloud Security with Artificial Intelligence: Detecting Threats Using Advanced Machine learning Technologies. Available at SSRN 5741263.
[35] Padur, S. K. R. (2022). Intelligent resource management: AI methods for predictive workload forecasting in cloud data centers. J. Artif. Intell. Mach. Learn. & Data Sci, 1(1), 2936-2941.
[36] Nadella, V. M. (2022). Digital Twins for Predictive Network Management and System Simulation. International Journal of AI, BigData, Computational and Management Studies, 3(3), 100-111.
[37] Routhu, K. K. (2022). From RFID to Geofencing: IoT-Enabled Smart Time Tracking in Oracle HCM Cloud. International Journal of Science, Engineering and Technology, 10(4).
[38] Nadella, V. (2019). Extracting road traffic data through video analysis using automatic camera calibration and deep neural networks.
[39] Polam, R. M., Kamarthapu, B., Kakani, A. B., Nandiraju, S. K. K., Chundru, S. K., & Vangala, S. R. (2022). Data Security in Cloud Computing: Encryption, Zero Trust, and Homomorphic Encryption. International Journal of Emerging Trends in Computer Science and Information Technology, 3(4), 31-41.
[40] Padur, S. K. R. (2022). AI augmented platform engineering, transforming developer experience through intelligent automation and self optimizing internal platforms. International Journal of Science, Engineering and Technology, 10(5), 10-5281.
[41] Kosaraju, P. , & Nadella, V. M. (2021). Quality of Experience (QoE) and Network Performance Modelling for Multimedia Traffic. Journal of Artificial Intelligence and Big Data, 1(1), 1-13. https://doi.org/10.31586/jaibd.2021.135










