This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Battery-Based Intrusion Detection: A Focus on Power for Security Assurance
Technical Paper
2004-01-3169
ISSN: 0148-7191, e-ISSN: 2688-3627
Annotation ability available
Sector:
Event:
Power Systems Conference
Language:
English
Abstract
An intrusion detection system (IDS) for mobile devices is at odds with itself: IDS should run continuously and remain transparent to the system and the user(s); however, the IDS should use as little system resources as possible to detect and prevent intrusions. This paper proposes an efficacious early warning system via a mobile host-based form of intrusion detection that can alert security administrators to protect their corporate network(s). This innovative technique operates through the implementation of battery-based intrusion detection (B-bid) on mobile devices by correlating attacks with their impact on device power consumption using a rules-based host intrusion detection engine (HIDE). HIDE monitors power behavior to detect potential intrusions by noting irregularities of power consumption and works in conjunction with a scan port intrusion engine (SPIE) and a host analysis signature trace engine (HASTE) to provide protection to both mobile hosts and, by extension, their affiliated network(s).
Recommended Content
Technical Paper | The Many Faces of Security |
Technical Paper | Industry Activities Related to Aircraft Information Security |
Technical Paper | Managing and Administering Security Infrastructure Controls via Policy |
Authors
Topic
Citation
Jacoby, G. and Davis, N., "Battery-Based Intrusion Detection: A Focus on Power for Security Assurance," SAE Technical Paper 2004-01-3169, 2004, https://doi.org/10.4271/2004-01-3169.Also In
References
- “Best Practices for Securing the Mobile Enterprise,” 1 6 Apr. 2004
- http://securityresponse.symantec.com/avcenter/venc/data/epoc.cabir.html
- Martin T. Hsiao M. Ha D. Krishnaswami J. “Denial-of-Service Attacks on Battery-powered Mobile Computers,” Second IEEE International Conf. on Pervasive Computing and Communications 14 17 Mar. 2004
- Brown B. “The Security Difference Between b and I,” IEEE Potentials 23 27 Oct–Nov. 2003
- Benini L. et.al. “Battery-driven dynamic power management,” IEEE Design & Test of Computers 18 53 60 Apr. 2001
- Benini L. et.al. “Extending lifetime of portable systems by battery scheduling,” Proceedings. Design Automation & Test Europe Conference 197 201 Mar. 2001
- Chiasserini C. F. Rao R. R. “Energy Efficient Battery Management,” IEEE J. on Selected Areas in Comms. 19 1235 1245 Jul. 2001
- Smart Battery System Implementers Forum http://www.sbs-forum.org
- Systems Management Bus Organization http://www.smbus.org/specs/smbdef.htm
- Lahiri K. Raghunathan A. Dey S. “Communication architecture based power management for battery efficient system design” Proc. ACM/IEEE DAC 691 696 2002
- Cannady J. Harrell, J. R. J.R. “A Comparative Analysis of Current Intrusion Detection Technologies” Proc. of Technology in Information Security Conference (TISC) 212 218 1999
- Schwartau W. “Time-Based Security,” Interpact Press 1 192 1999
- “App. Note 197 Sense Resistor Power Dissipation,” 1 2 http://www.maxim-ic.com
- Microsoft Corporation Advanced Power Management The Next Generation, Version 1.0 http://www.microsoft.com/whdc/hwdev/archive/busbios/amp_12.mspx
- Brake C. “Power Management in Portable ARM Based Systems,” Accelent Systems 1 5 12 Nov. 2001
- Syracuse K. C. Clark W. D. K. “A statistical approach to domain performance modeling for oxyhalide primary lithium batteries,” Proc. Annual Battery Conference on Applications and Advances 1997
- Pedram M. Wu Q. “Design considerations for battery-powered electronics,” Proc. Design Automation Conference 861 866 June 1999
- “App. Note 131 Lithium-Ion Cell Fuel Gauging with Dallas Semiconductors,” 1 10 http://www.maxim-ic.com
- Friel D. The Importance of Full Smart Battery Data Specification Implementation 1 8 www.powersmart.com
- Bauer D. Cannady J. “Detecting anomalous Behavior: Optimization of Network Traffic Parameters Via an Evolution Strategy,” Georgia Tech Research Institute, Computer Science and Information Technology Division Atlanta, Georgia
- Jha S. Sheyner O. Wing J. “Two Formal Analyses of Attack Graphs” Computer Security Foundations Workshop, Proceedings. 15th IEEE 49 63 24 26 Jun. 2002
- Erbacher R. Frincke D. “Visualization in Detection of Intrusions and Misuse in Large Scale Networks,” Proc. of the International Conference on Information Visualization ‘2000 London, UK 294 299 Jul. 2000
- Erbacher R. Frincke D. “Visual Behavior Characterization for Intrusion and Misuse Detection” U. of Idaho 1 9 2001
- Porras P.A. Kemmerer R.A. “Penetration State Transition Analysis A Rule-Based Intrusion Detection Approach,” Proc. of the Eighth Annual Computer Security Applications Conference Texas 220 229 Dec. 1992
- Jarrell R. Mar. 2004 http://babylon5.cc.vt.edu/~jarrell/esewgraph/
- Das K. “Attack Development for Intrusion Detection Evaluation” M.I.T., Dept of Electrical Engineering and Computer Science Boston 1 97 2002
- Benini L. et al “A discrete-time battery model for high-level power estimation,” Proc. Design Automation & Test Europe Conf 35 39 Mar. 2000
- Snedecor G. Cochran W. Statistical Methods, Eighth Edition Iowa State University Pre.ss 1989
- http://www.acpi.info/
- http://www.sbs-if.org/
- Durst R. Champion T. Witten B. Miller E. Luigi E. “Testing and Evaluating Computer IDS,” ACM: Digital Library: Communications of the ACM 42 7 1999