Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices
Abstract
:1. Introduction
2. Malicious Application Detection Based on Directed Information Flow
2.1. Basic Theory
2.2. Network Environment
2.3. Application Detection Based on Directed Information Flow
3. Risk Assessment of Data Leakage Based on Information Entropy and Markov Chain
3.1. Construction of Evaluation Index System
3.2. Risk Assessment of Data Leakage Based on Information Entropy and Markov Chain
4. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhang, X.; Chen, H. A review of high-dimensional data publishing research on differential privacy. CAAI Trans. Intell. Syst. 2021, 16, 989–998. [Google Scholar] [CrossRef]
- Zhang, T. Research on Risk Factors and Risk Assessment Methods of User Privacy Disclosure in Mobile Commerce; Yunnan University of Finance and Economics: Kunming, China, 2021. [Google Scholar]
- Guo, Y.; Duan, Q.S.; Wang, X.W. An Empirical Study on Privacy Information Disclosure Behaviour of Mobile Learning Users. J. Mod. Inf. 2018, 38, 98–117. [Google Scholar]
- Xiong, J. Research on privacy information disclosure behavior and protection of mobile commerce users—From the perspective of evolutionary game theory. Fortume Times 2018, 2018, 63–64. [Google Scholar]
- Wang, K. Evidence Theory Based Evaluating and Controlling Mobile Commerce Transactions Risk; Huazhong University of Science and Technology: Wuhan, China, 2009. [Google Scholar]
- Zhao, Z.H. An Empirical Study on the Determinants of Intentions to Use Mobile SNS Applications—Take “WeiXin” for Example; Shandong University: Jinan, China, 2014. [Google Scholar]
- Li, Y.H.; Liang, L.T.; Liu, B.L. An Empirical Study on Privacy Beliefs and Information Disclosure Willingness of Mobile Social Users. Inf. Theory Pract. 2016, 39, 76–81. [Google Scholar]
- Xu, J.L.; Qiao, Z.; Wang, X.Q.; Li, F. Research and Application of Privacy Information Detection and Protection Technology for Mobile Internet Users. Telecom Eng. Tech. Stand. 2019, 2019, 12–22. [Google Scholar]
- Mark, F.; Alexander, B. Do privacy concerns matter for Millennials? Results from an empirical analysis of Location-Based Services adoption in Germany. Comput. Hum. Behav. 2015, 53, 344–353. [Google Scholar]
- Jia, J. The Research of Personal Privacy Information Security in the Era of Big Date; Neimenggu University: Huhehaote, China, 2018. [Google Scholar]
- Wu, J.Z.; Wu, Y.J.; Wu, Z.F.; Yang, M.T.; Luo, T.Y.; Wang, Y.J. An Android privacy leakage malicious application detection approach based on directed information flow. J. Univ. Chin. Acad. Sci. 2015, 32, 807–815. [Google Scholar]
- Jin, X.Q.; Lu, J.Q.; Li, L.C. Design of network anomaly detection and intrusion prevention system based on information entropy. Electron. Des. Eng. 2021, 29, 152–156. [Google Scholar]
- Zhang, Z.G.; Wang, X.J.; Li, G.; Yue, S.M. The Generation Method of Network Defense Strategy Combining with Attack Graph and Game Model. Netinfo Secur. 2021, 21, 1–9. [Google Scholar]
- Song, X.M. Research on Covert Channel Identification Methods Based on Semantic Information Flow; Jiangsu University: Zhenjiang, China, 2017. [Google Scholar]
- Yang, T. Research on Detection Methods of Communication Privacy Leakage of Smart Home System; Hebei University of Science and Technology: Shijiazhuang, China, 2020. [Google Scholar]
- Pan, C.J. Research on Private Information Disclosure Detection Method of Composite Services; Xidian University: Xi’an, China, 2019. [Google Scholar]
- Russo, A.; Lax, G.; Dromard, B.; Mezred, M. A System to Access Online Services with Minimal Personal Information Disclosure. Inf. Syst. Front. 2021. [Google Scholar] [CrossRef]
- Sun, C.G.; Zhu, W.Z.; Li, W.F.; He, X. A method for detecting privacy data leakage in Android application. J. Zhengzhou Univ. Sci. Ed. 2019, 52, 68–74. [Google Scholar]
- Peng, Y.C. Consideration and analysis of public information disclosure and personal information protection in epidemic response. Chin. J. Gen. Pract. 2021, 19, 1760–1763. [Google Scholar]
- Yang, A.; Liu, H.; Chen, Y.; Zhang, C.; Yang, K. Digital video intrusion intelligent detection method based on narrowband Internet of Things and its application. Image Vis. Comput. 2020, 97, 130914. [Google Scholar] [CrossRef]
- Chen, W.; Lv, W.Y.; Li, S.Q.; Dai, J.; Deng, X. Estimation and Comparison of Two Markov Chain State Transition Probability Matrices. J. Chongqing Univ. Technol. Nat. Sci. 2021, 35, 217–223. [Google Scholar]
- Jiang, L.; Liu, J.Y.; Wei, Z.B.; Gong, H.; Lei, C.; Li, C.X. Running State and Its Risk Evaluation of Transmission Line Based on Markov Chain Model. Autom. Electr. Power Syst. 2015, 39, 51–58. [Google Scholar]
- Song, L.J.; Xu, Z.Y. Assessment of power customer credit risk based on set pair analysis and Markov chain model. Electr. Power Autom. Equip. 2009, 29, 37–40. [Google Scholar]
- Pettai, M.; Laud, P. Combining differential privacy and secure multiparty computationl. In Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, 7–11 December 2015; pp. 421–430. [Google Scholar]
- Zhu, X.X.; Liu, X.Y.; Xiong, Q.Q. Research on the impact of App permissions on user privacy. Wirel. Internet Technol. 2021, 18, 13–18, 41. [Google Scholar]
Application Program | Risky Application Characterization |
---|---|
Message | Obtain the content of message, sending and receiving time and SMS records |
Contacts | Obtain address book information |
Instant Messaging | Obtain communication software information, such as WeChat record |
Browser | Obtain browser access history, tag data, etc. |
Call Log | Obtain call record, call time, call frequency |
Social Networks | Obtain social app data, such as takeout data and likes |
Position | Obtain position information, motion trajectory |
Event | API Source Code |
---|---|
IMEI | Local Telephone Manager.get Imei |
Phone number | Local Telephone Manager.get Phonenumber |
SMS Center | Get SMS Center |
Handled | Value of String |
Pid | This M Pid |
Install time | Get first Start Time |
Sys version | Build VERSION.sdk |
Permissions | Application Rate |
---|---|
ACCESS_COARSE_LOCATION | 48.7% |
ACCESS_FINE_LOCATION | 41.5% |
GET_TASKS | 39.5% |
CALL_PHONE | 12.1% |
READ_SETINGS | 10% |
READ_ACCOUNTS | 10% |
GET_ACCOUNTS | 9% |
SEND_SMS | 8% |
RECEIVE_SMS | 8% |
Primary Index | Secondary Index | Primary Index | Secondary Index |
---|---|---|---|
Technical Level | Intrusion Detection | Operation Management | Advertising Review |
Access Control | Supervision System | ||
Network Security | Insider Threats | ||
Anonymous Technology | Third Party Information Collection | ||
Anomaly Detection | Position Monitoring | ||
Stain Tracking | Privacy Management | ||
Identity Authentication | Self Level | Privacy Awareness | |
Track Hiding | Intrusion Experience | ||
Data Sharing | Association Settings | ||
Data Encryption | Password Settings | ||
Environmental Level | Data Exchange | Permission Setting | |
Location Services | Data Identification | ||
Advertising Attack | Terminal Level | Data Protection | |
Protocol Compatibility | Data Control | ||
Management Regulations | Permission Control | ||
Privacy Diversity | Event Reminder |
Equipment | Factor | Expect | 95% Confidence Interval | Probability | Factor | Expect | 95% Confidence Interval | Probability | Factor | Expect | 95% Confidence Interval | Probability | Factor | Expect | 95% Confidence Interval | Probability |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
TabletPC | 4.1 | 3.2–5.6 | 0.027 | 8.0 | 7.2–9.3 | 0.052 | 3.2 | 2.4–4.0 | 0.021 | 8.8 | 8.3–9.6 | 0.058 | ||||
4.3 | 3.5–4.8 | 0.028 | 8.0 | 7.0–9.2 | 0.052 | 4.3 | 3.5–5.3 | 0.028 | 8.2 | 7.5–9.0 | 0.054 | |||||
4.6 | 3.6–5.2 | 0.030 | 3.9 | 2.8–5.0 | 0.026 | 9.1 | 8.0–9.5 | 0.060 | 7.5 | 6.6–8.4 | 0.049 | |||||
4.5 | 2.9–6.0 | 0.029 | 4.2 | 2.7–5.5 | 0.027 | 9.2 | 7.8–9.3 | 0.060 | 6.1 | 5.5–7.0 | 0.040 | |||||
7.1 | 5.5–8.7 | 0.046 | 3.5 | 2.8–4.0 | 0.023 | 9.2 | 8.0–9.7 | 0.060 | 7.8 | 5.0–9.3 | 0.051 | |||||
7.1 | 6.3–7.5 | 0.046 | 4.5 | 3.5–5.5 | 0.029 | 9.6 | 9.0–10 | 0.063 | 5.9 | 4.8–7.3 | 0.039 | |||||
Intelligent mobile phone | 4.2 | 3.1–5.8 | 0.031 | 5.7 | 4.5–6.8 | 0.042 | 6.8 | 5.6–7.5 | 0.050 | 9.2 | 6.8–9.8 | 0.067 | ||||
7.5 | 6.8–8.5 | 0.055 | 5.8 | 4.5–7.8 | 0.042 | 4.7 | 3.5–6.4 | 0.034 | 3.1 | 2.0–4.2 | 0.023 | |||||
4.8 | 3.0–6.5 | 0.035 | 3.9 | 3.0–5.2 | 0.029 | 4.0 | 3.3–5.0 | 0.029 | 6.5 | 4.3–8.0 | 0.048 | |||||
3.9 | 3.0–6.4 | 0.029 | 4.2 | 2.8–6.4 | 0.031 | 8.7 | 7.3–9.6 | 0.064 | 5.5 | 4.0–6.8 | 0.040 | |||||
4.1 | 2.5–6.5 | 0.030 | 4.7 | 2.5–6.2 | 0.034 | 8.8 | 7.5–9.3 | 0.064 | 7.8 | 6.3–8.5 | 0.057 | |||||
4.0 | 2.4–7.0 | 0.029 | 3.8 | 2.0–6.7 | 0.028 | 9.2 | 8.5–9.6 | 0.067 | 5.9 | 4.3–7.5 | 0.043 | |||||
Bracelet | 2.6 | 1.5–4.3 | 0.019 | 8.3 | 7.5–9.6 | 0.061 | 8.5 | 7.5–9.6 | 0.062 | 9.2 | 8.5–9.7 | 0.067 | ||||
2.7 | 1.8–4.6 | 0.020 | 4.7 | 3.2–6.0 | 0.034 | 4.7 | 3.2–7.0 | 0.034 | 3.7 | 2.8–5.6 | 0.027 | |||||
4.7 | 3.5–6.0 | 0.034 | 3.5 | 2.5–4.8 | 0.026 | 3.9 | 2.0–7.5 | 0.029 | 4.7 | 3.0–6.6 | 0.034 | |||||
3.5 | 2.5–6.0 | 0.026 | 3.7 | 2.3–5.0 | 0.027 | 8.0 | 5.3–9.7 | 0.058 | 5.7 | 4.0–7.4 | 0.042 | |||||
2.7 | 2.0–5.0 | 0.020 | 3.6 | 2.5–5.3 | 0.026 | 8.9 | 7.0–9.9 | 0.065 | 8.6 | 7.6–9.5 | 0.063 | |||||
8.5 | 7.2–9.5 | 0.062 | 8.7 | 7.8–9.5 | 0.064 | 8.9 | 7.2–9.9 | 0.065 | 4.8 | 2.6–7.0 | 0.035 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, X.; Liu, Y.; Xie, J. Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices. Mathematics 2022, 10, 2011. https://doi.org/10.3390/math10122011
Yang X, Liu Y, Xie J. Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices. Mathematics. 2022; 10(12):2011. https://doi.org/10.3390/math10122011
Chicago/Turabian StyleYang, Xiaolei, Yongshan Liu, and Jiabin Xie. 2022. "Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices" Mathematics 10, no. 12: 2011. https://doi.org/10.3390/math10122011
APA StyleYang, X., Liu, Y., & Xie, J. (2022). Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices. Mathematics, 10(12), 2011. https://doi.org/10.3390/math10122011