Battery Based Intrusion Detection


This invention offers a unique security system for computerized devices. The novel technique detects and alerts a user, microprocessor, and/or network administrator of undesired software operations, including, software attacks, worms, and viruses, through monitoring energy demands of battery power for mobile computing devices.

Portable computing devices are increasingly becoming targets of malicious software attacks, especially when linked via a wireless network. The increasing potential for undesired software operation demands a new system or method for detecting malicious software attacks. Conventional techniques for computer system protection, such as antivirus programs or firewall, greatly increase power consumption and thereby significantly reduce battery life. Additionally, portable devices under attack from viruses, worms, etc. will operate with impaired performance and abnormal battery depletion activities. This loss of battery power can be extremely detrimental to function and revenue.

Applied to mobile computing devices, the invented Battery-based intrusion detection (B-bid) technique provides formidable and effective means to determine abnormal battery depletion technology. A Host Intrusion Detection Engine (HIDE) monitors the power behavior of devices, and detects intrusion by noting irregular power consumption activities. HIDE works in conjunction with a Host Analysis Signature Trace Engine (HASTE) to provide protection for both mobile hosts and their affiliated network by alerting security administrators of potential attacks. In addition to power consumption detection, this invention detects undesired software operation through monitoring of frequency signatures. The device compares detected frequency signatures to a database of frequency signatures associated with undesired software, effectively identifying the present malicious software.

Patent Information:
Title App Type Country Serial No. Patent No. File Date Issued Date Expire Date
Dirty Dozen Software US Copyright United States (CY/TM) TXu 1-241-178 TXu 1-241-178 6/8/2005 6/9/2005  
HASTE Software: Chi Squared US Copyright United States (CY/TM) TXu-1-241-179 TXu-1-241-179 6/8/2005 6/9/2005  
HASTE Software: FFT Filter US Copyright United States (CY/TM) TXu-1-241-180 TXu-1-241-180 6/8/2005 6/9/2005  
HASTE Software: FFT in C# US Copyright United States (CY/TM) TXu-1-241-181 TXu-1-241-181 6/8/2005 6/9/2005  
SPIE Software US Copyright United States (CY/TM) TXu-1-241-182 TXu-1-241-182 6/8/2005 6/9/2005  
HIDE Software US Copyright United States (CY/TM) TXu 1-241-177 TXu 1-241-177 6/8/2005 6/9/2005  
Detecting Software Attacks by Monitoring Electric Power Consumption Patterns US 371 Utility *United States 11/574,619 7,877,621 8/31/2007 1/25/2011 7/4/2027
For Information, Contact:
Mike Miller
Senior Licensing Manager
Virginia Tech Intellectual Properties, Inc.
(540) 443-9228
Randolph Marchany
Nathaniel Davis lV
Grant Jacoby
Computer Sciences
© 2017. All Rights Reserved. Powered by Inteum