• Markus Schölzel
  • Evren Eren
  • Kai-Oliver Detken
  • Leonid Schwenke



information security, SIEM, network monitoring, IEEE 802.1X, IF-MAP, trusted network connect, TNC, event detection.


Mobile devices such as smartphones and tablet PCs are increasingly used for business purposes. However, the trustworthiness of the operating system and apps is controversial. They can constitute a threat to corporate networks and infrastructures, if they are not audited or monitored. The concept of port-based authentication using IEEE 802.1X restricts access and may provide statistical data about users entering or leaving a network, but it does not consider the threat devices can pose if they have already been authenticated and used. Security information and event management (SIEM) software has to incorporate information about mobile devices during their usage. Those devices have to gather and publish information to make this possible. This can be achieved by using a client on the mobile device, which is proposed here. It collects metadata including information about device specific data, platform or system state, which is sent via multiple supported protocols to a central SIEM component, where the data is analyzed in assessment procedures for threat analysis by using artificial intelligence and rule-sets.


M. Schölzel, E. Eren and K.-O. Detken, “A viable SIEM approach for Android,” in Proceedings of the IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Warsaw, Poland, 2015, pp. 803-807.

Trusted Computing Group, 2016, [Online]. Available:

TCG Trusted Network Connect, TNC IF-MAP Binding for SOAP 2.2 r10, 2014, [Online]. Available:

N. Nitra and Y. Lafon, SOAP version 1.2 part 0: Primer (second edition), 2007, [Online]. Available:

E. Rescorla, HTTP Over TLS (RFC 2818), 2000, [Online]. Available:

TCG Trusted Network Connect, TNC IF-MAP Metadata for Network Security, 2012, [Online]. Available:

T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2 (RFC 5246), 2008, [Online]. Available:

J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen and L. Stewart, HTTP Authentication: Basic and Digest Access Authentication (RFC 2617), 1999, [Online]. Available:

C. Rigney, S. Willens, A. Rubens and W. Simpson, Remote Authentication Dial In User Service (RFC 2865), 2000, [Online]. Available:

K. Zeilenga, Lightweight Directory Access Protocol (LDAP): Technical Specification Roadp Map (RFC 4510), 2006, [Online]. Available:

Trust@FHH, irongui, 2015 [Online]. Available:

SELinux Project, 2016, [Online]. Available:

ESUKOM, Echtzeit-Sicherheit für Unternehmensnetze durch Konsolidierung von Metadaten, 2016, [Online]. Available:

SIMU, Security Information and Event Management (SIEM) für Klein- und Mittelständische Unternehmen (KMU), 2016, [Online]. Available:

iMonitor, intelligentes IT-Monitoring durch KI-Ereignisverarbeitung, 2016, [Online].

C. Elfers, Event Correlation Using Conditional Exponential Models with Tolerant Pattern Matching Applied to Incident Detection, Shaker Verlag GmbH, Aachen, 2014, 279 p.

DECOmap for Android, 2015, [Online]. Available:

C. Bormann and P. Hoffman, Concise Binary Object Representation (RFC 7049), 2013, [Online]. Available:

Nagios Enterprises, Nagios, 2016, [Online]. Available:

The Icinga Project, Icinga, 2016, [Online]. Available:

Google Developers, SafetyNet - Google APIs for Android, 2016, [Online]. Available:

K.-O. Detken, D. Scheuermann, B. Hellmann, “Using Extensible Metadata Definitions to Create a Vendor-Independent SIEM System,” in Advanced in Swarm and Computational Intelligence, Proceedings Part II, Editors: Y. Tan, Y. Shi, F. Buarque, A. Gelbukh, S. Das, A. Engelbrecht, ISBN 978-3-319-20471-0, publishing house Springer, Beijing, China, 2015, pp. 439-453.

A. Jamil, The difference between SEM, SIM and SIEM, 2010, [Online]. Available:

A. Williams, The Future of SIEM – The market will begin to diverge, 2007, [Online]. Available:–-the-market-will-begin-to-diverge/

S. Howard, Securing SCADA and Control Networks, 2010, [Online]. Available:

The Icinga Project, Nagios Service Check Acceptor (NSCA), [Online]. Available:

Microsoft, Network Access Protection (NAP), [Online]. Available:

Cisco, NAC Appliance (Clean Access), [Online]. Available:

Trust@FHH, ironcontrol, 2015 [Online]. Available:




How to Cite

Schölzel, M., Eren, E., Detken, K.-O., & Schwenke, L. (2016). MONITORING ANDROID DEVICES BY USING EVENTS AND METADATA. International Journal of Computing, 15(4), 248-258.