• Corpus ID: 44102448

Study on Intrusion Detection on Mobile Security using SIM and PDA

@inproceedings{Kathirvel2016StudyOI,
  title={Study on Intrusion Detection on Mobile Security using SIM and PDA},
  author={K. Kathirvel},
  year={2016}
}
A new wave in advancement of the Internet of Things is driving toward ubiquitous mutually connected wireless sensor networks and embedded devices that can be potentially accessed from anywhere in the world. Hence cyber security is essential in Internet of things and also it becomes a challenge in securing the data in the Internet connected devices. I Therefore, IoT devices specifically Wireless sensor may now embody an idyllic intention for malware writers. As the number of vulnerabilities and… 

Tables from this paper

References

SHOWING 1-10 OF 23 REFERENCES
A cloud-based intrusion detection and response system for mobile phones
TLDR
A cloud-based smartphone-specific intrusion detection and response engine, which continuously performs an in-depth forensics analysis on the smartphone to detect any misbehavior and takes optimal response actions to thwart the ongoing attacks.
Behavior-Based Intrusion Detection in Mobile Phone Systems
TLDR
This paper presents an on-line security system for fraud detection of impostors and improper use of mobile phone operations based on a neural network (NN) classifier that reduces significantly the telecom carriers's profit losses as well as the damage that might be passed to the clients.
SmartSiren: virus detection and alert for smartphones
TLDR
SmartSiren is presented, a collaborative virusdetection and alert system for smartphones that uses a proxy-based architecture to offload the processing burden from resource-constrained smartphones and simplify the collaboration among smartphones.
Host-Based Intrusion Detection for Advanced Mobile Devices
  • Markus Miettinen, P. Halonen
  • Computer Science
    20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)
  • 2006
TLDR
It is shown that host-based approaches are required, since network-based monitoring alone is not sufficient to encounter the future threats, and a framework for mobile device intrusion detection is proposed.
VirusMeter: Preventing Your Cellphone from Spies
TLDR
VirusMeter is proposed, a novel and general malware detection method, to detect anomalous behaviors on mobile devices and can effectively detect these malware activities with less than 1.5% additional power consumption in real time.
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
TLDR
This intrusion detection system uses several parameters, such as CPU load and disk accesses, to estimate the power consumption using a linear regression model, allowing us to find the energy used on a per process basis, and thus identifying processes that are potentially battery exhaustion attacks.
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
TLDR
An attack is demonstrated, which surreptitiously drains mobile devices' battery power up to 22 times faster and therefore could render these devices useless before the end of business hours.
Monitoring Smartphones for Anomaly Detection
TLDR
This paper demonstrates how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection and introduces the top ten applications used by mobile phone users based on a study in 2005.
Intrusion detection model based on Android
  • Xiaoming Kou, Q. Wen
  • Computer Science
    2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
  • 2011
TLDR
A light weight intrusion detection model based on Android — LIDS is proposed which changes the traditional passive antivirus to active defense and the Snort intrusion detection technology is used on mobile phones and the key pattern matching algorithm of Snort is improved.
...
...