Filters








58 Hits in 6.6 sec

Mobile Botnet Detection Model based on Retrospective Pattern Recognition

Meisam Eslahi, Moslem Yousefi, Maryam Var Naseri, Y.M. Yussof, N.M. Tahir, H. Hashim
2016 International Journal of Security and Its Applications  
This paper proposes a Neural Network based model to detect mobile HTTP Botnets with random intervals independent of the packet payload, commands content, and encryption complexity of Bot communications  ...  The dynamic nature of Botnets along with their sophisticated characteristics makes them one of the biggest threats to cyber security.  ...  Acknowledgments The authors would like to acknowledge the Ministry of Higher Education (MOHE) for providing the grant 600-RMI/FRGS 5/3 (141/2015) in carrying out this research work and to the Institute  ... 
doi:10.14257/ijsia.2016.10.9.05 fatcat:p4texv7vi5hzbbxdrpx5jd2p6q

Security Information and Event Management (SIEM): Analysis, Trends, and Usage in Critical Infrastructures

Gustavo González-Granadillo, Susana González-Zarzosa, Rodrigo Diaz
2021 Sensors  
A list of potential enhancements for the next generation of SIEMs is provided as part of the review of existing solutions as well as an analysis on their benefits and usage in critical infrastructures.  ...  Security Information and Event Management (SIEM) systems have been widely deployed as a powerful tool to prevent, detect, and react against cyber-attacks.  ...  Mironescu, Frances Buontempo, Ilir Gashi, Ivo Rosa, and the rest of partners from the DiSIEM project for their support, hard work, and collaboration.  ... 
doi:10.3390/s21144759 fatcat:h3fgqiuymrgzjflwujd5sphde4

ARANAC: A Bring-Your-Own-Permissions Network Access Control Methodology for Android Devices

J. A. Gomez-Hernandez, J. Camacho, J. A. Holgado-Terriza, P. Garcia-Teodoro, G. Macia-Fernandez
2021 IEEE Access  
In this paper, we introduce a new methodology for network access control for Android devices based on app risk assessment.  ...  The access control scheme combines three operational modules: i) a device monitoring tool, ii) a novel permission-based risk model, and iii) an anomaly-based detection machine learning module based on  ...  Then the proposed model uses smart contracts to provide adaptive features in which the user behavior is monitored to detect any abnormal actions from authorized users.  ... 
doi:10.1109/access.2021.3097152 fatcat:dswbpghrzzd77ih327jatkncsu

A Review of Insider Threat Detection Approaches with IoT Perspective

Aram Kim, Junhyoung Oh, Jinho Ryu, Kyungho Lee
2020 IEEE Access  
In this work, we provide a generalization of aspects of insider threats with IoT and analyze the surveyed literature based on both private and public sources.  ...  Attack surfaces are significantly enlarged which could cause a severe risk in terms of company insider threat management.  ...  ACKNOWLEDGMENT This article was presented in part at the MobiSec 2019 (The 4th International Symposium on Mobile Internet Security).  ... 
doi:10.1109/access.2020.2990195 fatcat:uxydn6lk4vdi5mtqaotp35s3oq

Cyber Security in the Mobile Age [chapter]

Xiaoyu Ruan
2014 Platform Embedded Security Technology Revealed  
A bug will be recorded when the behavior of the system under test violates one or more requirements.  ...  They are designed to detect changes in platform state and identify malicious programs on the system.  ... 
doi:10.1007/978-1-4302-6572-6_1 fatcat:app7gkjwezcibnum2245bvonze

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.  ...  The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  Abnormal behavior detection using sequences of system calls has been successfully applied on the intrusion detection domain, as the sequence of system calls executed by the program is a good indicator  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Software as a Service: Analyzing Security Issues [article]

Pushpinder Kaur Chouhan, Feng Yao, Suleiman Y. Yerima, Sakir Sezer
2015 arXiv   pre-print
Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.  ...  Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges.  ...  Behavior-based and biometric character-based authentication Gait based authentication [28] Implicit authentication based on touch screen pattern [29] Implicit authentication based on user behavior  ... 
arXiv:1505.01711v1 fatcat:pnwkovzsd5hqrpcmh6dakmi7xi

A New Security Architecture to Improve Business Agility [chapter]

Malcolm Harkins
2013 Managing Risk and Information Security  
For example, if traffic within a server cluster becomes abnormally high, it might indicate that a botnet is exploiting one of the servers to broadcast traffic across the web.  ...  This helps us accommodate usage models such as bring-your-own-device (BYOD).  ... 
doi:10.1007/978-1-4302-5114-9_7 fatcat:pzfrluckk5efhnl5uhrknh4uay

Insider Threats [chapter]

Todd Fitzgerald
2010 Encyclopedia of Information Assurance  
In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure.  ...  Ben-ware has been developed as a distributed system comprising of probes for data collection, intermediate nodes for data routing and higher nodes for data analysis.  ...  However, in both of these cases, the number of files stolen is two per day (with Bad3 increasing by one per day), thus the system is sensitive to small variations in usage patterns.  ... 
doi:10.1081/e-eia-120046552 fatcat:jqc3bun5j5fs3arzneg4ilreoq

Experimental Cyber Attack Detection Framework

Cătălin Mironeanu, Alexandru Archip, Cristian-Mihai Amarandei, Mitică Craus
2021 Electronics  
We submit a novel concept for integrating machine learning and analytical tools into a live intrusion detection and prevention solution.  ...  The results are promising and show the benefits of such a tool in the early prevention stages of both known and unknown cyber-attack patterns.  ...  Gheorghit ,ȃ is a system and network engineer at the "Gheorghe Asachi" Technical University of Iasi, Romania.  ... 
doi:10.3390/electronics10141682 fatcat:h4tpj4ihkvfanhn6fpmwkjwqjy

A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights [article]

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dong Seong Kim
2021 arXiv   pre-print
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, and  ...  Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912.  ... 
arXiv:2110.15747v1 fatcat:zboddcg4a5gdxmq5hqmo5cpj34

A Survey on Cyber Situation Awareness Systems: Framework, Techniques, and Insights

Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit A. Camtepe, Dan Dongseong Kim
2022 ACM Computing Surveys  
This paper provides a comprehensive study on the current state-of-the-art in the cyber SA to discuss the following aspects of SA: key design principles, framework, classifications, data collection, analysis  ...  Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats.  ...  MBIE) of New Zealand as a part of the Catalyst Strategy Funds under Grant MAUX1912.  ... 
doi:10.1145/3530809 fatcat:cwk5bp56ere5re2frzgzox56ka

Security issues in cloud environments: a survey

Diogo A. B. Fernandes, Liliana F. B. Soares, João V. Gomes, Mário M. Freire, Pedro R. M. Inácio
2013 International Journal of Information Security  
This paper surveys the works on cloud security issues, making a comprehensive review of the literature on the subject.  ...  In the last few years, the appealing features of cloud computing have been fueling the integration of cloud environments in the industry, which has been consequently motivating the research on related  ...  Acknowledgements We would like to thank all the anonymous reviewers for constructively criticizing this work.  ... 
doi:10.1007/s10207-013-0208-7 fatcat:55o67epb6zfspchxuzvuduzr4a

Insider Threats

Andrew Stephen McGough, Sujeewa Alwis, David Wall, John Brennan, Georgios Theodoropoulos, Ed Ruck-Keene, Budi Arief, Carl Gamble, John Fitzgerald, Aad van Moorsel
2015 Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats - MIST '15  
In this paper, we present the concept of "Ben-ware" as a beneficial software system capable of identifying anomalous human behaviour within a 'closed' organisation's IT infrastructure.  ...  Ben-ware has been developed as a distributed system comprising of probes for data collection, intermediate nodes for data routing and higher nodes for data analysis.  ...  However, in both of these cases, the number of files stolen is two per day (with Bad3 increasing by one per day), thus the system is sensitive to small variations in usage patterns.  ... 
doi:10.1145/2808783.2808785 dblp:conf/ccs/McGoughWBTRAGFM15 fatcat:s22b5rffbzhafbg3562d2fd5wy

Evaluation of Security Solutions for Android Systems [article]

Asaf Shabtai, Dudu Mimran, Yuval Elovici
2015 arXiv   pre-print
Since the Android operating system has the highest market share today, we decided to focus on it in this study in which we review some of the state-of-the-art security solutions for Android-based smartphones  ...  In addition, we present a set of evaluation criteria aiming at evaluating security mechanisms that are specifically designed for Android-based smartphones.  ...  Intrusion Detection System Intrusion detection systems (IDS) monitor the device, applications, or user's behavior to detect/prevent abnormal or known malicious behavior.  ... 
arXiv:1502.04870v1 fatcat:uubl4boopjaapnxbfvfqnbnoe4
« Previous Showing results 1 — 15 out of 58 results