"Detecting Security Threats Using Mobile Devices"
Title | "Detecting Security Threats Using Mobile Devices" |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | J. J. Li, P. Abbate, B. Vega |
Conference Name | 2015 IEEE International Conference on Software Quality, Reliability and Security - Companion |
Date Published | Aug |
Publisher | IEEE |
ISBN Number | 978-1-4673-9598-4 |
Accession Number | 15586814 |
Keywords | advanced persistent threat, advanced persistent threats, combinatorial testing, covering array, Data collection, DDoS Attack, distributed denial-of-service, mobile computing, mobile devices, Mobile handsets, Monitoring, performance escalation, Ports (Computers), pubcrawl170101, security, security of data, security threat detection, security threats detection, Servers, telecommunication traffic |
Abstract | In our previous work [1], we presented a study of using performance escalation to automatic detect Distributed Denial of Service (DDoS) types of attacks. We propose to enhance the work of security threat detection by using mobile phones as the detector to identify outliers of normal traffic patterns as threats. The mobile solution makes detection portable to any services. This paper also shows that the same detection method works for advanced persistent threats. |
URL | http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322123&isnumber=7322103 |
DOI | 10.1109/QRS-C.2015.18 |
Citation Key | 7322123 |
- Monitoring
- telecommunication traffic
- Servers
- security threats detection
- security threat detection
- security of data
- security
- pubcrawl170101
- Ports (Computers)
- performance escalation
- advanced persistent threat
- Mobile handsets
- mobile devices
- mobile computing
- distributed denial-of-service
- DDoS Attack
- Data collection
- covering array
- combinatorial testing
- advanced persistent threats