Visible to the public "Detecting Security Threats Using Mobile Devices"Conflict Detection Enabled

Title"Detecting Security Threats Using Mobile Devices"
Publication TypeConference Paper
Year of Publication2015
AuthorsJ. J. Li, P. Abbate, B. Vega
Conference Name2015 IEEE International Conference on Software Quality, Reliability and Security - Companion
Date PublishedAug
PublisherIEEE
ISBN Number978-1-4673-9598-4
Accession Number15586814
Keywordsadvanced persistent threat, advanced persistent threats, combinatorial testing, covering array, Data collection, DDoS Attack, distributed denial-of-service, mobile computing, mobile devices, Mobile handsets, Monitoring, performance escalation, Ports (Computers), pubcrawl170101, security, security of data, security threat detection, security threats detection, Servers, telecommunication traffic
Abstract

In our previous work [1], we presented a study of using performance escalation to automatic detect Distributed Denial of Service (DDoS) types of attacks. We propose to enhance the work of security threat detection by using mobile phones as the detector to identify outliers of normal traffic patterns as threats. The mobile solution makes detection portable to any services. This paper also shows that the same detection method works for advanced persistent threats.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322123&isnumber=7322103
DOI10.1109/QRS-C.2015.18
Citation Key7322123