Open Access Repository

An enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system

Downloads

Downloads per month over past year

Park, W and Kang, BH ORCID: 0000-0003-3476-8838 2017 , 'An enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system' , Mobile Information Systems, vol. 2017 , pp. 1-13 , doi: 10.1155/2017/8501976.

[img] PDF
8501976.pdf | Download (1MB)

Abstract

A lot of mobile applications which provided location information by using a location-based service are being developed recently.For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However,the information leakage and the crime thatmisused the leaked information caused by the cyberattack ofmobile information systemoccurred. So the interest and importance of information security are increasing. Also the number of users who has used mobiledevices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has beenused to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kindsof equipment. It is expected that the security of mobile information system would be improved and information leakage would beblocked by selecting options through optimization of Snort detection policy to protect users who are using location-based servicein mobile information system environment in this paper.

Item Type: Article
Authors/Creators:Park, W and Kang, BH
Keywords: mobile system, security monitoring
Journal or Publication Title: Mobile Information Systems
Publisher: Hindawi
ISSN: 1574-017X
DOI / ID Number: 10.1155/2017/8501976
Copyright Information:

Copyright 2017 The AuthorsLicensed under Creative Commons Attribution 4.0 International (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/

Related URLs:
Item Statistics: View statistics for this item

Actions (login required)

Item Control Page Item Control Page
TOP