Behavioral Model for Live Detection of Apps Based Attack

نویسندگان

چکیده

Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use different has paved way for numerous security threats. threats in form attacks such as permission control attacks, phishing spyware botnets, malware privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization apps, compromise on confidentiality data, access control. In this article, an application-based attack modeling detection proposed a novel vulnerability is identified based app execution smartphone. involves end-user vulnerable application to initiate attack. installed at background end smartphone hidden visibility from end-user, thereby accessing confidential information. model technique behavioral analysis (ABMA) scheme address model. incorporates comparative parameter perform process intrusion detection. ABMA estimated by using parameters power, battery level, data usage. Based source Internet accessibility, performed three configurations, Wi-Fi, mobile combination two. simulation results verify demonstrate effectiveness

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

application of upfc based on svpwm for power quality improvement

در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...

15 صفحه اول

Semantics-Based Repackaging Detection for Mobile Apps

While Android app stores keep growing in size and in number, app repackaging has become a major threat to the health of the mobile ecosystem. Different from many syntax-based repackaging detection techniques, in this work we propose a semantic-based approach, RepDetector, which is more robust against code obfuscation attacks. To capture an app’s semantics, our approach extracts input-output sta...

متن کامل

Development of a Model for Predicting Heart Attack Based on Fog Computing

Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...

متن کامل

Adaptive, Model-Based Monitoring for Cyber Attack Detection

Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack specificity, but may not be able to generalize. The latter detect attacks probabilistically, allowing for generalization potential. However, they lack attack models and can potentially “learn” to consider an attack no...

متن کامل

Development of a Model for Predicting Heart Attack Based on Fog Computing

Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computational Social Systems

سال: 2023

ISSN: ['2373-7476', '2329-924X']

DOI: https://doi.org/10.1109/tcss.2022.3166145