MATHEMATICAL MODELS OF SECURITY ATTACKS ON MOBILE CELLULAR SYSTEMS
نویسندگان
چکیده
The need to protect smartphones and mobile devices from attacks on their internal resources is due multiple growth in number, as well share among gadgets with Internet access. paper aims analyze create mathematical models of the most common types devices. Based constructed analysis, ways are proposed prevent neutralize intrusions into operating system other gadgets. Methods: applied analysis using elements probability theory modeling. Results: features mechanisms for formation vulnerabilities determined. Important aspects determining effectiveness modern technologies protection against cyber identified. A brief review main approaches modeling typical networks given. Requirements effective choice methods depending type attack class formulated. Basic recommendations ensuring security a device Methods reduce hacking through attacks.
منابع مشابه
Attacks on Cellular Systems
The cellular industry is growing quickly but so is the fraud. For instance, based on the surveys conducted by the Cellular Telecommunications Industry Association (CTIA), the number of U.S. cellular subscribers, cell sites, and total revenue have grown 112, 27, and 36 times, respectively, over the past ten years. At least 38.2 million, 14.5% of the entire U.S. population, have subscribed to the...
متن کاملApplication Security Models for Mobile Agent Systems
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security mod...
متن کاملHypergraph Models for Cellular Mobile Communication Systems
Cellular systems have hitherto been modeled mostly by graphs for the purpose of channel assignment. However, hypergraph modeling of cellular systems offers a significant advantage over graph modeling in terms of the total traffic carried by the system. For example, we show that a 37-cell system when modeled by a hypergraph carries around 30% more traffic than when modeled by a graph. We study t...
متن کاملMathematical Models of Computer Security
In this chapter I present a process algebraic approach to the modelling of security properties and policies. I will concentrate on the concept of secrecy, also known as confidentiality, and in particular on the notion of non-interference. Non-interference seeks to characterise the absence of information flows through a system and, as such, is a fundamental concept in information security. A cen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: M. Tynyšpaev atynda?y K?azak? kôlìk ža?ne kommunikaciâlar akademiâsynyn? habaršysy
سال: 2023
ISSN: ['1609-1817', '2790-5802']
DOI: https://doi.org/10.52167/1609-1817-2023-124-1-213-221