A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

نویسنده

  • I. Raja
چکیده

As good mobile phones, so referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they\'re liable to similar classes of security risks like viruses, Trojans and worms. Throughout this paper, we\'ve got an inclination to propose a cloud based mostly sensible phone-specific intrusion detection and response engine that endlessly performs Associate in nursing in-depth forensics analysis on the sensible phone to find any wrongdoing. Just in case a wrongdoing is detected, the projected engine decides upon and takes optimum response actions to thwart the continued attacks. Despite the machine and storage resource limitations in sensible phone devices, the engine can perform an entire and in-depth analysis on the sensible phone, since all the investigations unit carried out on Associate in nursing emulated device in terribly cloud surroundings.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection for Smart phone using Cloud

Smart phones have recently become increasingly popular because they provide “all-in-one” convenience by integrating traditional mobile phones with handled computing devices. Unfortunately these mobile devices are beginning to face many of the same security threats as desktops. Since smart phones software architecture is similar to the PCs software architecture, they are vulnerable to similar ty...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

iForensics: Forensic Analysis of Instant Messaging on Smart Phones

Smart phones with Internet capability are growing in popularity, due to many of their useful capabilities. Among other handy features of smart phones, Instant Messaging (IM) is very popular due to the level of convenience it provides in interpersonal communications. As the usage of IM on smart phone is increasing rapidly, it is important to take measures in advance from forensic standpoint fore...

متن کامل

New Research Directions in the Area of Smart Phone Forensic Analysis

The proliferation of smart mobile phones with diverse features makes it possible to increase their use in criminal activities. The fast technological evolution and presence of different smart phones and their proprietary operating systems pose great difficulties for investigators and law enforcement officials to choose the best tool for forensics examination, accurate recovery and speedy analys...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013