A Method of Abnormal Behavior Classification in Mobile Internet
نویسندگان
چکیده
With the large-scale employment of mobile internet, more mobile abnormal behaviors appear and are a great threat to the security of mobile users. Since many of those are unprecedented and unknown, it is difficult to classify these abnormal behaviors from normal behaviors by use of existing security application. In this article, a new method is proposed to classify and detect the abnormal behaviors in mobile internet. Firstly three classifiers are designed to divide all of the normal and abnormal mobile internet behaviors based on the characteristics of these behaviors. These three network behavior classifiers are trained by the known abnormal behaviors and normal behaviors data of mobile internet respectively. The algorithm of these classifiers is an improved multi-category Naïve Bayesian algorithm. Those classifiers analyze the corresponding type of network behaviors to detect the new abnormal behaviors. A self-learning procedure is adopted to gradually optimize those classifiers for different behavior. A mobile abnormal behaviors analysis system based on the above behavior classifiers is described.
منابع مشابه
استفاده از نمایش پراکنده و همکاری دوربینها برای کاربردهای نظارت بینایی
With the growth of demand for security and safety, video-based surveillance systems have been employed in a large number of rural and urban areas. The problem of such systems lies in the detection of patterns of behaviors in a dataset that do not conform to normal behaviors. Recently, for behavior classification and abnormal behavior detection, the sparse representation approach is used. In thi...
متن کامللبخوانی: روش جدید احراز هویت در برنامههای کاربردی گوشیهای تلفن همراه اندروید
Today, mobile phones are one of the first instruments every individual person interacts with. There are lots of mobile applications used by people to achieve their goals. One of the most-used applications is mobile banks. Security in m-bank applications is very important, therefore modern methods of authentication is required. Most of m-bank applications use text passwords which can be stolen b...
متن کاملInvestigating the relationship between mobile phone harmful use and Internet addiction with emotional divorce of teachers in Kermanshah city
The purpose of this study was to investigate the relationship between mobile phone harmful use and internet addiction with the emotional divorce of female teachers in Kermanshah. The statistical population of this study included all married female teachers in Kermanshah city in 1969-97. Using multi-stage cluster sampling, 269 people were selected as sample based on Morgan's table. The questionn...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملOnline Buying Behavior among University Students: A Cross Cultural Empirical Analysis
Internet users all over the world are increasing day by day and showing great interest for online shopping. The main reason for the high usage of the internet is the affordable price of mobile gadgets and low internet tariff plans. Consumer behavior is influenced by various factors such as culture, social class, reference groups relationship, family, income level and income independency, age, g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014