A threat monitoring system in enterprise networks with smart mobiles Online publication date: Wed, 02-Mar-2016
by Zhijiang Chen; Linqiang Ge; Guobin Xu; Wei Yu; Robert F. Erbacher; Hasan Cam; Nnanna Ekedebe
International Journal of Security and Networks (IJSN), Vol. 11, No. 1/2, 2016
Abstract: With the development of modern mobile operating systems, computing, and communication technologies, smart mobile devices have been widely used to support rich applications and have been integrated into enterprise networks for organisations to improve business operations. When accessing sensitive pieces of personal and business information, the lack of strong security in smart mobile devices has become a serious issue. In this paper, we developed a threat monitoring system to monitor and detect threats in enterprise networks with mobile devices. We implemented both signature and anomaly based schemes to monitor and detect threats. To evaluate the effectiveness of our threat monitoring system, we used real-world samples of benign apps and malware samples to conduct experiments on Android mobile devices. Our experimental data shows that our developed system can accurately and effectively detect malware on the Android platform while incurring low overhead to the system in terms of energy and CPU usage.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com