• Title/Summary/Keyword: Mobile internet devices

Search Result 800, Processing Time 0.031 seconds

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

A Personalized Mobile Service Method of RSS News Channel Contents for Ubiquitous Environment (유비쿼터스 환경을 위한 RSS 뉴스 채널 컨텐츠의 개인화 모바일 서비스 기법)

  • Han, Seung-Hyun;Ryu, Dong-Yeop;Lim, Young-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.427-434
    • /
    • 2007
  • Although wireless devices are the most suitable device for ubiquitous environment, they have restrictive capacities when using internet services than desktop environments. Therefore this research proposes a wireless internet service method that uses contents-based personalization. The existing websites can easily and promptly access desired news articles and other data through RSS-linked web contents and by the personalization method. The proposed method will make using wireless internet easier while lowering contents production costs. Moreover, personalized mobile web news contents that satisfy the preferences of users can be serviced.

Design and Implementation of Mobile Security System for Digital contents Rights Protection in Wireless Internet Environment (무선 인터넷 환경에서 디지털 컨텐츠 저작권 보호를 위한 모바일 보안 시스템의 설계 및 구현)

  • Kim, Hoo-Jong;Na, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.695-704
    • /
    • 2003
  • As wireless Internet speads widely, circulation of various types of digital contents become active. Therefore, it is necesary to make a mobile-based DRM (Digatal Rights Management) system to protect digital contents from illegal reproduction and to give proper rights to contents users, In this paper, we present a mibile security system, which protects the copyright for digital contents offered throughout the mobile environment. Our security system is focused on presenting mobile-based DRM architecture. Especially, considering mobile device's decrying power, we adopted partial encryption scheme. For this, wecompared and evaluated the performant of each contents encryption scheme (the entire encryption scheme and the partial encription scheme) and proved that a proper DRM system for current wireless devices is the partial encryption system. Our mobile DRM system can be very efficient to protect contents on the wireless Internet environment.

Secure Handoff Based on Dual Session Keys in Mobile IP with AAA (Mobile IP 및 AAA 프로토콜 기반으로 신속성과 안전성을 고려한 듀얼세션키 핸드오프 방식연구c)

  • Choi Yumi;Lee Hyung-Min;Choo Hyunseung
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.107-119
    • /
    • 2005
  • The Mobile IP has evolved from providing mobility support for portable computers to support wireless handheld devices with high mobility patterns. The Mobile IP secures mobility, but does not guarantee security, In this paper, the Mobile IP has been adapted to allow AM protocol that supports authentication, authorization and accounting for authentication and collection of accounting information of network usage by mobile nodes, For this goal, we propose a new security handoff mechanism to intensify the Mobile IP security and to achieve fast handoff. In the proposed mechanism, we provide enough handoff achievement time to maintain the security of mobile nodes, According to the analysis of modeling result, the proposed mechanism composed the basic Mobile IP along with AM protocol is up to about $60\%$ better in terms of normalized surcharge for the handoff failure rate that considers handoff time.

  • PDF

A Multi-Agent Approach to Context-Aware Optimization for Personalized Mobile Web Service (상황인지 기반 최적화가 가능한 개인화된 모바일 웹서비스 구축을 위한 다중에이전트 접근법에 관한 연구)

  • Kwon Oh-byung;Lee Ju-chul
    • Korean Management Science Review
    • /
    • v.21 no.3
    • /
    • pp.23-38
    • /
    • 2004
  • Recently the usage of mobile devices which enable the accessibility to Internet has been dramatically increased. Most of the mobile services, however, so far tend to be simple such as infotainment service. In order to fully taking advantage of wireless network and corresponding technology, personalized web service based on user's context could be needed. Meanwhile, optimization techniques have been vitally incorporated for optimizing the development and administration of electronic commerce. However, applying context-aware optimization mechanism to personalized mobile services is still very few. Hence, the purpose of this paper is to propose a methodology to incorporate optimization techniques into personalization services. Multi agent-based web service approach is considered to realize the methodology. To show the feasibility of the methodology proposed in this paper, a prototype system, CAMA-myOPt(Context-Aware Multi-Agent system for my Optimization), was implemented and adopted in mobile comparative shopping.

Factors Influencing the Knowledge Adoption of Mobile Game Developers in Online Communities: Focusing on the HSM and Data Quality Framework

  • Jong-Won Park;Changsok Yoo;Sung-Byung Yang
    • Asia pacific journal of information systems
    • /
    • v.30 no.2
    • /
    • pp.420-438
    • /
    • 2020
  • Recently, with the advance of the wireless Internet access via mobile devices, a myriad of game development companies have forayed into the mobile game market, leading to intense competition. To survive in this fierce competition, mobile game developers often try to get a grasp of the rapidly changing needs of their customers by operating their own official communities where game users freely leave their requests, suggestions, and ideas relevant to focal games. Based on the heuristic-systematic model (HSM) and the data quality (DQ) framework, this study derives key content, non-content, and hybrid cues that can be utilized when game developers accept suggested postings in these online communities. The results of hierarchical multiple regression analysis show that relevancy, timeliness, amount of writing, and the number of comments are positively associated with mobile game developers' knowledge adoption. In addition, title attractiveness mitigates the relationship between amount of writing/the number of comments and knowledge adoption.

Contents Conversion System for Mobile Devices using Light-Weight Web Document (웹 문서 경량화에 의한 모바일용 콘텐츠 변환 시스템)

  • Kim Jeong-Hee;Kwon Hoon;Kwak Ho-Young
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.13-22
    • /
    • 2005
  • This paper aims to develop a system for converting web contents to mobile contents that can be used on mobile devices. Since web contents generally consist of pop-up ad windows, a bunch of unnecessary images and useless links, it is difficult to efficiently display them on common mobile devices that have lower bandwidth and memory, as well as much smaller screen, than the online environment. It is also troublesome for mobile device users to directly access contents. Thus, there has been a great demand for a new method for extracting useful and adequate contents from web documents, and optimizing them for use on mobile phones, In the paper, a system based on WAP 2,0 and XHTML Basic, which is a content creation language adopted for WAP 2,0, has been suggested. The system is designed to convert web contents by using the conversion rules of the existing filtering method after making the size of web documents smaller. The adopted conversion rules use the XHTML Basic's module units so that modification and deletion can be carried out with ease. In addition, it has been defined in a XSL document written in XSLT to maintain the extensibility of conversion and the validity of documents, In order to allow it to efficiently work together with WAP l.X's legacy services, the system has been built in a way that can have modules, which analyze information about CC/PP profiles and mobile device headers.

  • PDF

CoAP/6LoWPAN-based Smart Home Network system using DTLS (DTLS 보안기술이 적용된 CoAP/6LoWPAN 기반의 스마트 홈네트워크 시스템)

  • Kim, Yeon-Su;Kim, Ki-Tae;Lee, Bo-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.53-61
    • /
    • 2018
  • Recently, technologies related to the Internet of Things have developed rapidly and research on mobile environment home network systems is actively in progress. The Internet Engineering Task Force (IETF) Working Group proposed the CoAP/6LoWPAN technology as a suitable protocol for internetworking IoT devices with the Internet in a limited environment and adopting it as a standard. However, the existing home network systems hardly include security protocols. IETF recommends DTLS(Datagram Transport Layer Security) on UDP as security protocol suitable for IoT environments. In this paper, smart home network system based on CoAP/6LoWPAN by using DTLS is implemented in mobile environments. The data transfer time is measured according to each procedure of the DTLS protocol and the need to improve DTLS protocol is suggested.

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

Adaptive Resource Allocation for Traffic Flow Control in Hybrid Networks

  • Son, Sangwoo;Rhee, Byungho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.1
    • /
    • pp.38-55
    • /
    • 2013
  • Wireless network systems provide fast data transmission rates and various services to users of mobile devices such as smartphones and smart pads. Because many people use high-performance mobile devices, the use of real-time multimedia services is increasing rapidly. However, the preoccupation of resources by real-time traffic users is causing harm to other services-for example, frequent call interference, lowered service quality, and poor network performance. This paper suggests a resource allocation algorithm for effective traffic service support in a hybrid network. The main objective is to obtain an optimum value of data rates by comparing user requirements with the amount of resources that can be allocated. A new mechanism based on Adaptive-Quality of Service (QoS) and a monitoring system based on Queue-Aware are proposed. Adaptive-QoS supports effective resource control according to the type of traffic service, and the monitoring system based on Queue-Aware measures the amount of resources in order to calculate the maximum that can be allocated. We apply our algorithm to a test system and use Qualnet 4.5.1 to evaluate its performance.