[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gangula et al., 2013 - Google Patents

Survey on mobile computing security

Gangula et al., 2013

Document ID
5626141088959782695
Author
Gangula A
Ansari S
Gondhalekar M
Publication year
Publication venue
2013 European Modelling Symposium

External Links

Snippet

The popularity of Wireless Technology is continuously growing and is very demanding these days. This has attracted enough number hackers to try to turn the serious threat issues into reality. The technology in the areas of computers and communications is updated every …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Similar Documents

Publication Publication Date Title
La Polla et al. A survey on security for mobile devices
Seo et al. Detecting mobile malware threats to homeland security through static analysis
He et al. Mobile application security: malware threats and defenses
Delac et al. Emerging security threats for mobile platforms
Wang et al. Smartphone security challenges
Teufl et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)
Al-Turjman et al. Cyber security in mobile social networks
US20130333032A1 (en) Network based device security and controls
EP3965364A1 (en) Hierarchical risk assessment and remediation of threats in mobile networking environment
Karim et al. Mobile botnet attacks-an emerging threat: Classification, review and open issues
Kumar et al. Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems
Wang et al. Mobile security testing approaches and challenges
Yesilyurt et al. Security threats on mobile devices and their effects: estimations for the future
Raveendranath et al. Android malware attacks and countermeasures: Current and future directions
Hamed et al. Intrusion detection in contemporary environments
Singh Social networking for botnet command and control
Anwar et al. Android botnets: a serious threat to android devices.
Gangula et al. Survey on mobile computing security
BalaGanesh et al. Smart devices threats, vulnerabilities and malware detection approaches: a survey
Hsieh et al. A study of android malware detection technology evolution
Mohata et al. Mobile malware detection techniques
US11876788B2 (en) Mobile device system and method for preventing network signal interception and hacking
Schneider et al. Mobile devices vulnerabilities
Agrawal et al. Pegasus: Zero-Click spyware attack–its countermeasures and challenges
Khan et al. A malicious attacks and defense techniques on android-based smartphone platform