首页> 外文期刊>Journal of Information Warfare >Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications
【24h】

Enhancing Cybersecurity by Defeating the Attack Lifecycle: Using Mobile Device Resource Usage Patterns to Detect Unauthentic Mobile Applications

机译:通过击败攻击生命周期来提高网络安全性:使用移动设备资源使用模式来检测不真实的移动应用程序

获取原文
获取原文并翻译 | 示例
       

摘要

Attacks are usually orchestrated based upon the motivation of the attackers, who are becoming increasingly savvy, better resourced, and more committed. This article examines cyber threats and vulnerabilities through the eyes of the perpetrator. To begin, the authors discuss some counter approaches that have produced limited benefits at best, and then introduce a novel approach that details the use of mobile device resource usage to discern unauthentic mobile applications from authentic applications. This capability is indeed a step in the right direction to addressing the problem of intrusion detection in mobile devices without using traditional signatures or rule-based approaches.
机译:通常根据攻击者的动机来安排攻击,这些攻击者变得越来越精明,资源更丰富,更坚定。本文通过犯罪者的眼光检查了网络威胁和漏洞。首先,作者讨论了一些对策,这些对策最多只能产生有限的收益,然后介绍一种新颖的方法,该方法详细介绍了使用移动设备资源使用情况来区分非真实的移动应用程序与真实的应用程序。此功能确实是朝着正确方向迈出的一步,无需使用传统签名或基于规则的方法即可解决移动设备中的入侵检测问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号