2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA) 2016
DOI: 10.1109/waina.2016.35
|View full text |Cite
|
Sign up to set email alerts
|

A Host and Network Based Intrusion Detection for Android Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(15 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…The graph supports our assumption by showing the signicant deviation in the CPU utilisation pattern during the DDoS attack period. In the literature we note works such as [21], [22], [2], [15], [9], [16], [17] where deviations in smartphone resource utilisation are used as indicators of smartphone intrusions. For DroidLight, we use the OCC algorithm that is proposed by [10].…”
Section: Droidlight Approach To Intrusion Detectionmentioning
confidence: 99%
“…The graph supports our assumption by showing the signicant deviation in the CPU utilisation pattern during the DDoS attack period. In the literature we note works such as [21], [22], [2], [15], [9], [16], [17] where deviations in smartphone resource utilisation are used as indicators of smartphone intrusions. For DroidLight, we use the OCC algorithm that is proposed by [10].…”
Section: Droidlight Approach To Intrusion Detectionmentioning
confidence: 99%
“…FR1: Must be able to collect required security-related data in different situations and contexts [21]. FR2: Must be able to store collected data in a storage medium [22].…”
Section: A Requirements 1) Functional Requirements (Fr)mentioning
confidence: 99%
“…FR8: Must be flexible and scalable in data collection [25]. FR9: Must not cost too much computation resources, storage resources or other resources in collecting data in some scenarios [21]. FR10: Must be automatic and adaptive, with a certain degree of intelligence and learning ability in order to adapt to the changes of a network environment [11].…”
Section: A Requirements 1) Functional Requirements (Fr)mentioning
confidence: 99%
See 1 more Smart Citation
“…More recently, Ariyapala et al [5] combine host and network metrics to build an intrusion detection system for smartphones. The authors capture metrics such as CPU utilisation, energy consumption, running processes, user activity and network traffic.…”
Section: Related Workmentioning
confidence: 99%