2013
DOI: 10.1007/978-3-319-01604-7_42
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach

Abstract: Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and eliminate or mitigate their effects, as part of the EU FP7 NEMESYS project. These ideas are supplemented with a careful re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
2
1

Relationship

4
6

Authors

Journals

citations
Cited by 33 publications
(34 citation statements)
references
References 36 publications
0
34
0
Order By: Relevance
“…Similar events have also been observed for mobile devices that seek to connect to Cloud services [9], [16]. Thus significant efforts are required to be made to understand the security of mobile connections, making them resilient and reliable in the face of malicious apps [17].…”
Section: Introductionmentioning
confidence: 54%
“…Similar events have also been observed for mobile devices that seek to connect to Cloud services [9], [16]. Thus significant efforts are required to be made to understand the security of mobile connections, making them resilient and reliable in the face of malicious apps [17].…”
Section: Introductionmentioning
confidence: 54%
“…To ensure information security, an important task is to design a computer system. Need a variety of methods to ensure information security, information encryption technology is an important part of the protection of information security, realize the core of the network information security technology [3][4][5][6] .…”
Section: ) Integritymentioning
confidence: 99%
“…A number of novel ideas are also being investigated [39] such as modeling the signaling and billing network as a queueing network [40,41] to capture the main events that involve hundreds of thousands of mobile calls and interactions, while only a few may be subject to an intrusion or attack at any given time. Detection of anomalies is studied using learning with neural networks [42,43] that provide fast loworder polynomial detection complexity required for massive real-time data, and the need to detect and respond to threats in real-time.…”
Section: Anomaly Detection Using Control Plane and Billing Datamentioning
confidence: 99%