eCite Digital Repository

An enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system

Citation

Park, W and Kang, BH, An enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system, Mobile Information Systems, 2017 Article 8501976. ISSN 1574-017X (2017) [Refereed Article]


Preview
PDF
1Mb
  

Copyright Statement

Copyright 2017 The Authors Licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/

DOI: doi:10.1155/2017/8501976

Abstract

A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime thatmisused the leaked information caused by the cyberattack ofmobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.

Item Details

Item Type:Refereed Article
Keywords:mobile system, security monitoring
Research Division:Information and Computing Sciences
Research Group:Library and Information Studies
Research Field:Information Retrieval and Web Search
Objective Division:Information and Communication Services
Objective Group:Computer Software and Services
Objective Field:Information Processing Services (incl. Data Entry and Capture)
UTAS Author:Park, W (Dr Won Hyung Park)
UTAS Author:Kang, BH (Professor Byeong Kang)
ID Code:121312
Year Published:2017
Deposited By:Information and Communication Technology
Deposited On:2017-09-22
Last Modified:2018-06-14
Downloads:96 View Download Statistics

Repository Staff Only: item control page