Research on System Structure of Mobile Internet Security Audit

Author(s):  
Xia-Meng Si

As the development of mobile internet bring convenient for people, the openness and variety of services make its security issues more complicated than those of traditional network. Firewall and intrusion detection focuses on external aggression, and cannot prevent revealing of internal information. As supplementary, security audit technology can monitor internal users' activity, forbid abnormal behavior of internal users. The author introduces related works about mobile internet security audit, comb through matured products on the market, and analyze current security status and architecture of mobile internet security. Based on the research results of traditional network security audit, the author provides a functional framework and universal model of mobile internet security auditing, as well as introduce an application scenario.

Author(s):  
Md Equebal Hussain ◽  
Mohammad Rashid Hussain

security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.


2022 ◽  
pp. 19-38
Author(s):  
Jeffrey S. Zanzig ◽  
Guillermo A. Francia III

Tremendous improvements in information networking capabilities have brought with them increased security risks resulting from the deterioration of the ability of a physical layer of computer security to protect an organization's information system. As a result, audit committees have had to deal with new security issues as well as the need to understand the cyber perpetrator and ensure the proper training of employees to consider cybersecurity risks. Standard setters including the Institute of Internal Auditors and the American Institute of Certified Public Accountants have issued guidance about lines of defense and reporting on an entity's cybersecurity risk management program and controls, respectively. Each of these topics is considered along with how cybersecurity guidance from COBIT, the National Institute of Standards and Technology, and the Center for Internet Security can be mapped into five cyber infrastructure domains to provide an approach to evaluate a system of cybersecurity.


Author(s):  
Roumaissa Khelf ◽  
Nacira Ghoualmi-Zine ◽  
Marwa Ahmim

The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is rapidly changing. Nevertheless, this technology has exacerbated the conventional security issues in WSNs, such as the key exchange problem. Therefore, Tiny Authenticated Key Exchange Protocol for IoT (TAKE-IoT) is proposed to solve this problem. The proposed TAKE-IoT is a secure, yet efficient, protocol that responds to several security requirements and withstands various types of known attacks. Moreover, TAKE-IoT aims to reduce computation costs using lightweight operations for the key generation. The proposed protocol is validated using the automated validation of internet security protocols and applications (AVISPA) tool. Hence, results show that TAKE-IoT can reach a proper level of security without sacrificing its efficiency in the context of IoT.


2013 ◽  
Vol 339 ◽  
pp. 341-348
Author(s):  
Yi Min Mao ◽  
Xiao Fang Xue ◽  
Jin Qing Chen

Ming association rules have been proved as an important method to detect intrusions. To improve response speed and detecting precision in the current intrusion detection system, this papers proposes an intrusion detection system model of MMFIID-DS. Firstly, to improve response speed of the system by greatly reducing search space, various pruning strategies are proposed to mine the maximal frequent itemsets on trained normal data set, abnormal data set and current data streams to establish normal and abnormal behavior pattern as well as user behavior pattern of the system. Besides, to improve detection precision of the system, misuse detection and anomaly detection techniques are combined. Both theoretical and experimental results indicate that the MMFIID-DS intrusion detection system is fairly sound in performance.


2014 ◽  
Vol 641-642 ◽  
pp. 1280-1283
Author(s):  
Jin Peng Tang ◽  
Ling Lin Li

According to the requirements and characteristics of mobile Internet content security audit, designed and implemented the mobile Internet content security audit system. The system captured and processed data through a data acquisition proxy server for mobile user network access, and then set keywords by matching rules, finally carried out the content audit through the single mode and multi pattern matching algorithm.


2021 ◽  
Vol 1 (1) ◽  
pp. 61-74
Author(s):  
Sohrab Mokhtari ◽  
◽  
Kang K Yen

<abstract><p>Anomaly detection strategies in industrial control systems mainly investigate the transmitting network traffic called network intrusion detection system. However, The measurement intrusion detection system inspects the sensors data integrated into the supervisory control and data acquisition center to find any abnormal behavior. An approach to detect anomalies in the measurement data is training supervised learning models that can learn to classify normal and abnormal data. But, a labeled dataset consisting of abnormal behavior, such as attacks, or malfunctions is extremely hard to achieve. Therefore, the unsupervised learning strategy that does not require labeled data for being trained can be helpful to tackle this problem. This study evaluates the performance of unsupervised learning strategies in anomaly detection using measurement data in control systems. The most accurate algorithms are selected to train unsupervised learning models, and the results show an accuracy of 98% in stealthy attack detection.</p></abstract>


Sign in / Sign up

Export Citation Format

Share Document