8501976.pdf (1.38 MB)
Download fileAn enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system
A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime thatmisused the leaked information caused by the cyberattack ofmobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.
History
Publication title
Mobile Information SystemsVolume
2017Article number
8501976Number
8501976Pagination
1-13ISSN
1574-017XDepartment/School
School of Information and Communication TechnologyPublisher
HindawiPlace of publication
United StatesRights statement
Copyright 2017 The Authors Licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/Repository Status
- Open