An enhancement of optimized detection rule of security monitoring and control for detection of cyberthreat in location-based mobile system
journal contributionposted on 2023-05-19, 11:19 authored by Park, W, Byeong KangByeong Kang
A lot of mobile applications which provided location information by using a location-based service are being developed recently. For instance, a smart phone would find my location and destination by running a program using a GPS chip in a device. However, the information leakage and the crime thatmisused the leaked information caused by the cyberattack ofmobile information system occurred. So the interest and importance of information security are increasing. Also the number of users who has used mobile devices in Korea is increasing, and the security of mobile devices is becoming more important. Snort detection system has been used to detect and handle cyberattacks but the policy of Snort detection system is applied differently for each of the different kinds of equipment. It is expected that the security of mobile information system would be improved and information leakage would be blocked by selecting options through optimization of Snort detection policy to protect users who are using location-based service in mobile information system environment in this paper.
Publication titleMobile Information Systems
Department/SchoolSchool of Information and Communication Technology
Place of publicationUnited States
Rights statementCopyright 2017 The Authors Licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) https://creativecommons.org/licenses/by/4.0/