1,199 research outputs found
NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem
As a consequence of the growing popularity of smart mobile devices, mobile
malware is clearly on the rise, with attackers targeting valuable user
information and exploiting vulnerabilities of the mobile ecosystems. With the
emergence of large-scale mobile botnets, smartphones can also be used to launch
attacks on mobile networks. The NEMESYS project will develop novel security
technologies for seamless service provisioning in the smart mobile ecosystem,
and improve mobile network security through better understanding of the threat
landscape. NEMESYS will gather and analyze information about the nature of
cyber-attacks targeting mobile users and the mobile network so that appropriate
counter-measures can be taken. We will develop a data collection infrastructure
that incorporates virtualized mobile honeypots and a honeyclient, to gather,
detect and provide early warning of mobile attacks and better understand the
modus operandi of cyber-criminals that target mobile devices. By correlating
the extracted information with the known patterns of attacks from wireline
networks, we will reveal and identify trends in the way that cyber-criminals
launch attacks against mobile devices.Comment: Accepted for publication in Proceedings of the 28th International
Symposium on Computer and Information Sciences (ISCIS'13); 9 pages; 1 figur
Electrical and Computer Engineering Annual Report 2017
Early Career Awards Faculty Directory Faculty Highlights Special Report: Mobility at Michigan Tech Faculty Publications Staff Profile & Directory Graduate Student Research Accelerated Master\u27s Degree Graduate Student Awards & Degrees Undergraduate Highlights Senior Design Enterprise Undergraduate Student Awards & Advisory Grants & Contracts Departmental Statistics A Pioneer\u27s Storyhttps://digitalcommons.mtu.edu/ece-annualreports/1001/thumbnail.jp
Consumerization of IT: Risk Mitigation Strategies and Good Practices. Responding to the Emerging Threat Environment.
This report presents security policies that can be deployed to mitigate risks that are related with the trend of Consumerization of IT (COIT) and Bring Your Own Device (BYOD).
The aim of this document is to identify mitigation strategies, policies and controls for the risks identified in this area
- …