Detecting Security Threats Using Mobile Devices

Juan Jenny Li, Peter Abbate, Brian Vega

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In our previous work [1], we presented a study of using performance escalation to automatic detect Distributed Denial of Service (DDoS) types of attacks. We propose to enhance the work of security threat detection by using mobile phones as the detector to identify outliers of normal traffic patterns as threats. The mobile solution makes detection portable to any services. This paper also shows that the same detection method works for advanced persistent threats.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages40-45
Number of pages6
ISBN (Electronic)9781467395984
DOIs
StatePublished - 6 Nov 2015
EventIEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015 - Vancouver, Canada
Duration: 3 Aug 20155 Aug 2015

Publication series

NameProceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015

Conference

ConferenceIEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015
Country/TerritoryCanada
CityVancouver
Period3/08/155/08/15

Keywords

  • Combinatorial testing
  • Covering array
  • Performance escalation
  • Security threat detection

Fingerprint

Dive into the research topics of 'Detecting Security Threats Using Mobile Devices'. Together they form a unique fingerprint.

Cite this