TY - GEN
T1 - Detecting Security Threats Using Mobile Devices
AU - Li, Juan Jenny
AU - Abbate, Peter
AU - Vega, Brian
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/11/6
Y1 - 2015/11/6
N2 - In our previous work [1], we presented a study of using performance escalation to automatic detect Distributed Denial of Service (DDoS) types of attacks. We propose to enhance the work of security threat detection by using mobile phones as the detector to identify outliers of normal traffic patterns as threats. The mobile solution makes detection portable to any services. This paper also shows that the same detection method works for advanced persistent threats.
AB - In our previous work [1], we presented a study of using performance escalation to automatic detect Distributed Denial of Service (DDoS) types of attacks. We propose to enhance the work of security threat detection by using mobile phones as the detector to identify outliers of normal traffic patterns as threats. The mobile solution makes detection portable to any services. This paper also shows that the same detection method works for advanced persistent threats.
KW - Combinatorial testing
KW - Covering array
KW - Performance escalation
KW - Security threat detection
UR - http://www.scopus.com/inward/record.url?scp=84963626701&partnerID=8YFLogxK
U2 - 10.1109/QRS-C.2015.18
DO - 10.1109/QRS-C.2015.18
M3 - Conference contribution
AN - SCOPUS:84963626701
T3 - Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015
SP - 40
EP - 45
BT - Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015
Y2 - 3 August 2015 through 5 August 2015
ER -