Enviar búsqueda
Cargar
IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices
•
0 recomendaciones
•
4 vistas
IRJET Journal
Seguir
https://www.irjet.net/archives/V7/i1/IRJET-V7I138.pdf
Leer menos
Leer más
Ingeniería
Denunciar
Compartir
Denunciar
Compartir
1 de 7
Descargar ahora
Descargar para leer sin conexión
Recomendados
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
eSAT Publishing House
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
Recomendados
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
ijtsrd
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
Analytical survey of active intrusion detection techniques in mobile ad hoc n...
eSAT Publishing House
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
eSAT Journals
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Deepak Mishra
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
Nishanth Gandhidoss
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Drjabez
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
Eswar Publications
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
ijsrd.com
Intrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection System
International Journal of Engineering Inventions www.ijeijournal.com
Risks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
06686259 20140405 205404
06686259 20140405 205404
Manasa Deshaboina
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
editor1knowledgecuddle
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
IRJET Journal
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
AM Publications,India
Retail
Retail
CMR WORLD TECH
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
ijctet
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
AM Publications,India
C02
C02
newbie2019
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
Melissa Lim
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
IJMIT JOURNAL
Más contenido relacionado
La actualidad más candente
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
Eswar Publications
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
IOSR Journals
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
ijsrd.com
Intrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection System
International Journal of Engineering Inventions www.ijeijournal.com
Risks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
06686259 20140405 205404
06686259 20140405 205404
Manasa Deshaboina
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
editor1knowledgecuddle
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IJERA Editor
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
CSCJournals
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
IRJET Journal
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
AM Publications,India
Retail
Retail
CMR WORLD TECH
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
ijctet
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
AM Publications,India
C02
C02
newbie2019
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
Melissa Lim
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
La actualidad más candente
(20)
Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
Intrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection System
Risks and Security of Internet and System
Risks and Security of Internet and System
06686259 20140405 205404
06686259 20140405 205404
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
Retail
Retail
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
C02
C02
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Similar a IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
IJMIT JOURNAL
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
IRJET Journal
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
Lindsey Sais
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
IJNSA Journal
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
Venkat Projects
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
50320130403001 2-3
50320130403001 2-3
IAEME Publication
50320130403001 2-3
50320130403001 2-3
IAEME Publication
A017360104
A017360104
IOSR Journals
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
IJCSIS Research Publications
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
Moon Technolabs Pvt. Ltd.
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
IRJET Journal
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
IRJET Journal
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
Similar a IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices
(20)
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
50320130403001 2-3
50320130403001 2-3
50320130403001 2-3
50320130403001 2-3
A017360104
A017360104
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
Más de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Más de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Último
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
sdickerson1
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
JasonTagapanGulla
Transport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
GOPINATHS437943
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
saravananr517913
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
irfanmechengr
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Último
(20)
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
Transport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205 Local Security Enhancement and Intrusion Prevention in Android Devices Santhosh Voruganti1, Mohd Muawiz Siddiqui 2, Jallawaram Abhishek3, Karnati Ramyakrishna4 1Asst.Prof, IT Department CBIT Hyderabad 2Student, IT Department CBIT Hyderabad 3Student, IT Department CBIT Hyderabad 4Student, Osmania University Hyderabad ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Android smart phones amount to 82% of the devices in the smartphone market. Every year there are more than 500 million new handsets sold, thereby granting Android the monopoly in the smartphone market. With an exponential increase in the number of users the risks associated with the phones also increases exponentially. In this paper, we use earlierapproachesofhost-basedintrusion detection systems and behavior-based intrusion prevention systems for Androidsmartphonestodesignandimplementa host-based, behavior-based intrusionpreventionsystem, for Android smartphones. Our system uses net flow based clustering to identify anomalies and correlates further with the host-based features to verify malware intrusions in the Android system. Our goal is to provide versatile security for Android smartphones, offering detection of a wide range of attacks including denial of service attacks and probing. The system should be able to detect new attacks as well, thus providing scope for extending the method to other security solutions. Key Words: Android; Host-Based; Behaviour-Based Information Security; Intrusion Prevention;LogitBoost. 1. INTRODUCTION The global telephony industry is witnessing an on- going proliferation of smartphones. A smartphone is an advanced mobile communication and a computing device which is shaping the way we communicate process and store information at work, at home andonthemove.Smartphones are no longer mere voice communication devices. The considerable processing and storage capabilitiesare making their users to store and process private and business data. Data associated with these activities have significant value and over the recent years, smartphones are becoming an increasingly interesting target for cyber-criminalsdueto the wealth of personal data in them. Over the past years, smartphone marketsharehasincreased rapidly and currently Android smartphones are dominating the smartphones. The popularity of Android open platform and the relative ease of programmability is making Android platform the lead malware target as well. However, this is possibly due to the unregulated third-party app stores for Android. Cybercriminals find the motivation to exploit smartphones as they store a wealth of personal data. Users tend to store more of their personal data on their smartphones, than on PCs; such as photos, videos, SMS, emails, and banking/shopping apps. Therefore, in this mobile computing era, protecting the safety of the smartphones is a top priority. The advanced mobile communication devices such as smart phones are changing the way in which we communicate process and store data from any place. They evolved from simple mobile phones into sophisticated and yet compact mini computers. They are not just voice communication devices. Apart from browsing internet these devices can receive email send MMS messages, exchange information by connecting to other devices. They are also equipped with operating system, text editors, spreadsheet editors and database processors. As the capabilities of mobile devices evolve, their usage for processing and storing private and business data is likely to increase. Currently 200 million users are using smart phones worldwide and the number of people using smart phones will likely to increase to 1 billion in the next 2 years. That is approximately one sixth of the world population and equivalent to population of India. As these devices can allow third party software’s to run on them they are vulnerable to various threats like viruses, malware, worms and Trojan horses.Alsoa mobiledevice can initiate communication on anyone of its communication interfaces and also can connect to wide variety of wireless networks. Intrusion prevention mechanisms such as encryption, authentication alone cannot improve the security of the system. Already existing desktop based Intrusion Detection software’s may not be good for mobile systems because of the memory consumption rate and power consumption. We need to come up with Intrusion detection systems that will not only improve the security of these systems but also reduce the processing overheadfrom the system. In this paper, we aim to successfully overcome the shortcomings of existing systems i.e. Host-Based Intrusion Detection and Behavior Based intrusion Detection. A host- based system is faster and allows mobility of devices, thus making it a more feasible design trait for smart phones. A behavior based system is employedbecauseitusesa learned pattern of normal network packets to identify active intrusion attempts and can adapt to new and original attacks, unlike knowledge-basedsystems.In behavior-based systems, feature reductionandselectionreducesthenumber
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206 of features given to the classifier, thus improving classifier accuracy. The application uses PCA for feature reduction, thus improving the classifier’s accuracy considerably. Moreover, all the prevailing host- based systems detect device-dependent metrics and malware. 2. LITERATURE SURVEY 2.1 Host-based Intrusion Detection A host-based IDS is capable of monitoring all or parts of the dynamic behavior and the state of a computer system,based on how it is configured. Besides such activities as dynamically inspecting network packets targeted at this specific host (optional component with most software solutions commerciallyavailable),a HIDSmightdetectwhich program accesses what resources and discover that, for example, a word- processor has suddenly and inexplicably started modifying the system passworddatabase.Similarlya HIDS might look at the state of a system, its stored information, whether in RAM, in the file system, log files or elsewhere; and check that the contents of these appear as expected, e.g. have not been changed by the intruders. Ideally a HIDS works in conjunction with a NIDS, such that a HIDS finds anything that slips past the NIDS. Commercially available software solutions often do correlate the findings from NIDS and HIDS in order to find out about whether a network intruder has been successful or not at the targeted host. Most successful intruders, on entering a target machine, immediately apply best-practice security techniques to secure the system which they have infiltrated, leaving only their own backdoor open, so that other intruders cannot take over their computers. 2.2 Behavior-based Intrusion Detection Most security monitoring systems utilize a signature- based approach to detect threats. They generally monitor packets on the network and look for patterns in the packets which match their database of signatures representing pre- identified known security threats. Behavior analysis detection-based systems are particularlyhelpful indetecting security threat vectors in 2 instanceswheresignature-based systems cannot (i) new zero- day attacks(ii)whenthethreat traffic is encrypted such as the command and control channel for certain Botnets. A Behavior analysis detection program tracks critical network characteristics in real time and generates an alarm if a strange event or trend is detected that could indicate the presence of a threat. Large-scale examples of such characteristics include traffic volume, bandwidth use and protocol use. Behavior analysis detection solutions can also monitor the behavior of individual network subscribers. In order for behavior analysis detection to be optimally effective a baseline of normal network or user behavior must be established over a period of time. Once certain parameters have been defined as normal, any departure from one or more of them is flagged as anomalous. Behavior analysis detection should be used in addition to conventional firewalls and applications for the detection of malware. Some vendors have begun to recognize this factby including Behavior analysis detection programs as integral parts of their network security packages. 2.3 Summary The advantages and limitations of the studied systems lead to the following observations. A host-based system is faster and allows mobility of devices, thus making it a more feasible design trait for smart phones. A behavior based system is employed because it uses a learned pattern of normal network packetstoidentifyactiveintrusionattempts and can adapt to new andoriginal attacks,unlikeknowledge- based systems. In behavior-basedsystems,featurereduction and selection reduces the number of features given to the classifier, thus improving classifier accuracy. Our model improves the existing version of ‘Protego: A passive Intrusion Detection System for Android Devices. We use the same architecture and the procedure as Protego but the implementation is improved. While Protego has anaccuracy of 92% using AdaBoost o build the classifier, our model has an accuracy of 97.8845% using Logit Boost algorithm. Another drawback of Protego that our model overcomes is that it could only detect any intrusions while our model can even stop the intrusions as soon as they are detected. 3. MODEL OVERVIEW The proposed system is a behavior-based, host-based, passive intrusion detection system. We first remove the unnecessary attributes from the NSL-KDD dataset in the preprocess stage. WethenusePrincipal ComponentAnalysis to reduce features of the dataset. The generation of the packet capture file allows the application of feature reduction using principal components analysis. The system architecture of our model is same as Protego and has been depicted in Fig- 1. It consists of 5 subparts, organized in three basic modules: Classifier Training Packet Capture and Analysis Packet Classification 3.1 Classifier Training The idea of training a classifier stems from the fundamental concept of supervised learning. Supervised learning is the machine learning task of inferring a function from labelled data. A classifier is an algorithm which allows one to define categories of nodes. An integral part of training theclassifier is a predefined training set, which in this case is a modified version of the NSL-KDD dataset (reduced to suittheneedsof smartphones). By running the dataset through the classifier
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 207 to train it, you can then run that trained classifier on unknown nodes or records to determine which class that node belongs to. 3.1.1 Classifier algorithm: As accuracy is of utmost importance in intrusion detection systems, we decided to use an ensemble approach for classification. This is a compositemodel,madeupofmultiple classifiers which vote, and returns a class label prediction based on the collection of votes. After evaluating multiple classifier models for their accuracy, we zeroed in on Logit Boost (adds a cost functional of logistic regression,) as the classification algorithm, as it gave 97.982% accuracy. 3.2 Packet Capture and Analysis Feature reduction is usedfor reductionofdimensionsofdata having high dimensionality. It consists of feature selection and feature extraction. Feature selection is a process of selecting a subset of features and discarding the features which are redundant or have a comparatively low or no information gain. This results in data with reduced dimensionality and thus increases efficiency of machine learning algorithms. We chose principal componentanalysis (PCA) to reduce the dimensionality of the data,asithasbeen widely applied to datasets in various scientific domains.PCA is a linear dimensionality reduction technique which explains the variance covariance structure of a set of variables, through a few new variables, that are linear combinations of the original variables.Thenewvariablesare obtained from the eigenvalues and eigenvectors of the data covariance matrix. The data is first normalized and its standard deviation is calculated. In the next step, eigen analysis is performed on the create independent orthonormal eigenvalue, eigenvector pairs. Finally, the sets of principal components sortbyEigenvalue in descending order. The eigenvalue is a relative measure of the variance of its corresponding eigenvectors. We implemented our system by using different sets of the most significant features generated by PCA. The accuracy was found to be consistent for 10 or more most significant features i.e. 97.9865%. Thus, in the final version of the static application, we have selected the 10 most significant features obtained as a result of PCA. 3.3 Packet Classification Before the records are classified, the trained model of the classifier - which was saved while training - is loaded. The connection records are then fed to the classifier. Based on this trained model, each of the record is then classified into two categories viz. normal and anomaly. Fig-1: Architecture of the Model 4. IMPLEMENTATION 4.1 Hardware The models for AdaBoost and LogitBoost are compared on WEKA, a data mining tool. The model is testedonanAndroid device running on Two Android smart phones running on Lollipop (5.0.2) the hardware specificationofthephoneisas follows: • CPU- Dual-core 1.3 GHz (Cortex-A7) • GPU- Mali 400 • RAM- 1GB The hardware specification of the system to build and compare the models is as follows; • CPU- Intel core I5 • GPU- NVIDIA GEFORCE 680 • RAM- 8GB 4.2 Software Android Studio 1.1 wasused forthedevelopmentandtesting of our model. Our model requires that the phone has a root access. We used tcpdump version3.9.8 to sniff packets.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 208 Tcpdump is a command line tool which prints the description of contents of packets on a network interface. Busybox has been used for exploiting Unix tools. We use Weka, a machine learning tool used for data mining, for building and comparing the for the Android platform. 4.3 Dataset Description In our classifier, we used the NSL-KDD data set, as it has solved someof the inherent problemsoftheKDDCUP’99data set, which is a benchmark data set for evaluating intrusion detection systems. The training data set consists of 125,973 single connection vectors, each of which contain 41 features and is labeled as a normal or an attack vector. However, 13 features, like ‘root_shell’, ‘su_attempted’, ‘num_file_creation’, etc., are not related to smartphones and hence needed to be removed from the dataset to be relevant to our system. Removing these features manually could be done without affecting the training set as the features had low relevance and information gain. Fig-2: Dataset Description The above figure gives a brief description of the various attributes selected in the dataset. Out of the 41 attributes present in the NSL-KDD dataset, we remove 13 attributes which are not necessary in an android environment. 4.4 Model Creation The Dataset is modified to suit the needs of an android device. After removing the attributes that are no longer required, Principal Component Analysis is done on the Dataset. Once PCA is done on the Dataset we proceed to build the model for the classifier. We use Logit Boost algorithm to ensure maximum accuracy. The model is tested for varying number of iterations and the most accurate case is taken. Fig -3: Principal Component Analysis done on Dataset Sample paragraph Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. Fig-4: Working of the Algorithm to build the model We compare the results between AdaBoost and Logit Boost for various iterations and the results are tabulated in the
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 209 form of a graph. Our assumption that Logit Boost is more accurate is proved to be true. In the above figure, the Logit Boost algorithm is being used. We calculate Root Mean Square Error, Relative Absolute Error as well as Root Relative Squared Error. The detailed accuracy gives the True Positive, False Positive, Precision, Recall and other metrics to better understand the accuracy. 5. TESTING AND RESULTS 5.1 Evaluation In order to evaluate the implementation of our model, we executed the application and checked the results. Fig-5: Loading the dataset The above figure illustrates the loading screen and the options for loading the dataset into the WEKA tool. Fig-6: Accuracy for 25 iterations (97.8845%) Fig-7: Performing LogitBoost in AndroidDevice Fig-8: Building Model in Android device In the above 2 figures, we redo the process of building the model for the classifier in the android device. We use an extension of WEKA for Android devices to facilitate this. 5.2 Results The system correctly classifies the respective data with an accuracy of 97.8845%. The number of iterations and their corresponding accuracies are as follows: • 10 features: 96.4199% • 20 features: 97.3606% • 25 features: 97.8845%
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 210 A graph comparing the accuracyofAdaBoostandLogitBoost is shown in Fig- 9. 5.3 Discussion Although Protego isanefficientintrusiondetectionsystem,it fails to prevent those intrusions and our model overcomes this limitation. Intrusion prevention: Our model can successfully prevent the preassigned set of intrusionstryingtoattack theAndroid Dataset. The Application gives a toast whenever any such intrusion is detected. In the below graph we compare the accuracy between AdaBoost and LogitBoost algorithms. The X axis denotes the number of iterations and the Y axis gives the accuracy. From the graph we can conclude that with an increase in the number of iterations the accuracy of both AdaBoost and LogitBoost algorithms increase. But in comparison to AdaBoost algorithm (denoted by the green line), LogitBoost algorithm (denoted by the red line) is more accurate for every case which is studied. Fig-9: Comparison between LogitBoost and AdaBoost 6. CONCLUSIONS AND FUTURE SCOPE In this work, we present a novel intrusion prevention method on Android smartphones. The system captures network traffic and classifies it to detect intrusions and unauthorized network activity on the host. The key focus of the study was to develop a system which could accurately detect any deviation from normal activity and cope with changing systembehaviour, whileimposinglessoverheadon the host system. The developed system is robustly able to detect denial of service attacks and probing attacks with an accuracy of 97.8845 %. The idea presentedalbeitnot radical, more exploration is clearly required. We think that this system design would ameliorate the current smartphone security scenario. For future research directions, we believe that the system can be used in various environments, thus allowing a customizedapproachtosecurityforsmartphones. The main limitation of this paper is that we need root access for running this app. The scope of this application can be extended so as to analyze real time data streams and torrent data packets. We can also include a provision to check the packets in a network connection in real time. REFERENCES [1].Prachi Joshi “Protego: A Passive Intrusion Detection System for Android Smartphones”, 2016 International Conference on Computing, Analytics and Security Trends (CAST), Dec 2016. [2].Dimitrios Damopoulos, “Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development,” Ph.D. Thesis, Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece, 2013 [3].Sherif, Joseph S., and Tommy G. Dearmond. "Intrusion detection: systems and models." In 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 115- 115. IEEE Computer Society, 2002. [4].Gupta, Kapil Kumar. “Robust and efficient intrusion detection systems.”, Ph.D. Thesis, Department of Computer Science and Software Engineering, University of Melbourne, 2009. [5].Sanchez, Jaime. Building Android IDS on Network Level. DEFCON 21, 2013. [6].Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. “Andromaly:a behavioral malwaredetection framework for android devices”. Journal of Intelligent Information Systems, pages 1–30, 2011. 10.1007/s10844- 010-0148-x. [7].Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra. "Madam: a multi-level anomaly detector for android malware." In Computer Network Security, pp. 240-253. Springer Berlin Heidelberg, 2012 [8].Adigun, Abimbola Adebisi, Temitayo Matthew Fagbola, and Adekanmi Adegun. "SwarmDroid: Swarm Optimized Intrusion Detection System for the Android Mobile Enterprise." International Journal of Computer Science Issues (IJCSI) 11, no. 3 (2014). [9].Elrawy, Mohamed Faisal, T. K. Abdelhamid, and A. M. Mohamed. "IDS in Telecommunication Network UsingPCA." arXiv preprint arXiv: 1308.2779 (2013).
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 211 [10].Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten;TheWEKAData Mining Software: An Update; SIGKDD Explorations, Volume 11, Issue 1. (2009). [11].Tavallaee, Mahbod, Ebrahim Bagheri, WeiLu,andAli-A. Ghorbani. "A detailed analysis of the KDD CUP 99 data set." In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009. (2009). [12].Kayacik, H. Günes, A. NurZincir-Heywood,andMalcolm I. Heywood. "Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets." Proceedings of the third annual conference on privacy, security and trust. (2005).
Descargar ahora