Analysis of methods and techniques used for Intrusion detections in mobile devices

Olorunfemi Tope Roseline, Nwulu Nnamdi

Research output: Contribution to journalConference articlepeer-review

Abstract

The rapid evolution in the use of smart mobile devices has greatly enhanced the lives of humans and their ability to disseminate and store information. These smart devices have revolutionized our personal life, work life and businesses with vast amount of Information stored on these devices. However, this poses a great threat of unauthorized access to the confidential information stored on these devices. Hence, there is the need for Intrusion Detection System (IDS) in smart mobile devices. An Intrusion Detection System can be deployed in mobile devices to detect attacks that might want to cause damage to the device, or steal the user's resources and suggest appropriate remedies measures to be taken. This paper presents a review of the state of the art pertaining to intrusion detection in mobile phones and analyses recent methods and techniques used for this task.

Original languageEnglish
Pages (from-to)2365-2375
Number of pages11
JournalProceedings of the International Conference on Industrial Engineering and Operations Management
Volume2018
Issue numberSEP
Publication statusPublished - 2018
Event3rd North American IEOM Conference. IEOM 2018 -
Duration: 27 Sept 201829 Sept 2018

Keywords

  • Information technology
  • Internet
  • Intrusion detection system
  • Mobile phones and security

ASJC Scopus subject areas

  • Strategy and Management
  • Management Science and Operations Research
  • Control and Systems Engineering
  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'Analysis of methods and techniques used for Intrusion detections in mobile devices'. Together they form a unique fingerprint.

Cite this