Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure

被引:0
|
作者
Kim, Taehyun [1 ]
Choi, Yeongrak [1 ]
Han, Seunghee [1 ,2 ]
Chung, Jae Yoon
Hyun, Jonghwan [1 ]
Li, Jian [1 ]
Hong, James Won-Ki [1 ]
机构
[1] POSTECH, Div IT Convergence Engn, Pohang, South Korea
[2] Network Technol Lab, Daejeon, South Korea
基金
新加坡国家研究基金会;
关键词
Mobile cloud computing; mobile cloud infrastructure; mobile cloud service scenarios; abnormal behavior monitoring; machine learning;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, several mobile services are changing to cloud-based mobile services with richer communications and higher flexibility. We present a new mobile cloud infrastructure that combines mobile devices and cloud services. This new infrastructure provides virtual mobile instances through cloud computing. To commercialize new services with this infrastructure, service providers should be aware of security issues. In this paper, we first define new mobile cloud services through mobile cloud infrastructure and discuss possible security threats through the use of several service scenarios. Then, we propose a methodology and architecture for detecting abnormal behavior through the monitoring of both host and network data. To validate our methodology, we injected malicious programs into our mobile cloud test bed and used a machine learning algorithm to detect the abnormal behavior that arose from these programs.
引用
收藏
页码:1303 / 1310
页数:8
相关论文
共 50 条
  • [31] Ubiquitous Computing for Cloud Infrastructure to Mobile Application in IoT Environment
    Seo, DongBum
    Lee, Keun-Ho
    Jeon, You-Boo
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 742 - 749
  • [32] Mobile Traffic Analysis exploiting a Cloud Infrastructure and Hardware Accelerators
    Barbareschi, Mario
    De Benedictis, Alessandra
    Mazzeo, Antonino
    Vespoli, Antonino
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 414 - 419
  • [33] Infrastructure optimization of mobile intelligent network based on cloud computing
    Ma Qin
    Zhao, Xinguang
    Chen, Hong
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 342 - 346
  • [34] Cloud of Secure Elements: An Infrastructure For The Trust of Mobile NFC Services
    Urien, Pascal
    2014 IEEE 10TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2014, : 213 - 218
  • [35] Dependability Evaluation of a mHealth System Using a Mobile Cloud Infrastructure
    Araujo, Jean
    Silva, Bruno
    Oliveira, Danilo
    Maciel, Paulo
    2014 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2014, : 1348 - 1353
  • [36] The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring
    Lebedev, Ilya
    Krivtsova, Irina
    Korzhuk, Viktoria
    Bazhayev, Nurzhan
    Sukhoparov, Mikhail
    Pecherkin, Sergey
    Salakhutdinova, Kseniya
    INTERNET OF THINGS, SMART SPACES, AND NEXT GENERATION NETWORKS AND SYSTEMS, NEW2AN 2016/USMART 2016, 2016, 9870 : 503 - 511
  • [37] The search value model: Detecting abnormal searching behavior
    Nicolau, Juan Luis
    Kim, Hyoeun
    Liu, Xianwei
    ANNALS OF TOURISM RESEARCH, 2021, 87
  • [38] Detecting Abnormal Driving Behavior Using Modified DenseNet
    Ayad A.
    Abdulmunim M.E.
    Iraqi Journal for Computer Science and Mathematics, 2023, 4 (03): : 48 - 65
  • [39] A Novel Detection Framework for Detecting Abnormal Human Behavior
    Wu, Chengfei
    Cheng, Zixuan
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [40] A Method for Detecting Abnormal Program Behavior on Embedded Devices
    Zhai, Xiaojun
    Appiah, Kofi
    Ehsan, Shoaib
    Howells, Gareth
    Hu, Huosheng
    Gu, Dongbing
    McDonald-Maier, Klaus D.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (08) : 1692 - 1704