An Intelligent Technique for Detecting Malicious Users on Mobile Stores

被引:0
|
作者
Terzi, Ramazan [1 ]
Yavanoglu, Uraz [1 ]
Sinanc, Duygu [1 ]
Oguz, Dogac [2 ]
Cakir, Semra [1 ]
机构
[1] Gazi Univ, Dept Comp Engn, Ankara, Turkey
[2] TOBB Univ, Dept Comp Engn, Ankara, Turkey
关键词
resource exhausting; artificial neural network(ANN); DoS attack; mobile store security; NETWORK;
D O I
10.1109/ICMLA.2014.82
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this study, malicious users who cause to resource exhausting are tried to detect in a telecommunication company network. Non-Legitimate users could cause lack of information availability and need countermeasures to prevent threat or limit permissions on the system. For this purpose, ANN based intelligent system is proposed and compared to SVM which is well known classification technique. According to results, proposed technique has achieved approximately 70% general success rate, 33% false positive rate and 27% false negative rate in controlled environment. Also ANN has high ability to work compare to SVM for our dataset. As a result proposed technique and developed application shows sufficient and acceptable defense mechanism in huge company networks. We discussed about this is initial study and ongoing research which is compared to the current literature. By the way, this study also shows that non security information such as users mobile experiences could be potential usage to prevent resource exhausting also known as DoS related attacks.
引用
收藏
页码:470 / 477
页数:8
相关论文
共 50 条
  • [1] Detecting Malicious Users in Online Dating Application
    Qiu, Jianhui
    Shen, Xingfa
    Guo, Yan
    Yao, Jian
    Fang, Renzhe
    [J]. 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 255 - 260
  • [2] Understanding users' switching from online stores to mobile stores
    Zhou, Tao
    [J]. INFORMATION DEVELOPMENT, 2016, 32 (01) : 60 - 69
  • [3] Detecting Mobile Malicious Webpages in Real Time
    Amrutkar, Chaitrali
    Kim, Young Seuk
    Traynor, Patrick
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (08) : 2184 - 2197
  • [4] An Intelligent Automated System for Detecting Malicious Vehicles in Intelligent Transportation Systems
    Ashfaq, Tehreem
    Khalid, Rabiya
    Yahaya, Adamu Sani
    Aslam, Sheraz
    Azar, Ahmad Taher
    Alkhalifah, Tamim
    Tounsi, Mohamed
    [J]. SENSORS, 2022, 22 (17)
  • [5] A Real Time Approach for Detecting Mobile Malicious WebPages
    Deepika, S.
    Mounika, P.
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER VISION AND MACHINE LEARNING, 2019, 1228
  • [6] Lino - An Intelligent System for Detecting Malicious Web-Robots
    Grzinic, Toni
    Mrsic, Leo
    Saban, Josip
    [J]. INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT II, 2015, 9012 : 559 - 568
  • [7] Detecting malicious reviews and users affecting social reviewing systems: A survey
    Esposito, Christian
    Moscato, Vincenzo
    Sperli, Giancarlo
    [J]. COMPUTERS & SECURITY, 2023, 133
  • [8] Detecting Malicious Users Behind Circuit-Based Anonymity Networks
    Huang, Shou-Hsuan Stephen
    Cao, Zechun
    [J]. IEEE ACCESS, 2020, 8 : 208610 - 208622
  • [9] A Detecting Method for Malicious Mobile Application Based on Incremental SVM
    Li, Yong
    Ma, YuanYuan
    Chen, Mu
    Dai, ZaoJian
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1246 - 1250
  • [10] Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks
    Candal-Ventureira, David
    Fondo-Ferreiro, Pablo
    Gil-Castineira, Felipe
    Javier Gonzalez-Castano, Francisco
    [J]. SENSORS, 2020, 20 (18) : 1 - 18