Cargando…

An Analysis of Security System for Intrusion in Smartphone Environment

There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notificati...

Descripción completa

Detalles Bibliográficos
Autores principales: Louk, Maya, Lim, Hyotaek, Lee, HoonJae
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4138763/
https://www.ncbi.nlm.nih.gov/pubmed/25165754
http://dx.doi.org/10.1155/2014/983901
_version_ 1782331277036224512
author Louk, Maya
Lim, Hyotaek
Lee, HoonJae
author_facet Louk, Maya
Lim, Hyotaek
Lee, HoonJae
author_sort Louk, Maya
collection PubMed
description There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.
format Online
Article
Text
id pubmed-4138763
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41387632014-08-27 An Analysis of Security System for Intrusion in Smartphone Environment Louk, Maya Lim, Hyotaek Lee, HoonJae ScientificWorldJournal Research Article There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. Hindawi Publishing Corporation 2014 2014-08-05 /pmc/articles/PMC4138763/ /pubmed/25165754 http://dx.doi.org/10.1155/2014/983901 Text en Copyright © 2014 Maya Louk et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Louk, Maya
Lim, Hyotaek
Lee, HoonJae
An Analysis of Security System for Intrusion in Smartphone Environment
title An Analysis of Security System for Intrusion in Smartphone Environment
title_full An Analysis of Security System for Intrusion in Smartphone Environment
title_fullStr An Analysis of Security System for Intrusion in Smartphone Environment
title_full_unstemmed An Analysis of Security System for Intrusion in Smartphone Environment
title_short An Analysis of Security System for Intrusion in Smartphone Environment
title_sort analysis of security system for intrusion in smartphone environment
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4138763/
https://www.ncbi.nlm.nih.gov/pubmed/25165754
http://dx.doi.org/10.1155/2014/983901
work_keys_str_mv AT loukmaya ananalysisofsecuritysystemforintrusioninsmartphoneenvironment
AT limhyotaek ananalysisofsecuritysystemforintrusioninsmartphoneenvironment
AT leehoonjae ananalysisofsecuritysystemforintrusioninsmartphoneenvironment
AT loukmaya analysisofsecuritysystemforintrusioninsmartphoneenvironment
AT limhyotaek analysisofsecuritysystemforintrusioninsmartphoneenvironment
AT leehoonjae analysisofsecuritysystemforintrusioninsmartphoneenvironment