An internal intrusion detection and protection system by using data mining and forensic techniques

FY Leu, KL Tsai, YT Hsiao, CT Yang - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
Currently, most computer systems use user IDs and passwords as the login patterns to
authenticate users. However, many people share their login patterns with coworkers and …

Unblocking stolen mobile devices using SS7-MAP vulnerabilities: Exploiting the relationship between IMEI and IMSI for EIR access

SP Rao, S Holtmanns, I Oliver… - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
The increase in usage of mobile phones and the relative increase in the number of mobile
phone thefts have imposed an overhead on securely retrieving the stolen or missing …

Survey on packet marking fields and information for IP traceback

M Vasseur, R Khatoun… - … Conference on Protocol …, 2015 - ieeexplore.ieee.org
Not all header fields in IP packets are used simultaneously during transmissions. Some
fields may provide traceback services, especially for the defense against DDoS attacks. In …

Dual‐collaborative DoS/DDoS mitigation approach in information‐centric mobile Internet

J Chen, H Jia, Q Liu - International Journal of Communication …, 2020 - Wiley Online Library
The amount of wireless traffic is increasing at an overwhelming speed. Information‐centric
networking (ICN) has been proposed as a promising Future Internet Architecture, which can …

Measuring the effect of ubiquitous Internet success on travelers' perceived value and overall tourism destination satisfaction

CK Pai, ZY Wang, SH Chen - International Journal of Tourism …, 2017 - Taylor & Francis
The Internet has not only gained wide-spread popularity; it has gradually become a
necessity of modern life. In addition, the popularity of mobile devices has changed tourists' …

Analysis and mitigation of recent attacks on mobile communication backend

S Rao - 2015 - aaltodoc.aalto.fi
In the last quarter of 2014, several successful attacks against mobile networks were
demonstrated. They are based on misuse of one of the key signaling protocol, SS7, which is …

Privacy-preserving top-k location-based services retrieval in mobile internet

N Wang, J Li, J Fu, Y Zheng - Mobile Networks and Applications, 2021 - Springer
With the rapid development of mobile internet, location-based services have been drawing
great attention of both industry and academia. Given a dataset of location-based services …

Research on mobile internet big data detecting method for the redundant data

G Yu - International Journal of Internet Protocol Technology, 2018 - inderscienceonline.com
To address the low efficiency of the traditional cleaning method, this paper presents a build
path tree clean method based on split method for identification of the redundant data …

Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network

M Gassara, I Bouabidi, F Zarai… - International Journal …, 2018 - Wiley Online Library
Wireless mesh networks (WMNs) have acquired recently enormous attention and
momentum; therefore, security aspects have been a fundamental concern for them. Among …

“Private and Secure ICMP Message” Solution for IP Traceback in Wireless Mesh Network

M Gassara, I El Bouabidi, F Zarai - 2017 IEEE/ACS 14th …, 2017 - ieeexplore.ieee.org
IP spoofing attacks create big problems in terms of security in Wireless Mesh Networks IEEE
802.11 s (WMNs). These attacks are accounted to be sent from infected hosts. In order to …