An Analysis of Security System for Intrusion in Smartphone Environment

There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (M...

Full description

Saved in:
Bibliographic Details
Main Authors: Maya Louk, Hyotaek Lim, HoonJae Lee
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/983901
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832551231818563584
author Maya Louk
Hyotaek Lim
HoonJae Lee
author_facet Maya Louk
Hyotaek Lim
HoonJae Lee
author_sort Maya Louk
collection DOAJ
description There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.
format Article
id doaj-art-0cbfc84b5a8c400094968bf4472932be
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-0cbfc84b5a8c400094968bf4472932be2025-02-03T06:01:50ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/983901983901An Analysis of Security System for Intrusion in Smartphone EnvironmentMaya Louk0Hyotaek Lim1HoonJae Lee2Department of Ubiquitous IT, Graduate School of Dongseo University, Sasang-Gu, Busan 617-716, Republic of KoreaDivision of Computer and Engineering Dongseo University, Sasang-Gu, Busan 617-716, Republic of KoreaDivision of Computer and Engineering Dongseo University, Sasang-Gu, Busan 617-716, Republic of KoreaThere are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.http://dx.doi.org/10.1155/2014/983901
spellingShingle Maya Louk
Hyotaek Lim
HoonJae Lee
An Analysis of Security System for Intrusion in Smartphone Environment
The Scientific World Journal
title An Analysis of Security System for Intrusion in Smartphone Environment
title_full An Analysis of Security System for Intrusion in Smartphone Environment
title_fullStr An Analysis of Security System for Intrusion in Smartphone Environment
title_full_unstemmed An Analysis of Security System for Intrusion in Smartphone Environment
title_short An Analysis of Security System for Intrusion in Smartphone Environment
title_sort analysis of security system for intrusion in smartphone environment
url http://dx.doi.org/10.1155/2014/983901
work_keys_str_mv AT mayalouk ananalysisofsecuritysystemforintrusioninsmartphoneenvironment
AT hyotaeklim ananalysisofsecuritysystemforintrusioninsmartphoneenvironment
AT hoonjaelee ananalysisofsecuritysystemforintrusioninsmartphoneenvironment
AT mayalouk analysisofsecuritysystemforintrusioninsmartphoneenvironment
AT hyotaeklim analysisofsecuritysystemforintrusioninsmartphoneenvironment
AT hoonjaelee analysisofsecuritysystemforintrusioninsmartphoneenvironment