Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness

As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabil...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless communications and mobile computing 2019-01, Vol.2019 (2019), p.1-14
Hauptverfasser: Lee, Kyungho, Oh, Haengrok, Han, Jaehyeok, Park, Mookyu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 14
container_issue 2019
container_start_page 1
container_title Wireless communications and mobile computing
container_volume 2019
creator Lee, Kyungho
Oh, Haengrok
Han, Jaehyeok
Park, Mookyu
description As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.
doi_str_mv 10.1155/2019/5121054
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2407627026</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2407627026</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</originalsourceid><addsrcrecordid>eNqF0E1LwzAYB_AgCs7pzbMEPGpdnqRJ1-OY8wUGCs5zSZuUZmzJTLLNfXu7dehRckgIv-eFP0LXQB4AOB9QAvmAAwXC0xPUA85IMhRZdvr7Fvk5ughhTghhhEIPfc8ar2XEoxB0CEttI66dxyOrvDMKT-zGeGcP_1sTGzx21uoqmo2JOxwdfnUz_Kg3ptIB194tcWw0ftc-rA5KY1fjDxPXMhpn5QKPttJr2466RGe1XAR9dbz76PNpMhu_JNO359fxaJpUTJCYKFFCWedcyBREpUQGGeGgKAVBJGQ8lZUQCvQQVKpyVinKFCuzPN1XlIyxPrrt-q68-1rrEIu5W_t2lVDQlGSCZoSKVt13qvIuBK_rYuXNUvpdAaTYZ1vssy2O2bb8ruONsUpuzX_6ptO6NbqWf5q2R1D2Az0Ug1A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2407627026</pqid></control><display><type>article</type><title>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Lee, Kyungho ; Oh, Haengrok ; Han, Jaehyeok ; Park, Mookyu</creator><contributor>You, Ilsun ; Ilsun You</contributor><creatorcontrib>Lee, Kyungho ; Oh, Haengrok ; Han, Jaehyeok ; Park, Mookyu ; You, Ilsun ; Ilsun You</creatorcontrib><description>As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2019/5121054</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Artificial intelligence ; Communication ; Cybercrime ; Electronic devices ; Intelligence gathering ; Internet of Things ; Machine learning ; Malware ; Mobile operating systems ; Personal information ; Privacy ; Remote control ; Situational awareness ; Smartphones ; Threat assessment ; Threat evaluation ; Wireless access points</subject><ispartof>Wireless communications and mobile computing, 2019-01, Vol.2019 (2019), p.1-14</ispartof><rights>Copyright © 2019 Mookyu Park et al.</rights><rights>Copyright © 2019 Mookyu Park et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</citedby><cites>FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</cites><orcidid>0000-0002-5183-5927 ; 0000-0003-0744-8521</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><contributor>You, Ilsun</contributor><contributor>Ilsun You</contributor><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>Oh, Haengrok</creatorcontrib><creatorcontrib>Han, Jaehyeok</creatorcontrib><creatorcontrib>Park, Mookyu</creatorcontrib><title>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</title><title>Wireless communications and mobile computing</title><description>As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Communication</subject><subject>Cybercrime</subject><subject>Electronic devices</subject><subject>Intelligence gathering</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Mobile operating systems</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Remote control</subject><subject>Situational awareness</subject><subject>Smartphones</subject><subject>Threat assessment</subject><subject>Threat evaluation</subject><subject>Wireless access points</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1LwzAYB_AgCs7pzbMEPGpdnqRJ1-OY8wUGCs5zSZuUZmzJTLLNfXu7dehRckgIv-eFP0LXQB4AOB9QAvmAAwXC0xPUA85IMhRZdvr7Fvk5ughhTghhhEIPfc8ar2XEoxB0CEttI66dxyOrvDMKT-zGeGcP_1sTGzx21uoqmo2JOxwdfnUz_Kg3ptIB194tcWw0ftc-rA5KY1fjDxPXMhpn5QKPttJr2466RGe1XAR9dbz76PNpMhu_JNO359fxaJpUTJCYKFFCWedcyBREpUQGGeGgKAVBJGQ8lZUQCvQQVKpyVinKFCuzPN1XlIyxPrrt-q68-1rrEIu5W_t2lVDQlGSCZoSKVt13qvIuBK_rYuXNUvpdAaTYZ1vssy2O2bb8ruONsUpuzX_6ptO6NbqWf5q2R1D2Az0Ug1A</recordid><startdate>20190101</startdate><enddate>20190101</enddate><creator>Lee, Kyungho</creator><creator>Oh, Haengrok</creator><creator>Han, Jaehyeok</creator><creator>Park, Mookyu</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid><orcidid>https://orcid.org/0000-0003-0744-8521</orcidid></search><sort><creationdate>20190101</creationdate><title>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</title><author>Lee, Kyungho ; Oh, Haengrok ; Han, Jaehyeok ; Park, Mookyu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Communication</topic><topic>Cybercrime</topic><topic>Electronic devices</topic><topic>Intelligence gathering</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Mobile operating systems</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Remote control</topic><topic>Situational awareness</topic><topic>Smartphones</topic><topic>Threat assessment</topic><topic>Threat evaluation</topic><topic>Wireless access points</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>Oh, Haengrok</creatorcontrib><creatorcontrib>Han, Jaehyeok</creatorcontrib><creatorcontrib>Park, Mookyu</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Kyungho</au><au>Oh, Haengrok</au><au>Han, Jaehyeok</au><au>Park, Mookyu</au><au>You, Ilsun</au><au>Ilsun You</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2019-01-01</date><risdate>2019</risdate><volume>2019</volume><issue>2019</issue><spage>1</spage><epage>14</epage><pages>1-14</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2019/5121054</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid><orcidid>https://orcid.org/0000-0003-0744-8521</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1530-8669
ispartof Wireless communications and mobile computing, 2019-01, Vol.2019 (2019), p.1-14
issn 1530-8669
1530-8677
language eng
recordid cdi_proquest_journals_2407627026
source Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Algorithms
Artificial intelligence
Communication
Cybercrime
Electronic devices
Intelligence gathering
Internet of Things
Machine learning
Malware
Mobile operating systems
Personal information
Privacy
Remote control
Situational awareness
Smartphones
Threat assessment
Threat evaluation
Wireless access points
title Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T11%3A14%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Threat%20Assessment%20for%20Android%20Environment%20with%20Connectivity%20to%20IoT%20Devices%20from%20the%20Perspective%20of%20Situational%20Awareness&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Lee,%20Kyungho&rft.date=2019-01-01&rft.volume=2019&rft.issue=2019&rft.spage=1&rft.epage=14&rft.pages=1-14&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2019/5121054&rft_dat=%3Cproquest_cross%3E2407627026%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2407627026&rft_id=info:pmid/&rfr_iscdi=true