Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness
As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabil...
Gespeichert in:
Veröffentlicht in: | Wireless communications and mobile computing 2019-01, Vol.2019 (2019), p.1-14 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 14 |
---|---|
container_issue | 2019 |
container_start_page | 1 |
container_title | Wireless communications and mobile computing |
container_volume | 2019 |
creator | Lee, Kyungho Oh, Haengrok Han, Jaehyeok Park, Mookyu |
description | As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues. |
doi_str_mv | 10.1155/2019/5121054 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2407627026</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2407627026</sourcerecordid><originalsourceid>FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</originalsourceid><addsrcrecordid>eNqF0E1LwzAYB_AgCs7pzbMEPGpdnqRJ1-OY8wUGCs5zSZuUZmzJTLLNfXu7dehRckgIv-eFP0LXQB4AOB9QAvmAAwXC0xPUA85IMhRZdvr7Fvk5ughhTghhhEIPfc8ar2XEoxB0CEttI66dxyOrvDMKT-zGeGcP_1sTGzx21uoqmo2JOxwdfnUz_Kg3ptIB194tcWw0ftc-rA5KY1fjDxPXMhpn5QKPttJr2466RGe1XAR9dbz76PNpMhu_JNO359fxaJpUTJCYKFFCWedcyBREpUQGGeGgKAVBJGQ8lZUQCvQQVKpyVinKFCuzPN1XlIyxPrrt-q68-1rrEIu5W_t2lVDQlGSCZoSKVt13qvIuBK_rYuXNUvpdAaTYZ1vssy2O2bb8ruONsUpuzX_6ptO6NbqWf5q2R1D2Az0Ug1A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2407627026</pqid></control><display><type>article</type><title>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Lee, Kyungho ; Oh, Haengrok ; Han, Jaehyeok ; Park, Mookyu</creator><contributor>You, Ilsun ; Ilsun You</contributor><creatorcontrib>Lee, Kyungho ; Oh, Haengrok ; Han, Jaehyeok ; Park, Mookyu ; You, Ilsun ; Ilsun You</creatorcontrib><description>As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.</description><identifier>ISSN: 1530-8669</identifier><identifier>EISSN: 1530-8677</identifier><identifier>DOI: 10.1155/2019/5121054</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Algorithms ; Artificial intelligence ; Communication ; Cybercrime ; Electronic devices ; Intelligence gathering ; Internet of Things ; Machine learning ; Malware ; Mobile operating systems ; Personal information ; Privacy ; Remote control ; Situational awareness ; Smartphones ; Threat assessment ; Threat evaluation ; Wireless access points</subject><ispartof>Wireless communications and mobile computing, 2019-01, Vol.2019 (2019), p.1-14</ispartof><rights>Copyright © 2019 Mookyu Park et al.</rights><rights>Copyright © 2019 Mookyu Park et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</citedby><cites>FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</cites><orcidid>0000-0002-5183-5927 ; 0000-0003-0744-8521</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27922,27923</link.rule.ids></links><search><contributor>You, Ilsun</contributor><contributor>Ilsun You</contributor><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>Oh, Haengrok</creatorcontrib><creatorcontrib>Han, Jaehyeok</creatorcontrib><creatorcontrib>Park, Mookyu</creatorcontrib><title>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</title><title>Wireless communications and mobile computing</title><description>As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.</description><subject>Algorithms</subject><subject>Artificial intelligence</subject><subject>Communication</subject><subject>Cybercrime</subject><subject>Electronic devices</subject><subject>Intelligence gathering</subject><subject>Internet of Things</subject><subject>Machine learning</subject><subject>Malware</subject><subject>Mobile operating systems</subject><subject>Personal information</subject><subject>Privacy</subject><subject>Remote control</subject><subject>Situational awareness</subject><subject>Smartphones</subject><subject>Threat assessment</subject><subject>Threat evaluation</subject><subject>Wireless access points</subject><issn>1530-8669</issn><issn>1530-8677</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1LwzAYB_AgCs7pzbMEPGpdnqRJ1-OY8wUGCs5zSZuUZmzJTLLNfXu7dehRckgIv-eFP0LXQB4AOB9QAvmAAwXC0xPUA85IMhRZdvr7Fvk5ughhTghhhEIPfc8ar2XEoxB0CEttI66dxyOrvDMKT-zGeGcP_1sTGzx21uoqmo2JOxwdfnUz_Kg3ptIB194tcWw0ftc-rA5KY1fjDxPXMhpn5QKPttJr2466RGe1XAR9dbz76PNpMhu_JNO359fxaJpUTJCYKFFCWedcyBREpUQGGeGgKAVBJGQ8lZUQCvQQVKpyVinKFCuzPN1XlIyxPrrt-q68-1rrEIu5W_t2lVDQlGSCZoSKVt13qvIuBK_rYuXNUvpdAaTYZ1vssy2O2bb8ruONsUpuzX_6ptO6NbqWf5q2R1D2Az0Ug1A</recordid><startdate>20190101</startdate><enddate>20190101</enddate><creator>Lee, Kyungho</creator><creator>Oh, Haengrok</creator><creator>Han, Jaehyeok</creator><creator>Park, Mookyu</creator><general>Hindawi Publishing Corporation</general><general>Hindawi</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7XB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid><orcidid>https://orcid.org/0000-0003-0744-8521</orcidid></search><sort><creationdate>20190101</creationdate><title>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</title><author>Lee, Kyungho ; Oh, Haengrok ; Han, Jaehyeok ; Park, Mookyu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c360t-d6b1bf956a416cd6717051d22160a1754ac66d1e81d4d93cd23d3b79456a4b333</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Artificial intelligence</topic><topic>Communication</topic><topic>Cybercrime</topic><topic>Electronic devices</topic><topic>Intelligence gathering</topic><topic>Internet of Things</topic><topic>Machine learning</topic><topic>Malware</topic><topic>Mobile operating systems</topic><topic>Personal information</topic><topic>Privacy</topic><topic>Remote control</topic><topic>Situational awareness</topic><topic>Smartphones</topic><topic>Threat assessment</topic><topic>Threat evaluation</topic><topic>Wireless access points</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lee, Kyungho</creatorcontrib><creatorcontrib>Oh, Haengrok</creatorcontrib><creatorcontrib>Han, Jaehyeok</creatorcontrib><creatorcontrib>Park, Mookyu</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Wireless communications and mobile computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Lee, Kyungho</au><au>Oh, Haengrok</au><au>Han, Jaehyeok</au><au>Park, Mookyu</au><au>You, Ilsun</au><au>Ilsun You</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness</atitle><jtitle>Wireless communications and mobile computing</jtitle><date>2019-01-01</date><risdate>2019</risdate><volume>2019</volume><issue>2019</issue><spage>1</spage><epage>14</epage><pages>1-14</pages><issn>1530-8669</issn><eissn>1530-8677</eissn><abstract>As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2019/5121054</doi><tpages>14</tpages><orcidid>https://orcid.org/0000-0002-5183-5927</orcidid><orcidid>https://orcid.org/0000-0003-0744-8521</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1530-8669 |
ispartof | Wireless communications and mobile computing, 2019-01, Vol.2019 (2019), p.1-14 |
issn | 1530-8669 1530-8677 |
language | eng |
recordid | cdi_proquest_journals_2407627026 |
source | Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection |
subjects | Algorithms Artificial intelligence Communication Cybercrime Electronic devices Intelligence gathering Internet of Things Machine learning Malware Mobile operating systems Personal information Privacy Remote control Situational awareness Smartphones Threat assessment Threat evaluation Wireless access points |
title | Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T11%3A14%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Threat%20Assessment%20for%20Android%20Environment%20with%20Connectivity%20to%20IoT%20Devices%20from%20the%20Perspective%20of%20Situational%20Awareness&rft.jtitle=Wireless%20communications%20and%20mobile%20computing&rft.au=Lee,%20Kyungho&rft.date=2019-01-01&rft.volume=2019&rft.issue=2019&rft.spage=1&rft.epage=14&rft.pages=1-14&rft.issn=1530-8669&rft.eissn=1530-8677&rft_id=info:doi/10.1155/2019/5121054&rft_dat=%3Cproquest_cross%3E2407627026%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2407627026&rft_id=info:pmid/&rfr_iscdi=true |