3rd North American International Conference on Industrial Engineering and Operations Management

Analysis of methods and techniques used for Intrusion detentions in mobile device

Olorunfemi Tope Roseline
Publisher: IEOM Society International
0 Paper Citations
1 Views
1 Downloads
Track: Cyber Security
Abstract

The rapid evolution in the use of smart mobile devices has greatly enhanced the lives of humans and their ability to disseminate and store information. These smart devices have revolutionized our personal life, work life and businesses with vast amount of Information stored on these devices. However, this poses a great threat of unauthorized access to the confidential information stored on these devices. Hence, there is the need for Intrusion Detection System (IDS) in smart mobile devices. An Intrusion Detection System can be deployed in mobile devices to detect attacks that might want to cause damage to the device, or steal the user’s resources and suggest appropriate remedies measures to be taken. This paper presents a review of the state of the art pertaining to intrusion detection in mobile phones and analyses recent methods and techniques used for this task.

Published in: 3rd North American International Conference on Industrial Engineering and Operations Management, Washington D.C., USA

Publisher: IEOM Society International
Date of Conference: September 27-29, 2018

ISBN: 978-1-5323-5946-0
ISSN/E-ISSN: 2169-8767