메뉴 건너뛰기




Volumn 5758 LNCS, Issue , 2009, Pages 202-223

SMS-Watchdog: Profiling social behaviors of sms users for anomaly detection

Author keywords

Anomaly detection; JS divergence; Relative entropy; SMS

Indexed keywords

ANOMALY DETECTION; CELLULAR NETWORK; DETECTION SCHEME; FALSE ALARM RATE; FALSE ALARMS; HYBRID APPROACH; LOW OVERHEAD; MOBILE USERS; NETWORK CONGESTIONS; ONLINE ANOMALY DETECTION; PARAMETER SETTING; PHISHING; RELATIVE ENTROPY; SECURITY THREATS; SOCIAL BEHAVIOR; VARIOUS ATTACKS; WINDOW-BASED;

EID: 76649137567     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04342-0_11     Document Type: Conference Paper
Times cited : (13)

References (27)
  • 4
    • 84868175603 scopus 로고    scopus 로고
    • http://www.redherring.com/Home/19081
  • 5
    • 84956820389 scopus 로고
    • Knowledge-based management of cellular clone fraud
    • Boston, MA, USA
    • Davis, A.B., Goyal, S.K.: Knowledge-based management of cellular clone fraud. In: Proceedings of IEEE PIMRC 1992, Boston, MA, USA (1992)
    • (1992) Proceedings of IEEE PIMRC
    • Davis, A.B.1    Goyal, S.K.2
  • 7
    • 0002656796 scopus 로고    scopus 로고
    • Activity monitoring: Noticing interesting changes in behavior
    • Fawcett, T., Provost, F.: Activity monitoring: noticing interesting changes in behavior. In: Proceedings of ACM KDD 1999 (1999)
    • (1999) Proceedings of ACM KDD
    • Fawcett, T.1    Provost, F.2
  • 8
    • 36349005250 scopus 로고    scopus 로고
    • A malware signature extraction and detection method applied to mobile networks
    • April
    • Hu, G., Venugopal, D.: A malware signature extraction and detection method applied to mobile networks. In: Proceedings of IPCCC 2007 (April 2007)
    • (2007) Proceedings of IPCCC
    • Hu, G.1    Venugopal, D.2
  • 9
    • 57349195106 scopus 로고    scopus 로고
    • Detecting energy-greedy anomalies and mobile malware variants
    • Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of MobiSys (2008)
    • (2008) Proceedings of MobiSys
    • Kim, H.1    Smith, J.2    Shin, K.G.3
  • 11
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proceedings of IEEE S&P (2001)
    • (2001) Proceedings of IEEE S&P
    • Lee, W.1    Xiang, D.2
  • 15
    • 84868173719 scopus 로고    scopus 로고
    • http://www.vnunet.com/vnunet/news/2163586/sms-phishing-attack-seen-wild
  • 16
    • 84868182680 scopus 로고    scopus 로고
    • http://www.kval.com/news/local/17945949.html
  • 17
    • 84868175631 scopus 로고    scopus 로고
    • http://www.mobilemarketer.com/cms/opinion/columns/1610.html
  • 18
    • 84868180909 scopus 로고    scopus 로고
    • http://www.textually.org/textually/archives/2007/12/018482.htm
  • 19
    • 84868180912 scopus 로고    scopus 로고
    • http://www.openmindnetworks.com/SMSSpoofing.asp
  • 21
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing security using mobility-based anomaly detection in cellular mobile networks
    • Sun, B., Yu, F., Wu, K., Xiao, Y., Leung, V.C.M.: Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Trans. on Vehicular Technology 55(3) (2006)
    • (2006) IEEE Trans. on Vehicular Technology , vol.55 , Issue.3
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 22
    • 76649137098 scopus 로고    scopus 로고
    • http://searchcio-midmarket.techtarget.com/tip/0,289483,sid183-gci1310706, 00.html
    • http://searchcio-midmarket.techtarget.com/tip/0,289483,sid183-gci1310706, 00.html
  • 24
    • 33751040642 scopus 로고    scopus 로고
    • Mitigating attacks on open functionality in SMS-capable cellular networks
    • Traynor, P., Enck, W., McDaniel, P., Porta, T.L.: Mitigating attacks on open functionality in SMS-capable cellular networks. In: Proceedings of MobiCom 2006 (2006)
    • (2006) Proceedings of MobiCom
    • Traynor, P.1    Enck, W.2    McDaniel, P.3    Porta, T.L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.