TY - JOUR
T1 - Requirements for designing mobile and flexible applications for online invasion detection and remote control
AU - Czekster, Ricardo M.
AU - Gatti, Clauter
AU - Pilz, Bruno
AU - Webber, Thais
PY - 2016/9/3
Y1 - 2016/9/3
N2 - Nowadays, security concerns are becoming extremely important as attacks and intrusions to systems and computers networks increase significantly. Different measures and countermeasures are employed to guarantee server security as well as new techniques and tools. Intrusion Detection Systems (IDSs) are expert software broadly used by system administrators and a key mechanism against intrusions. Many IDSs present an infrastructure to identify and classify attempts of intrusion suggesting appropriate measures. The use of mobile devices such as smartphones and tablets to access data 'anywhere, anytime' is becoming more common. Despite their limited computational resources, they reduce response time for taking immediate decisions for monitoring and remote management of network availability. The present work demonstrates the most important requirements for designing security applications. We discuss benefits and limitations of mobility presenting a tool called Hamdroid that implements the requirements to enhance decision-making by adding more control in the event of invasions and intrusions.
AB - Nowadays, security concerns are becoming extremely important as attacks and intrusions to systems and computers networks increase significantly. Different measures and countermeasures are employed to guarantee server security as well as new techniques and tools. Intrusion Detection Systems (IDSs) are expert software broadly used by system administrators and a key mechanism against intrusions. Many IDSs present an infrastructure to identify and classify attempts of intrusion suggesting appropriate measures. The use of mobile devices such as smartphones and tablets to access data 'anywhere, anytime' is becoming more common. Despite their limited computational resources, they reduce response time for taking immediate decisions for monitoring and remote management of network availability. The present work demonstrates the most important requirements for designing security applications. We discuss benefits and limitations of mobility presenting a tool called Hamdroid that implements the requirements to enhance decision-making by adding more control in the event of invasions and intrusions.
KW - Intrusion detection systems
KW - Mobility
KW - Network security
KW - Tool for remote control
UR - http://www.scopus.com/inward/record.url?eid=2-s2.0-84986184214&partnerID=MN8TOARS
UR - https://www.inderscienceonline.com/doi/abs/10.1504/IJCAT.2016.078780
U2 - 10.1504/IJCAT.2016.078780
DO - 10.1504/IJCAT.2016.078780
M3 - Article
SN - 0952-8091
VL - 54
SP - 138
EP - 149
JO - International Journal of Computer Applications in Technology
JF - International Journal of Computer Applications in Technology
IS - 2
ER -