完整後設資料紀錄
DC 欄位語言
dc.contributor.authorWang, Pingen_US
dc.contributor.authorChao, Kuo-Mingen_US
dc.contributor.authorLo, Chi-Chunen_US
dc.contributor.authorWang, Yu-Shihen_US
dc.date.accessioned2018-08-21T05:53:17Z-
dc.date.available2018-08-21T05:53:17Z-
dc.date.issued2017-03-01en_US
dc.identifier.issn1385-951Xen_US
dc.identifier.urihttp://dx.doi.org/10.1007/s10799-014-0213-1en_US
dc.identifier.urihttp://hdl.handle.net/11536/144497-
dc.description.abstractExisting studies on the detection of mobile malware have focused mainly on static analyses performed to examine the code-structure signature of viruses, rather than the dynamic behavioral aspects. By contrast, the unidentified behavior of new mobile viruses using the self-modification, polymorphic, and mutation techniques for variants have largely been ignored. The problem of precision regarding malware variant detection has become one of the key concerns in mobile security. Accordingly, the present study proposed a threat risk analysis model for mobile viruses, using a heuristic approach incorporating both malware behavior analysis and code analysis to generate a virus behavior ontology associated with the Prot,g, platform. The proposed model can not only explicitly identify an attack profile in accordance with structural signature of mobile viruses, but also overcome the uncertainty regarding the probability of an attack being successful. This model is able to achieve this by extending frequent episode rules to investigate the attack profile of a given malware, using specific event sequences associated with the sandbox technique for mobile applications (apps) and hosts. For probabilistic analysis, defense evaluation metrics for each node were used to simulate the results of an attack. The simulations focused specifically on the attack profile of a botnet to assess the threat risk. The validity of the proposed approach was demonstrated numerically by using two malware cyber-attack examples. Overall, the results presented in this paper prove that the proposed scheme offers an effective countermeasure, evaluated using a set of security metrics, for mitigating network threats by considering the interaction between the attack profiles and defense needs.en_US
dc.language.isoen_USen_US
dc.subjectThreat risk analysisen_US
dc.subjectMobile virusen_US
dc.subjectOntologyen_US
dc.subjectBehavior analysisen_US
dc.subjectCode analysisen_US
dc.titleUsing ontologies to perform threat analysis and develop defensive strategies for mobile securityen_US
dc.typeArticleen_US
dc.identifier.doi10.1007/s10799-014-0213-1en_US
dc.identifier.journalINFORMATION TECHNOLOGY & MANAGEMENTen_US
dc.citation.volume18en_US
dc.citation.spage1en_US
dc.citation.epage25en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000396133100001en_US
顯示於類別:期刊論文