Requirements for designing mobile and flexible applications for online invasion detection and remote control

Ricardo M. Czekster*, Clauter Gatti, Bruno Pilz, Thais Webber

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Nowadays, security concerns are becoming extremely important as attacks and intrusions to systems and computers networks increase significantly. Different measures and countermeasures are employed to guarantee server security as well as new techniques and tools. Intrusion Detection Systems (IDSs) are expert software broadly used by system administrators and a key mechanism against intrusions. Many IDSs present an infrastructure to identify and classify attempts of intrusion suggesting appropriate measures. The use of mobile devices such as smartphones and tablets to access data 'anywhere, anytime' is becoming more common. Despite their limited computational resources, they reduce response time for taking immediate decisions for monitoring and remote management of network availability. The present work demonstrates the most important requirements for designing security applications. We discuss benefits and limitations of mobility presenting a tool called Hamdroid that implements the requirements to enhance decision-making by adding more control in the event of invasions and intrusions.

Original languageEnglish
Pages (from-to)138-149
Number of pages12
JournalInternational Journal of Computer Applications in Technology
Volume54
Issue number2
DOIs
Publication statusPublished - 2 Sept 2016

Keywords

  • Intrusion detection systems
  • Mobility
  • Network security
  • Tool for remote control

Fingerprint

Dive into the research topics of 'Requirements for designing mobile and flexible applications for online invasion detection and remote control'. Together they form a unique fingerprint.

Cite this