Research on System Structure of Mobile Internet Security Audit

Research on System Structure of Mobile Internet Security Audit

Xia-Meng Si (School of Software Engineering, Beijing University of Posts and Telecommunications. Beijing, China)
DOI: 10.4018/IJITN.2016040102
OnDemand PDF Download:
$37.50

Abstract

As the development of mobile internet bring convenient for people, the openness and variety of services make its security issues more complicated than those of traditional network. Firewall and intrusion detection focuses on external aggression, and cannot prevent revealing of internal information. As supplementary, security audit technology can monitor internal users' activity, forbid abnormal behavior of internal users. The author introduces related works about mobile internet security audit, comb through matured products on the market, and analyze current security status and architecture of mobile internet security. Based on the research results of traditional network security audit, the author provides a functional framework and universal model of mobile internet security auditing, as well as introduce an application scenario.
Article Preview

2. The Present Research

At present, the security audit technology and products which is aim at the traditional network relatively mature. The research and application of mobile internet security audit is also gradually aroused widespread attention, but it is still in its infancy, the security audit products on the market are relatively small.

Technology research, depending on the difference of audit target, audit contents, audit methods and techniques, probably there are the safety audit based on the log, based on the Network traffic, based on the data mining and so on. Literature (Wang, Liu, Hu, Jiang, 2013) puts forward a kind of effective audit method for network security based on agent and log mining technology, improve the traditional rules mining algorithm Apriori and design a new data structure, which makes the audit system scans the database only once and has obvious advantages than Apriori algorithm on system I/O cost.

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing