Abstract

As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.

Highlights

  • The Internet of Things (IoT) technology is being applied to various fields such as public safety, transportation, industrial, and healthcare

  • For efficient control of the IoT environment, many companies are concentrating on developing mobile devices such as smartphones

  • The security of the application installed on the smartphone is weak

Read more

Summary

Introduction

The Internet of Things (IoT) technology is being applied to various fields such as public safety, transportation, industrial, and healthcare. South Korea’s security companies are behind a spy app that seized information, text messages, and contact information on about 10 high-ranking officials in the national defense, diplomacy, and security fields in 2016 [8] The reason for this increase is that personal information or financial information is often stored on smartphones, and smartphones are at the center of connection and control of IoT devices. Changes in the way in which personal information is stored and the efficient use of IoT equipment are reasons to increase the frequency of attacks on smartphones. These mobile threats can cause damage to both cyberspace and the real world. This paper proposes frames from the threat assessment procedure from the perspective of situational awareness section, and the results are described in the result of threat assessment for Android malware application section

The Relationship between Mobile Threats and Cyberspace
Threat Assessment
Limitation of Mobile Malware Detection
Threat Assessment Procedure from the Perspective of SA
Result of Threat Assessment for Android Malware Application
Findings
Summary and Discussion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call