Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness

Mookyu Park, Jaehyeok Han, Haengrok Oh, Kyung Ho Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.

Original languageEnglish
Article number5121054
JournalWireless Communications and Mobile Computing
Volume2019
DOIs
Publication statusPublished - 2019 Jan 1

Fingerprint

Smartphones
Mobile devices
Learning algorithms
Learning systems
Internet of things

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness. / Park, Mookyu; Han, Jaehyeok; Oh, Haengrok; Lee, Kyung Ho.

In: Wireless Communications and Mobile Computing, Vol. 2019, 5121054, 01.01.2019.

Research output: Contribution to journalArticle

@article{93fb0b2ae1e549059fbab06b2b53f6d7,
title = "Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness",
abstract = "As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.",
author = "Mookyu Park and Jaehyeok Han and Haengrok Oh and Lee, {Kyung Ho}",
year = "2019",
month = "1",
day = "1",
doi = "10.1155/2019/5121054",
language = "English",
volume = "2019",
journal = "Wireless Communications and Mobile Computing",
issn = "1530-8669",
publisher = "John Wiley and Sons Ltd",

}

TY - JOUR

T1 - Threat Assessment for Android Environment with Connectivity to IoT Devices from the Perspective of Situational Awareness

AU - Park, Mookyu

AU - Han, Jaehyeok

AU - Oh, Haengrok

AU - Lee, Kyung Ho

PY - 2019/1/1

Y1 - 2019/1/1

N2 - As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.

AB - As smartphones such as mobile devices become popular, malicious attackers are choosing them as targets. The risk of attack is steadily increasing as most people store various personal information such as messages, contacts, and financial information on their smartphones. Particularly, the vulnerabilities of the installed operating systems (e.g., Android, iOS, etc.) are trading at a high price in the black market. In addition, the development of the Internet of Things (IoT) technology has created a hyperconnected society in which various devices are connected to one network. Therefore, the safety of the smartphone is becoming an important factor to remotely control these technologies. A typical attack method that threatens the security of such a smartphone is a method of inducing installation of a malicious application. However, most studies focus on the detection of malicious applications. This study suggests a method to evaluate threats to be installed in the Android OS environment in conjunction with machine learning algorithms. In addition, we present future direction from the cyber threat intelligence perspective and situational awareness, which are the recent issues.

UR - http://www.scopus.com/inward/record.url?scp=85065666453&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85065666453&partnerID=8YFLogxK

U2 - 10.1155/2019/5121054

DO - 10.1155/2019/5121054

M3 - Article

AN - SCOPUS:85065666453

VL - 2019

JO - Wireless Communications and Mobile Computing

JF - Wireless Communications and Mobile Computing

SN - 1530-8669

M1 - 5121054

ER -