{"title":"利用流程挖掘增强移动设备安全性","authors":"L. Hluchý, O. Habala","doi":"10.1109/SISY.2016.7601493","DOIUrl":null,"url":null,"abstract":"We present part of a research project aimed at mobile device security. During the project we have tested several methods of processing of data from mobile devices in order to detect attacks and suspicious activity in general. One method we have tested was also mining of processes found in mobile device activity logs and analysis of those processes. We have used several devices with the AndroidTMOS, collected a large amount of activity data, including (simulated) harmful activity, and then modeled processes found in the data. Results of the comparison of these processes to the harmful activity suggest that this application of process mining shows promise, but also requires a lot of further research.","PeriodicalId":193153,"journal":{"name":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Enhancing mobile device security with process mining\",\"authors\":\"L. Hluchý, O. Habala\",\"doi\":\"10.1109/SISY.2016.7601493\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present part of a research project aimed at mobile device security. During the project we have tested several methods of processing of data from mobile devices in order to detect attacks and suspicious activity in general. One method we have tested was also mining of processes found in mobile device activity logs and analysis of those processes. We have used several devices with the AndroidTMOS, collected a large amount of activity data, including (simulated) harmful activity, and then modeled processes found in the data. Results of the comparison of these processes to the harmful activity suggest that this application of process mining shows promise, but also requires a lot of further research.\",\"PeriodicalId\":193153,\"journal\":{\"name\":\"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)\",\"volume\":\"170 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SISY.2016.7601493\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISY.2016.7601493","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhancing mobile device security with process mining
We present part of a research project aimed at mobile device security. During the project we have tested several methods of processing of data from mobile devices in order to detect attacks and suspicious activity in general. One method we have tested was also mining of processes found in mobile device activity logs and analysis of those processes. We have used several devices with the AndroidTMOS, collected a large amount of activity data, including (simulated) harmful activity, and then modeled processes found in the data. Results of the comparison of these processes to the harmful activity suggest that this application of process mining shows promise, but also requires a lot of further research.