تجاوز إلى المحتوى الرئيسي
User Image

Abdelouahid Derhab

Associate Professor

Faculty member

علوم الحاسب والمعلومات
Address: Office No. 4, Center of Excellence in Information Assurance (CoEIA), Building No. 31, King Saud University
المنشورات
ورقة مؤتمر
2014

Third line of defense strategy to fight against SMS-based malware in android smartphones

Derhab, Abdelouahid, Kashif Saleem, Ahmed Youssef . 2014

In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to design and deploy a new line in the defense-in-depth strategy, called the third line. This line is represented by a security framework, named the Intrusion Ambushing System and is designed to tackle the issue of SMS-based malware in the Android-based Smartphones. The framework exploits the security features offered by Android operating system to prevent the malicious SMS from going out of the phone and detect the corresponding SMS-based malware. We show that the proposed framework can ensure full security against SMS-based malware. In addition, an analytical study demonstrates that the framework offers optimal performance in terms of detection time and execution cost in comparison to intrusion detection systems based on static and dynamic analysis.

اسم المؤتمر
International Wireless Communications and Mobile Computing Conference (IWCMC)
مزيد من المنشورات
publications

In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to design and deploy a new line in the defense-in-depth strategy, called the third line.

بواسطة Abdelouahid, Kashif Saleem, Ahmed Youssef Derhab
2014
publications

In this paper, we adopt the divide-and-conquer strategy to propose a lightweight design for an intrusion detection system in wireless sensor networks, lIghtweiGht aNomaly-based Intrusion deTection…

بواسطة Abdelouahid, Abdelghani Bouras Derhab
2014
publications

In this paper, we propose an intrusion detection system (IDS) based on four approaches: (i) statistical-based IDS to reduce detection time; (ii) intertwining data acquisition phase and data…

بواسطة Abdelouahid, Abdelghani Bouras Derhab
2014