Total views : 211

Enhanced Intrusion Tolerant System for Mobile Payment

Affiliations

  • Department of Computer System Engineering, Sangmyung University, Korea

Abstract


Objectives: To prevent malicious software and hacking in near field communication-based mobile payments, this paper suggests a new intrusion tolerant system. Methods/Statistical analysis: As Cuckoo Sandbox restricts the access to the system resources of the applet transmitted through the network, this new intrusion tolerant system adopted Cuckoo Sandbox for the intrusion detection and the safe normal service of the operation system from various malicious attacks. To enhance the intrusion tolerant level, the scalable intrusion-tolerant architecture for distributed service is adopted to analyze the status of the system and the risk in the current environment through the intrusion detection, which optimizes the security level of a system. Findings: The intrusion tolerant system suggested in this paper may cover various malicious applications such as network attacks to the weak service, data driven attack to applications, privilege escalation or intruder login, main file access from intruders, and host-based attacks. This system prevents the access to the server cluster and blocks direct attacks by forming a barrier layer with a firewall and the proxy. It can detect various attacks through checking the file integrity by the operation of challenge/response protocol. This system also finds the infected server by checking the responses from each server. In addition, this system has much more active corresponding level than the existing scalable intrusion-tolerant architecture. In this intrusion detection system, both the data analysis and detection proceed simultaneously through the migration of the system, which maintains the operation of the system as it was. This virtualization technique is good for the implementation of the intrusion tolerance system and the migration of the mobile payment system in active state to another system. Especially, the live migration method is very effective to minimize the loss of time and data. Application/Improvements: Especially, this intrusion tolerant system makes the operating system safe from mobile payments intrusion and malicious software.

Keywords

Cuckoo Sandbox, Infection Analysis, Intrusion, Mobile Payment, Tolerant System.

Full Text:

 |  (PDF views: 173)

References


  • Sung YT, Tat EH. A mobile phone malicious software detection model with behavior checker. Proceedings of 3rd HSI, Japan; 2005. p. 57–65.
  • Jeong LK, Randy T, Cheol PG, Tae KY. A study on architecture of malicious code blocking scheme with white list in smartphone environment. Proceedings of FGCN, Korea; 2010. p.155–63.
  • Derrick SA, Frank P, Florian L, Sahin A. Monitoring smartphones for anomaly detection. Proceedings of the 1st International Conference on Mobile Wireless Middleware, Operating Systems, and Applications, Austria; 2008. p.92–106.
  • Kapil S, Samrit S, Nehil J, Patrick T, Wenke L. Evaluating bluetooth as a medium for botnet command and control.Proceedings of 7th DIMVA, Germany; 2010. p. 61–80.
  • William S. Cryptography and network security. 6thedn.Pearson: England; 2014.
  • Wei Y, Heidemann J, Estrin D. Medium access control with coordinated, adaptive sleeping for wireless sensor networks.IEEE/ACM Transactions on Networking. 2004 June; 12(3):493–506.
  • Verissimo P, Neves N, Cachin C, Poritz J, Powell D, Deswarte Y, Stroud R, Welch I. Intrusion-tolerant middleware: The road to automatic security. IEEE Security and Privacy. 2006 Jul; 4(4):54–62.
  • Miguel C, Barbara L. Practical byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems. 2002 Nov; 20(4):398–461.
  • Paulo S, Neves BA, Miguel C, Ferreira NN, Paulo V. Highly available intrusion-tolerant services with proactive-reactive recovery. IEEE Transactions on Parallel and Distributed Systems. 2010 Apr; 21(4):452–65.
  • Taesoo K, Nickolai Z. Practical and effective sandboxing for non-root users. Proceedings of the 2013 USENIX Conference on Annual Technical Conference, San Jose; 2013. p. 139–44.
  • Robert W. Exploiting concurrency vulnerabilities in system call wrappers. Proceedings of the 1st USENIX Workshop on Offensive Technologies, Boston; 2007. p. 1–8.
  • Chris W, Crispin C, James M, Stephen S, Greg K. Linux security modules: General security support for the linux kernel.Proceedings of the 11th USENIX Security Symposium, San Francisco; 2002. p. 17–31.
  • Babazadeh SA, Salar R. A model for increasing usability of mobile banking apps on smart phones. Indian Journal of Science and Technology. 2015 Nov; 8(30):1–9.
  • Kumar DG, Rajasekaran S, Prabu R. PB verification and authentication for server using multi communication.Indian Journal of Science and Technology. 2016 Feb; 9(5):1–6.
  • Rehiman KR, Veni S. A secure authentication infrastructure for IoT enabled smart mobile devices. Indian Journal of Science and Technology. 2016 May; 9(9);1–6.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.