Chapter 6

Intrusion Detection in Contemporary Environments

Tarfa Hamed, Rozita Dara, and Stefan C. Kremer     University of Guelph, Guelph, ON, Canada

Abstract

This chapter discusses intrusion detection applications for two contemporary environments: mobile devices and cloud computing. The chapter starts by introducing the most well-known mobile device operating systems and cloud computing models. Next, the chapter discusses the risks to which these environments are exposed as a result of intrusions, and the sources and origins of attacks in both environments. Furthermore, classes of malware and types of attacks are explained. In addition, the chapter explores techniques employed by mobile malware as well as techniques employed by intrusions that ...

Get Computer and Information Security Handbook, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.