Intrusion detection techniques for mobile cloud computing in heterogeneous 5G

Keke Gai,Meikang Qiu,Lixin Tao,Yongxin Zhu
DOI: https://doi.org/10.1002/sec.1224
IF: 1.968
2015-02-11
Security and Communication Networks
Abstract:Mobile cloud computing is applied in multiple industries to obtain cloud‐based services by leveraging mobile technologies. With the development of the wireless networks, defending threats from wireless communications have been playing a remarkable role in the Web security domain. Intrusion detection system (IDS) is an efficient approach for protecting wireless communications in the Fifth Generation (5G) context. In this paper, we identify and summarize the main techniques being implemented in IDSs and mobile cloud computing with an analysis of the challenges for each technique. Addressing the security issue, we propose a higher level framework of implementing secure mobile cloud computing by adopting IDS techniques for applying mobile cloud‐based solutions in 5G networks. On the basis of the reviews and synthesis, we conclude that the implementation of mobile cloud computing can be secured by the proposed framework because it will provide well‐protected Web services and adaptable IDSs in the complicated heterogeneous 5G environment. Copyright © 2015 John Wiley & Sons, Ltd. This paper proposes a high level framework of using mobile cloud‐computing‐based Intrusion Detection Systems (IDSs) on mobile applications. The types of IDS are reviewed and synthesized by this paper. Connecting mobile cloud computing platform with IDS techniques is an efficient approach for securing mobile apps in 4G/5G.
computer science, information systems,telecommunications
What problem does this paper attempt to address?