Behavior-based intrusion detection in mobile phone systems
Journal of Parallel and Distributed Computing - Problems in parallel and distributed computing: Solutions based on evolutionary paradigms
Cloning SIM Cards Usability Reduction in Mobile Networks
Journal of Network and Systems Management
Hi-index | 0.00 |
The present work describes a security management system against the frauds related with the cloning of cellular phones. The system intends to make this fraud a nonlucrative business, and then, to finish with it. The system uses of three main techniques: (1) The ISO 8807 Technique (FDT LOTOS) is used to specify and validate the system through the Eucalyptus software employment; (2) A Pattern Recognition Technique is used to classify the telephone users into classes in order to identify if a call does not correspond to the patterns of a specific user -through MatLab software employment; and (3) CORBA Technique is used for the implementation of this distributed system (i.e., manager and agents), by VisiBroker software employment.