Integration Of Intrusion Detection System With Mobile Cloud Offloading To Securely Offload Mobile Applications To The Cloudlet
| dc.contributor.advisor | Ravindra Babu (PhD) | |
| dc.contributor.author | Abeselom, Befekadu | |
| dc.date.accessioned | 2025-12-17T11:29:38Z | |
| dc.date.issued | 2017-09 | |
| dc.description.abstract | Nowadays mobile devices have become a useful tool to compute the day to day activities of human being. However, this tool lacks the resources to handle the increasing need for computing intensive tasks. To overcome those limitations the computation offloading mechanism has been widely considered. Security measures using encryption, user authentication, password and digital certificates are not enough to secure the data during transmission and the code itself. To alleviate this problem many scholars have been trying to develop cloud based intrusion detection system. The existing cloud based intrusion detection system works by creating replica of the mobile device on the virtual machine in the cloud. The operation of intrusion detection executed on the replica of the mobile device on the cloud where the intrusion detection system is deployed. After detecting intrusion the users will be notified about the attacks. The main limitation of this security mechanism is the communication way of notifying the user about the attack. During communication between the mobile device and the cloud, the attacker can compromise the channel and make the system to look like normal working time to the mobile device. This allows the attacker to access the data which is transmitted or offloaded to the cloudlet. This mechanism also needs more network bandwidth for coping the network data to the emulation platform on the cloud. To reduce the risks behind mobile application offloading, this research proposes an integrated intrusion detection system with mobile application offloading to securely offload mobile computation to the cloudlet. The proposed system deny the service request of the mobile device during intrusion. This means the system stops the offloading process immediately at the time of attack. This process secures the client’s data from being accessed by unauthorized intruder. Moreover, the system will generate report to the cloudlet administrator about why the service request of the client is denied. After removing the intruder from the network the services will be started immediately. Furthermore, the evaluation results of the proposed integrated system showed that it can stop the offloading process immediately during attack and notifies the administrator about the attack. | en_US |
| dc.description.sponsorship | ASTU | en_US |
| dc.identifier.uri | http://10.240.1.28:4000/handle/123456789/2946 | |
| dc.language.iso | en | en_US |
| dc.title | Integration Of Intrusion Detection System With Mobile Cloud Offloading To Securely Offload Mobile Applications To The Cloudlet | en_US |
| dc.type | Thesis | en_US |
