New Comprehensive Taxonomies on Mobile Security and Malware Analysis
Abstract
Taxonomies are known to provide a systematic and theoretical classification of elements in a particular domain and could be efficiently used to express concepts in a structural manner. Unfortunately, security literature witnesses a few taxonomies having about 40 nodes on average in mostly a narrowed scope and maximum of 25 nodes on mobile scope only. This study surveyed security related taxonomies with quality criteria and proposes new comprehensive mobile security taxonomy and mobile malware analysis subtaxonomy from not only defensive but also offensive point of view. We have developed a levelling scheme and notation for security taxonomies in general and proposed a new definite method to build the taxonomies having over 1,300 nodes. We have also visualized our taxonomies for researchers, security professionals and even common end users to provide comprehensible, well structured, and handy maps. As security threats and vulnerabilities dynamically increase and diversify, these new taxonomies would help to see the entire perspective of mobile security without losing any details and present new perspective to bring mobile computing and cyber security disciplines closer.
Keywords
References
- [1] L. Howell, Ed., Global Risks 2013, 8th ed. Cologny/Geneva: World Economic Forum, 2013.
- [2] Global Risks 2015, 10th ed., Cologny/Geneva, 2015.
- [3] The Global Risks Report 2016, 11th ed. Cologny/Geneva: World Economic Forum, 2016.
- [4] V. Melvin, M. Cousin, S. Thorne, L. Liu, and A. Cheeseman, “Threat Horizon 2016: On the edge of trust Review,” Information Security Forum Limited, Tech. Rep., 2014.
- [5] D. McMorrow, “Science of Cyber-Security,” The MITRE Corporation, McLean, Virginia, Tech. Rep. November, 2010.
- [6] C. von Linn, Systema naturae per regna tria naturae: secundum classes, ordines, genera, species, cum characteribus, differentiis, synonymis, locis (System of nature through the three kingdoms of nature, according to classes, orders, genera and species, with characters), 10th ed. Stockholm: Impensis Direct. Laurentii Salvii,, 1758, vol. v.1.
- [7] U. Lindqvist and E. Jonsson, “How to systematically classify computer security intrusions,” in IEEE Symposium on Security and Privacy. Oakland, CA: IEEE, 1997, pp. 154–163.
- [8] R. P. Lippmann, D. J. Fried, I. Graf, J. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, “Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation,” in Proceedings DARPA Information Survivability Conference and Exposition DISCEX’00, vol. 2. Hilton Head, SC: IEEE, 2000, pp. 12–26.
Details
Primary Language
English
Subjects
-
Journal Section
-
Publication Date
December 1, 2016
Submission Date
-
Acceptance Date
-
Published in Issue
Year 2016 Volume: 5 Number: 4
APA
Canbek, G., Sagiroglu, S., & Baykal, N. (2016). New Comprehensive Taxonomies on Mobile Security and Malware Analysis. International Journal of Information Security Science, 5(4), 106-138. https://izlik.org/JA94UA42FJ
AMA
1.Canbek G, Sagiroglu S, Baykal N. New Comprehensive Taxonomies on Mobile Security and Malware Analysis. IJISS. 2016;5(4):106-138. https://izlik.org/JA94UA42FJ
Chicago
Canbek, Gürol, Seref Sagiroglu, and Nazife Baykal. 2016. “New Comprehensive Taxonomies on Mobile Security and Malware Analysis”. International Journal of Information Security Science 5 (4): 106-38. https://izlik.org/JA94UA42FJ.
EndNote
Canbek G, Sagiroglu S, Baykal N (December 1, 2016) New Comprehensive Taxonomies on Mobile Security and Malware Analysis. International Journal of Information Security Science 5 4 106–138.
IEEE
[1]G. Canbek, S. Sagiroglu, and N. Baykal, “New Comprehensive Taxonomies on Mobile Security and Malware Analysis”, IJISS, vol. 5, no. 4, pp. 106–138, Dec. 2016, [Online]. Available: https://izlik.org/JA94UA42FJ
ISNAD
Canbek, Gürol - Sagiroglu, Seref - Baykal, Nazife. “New Comprehensive Taxonomies on Mobile Security and Malware Analysis”. International Journal of Information Security Science 5/4 (December 1, 2016): 106-138. https://izlik.org/JA94UA42FJ.
JAMA
1.Canbek G, Sagiroglu S, Baykal N. New Comprehensive Taxonomies on Mobile Security and Malware Analysis. IJISS. 2016;5:106–138.
MLA
Canbek, Gürol, et al. “New Comprehensive Taxonomies on Mobile Security and Malware Analysis”. International Journal of Information Security Science, vol. 5, no. 4, Dec. 2016, pp. 106-38, https://izlik.org/JA94UA42FJ.
Vancouver
1.Gürol Canbek, Seref Sagiroglu, Nazife Baykal. New Comprehensive Taxonomies on Mobile Security and Malware Analysis. IJISS [Internet]. 2016 Dec. 1;5(4):106-38. Available from: https://izlik.org/JA94UA42FJ