NEMESYS: First Year Project Experience in Telecom Italia Information Technology

نویسندگان

  • Madalina Baltatu
  • Rosalia D'Alessandro
  • Roberta D'Amico
چکیده

Nowadays smartphones are ubiquitous, their usage continues to grow all over the world. With the International Telecommunication Union (ITU) estimating global mobile subscriptions at 6 billion at the end of 2011, it is calculated that global smartphones penetration is now 16.7 percent [7]. Smartphones are devices built on full-fledged operating systems, with advanced computing capabilities and enhanced connectivity (3G/4G, Wi-fi, bluetooth). They are also personal digital assistants, media players, compact digital cameras, video cameras, GPS navigation devices, and even tuners for musical instruments. Smartphones are also beginning to be used for direct paying (like debit cards), and to get access to enterprise premises. They are all equipped with web browsers and other network applications that use highspeed Wi-fi data access and mobile broadband, or proximity bluetooth access. Mobile application developers have immediately understood the opportunity presented by smartphones deployment, and, at the present time, mobile applications stores are the major drivers of smartphones adoption in everyday life. Unfortunately, smartphones are also becoming attractive for cyber criminals and malware developers. Ever since 2011, mobile malware has started to grow steadily. It seems that the trend is similar to that followed by malware developed for personal computers, but in a much faster way. Moreover, differently from traditional computer platforms, smartphones are natively a source of profit (since they have available the users’ phone and data traffic credit), and this makes them a great target of attacks. The spreading of smartphones also imply that Mobile Network Operators (MNOs) are required to provide appropriate protection and security mechanisms to their core network and, if possible, to their customers’ devices. Telecom

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems. With the emergence of large-scale mobile botnets, smartphones can also be used to launch attacks on mobile networks. The NEMESYS project will develop novel security technologies for ...

متن کامل

Using correlation engine and mobile agents for intrusion detection

IMAIDS project (Intelligent Mobile Agent for Intrusion Detection System) is carried out by five 5th year students, Réginald Lips, Nicolas Carlier, Damien Molot, Jean-Marie Peschoux and Alexandre Luciani, from Epitech (European Institute of Technology; http: // www. epitech. net/ ), within the framework of their end of studies project. The purpose of this document is to present a part of our res...

متن کامل

Enterprise modeling and Data Warehousing in Telecom Italia

We present a methodology for Data Warehouse design and its application within the TELECOM ITALIA information system. The methodology is based on a conceptual representation of the Enterprise, which is exploited both in the integration phase of the Warehouse information sources and during the knowledge discovery activity on the information stored in the Warehouse. The application of the methodol...

متن کامل

Mission-Critical Business Process Management with WADE

This paper presents an overview of WADE (Workflows and Agents Development Environment), an open-source platform for agentbased BPM (Business Process Management) that has been adopted in Telecom Italia for mission-critical systems since the early 2000s. First, we sketch the main features of WADE and outline its internal architecture. Then, we describe WANTS (Workflows and AgeNTS), an industrial ...

متن کامل

Enhancing Seamless Communication Through a user Co-designed Wearable Device

This work aims to describe the process of developing services and applications of seamless communication within a Telecom Italia long-term research project, which takes as central aim the design of a wearable communication device. In particular, the objective was to design a wrist phone integrated into everyday life of people in full transparency. The methodology used to design the wristwatch w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013