access icon free Mobile payment anomaly detection mechanism based on information entropy

With the rapid growth in the number of mobile phone users, mobile payments have become an important part of mobile e-commerce applications. Secure payment systems directly affect the security of e-commerce systems. This study proposes an anomaly detection mechanism supported by an information entropy method combined with neural network to improve mobile payments security. As the entropy value is sensitive and have much difference between normal and abnormal traffic flow in the mobile payment system, the abnormal traffic data will be detected. The simulation result shows that it can realise the effective monitoring of abnormal flow in the mobile payment system.

Inspec keywords: telecommunication traffic; IP networks; mobile commerce; computer network security; entropy

Other keywords: sensitive entropy value; information entropy method; mobile e-commerce applications; mobile payment security improvement; abnormal traffic data detection; abnormal traffic flow monitoring; neural network; e-commerce system security; mobile payment system anomaly detection mechanism; normal traffic flow monitoring; mobile phone users

Subjects: Computer communications; Computer networks and techniques; Data security; Financial computing

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
      • 1. Yao, D., Yin, M., Luo, J., et al: ‘Network anomaly detection using random forests and entropy of traffic features’. 2012 Fourth Int. Conf. on Multimedia Information Networking and Security (MINES) IEEE, 2012, pp. 926929.
    7. 7)
    8. 8)
      • 17. Shyu, M.L., Chen, S.C., Sarinnapakorn, K., et al: ‘A novel anomaly detection scheme based on principal component classifier’. In: Proc. of the IEEE Foundations and New Directions of Data Mining Workshop, Melbourne, FL, USA, 2003.
    9. 9)
      • 5. Chen, X., Lian, S.: ‘Secure peer-to-peer multimedia service in E-commerce environments’, J. Internet Technol., 2010, 11, (5), pp. 633641, see also p. 649.
    10. 10)
      • 18. Nychis, G., Sekar, V., Andersen, D.: ‘Empirical evaluation of entropy-based traffic anomaly detection’. Proc. IMC'08, 2008.
    11. 11)
      • 8. Smaha, S.E.: ‘Haystack: an intrusion detection system’. Fourth IEEE Aerospace Computer Security Applications Conf., 1988, pp. 3744.
    12. 12)
      • 16. Zhang, Y., Lee, W.: ‘Intrusion detection in wireless ad-hoc networks’. Proc. Sixth Annual Int. Conf. on Mobile Computing and Networking, ACM, 2000, pp. 275283.
    13. 13)
      • 19. Wagner, A., Plattner, B.: ‘Entropy based worm and anomaly detection in fast IP networks’. Fourteenth IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005, pp. 172177.
    14. 14)
      • 9. Anderson, D., Frivold, T., Valdes, A.: ‘Next-generation intrusion detection expert system (NIDES): a summary’ (SRI International, Computer Science Laboratory, 1995).
    15. 15)
    16. 16)
      • 14. Niu, X., Xianyi, Y., Wu, Z.: ‘Information hiding theory and key technology research’, Telecommun. Sci., 2004, (12), pp. 2829.
    17. 17)
      • 15. Chandola, V.: ‘MINDS: Architecture & Design Varun Chandola, Eric Eilertson, Levent Ertoz, Gyorgy Simon, and Vipin Kumar[J]’. 2006.
    18. 18)
      • 10. Lee, W., Xiang, D.: ‘Information-theoretic measures for anomaly detection’. IEEE Symp. on Security and Privacy, 2001 (S&P 2001) IEEE Proc., 2001, pp. 130143.
    19. 19)
      • 11. Lakhina, A., Papagiannaki, K., Crovella, M., et al: ‘Structural analysis of network traffic flows’. ACM, 2004.
    20. 20)
    21. 21)
    22. 22)
      • 12. Amin, M.M., Salleh, M., Ibrahim, S., et al: ‘Information hiding using steganography’. Fourth National Conf. on Telecommunication Technology Proceedings, Shah Alam, Malaysia, 14–15 January 2003.
    23. 23)
      • 6. Liu, C., Xiao, W., Li, J., Xiong, N., Qu, Y.: ‘Modeling of credit option replenishment in cluster supply chain networks under internet environment’, J. Internet Technol., 2013, 14, (4), pp. 561572, see also p. 577.
    24. 24)
      • 20. Tavallaee, M., Bagheri, E., Lu, W., et al: ‘A detailed analysis of the KDD CUP 99 data set’. Proc. Second IEEE Symp. Computational Intelligence for Security and Defence Applications, 2009.
    25. 25)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-net.2014.0101
Loading

Related content

content/journals/10.1049/iet-net.2014.0101
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading