IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Intrusion Detection and Vulnerability Analysis of Mobile Commerce Platform

Intrusion Detection and Vulnerability Analysis of Mobile Commerce Platform
View Sample PDF
Author(s): Changhua Zhu (Xidian University, China)and Changxing Pei (Xidian University, China)
Copyright: 2008
Pages: 17
Source title: Electronic Commerce: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Annie Becker (Florida Institute of Technology, USA)
DOI: 10.4018/978-1-59904-943-4.ch156

Purchase

View Intrusion Detection and Vulnerability Analysis of Mobile Commerce Platform on the publisher's website for pricing and purchasing information.

Abstract

Intrusion detection and vulnerability analysis play the same important roles in wireless infrastructure as in wired infrastructure. In this chapter we briefly present the methods and technologies of intrusion detection and vulnerability analysis. Then we give the security issues in various wireless networking technologies, analyze the vulnerability of the enabling technologies for the mobile commerce platform, and propose a distributed wireless intrusion detection & vulnerability analysis (WID&VA) system that can help to address the identified security issues. Finally, we conclude this chapter and discuss the future trends.

Related Content

Simriti Popli, Gabriel Wasswa. © 2024. 12 pages.
Pooja Lekhi. © 2024. 8 pages.
Shailey Singh. © 2024. 12 pages.
Shailey Singh. © 2024. 9 pages.
Tanuj Surve, Tuan Nguyen. © 2024. 17 pages.
Pawan Kumar, Sanjay Taneja, Mukul Bhatnagar, Arvinder K. Kaur. © 2024. 17 pages.
Azadeh Eskandarzadeh. © 2024. 15 pages.
Body Bottom