A novel approach to visualize web anomaly attacks in pervasive computing environment

被引:0
|
作者
Bonhyun Koo
Yang Sun Lee
Taeshik Shon
机构
[1] DMC R&D Center,Convergence Lab
[2] Chosun University,Dept. of Information Communication Engineering
来源
关键词
Multimedia communications; Web security; Visualization; Bayesian; Pervasive security;
D O I
暂无
中图分类号
学科分类号
摘要
These days, a pervasive computing environment is a rapidly changing trend towards increasingly always-on connected computing devices in the convergence environment. In a pervasive computing environment, there are various multimedia web services and communications for various devices in order to provide interesting and invaluable information to users. Meanwhile, providing a wide variety of the web-based multimedia services and communications may cause various security threats and abnormal behaviors. In this paper, a multimedia visualization approach for pervasive computing environment is proposed which analyzes HTTP request and response header information to detect and visualize multimedia web attacks based on the Bayesian method. We conducted a few cases’ experiment for the verification of the proposed approach in a real environment. The experimental results such as web attack detection visualization, scanning and password attack visualization, and attacker’s position tracking visualization verify the usability of the proposed approach.
引用
收藏
页码:301 / 316
页数:15
相关论文
共 50 条
  • [1] A novel approach to visualize web anomaly attacks in pervasive computing environment
    Koo, Bonhyun
    Lee, Yang Sun
    Shon, Taeshik
    JOURNAL OF SUPERCOMPUTING, 2013, 65 (01): : 301 - 316
  • [2] Environment Objects: A Novel Approach for Modeling Privacy in Pervasive Computing
    Babbitt, Ryan
    Yang, Hen-I
    Wong, Johnny
    Chang, Carl
    AMBIENT ASSISTIVE HEALTH AND WELLNESS MANAGEMENT IN THE HEART OF THE CITY, PROCEEDING, 2009, 5597 : 166 - 173
  • [3] Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
    Mohaisen, Abedelaziz
    Chang, Ku-Young
    Hong, Dowon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (09): : 1684 - 1697
  • [4] An evolutionary system development approach in a pervasive computing environment
    Liu, RM
    Yang, HJ
    Wang, YS
    Pan, W
    2004 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2004, : 194 - 199
  • [5] A Novel Anomaly Detection Approach for Mitigating Web-based Attacks against Clouds
    Zhang, Simin
    Li, Bo
    Li, Jianxin
    Zhang, Mingming
    Chen, Yang
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 289 - 294
  • [6] Covert Channel Attacks in Pervasive Computing
    Tuptuk, Nilufer
    Hailes, Stephen
    2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2015, : 236 - 242
  • [7] A developing approach of information acquisition system in pervasive computing environment
    Lin, Jinjiao
    Song, Chengxiang
    Wang, Haiyang
    2006 IEEE International Conference on Information Acquisition, Vols 1 and 2, Conference Proceedings, 2006, : 840 - 844
  • [8] Web caching in a Pervasive Computing world
    Buchholz, S
    Schill, A
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 102 - 107
  • [9] A novel algorithm for reducing energy-consumption in cloud computing environment: Web service computing approach
    Moganarangan, N.
    Babukarthik, R. G.
    Bhuvaneswari, S.
    Basha, M. S. Saleem
    Dhavachelvan, P.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (01) : 55 - 67
  • [10] Task computing - The semantic web meets pervasive computing
    Masuoka, R
    Parsia, B
    Labrou, Y
    SEMANTIC WEB - ISWC 2003, 2003, 2870 : 866 - 881