A novel approach to visualize web anomaly attacks in pervasive computing environment

被引:0
|
作者
Bonhyun Koo
Yang Sun Lee
Taeshik Shon
机构
[1] DMC R&D Center,Convergence Lab
[2] Chosun University,Dept. of Information Communication Engineering
来源
关键词
Multimedia communications; Web security; Visualization; Bayesian; Pervasive security;
D O I
暂无
中图分类号
学科分类号
摘要
These days, a pervasive computing environment is a rapidly changing trend towards increasingly always-on connected computing devices in the convergence environment. In a pervasive computing environment, there are various multimedia web services and communications for various devices in order to provide interesting and invaluable information to users. Meanwhile, providing a wide variety of the web-based multimedia services and communications may cause various security threats and abnormal behaviors. In this paper, a multimedia visualization approach for pervasive computing environment is proposed which analyzes HTTP request and response header information to detect and visualize multimedia web attacks based on the Bayesian method. We conducted a few cases’ experiment for the verification of the proposed approach in a real environment. The experimental results such as web attack detection visualization, scanning and password attack visualization, and attacker’s position tracking visualization verify the usability of the proposed approach.
引用
收藏
页码:301 / 316
页数:15
相关论文
共 50 条
  • [21] A policy language for a pervasive computing environment
    Kagal, L
    Finin, T
    Joshi, A
    IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 63 - 74
  • [22] A pervasive computing environment based on SIP
    Chen, Chyi-Nan
    Wu, Yi-Shi
    2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 147 - +
  • [23] Use of ontologies in a pervasive computing environment
    Ranganathan, A
    McGrath, RE
    Campbell, RH
    Mickunas, MD
    KNOWLEDGE ENGINEERING REVIEW, 2003, 18 (03): : 209 - 220
  • [24] Shadow attacks on users' anonymity in pervasive computing environments
    Riboni, Daniele
    Pareschi, Linda
    Bettini, Claudio
    PERVASIVE AND MOBILE COMPUTING, 2008, 4 (06) : 819 - 835
  • [25] Ubiquitous computing: Connecting Pervasive computing through Semantic Web
    Singh S.
    Puradkar S.
    Lee Y.
    Information Systems and e-Business Management, 2006, 4 (4) : 421 - 439
  • [26] A Method for Web Data Collection for Pervasive Computing
    Wang, Lihong
    Li, Qingzhong
    Deng, Li
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 555 - 560
  • [27] Aspects of pervasive computing for web based learning
    Ramadoss, B
    Balasundaram, SR
    INTELLIGENT INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, 3356 : 419 - 425
  • [28] A Novel Fault-Tolerant Approach to Web Service Composition upon the Edge Computing Environment
    Long, Tingyan
    Chen, Peng
    Xia, Yunni
    Jiang, Ning
    Wang, Xu
    Long, Mei
    WEB SERVICES - ICWS 2021, 2022, 12994 : 15 - 31
  • [29] Security Access Model in Pervasive Computing Environment
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
  • [30] Towards database administration in pervasive computing environment
    Siqueira, F
    Brayner, A
    INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES 2005, PROCEEDINGS, 2005, : 393 - 400