A novel approach to visualize web anomaly attacks in pervasive computing environment

被引:0
|
作者
Bonhyun Koo
Yang Sun Lee
Taeshik Shon
机构
[1] DMC R&D Center,Convergence Lab
[2] Chosun University,Dept. of Information Communication Engineering
来源
关键词
Multimedia communications; Web security; Visualization; Bayesian; Pervasive security;
D O I
暂无
中图分类号
学科分类号
摘要
These days, a pervasive computing environment is a rapidly changing trend towards increasingly always-on connected computing devices in the convergence environment. In a pervasive computing environment, there are various multimedia web services and communications for various devices in order to provide interesting and invaluable information to users. Meanwhile, providing a wide variety of the web-based multimedia services and communications may cause various security threats and abnormal behaviors. In this paper, a multimedia visualization approach for pervasive computing environment is proposed which analyzes HTTP request and response header information to detect and visualize multimedia web attacks based on the Bayesian method. We conducted a few cases’ experiment for the verification of the proposed approach in a real environment. The experimental results such as web attack detection visualization, scanning and password attack visualization, and attacker’s position tracking visualization verify the usability of the proposed approach.
引用
收藏
页码:301 / 316
页数:15
相关论文
共 50 条
  • [31] Dependability issues of pervasive computing in a healthcare environment
    Bohn, J
    Gärtner, F
    Vogt, H
    SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 53 - 70
  • [32] iShadow: Yet Another Pervasive Computing Environment
    Zhang, Daqiang
    Guan, Hu
    Zhou, Jingyu
    Tang, Feilong
    Guo, Minyi
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, 2008, : 261 - 268
  • [33] User Interest Learning in Pervasive Computing Environment
    Dong, Yongquan
    Li, Qingzhong
    Yan, Zhongmin
    Pan, Peng
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 319 - 322
  • [34] Anonymous routing protocol in pervasive computing environment
    Wang, Yinglong
    Wang, Jizhi
    Wang, Meiqin
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 421 - 424
  • [35] A novel two-stage resource allocation model under pervasive computing environment
    Wang, Haipeng
    Zhou, Xingshe
    Zhang, Tao
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2010, 28 (02): : 276 - 279
  • [36] Compatibility checking of web services composition in pervasive computing
    Gao, Chunming
    Ji, Shizhang
    Liu, Rongsheng
    Chen, Huowang
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 652 - +
  • [37] A Deep Web Data Integration Model for Pervasive Computing
    Yan, Zhongmin
    Li, Qingzhong
    Dong, Yongquan
    Cao, Luhui
    Pan, Peng
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 416 - 419
  • [38] Research of protecting private information in pervasive computing environment
    Li, Zhiqing
    Fu, Xiufen
    Su, Huigui
    Jiang, Mingliang
    Xiao, ShuTeng
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 561 - +
  • [39] A Study on Effective Proactive Service in Pervasive Computing Environment
    Kwon, Joonhee
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 35 - 39
  • [40] Plugin-orb for applications in a pervasive computing environment
    d'Acierno, A
    De Pietro, G
    Coronato, A
    Gugliara, G
    PSC '05: Proceedings of the 2005 International Conference on Pervasive Systems and Computing, 2005, : 140 - 146