A novel approach to visualize web anomaly attacks in pervasive computing environment

被引:0
|
作者
Bonhyun Koo
Yang Sun Lee
Taeshik Shon
机构
[1] DMC R&D Center,Convergence Lab
[2] Chosun University,Dept. of Information Communication Engineering
来源
关键词
Multimedia communications; Web security; Visualization; Bayesian; Pervasive security;
D O I
暂无
中图分类号
学科分类号
摘要
These days, a pervasive computing environment is a rapidly changing trend towards increasingly always-on connected computing devices in the convergence environment. In a pervasive computing environment, there are various multimedia web services and communications for various devices in order to provide interesting and invaluable information to users. Meanwhile, providing a wide variety of the web-based multimedia services and communications may cause various security threats and abnormal behaviors. In this paper, a multimedia visualization approach for pervasive computing environment is proposed which analyzes HTTP request and response header information to detect and visualize multimedia web attacks based on the Bayesian method. We conducted a few cases’ experiment for the verification of the proposed approach in a real environment. The experimental results such as web attack detection visualization, scanning and password attack visualization, and attacker’s position tracking visualization verify the usability of the proposed approach.
引用
收藏
页码:301 / 316
页数:15
相关论文
共 50 条
  • [41] Analysis of HTTP requests for anomaly detection of web attacks
    Zolotukhin, Mikhail
    Hamalainen, Timo
    Kokkonen, Tero
    Siltanen, Jarmo
    2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 406 - +
  • [42] Feature Extraction for Digital Object in Pervasive Computing Environment
    Song, Ruixia
    Wang, Xiaochun
    Li, Jian
    2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 163 - +
  • [43] Big Data Processing for Pervasive Environment in Cloud Computing
    Amato, Alba
    Di Martino, Beniamino
    Venticinque, Salvatore
    2014 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2014, : 598 - 603
  • [44] An Adaptive Anomaly Detection of WEB-based Attacks
    Kai, Wen
    Fan, Guo
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 690 - 694
  • [45] Mobile cloud computing framework for a pervasive and ubiquitous environment
    Min Choi
    Jonghyuk Park
    Young-Sik Jeong
    The Journal of Supercomputing, 2013, 64 : 331 - 356
  • [46] Mobile cloud computing framework for a pervasive and ubiquitous environment
    Choi, Min
    Park, Jonghyuk
    Jeong, Young-Sik
    JOURNAL OF SUPERCOMPUTING, 2013, 64 (02): : 331 - 356
  • [47] Globaledu - An architecture to support learning in a pervasive computing environment
    Barbosa, DNF
    Geyer, CFR
    Barbosa, JLV
    New Trends and Technologies in Computer-Aided Learning for Computer-Aided Design, 2005, 192 : 1 - 10
  • [48] Context Awareness in Uncertain Pervasive Computing and Sensors Environment
    Sebbak, Faouzi
    Bouznad, Sofiane
    Benhammadi, Farid
    Chibani, Abdelghani
    Amirat, Yacine
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 1026 - 1031
  • [49] Modeling Unknown Web Attacks in Network Anomaly Detection
    Liang Guangmin
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 112 - 116
  • [50] A distributed trust management scheme in the pervasive computing environment
    Sun, Tao
    Denko, Mieso K.
    2007 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, 2007, : 1219 - 1222