Attack Detection and Distributed Forensics in Machine-to-Machine Networks

被引:47
作者
Wang, Kun [1 ,2 ]
Du, Miao [3 ]
Sun, Yanfei [3 ]
Vinel, Alexey [4 ]
Zhang, Yan [5 ,6 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Internet Things, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
[4] Halmstad Univ, Sch Informat Technol, Comp Commun, Halmstad, Sweden
[5] Univ Oslo, N-0316 Oslo, Norway
[6] Simula Res Lab, Fornebu, Norway
来源
IEEE NETWORK | 2016年 / 30卷 / 06期
关键词
SECURITY;
D O I
10.1109/MNET.2016.1600113NM
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honey-pot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 15 条
[1]   Security in Software Defined Networks: A Survey [J].
Ahmad, Ijaz ;
Namal, Suneth ;
Ylianttila, Mika ;
Gurtov, Andrei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2317-2346
[2]  
Baig ZA, 2011, IEEE INT CONF NETWOR, P171, DOI 10.1109/ICON.2011.6168470
[3]   Multimedia in Forensics, Security, and Intelligence [J].
Battiato, Sebastiano ;
Emmanuel, Sabu ;
Ulges, Adrian ;
Worring, Marcel .
IEEE MULTIMEDIA, 2012, 19 (01) :17-19
[4]  
Brauckhoff D., 2014, IEEE ACM T NETWORK, V20, P1788
[5]  
Fung C. J., 2011, IEEE Transactions on Network and Service Management, V8, P79, DOI 10.1109/TNSM.2011.050311.100028
[6]   Network Forensics: An Analysis of Techniques, Tools, and Trends [J].
Hunt, Ray ;
Zeadally, Sherali .
COMPUTER, 2012, 45 (12) :36-43
[7]   A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks [J].
Moosavi, Hussein ;
Bui, Francis Minhthang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) :1367-1379
[8]  
Perumal S, 2015, 2015 FIFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), P19, DOI 10.1109/ICDIPC.2015.7323000
[9]   Secure Communication in Stochastic Wireless Networks-Part I: Connectivity [J].
Pinto, Pedro C. ;
Barros, Joao ;
Win, Moe Z. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) :125-138
[10]   MeasuRouting: A Framework for Routing Assisted Traffic Monitoring [J].
Raza, Saqib ;
Huang, Guanyao ;
Chuah, Chen-Nee ;
Seetharaman, Srini ;
Singh, Jatinder Pal .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (01) :45-56