[go: up one dir, main page]

Skip to main content

Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

In this paper we introduce the detection details and experimental results of our proposed Service-oriented and User-centric Intrusion Detection System (SUIDS). SUIDS is designed for ubiquitous computing environments like a smart home/office. It adopts a novel auditing mechanism and flexible system architecture to meet the special requirements of ubiquitous networks. Specifically, the paper shows how a string-based method is used in a user profile to represent the user’s short-term behavior in due course; and how an appropriate string length and threshold value are determined in order to balance the system’s false alarm rate and detection effectiveness. As a result, SUIDS achieve real-time intrusion detection in ubiquitous networks with a lightweight and adaptable detection model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Weiser, M.: The computer for the 21st century. Scientific American (International Edition) 265(3), 66–75 (1991)

    Google Scholar 

  2. Stajano, F.: Security for ubiquitous computing. Wiley, Chichester (2002) ISBN 0470844930

    Book  Google Scholar 

  3. Thompson, H., Whittaker, J., Andrews, M.: Intrusion detection: perspectives on the insider threat. Computer Fraud & Security, 13–15 (Janaury 2004)

    Google Scholar 

  4. Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Annales des Telecommunications 55(7-5), 361–378 (2000)

    Google Scholar 

  5. Zhou, B., Shi, Q., Merabti, M.: A framework for intrusion detection in heterogeneous environments. In: Proceedings of 3rd IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, Nevada, USA, Janaury 2006, vol. 2, pp. 1244–1248 (2006)

    Google Scholar 

  6. Zhou, B., Shi, Q., Merabti, M.: A novel service-oriented and user-centric intrusion detection system for ubiquitous networks. In: Proceedings of IASTED International Conference on Communication, Network and Information Security (CNIS 2005), Phoenix, Arizona, USA, November 2005, pp. 76–81 (2005)

    Google Scholar 

  7. Du, Y., Wang, H., Pang, Y.: Design of a distributed intrusion detection system based on independent agents. In: IEEE Proceedings of International Conference on Intelligent Sensing and Information Processing, pp. 254–257 (2004)

    Google Scholar 

  8. Northcutt, S., Novak, J.: Network intrusion detection (New Riders Pub, (2002) c2003) ISBN: 0735712654

    Google Scholar 

  9. Marks, D., Mell, P., Stinson, M.: Optimizing the scalability of network intrusion detection system using mobile agents. Journal of Network and Systems Management 12(1), 95–110 (2004)

    Article  Google Scholar 

  10. Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P., Javitz, H., Valdes, A., Garvey, T.: A real-time intrusion detection expert system (IDES) - final technical report. Computer Science Laboratory, SRI International, Menlo Park, Califomia (February 1992)

    Google Scholar 

  11. Zhang, Z., Manikopoulos, C., Jorgenson, J.: Architecture of generalized network service anomaly and fault thresholds. In: MMNS 2001, pp. 241–255 (2001)

    Google Scholar 

  12. GTNetS homepage, http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/

  13. Royer, E., Toh, C.-K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Pers. Commun., 46–55 (April 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, B., Shi, Q., Merabti, M. (2006). Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_38

Download citation

  • DOI: https://doi.org/10.1007/11751632_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics