메뉴 건너뛰기




Volumn 30, Issue 6, 2016, Pages 49-55

Attack detection and distributed forensics in machine-to-machine networks

Author keywords

[No Author keywords available]

Indexed keywords

DENIAL-OF-SERVICE ATTACK; DIGITAL FORENSICS; NETWORK SECURITY;

EID: 85015100023     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2016.1600113NM     Document Type: Article
Times cited : (65)

References (15)
  • 1
    • 79953778099 scopus 로고    scopus 로고
    • Home M2M Networks: Architectures, Standards, and QoS Improvement
    • Apr
    • Y. Zhang et al., “Home M2M Networks: Architectures, Standards, and QoS Improvement,” IEEE Commun. Mag., vol. 49, no. 4, Apr. 2011, pp. 44–52.
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.4 , pp. 44-52
    • Zhang, Y.1
  • 2
    • 84861317311 scopus 로고    scopus 로고
    • Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid
    • June
    • Y. Zhang et al., “Cognitive Machine-to-Machine Communications: Visions and Potentials for the Smart Grid,” IEEE Network, vol. 26, no. 3, June 2012, pp. 6–13.
    • (2012) IEEE Network , vol.26 , Issue.3 , pp. 6-13
    • Zhang, Y.1
  • 3
    • 84859977808 scopus 로고    scopus 로고
    • A Trust-Based Mechanism for Protecting IPv6 Networks Against Stateless Address Auto-Configuration Attacks
    • Dec
    • Z. Baig and S. Adeniye, “A Trust-Based Mechanism for Protecting IPv6 Networks Against Stateless Address Auto-Configuration Attacks,” Proc. IEEE. 17th Int’l. Conf. Net., Dec. 2011, pp. 171–76.
    • (2011) Proc. IEEE. 17th Int’L. Conf. Net. , pp. 171-176
    • Baig, Z.1    Adeniye, S.2
  • 4
    • 84969940808 scopus 로고    scopus 로고
    • Security in Software Defined Networks: A Survey
    • Aug
    • I. Ahmad et al., “Security in Software Defined Networks: A Survey,” IEEE Commun. Surveys & Tutorials, vol. 17, no. 4, Aug. 2015, pp. 2317–46.
    • (2015) IEEE Commun. Surveys & Tutorials , vol.17 , Issue.4 , pp. 2317-2346
    • Ahmad, I.1
  • 5
    • 84962815572 scopus 로고    scopus 로고
    • Internet of Things (IoT) Digital Forensic Investigation Model: Top-Down Forensic Approach Methodology
    • Oct
    • S. Perumal, N. Norwawi, and V. Raman, “Internet of Things (IoT) Digital Forensic Investigation Model: Top-Down Forensic Approach Methodology” Proc. IEEE ICDIPC, Oct. 2015, pp. 19–23.
    • (2015) Proc. IEEE ICDIPC , pp. 19-23
    • Perumal, S.1    Norwawi, N.2    Raman, V.3
  • 6
    • 84903531892 scopus 로고    scopus 로고
    • Anomaly Extraction in Backbone Networks Using Association Rules
    • Feb
    • D. Brauckhoff et al., “Anomaly Extraction in Backbone Networks Using Association Rules,” IEEE/ACM Trans. Net., vol. 20, no. 6, Feb. 2014, pp. 1788–99.
    • (2014) IEEE/ACM Trans. Net. , vol.20 , Issue.6 , pp. 1788-1799
    • Brauckhoff, D.1
  • 7
    • 84871763598 scopus 로고    scopus 로고
    • Network Forensics: An Analysis of Techniques, Tools, and Trends
    • July
    • R. Hunt and S. Zeadally, “Network Forensics: An Analysis of Techniques, Tools, and Trends,” Computer, vol. 45, no. 12, July 2012, pp. 36-43.
    • (2012) Computer , vol.45 , Issue.12 , pp. 36-43
    • Hunt, R.1    Zeadally, S.2
  • 8
    • 84857369317 scopus 로고    scopus 로고
    • MeasuRouting: A Framework for Routing Assisted Traffic Monitoring
    • Feb
    • S. Raza et al., “MeasuRouting: A Framework for Routing Assisted Traffic Monitoring,” IEEE/ACM Trans. Net., vol. 20, no. 1, Feb. 2012, pp. 45–56.
    • (2012) IEEE/ACM Trans. Net. , vol.20 , Issue.1 , pp. 45-56
    • Raza, S.1
  • 9
    • 84855923041 scopus 로고    scopus 로고
    • Secure Communication in Stochastic Wireless Networks-Part I: Connectivity
    • Jan
    • P. Pinto, J. Barros, and M. Win, “Secure Communication in Stochastic Wireless Networks-Part I: Connectivity,” IEEE Trans. Info. Forensics Security, vol. 7, no. 1, Jan. 2012, pp. 125–38.
    • (2012) IEEE Trans. Info. Forensics Security , vol.7 , Issue.1 , pp. 125-138
    • Pinto, P.1    Barros, J.2    Win, M.3
  • 10
    • 84856480462 scopus 로고    scopus 로고
    • Multimedia in Forensics, Security, and Intelligence
    • Jan
    • S. Battiato et al., “Multimedia in Forensics, Security, and Intelligence,” IEEE MultiMedia, vol. 19, no. 1, Jan. 2012, pp. 17–19.
    • (2012) IEEE MultiMedia , vol.19 , Issue.1 , pp. 17-19
    • Battiato, S.1
  • 11
    • 84940688354 scopus 로고    scopus 로고
    • A First Step Toward Network Security Virtualization: From Concept to Prototype
    • Oct
    • S. Shin, H. Wang, and G. Gu, “A First Step Toward Network Security Virtualization: From Concept to Prototype,” IEEE Trans. Info. Forensics Security, vol. 10, no. 10, Oct. 2015, pp. 2236–49.
    • (2015) IEEE Trans. Info. Forensics Security , vol.10 , Issue.10 , pp. 2236-2249
    • Shin, S.1    Wang, H.2    Gu, G.3
  • 12
    • 79958778609 scopus 로고    scopus 로고
    • Dirichlet-based Trust Management for Effective Collaborative Intrusion Detection Networks
    • June
    • C. Fung et al., “Dirichlet-based Trust Management for Effective Collaborative Intrusion Detection Networks,” IEEE Trans. Net. Service Mgmt., vol. 8, no. 2, June 2011, pp. 79–91.
    • (2011) IEEE Trans. Net. Service Mgmt. , vol.8 , Issue.2 , pp. 79-91
    • Fung, C.1
  • 13
    • 84905736269 scopus 로고    scopus 로고
    • A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks
    • Sept
    • H. Moosavi and F. Bui, “A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks,” IEEE Trans. Info. Forensics Security, vol. 9, no. 9, Sept. 2014, pp. 1367–79.
    • (2014) IEEE Trans. Info. Forensics Security , vol.9 , Issue.9 , pp. 1367-1379
    • Moosavi, H.1    Bui, F.2
  • 14
    • 84962034263 scopus 로고    scopus 로고
    • Mobile big Data Fault-Tolerant Processing for eHealth Networks
    • Jan
    • K. Wang et al., “Mobile big Data Fault-Tolerant Processing for eHealth Networks,” IEEE Network, vol. 30, no. 1, Jan. 2016, pp. 1–7.
    • (2016) IEEE Network , vol.30 , Issue.1 , pp. 1-7
    • Wang, K.1
  • 15
    • 84921479434 scopus 로고    scopus 로고
    • LDPA: A Local Data Processing Architecture in Ambient Assisted Living Communications
    • Jan
    • K. Wang et al., “LDPA: A Local Data Processing Architecture in Ambient Assisted Living Communications,” IEEE Commun. Mag., vol. 53, no. 1, Jan. 2015, pp. 56–63.
    • (2015) IEEE Commun. Mag. , vol.53 , Issue.1 , pp. 56-63
    • Wang, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.