메뉴 건너뛰기




Volumn 74, Issue , 2018, Pages 340-354

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

Author keywords

Edge device; Fog computing; Internet of Things; Intrusion detection system; Two stage Markov model; Virtual Honeypot Device

Indexed keywords

COMPUTER CRIME; DATA HANDLING; FOG; HIDDEN MARKOV MODELS; INTERNET OF THINGS; MARKOV PROCESSES; MERCURY (METAL); NETWORK FUNCTION VIRTUALIZATION; NETWORK SECURITY; VIRTUAL REALITY; WINDOWS OPERATING SYSTEM;

EID: 85029784320     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2017.08.016     Document Type: Article
Times cited : (198)

References (57)
  • 1
    • 84920266699 scopus 로고    scopus 로고
    • Cyber security analytics: a stochastic model for security quantification using absorbing markov chains
    • Abraham, S., Nair, S., Cyber security analytics: a stochastic model for security quantification using absorbing markov chains. J Commun 9:12 (2014), 899–907.
    • (2014) J Commun , vol.9 , Issue.12 , pp. 899-907
    • Abraham, S.1    Nair, S.2
  • 2
    • 33745009333 scopus 로고    scopus 로고
    • A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
    • Artail, H., Safa, H., Sraj, M., Kuwatly, I., Al-Masri, Z., A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks. Comput Secur 25:4 (2006), 274–288.
    • (2006) Comput Secur , vol.25 , Issue.4 , pp. 274-288
    • Artail, H.1    Safa, H.2    Sraj, M.3    Kuwatly, I.4    Al-Masri, Z.5
  • 7
    • 79956153885 scopus 로고    scopus 로고
    • Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks
    • Chonka, A., Xiang, Y., Zhou, W., Bonti, A., Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks. J Netw Comput Appl 34:4 (2011), 1097–1107.
    • (2011) J Netw Comput Appl , vol.34 , Issue.4 , pp. 1097-1107
    • Chonka, A.1    Xiang, Y.2    Zhou, W.3    Bonti, A.4
  • 8
    • 77956652072 scopus 로고    scopus 로고
    • Human factors in information security: the insider threat – who can you trust these days?
    • Colwill, C., Human factors in information security: the insider threat – who can you trust these days?. Inf Secur Tech Rep 14:4 (2009), 186–196.
    • (2009) Inf Secur Tech Rep , vol.14 , Issue.4 , pp. 186-196
    • Colwill, C.1
  • 11
    • 26444544161 scopus 로고    scopus 로고
    • Hybrid signcryption schemes with insider security
    • Dent, A.W., Hybrid signcryption schemes with insider security. Information security and privacy LNCS, vol. 3574, 2005, 253–266.
    • (2005) Information security and privacy, LNCS , vol.3574 , pp. 253-266
    • Dent, A.W.1
  • 12
    • 85035067677 scopus 로고    scopus 로고
    • Circumventing iOS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps
    • D'Orazio, C.J., Choo, K.K.R., Circumventing iOS security mechanisms for APT forensic investigations: a security taxonomy for cloud apps. Future Gener Comput Syst, 2016, 1–15.
    • (2016) Future Gener Comput Syst , pp. 1-15
    • D'Orazio, C.J.1    Choo, K.K.R.2
  • 13
    • 84994744881 scopus 로고    scopus 로고
    • A technique to circumvent SSL/TLS validations on iOS devices
    • D'Orazio, C.J., Choo, K.K.R., A technique to circumvent SSL/TLS validations on iOS devices. Future Gener Comput Syst 74 (2017), 366–374.
    • (2017) Future Gener Comput Syst , vol.74 , pp. 366-374
    • D'Orazio, C.J.1    Choo, K.K.R.2
  • 14
    • 85018406878 scopus 로고    scopus 로고
    • Data exfiltration from internet of things devices: IOS devices as case studies
    • D'Orazio, C.J., Choo, K.K.R., Yang, L.T., Data exfiltration from internet of things devices: IOS devices as case studies. IEEE Internet Things J 4:2 (2017), 524–535.
    • (2017) IEEE Internet Things J , vol.4 , Issue.2 , pp. 524-535
    • D'Orazio, C.J.1    Choo, K.K.R.2    Yang, L.T.3
  • 15
    • 84986550725 scopus 로고    scopus 로고
    • A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
    • D'Orazio, C.J., Lu, R., Choo, K.K.R., Vasilakos, A.V., A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. Appl Math Comput 293 (2017), 523–544.
    • (2017) Appl Math Comput , vol.293 , pp. 523-544
    • D'Orazio, C.J.1    Lu, R.2    Choo, K.K.R.3    Vasilakos, A.V.4
  • 16
    • 0032119668 scopus 로고    scopus 로고
    • Hierarchical Hidden Markov Model: analysis and applications
    • Fine, S., Singer, Y., Tishby, N., Hierarchical Hidden Markov Model: analysis and applications. Mach Learn 32:1 (1998), 41–62.
    • (1998) Mach Learn , vol.32 , Issue.1 , pp. 41-62
    • Fine, S.1    Singer, Y.2    Tishby, N.3
  • 17
    • 3142683286 scopus 로고    scopus 로고
    • Enemies within: the problem of insider attacks
    • Furnell, S., Enemies within: the problem of insider attacks. Comput Fraud Secur 2004:7 (2004), 6–11.
    • (2004) Comput Fraud Secur , vol.2004 , Issue.7 , pp. 6-11
    • Furnell, S.1
  • 18
    • 85042464260 scopus 로고    scopus 로고
    • Glastopf- A Web Application Honeypot
    • [Online]; Available from (Accessed 20 August 2017)
    • Glastopf- A Web Application Honeypot. [Online]; Available from https://www.edgis-security.org/honeypot/glastopf, 2017. (Accessed 20 August 2017)
    • (2017)
  • 20
    • 85029918183 scopus 로고    scopus 로고
    • Blogs | The Honeynet Project
    • [Online]; Available from (Accessed 13 February 2017)
    • Honeynet Project [Honeypot], Blogs | The Honeynet Project. [Online]; Available from http://www.honeynet.org/. (Accessed 13 February 2017)
  • 24
    • 68949143256 scopus 로고    scopus 로고
    • Game-theoretic modeling and analysis of insider threats
    • Liu, D., Wang, X., Camp, J., Game-theoretic modeling and analysis of insider threats. Int J Crit Infrastruct Prot 1 (2008), 75–80.
    • (2008) Int J Crit Infrastruct Prot , vol.1 , pp. 75-80
    • Liu, D.1    Wang, X.2    Camp, J.3
  • 27
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: evaluating the probability of IT misuse
    • Magklaras, G.B., Furnell, S.M., Insider threat prediction tool: evaluating the probability of IT misuse. Comput Secur 21:1 (1998), 62–73.
    • (1998) Comput Secur , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 28
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • Magklaras, G.B., Furnell, S.M., A preliminary model of end user sophistication for insider threat prediction in IT systems. Comput Secur 24:5 (2005), 371–380.
    • (2005) Comput Secur , vol.24 , Issue.5 , pp. 371-380
    • Magklaras, G.B.1    Furnell, S.M.2
  • 33
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
    • Osanaiye, O., Choo, K.K.R., Dlodlo, M., Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J Netw Comput Appl 67 (2016), 147–165.
    • (2016) J Netw Comput Appl , vol.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.K.R.2    Dlodlo, M.3
  • 34
  • 35
    • 85026636505 scopus 로고    scopus 로고
    • From cloud to fog computing: a review and a conceptual live VM migration framework
    • Osanaiye, O., Chen, S., Yan, Z., Lu, R., Choo, K.K.R., Dlodlo, M., From cloud to fog computing: a review and a conceptual live VM migration framework. IEEE Access 5 (2017), 8284–8300.
    • (2017) IEEE Access , vol.5 , pp. 8284-8300
    • Osanaiye, O.1    Chen, S.2    Yan, Z.3    Lu, R.4    Choo, K.K.R.5    Dlodlo, M.6
  • 36
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: a systematic review
    • Patel, A., Taghavi, M., Bakhtiyari, K., Celestino Júnior, J., An intrusion detection and prevention system in cloud computing: a systematic review. J Netw Comput Appl 36:1 (2013), 25–41.
    • (2013) J Netw Comput Appl , vol.36 , Issue.1 , pp. 25-41
    • Patel, A.1    Taghavi, M.2    Bakhtiyari, K.3    Celestino Júnior, J.4
  • 37
    • 84978971732 scopus 로고    scopus 로고
    • User profiling in intrusion detection: a review
    • Peng, J., Choo, K.-K.R., Ashman, H., User profiling in intrusion detection: a review. J Netw Comput Appl 72 (2016), 14–27.
    • (2016) J Netw Comput Appl , vol.72 , pp. 14-27
    • Peng, J.1    Choo, K.-K.R.2    Ashman, H.3
  • 38
  • 40
    • 85042492630 scopus 로고    scopus 로고
    • Key findings from the 2013 US state of cyber-crime survey
    • Available from Online (Accessed 13 February 2017)
    • PriceWaterHouse Coopers L.L.C., Key findings from the 2013 US state of cyber-crime survey. Tech Rep NAVTRADEVCEN, 2013 Available from https://www.pwc.com/en_US/us/increasing-iteffectiveness/publications/assets/us-state-of-cybercrime Online. (Accessed 13 February 2017)
    • (2013) Tech Rep NAVTRADEVCEN
    • PriceWaterHouse Coopers L.L.C.1
  • 42
    • 84963877054 scopus 로고    scopus 로고
    • Context-oriented web application protection model
    • Prokhorenko, V., Choo, K.K.R., Ashman, H., Context-oriented web application protection model. Appl Math Comput 285 (2016), 59–78.
    • (2016) Appl Math Comput , vol.285 , pp. 59-78
    • Prokhorenko, V.1    Choo, K.K.R.2    Ashman, H.3
  • 43
    • 84979928325 scopus 로고    scopus 로고
    • Intent-based extensible real-time PHP supervision framework
    • Prokhorenko, V., Choo, K.K.R., Ashman, H., Intent-based extensible real-time PHP supervision framework. IEEE Trans Inf Foren Secur 11:10 (2016), 2215–2226.
    • (2016) IEEE Trans Inf Foren Secur , vol.11 , Issue.10 , pp. 2215-2226
    • Prokhorenko, V.1    Choo, K.K.R.2    Ashman, H.3
  • 44
    • 84951790264 scopus 로고    scopus 로고
    • Web application protection techniques: a taxonomy
    • Prokhorenko, V., Choo, K.K.R., Ashman, H., Web application protection techniques: a taxonomy. J Netw Comput Appl 60 (2016), 95–112.
    • (2016) J Netw Comput Appl , vol.60 , pp. 95-112
    • Prokhorenko, V.1    Choo, K.K.R.2    Ashman, H.3
  • 45
    • 85042496047 scopus 로고    scopus 로고
    • Pytbull
    • [Online]; Available from (Accessed 20 August 2017)
    • Pytbull. [Online]; Available from http://pytbull.sourceforge.net, 2017. (Accessed 20 August 2017)
    • (2017)
  • 47
    • 84882794354 scopus 로고    scopus 로고
    • A survey of insider attack detection research
    • Springer US Boston (MA)
    • Salem, M.M.B., Hershkop, S., Stolfo, S.J.S., A survey of insider attack detection research. Advances in information security, vol. 39, 2008, Springer US, Boston (MA), 69–90.
    • (2008) Advances in information security , vol.39 , pp. 69-90
    • Salem, M.M.B.1    Hershkop, S.2    Stolfo, S.J.S.3
  • 48
    • 67649867487 scopus 로고    scopus 로고
    • An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks
    • Sardana, A., Joshi, R., An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks. Comput Commun 32:12 (2009), 1384–1399.
    • (2009) Comput Commun , vol.32 , Issue.12 , pp. 1384-1399
    • Sardana, A.1    Joshi, R.2
  • 49
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E.E., A framework for understanding and predicting insider attacks. Comput Secur 21:6 (2002), 526–531.
    • (2002) Comput Secur , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 50
    • 85039931018 scopus 로고    scopus 로고
    • Snort Network Intrusion Detection and Prevention System
    • [Online]; Available from (Accessed 20 August 2017)
    • Snort Network Intrusion Detection and Prevention System. [Online]; Available from https://www.snort.org, 2017. (Accessed 20 August 2017)
    • (2017)
  • 53
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • Theoharidou, M., Kokolakis, S., Karyda, M., Kiountouzis, E., The insider threat to information systems and the effectiveness of ISO17799. Comput Secur 24:6 (2005), 472–484.
    • (2005) Comput Secur , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1    Kokolakis, S.2    Karyda, M.3    Kiountouzis, E.4
  • 54
    • 31044441059 scopus 로고    scopus 로고
    • A tutorial on Markov models based on Mendel's classical experiments
    • Thorvaldsen, S., A tutorial on Markov models based on Mendel's classical experiments. J Bioinform Comput Biol 3:6 (2005), 1441–1460.
    • (2005) J Bioinform Comput Biol , vol.3 , Issue.6 , pp. 1441-1460
    • Thorvaldsen, S.1
  • 55
    • 67650170305 scopus 로고    scopus 로고
    • Behavioral and policy issues in information systems security: the insider threat
    • Warkentin, M., Willison, R., Behavioral and policy issues in information systems security: the insider threat. Eur J Inf Syst 18:2 (2009), 101–105.
    • (2009) Eur J Inf Syst , vol.18 , Issue.2 , pp. 101-105
    • Warkentin, M.1    Willison, R.2
  • 57
    • 84940604877 scopus 로고    scopus 로고
    • Xen-based virtual honeypot system for smart device
    • Zhang, W., He, H., Kim, T.H., Xen-based virtual honeypot system for smart device. Multimed Tools Appl 74:19 (2015), 8541–8558.
    • (2015) Multimed Tools Appl , vol.74 , Issue.19 , pp. 8541-8558
    • Zhang, W.1    He, H.2    Kim, T.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.