메뉴 건너뛰기




Volumn 98, Issue , 2018, Pages 1-26

Trace malicious source to guarantee cyber security for mass monitor critical infrastructure

Author keywords

Cyber forensics; Cyber security; Marking probability; Network lifetime; Traceback; Trust

Indexed keywords

COMPUTER FORENSICS; PROBABILITY;

EID: 85042117068     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2016.09.008     Document Type: Article
Times cited : (50)

References (32)
  • 1
    • 84897913321 scopus 로고    scopus 로고
    • A survey of emerging threats in cybersecurity
    • Jang-Jaccard, J., Nepal, S., A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80:5 (2014), 973–993.
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.5 , pp. 973-993
    • Jang-Jaccard, J.1    Nepal, S.2
  • 2
    • 84928269589 scopus 로고    scopus 로고
    • Improving network intrusion detection system performance through quality of service configuration and parallel technology
    • Bul'ajoul, W., James, A., Pannu, M., Improving network intrusion detection system performance through quality of service configuration and parallel technology. J. Comput. Syst. Sci. 81:6 (2015), 981–999.
    • (2015) J. Comput. Syst. Sci. , vol.81 , Issue.6 , pp. 981-999
    • Bul'ajoul, W.1    James, A.2    Pannu, M.3
  • 3
    • 84899065536 scopus 로고    scopus 로고
    • Scalable RFID security framework and protocol supporting Internet of things
    • Ray, B.R., Abawajy, J., Chowdhury, M., Scalable RFID security framework and protocol supporting Internet of things. Comput. Netw. 67 (2014), 89–103.
    • (2014) Comput. Netw. , vol.67 , pp. 89-103
    • Ray, B.R.1    Abawajy, J.2    Chowdhury, M.3
  • 4
    • 84901426903 scopus 로고    scopus 로고
    • An approach for profiling phishing activities
    • Hamid, I.R.A., Abawajy, J.H., An approach for profiling phishing activities. Comput. Secur. 45 (2014), 27–41.
    • (2014) Comput. Secur. , vol.45 , pp. 27-41
    • Hamid, I.R.A.1    Abawajy, J.H.2
  • 5
    • 84908659382 scopus 로고    scopus 로고
    • Cyber security readiness in the South Australian Government
    • Borgman, B., Mubarak, S., Choo, K.K.R., Cyber security readiness in the South Australian Government. Comput. Stand. Interfaces 37 (2015), 1–8.
    • (2015) Comput. Stand. Interfaces , vol.37 , pp. 1-8
    • Borgman, B.1    Mubarak, S.2    Choo, K.K.R.3
  • 6
    • 84924180739 scopus 로고    scopus 로고
    • An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting
    • Junghyun, N.A.M., Choo, K.K.R., Juryon, P., Dongho, W., An offline dictionary attack against Abdalla and Pointcheval's key exchange in the password-only three-party setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98:1 (2015), 424–427.
    • (2015) IEICE Trans. Fundam. Electron. Commun. Comput. Sci. , vol.98 , Issue.1 , pp. 424-427
    • Junghyun, N.A.M.1    Choo, K.K.R.2    Juryon, P.3    Dongho, W.4
  • 7
    • 85013182473 scopus 로고    scopus 로고
    • Improvement the quality of mobile target detection through portion of node with fully duty cycle in WSNs
    • 2016
    • Hu, Y., Liu, A., Improvement the quality of mobile target detection through portion of node with fully duty cycle in WSNs. Comput. Syst. Sci. Eng. 31:1 (2016), 5–17 2016.
    • (2016) Comput. Syst. Sci. Eng. , vol.31 , Issue.1 , pp. 5-17
    • Hu, Y.1    Liu, A.2
  • 8
    • 84978943536 scopus 로고    scopus 로고
    • ActiveTrust: secure and trustable routing in wireless sensor networks
    • 2016
    • Liu, Y., Dong, M., Ota, K., Liu, A., ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 11:9 (2016), 2013–2027, 10.1109/TIFS.2016.2570740 2016.
    • (2016) IEEE Trans. Inf. Forensics Secur. , vol.11 , Issue.9 , pp. 2013-2027
    • Liu, Y.1    Dong, M.2    Ota, K.3    Liu, A.4
  • 9
    • 84894416535 scopus 로고    scopus 로고
    • A practical approach for provenance transmission in wireless sensor networks
    • Alam, S.M., Fahmy, S., A practical approach for provenance transmission in wireless sensor networks. Ad Hoc Netw. 16 (2014), 28–45.
    • (2014) Ad Hoc Netw. , vol.16 , pp. 28-45
    • Alam, S.M.1    Fahmy, S.2
  • 10
    • 57049151883 scopus 로고    scopus 로고
    • A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks
    • Cheng, B.C., Chen, H., Li, Y.J., et al. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks. Comput. Commun. 31:18 (2008), 4352–4359.
    • (2008) Comput. Commun. , vol.31 , Issue.18 , pp. 4352-4359
    • Cheng, B.C.1    Chen, H.2    Li, Y.J.3
  • 11
    • 84857360648 scopus 로고    scopus 로고
    • Hop-by-hop traceback in wireless sensor networks
    • Siddiqui, M.S., Obaid Amin, S., Hong, C.S., Hop-by-hop traceback in wireless sensor networks. IEEE Commun. Lett. 16:2 (2012), 242–245.
    • (2012) IEEE Commun. Lett. , vol.16 , Issue.2 , pp. 242-245
    • Siddiqui, M.S.1    Obaid Amin, S.2    Hong, C.S.3
  • 12
    • 79961173989 scopus 로고    scopus 로고
    • Traceback in wireless sensor networks with packet marking and logging
    • Xu, J., Zhou, X., Yang, F., Traceback in wireless sensor networks with packet marking and logging. Front. Comput. Sci. China 5:3 (2011), 308–315.
    • (2011) Front. Comput. Sci. China , vol.5 , Issue.3 , pp. 308-315
    • Xu, J.1    Zhou, X.2    Yang, F.3
  • 13
    • 84902949347 scopus 로고    scopus 로고
    • Mobile target detection in wireless sensor networks with adjustable sensing frequency
    • Hu, Y., Mian, X., Ota, K., Liu, A., Guo, M., Mobile target detection in wireless sensor networks with adjustable sensing frequency. IEEE Syst. J., 2014, 10.1109/JSYST.2014.2308391.
    • (2014) IEEE Syst. J.
    • Hu, Y.1    Mian, X.2    Ota, K.3    Liu, A.4    Guo, M.5
  • 14
    • 33745684710 scopus 로고    scopus 로고
    • An efficient distributed algorithm to identify and traceback DDos traffic
    • Wong, T.Y., Law, K.T., Lui, J.C.S., et al. An efficient distributed algorithm to identify and traceback DDos traffic. Comput. J. 49:4 (2006), 418–442.
    • (2006) Comput. J. , vol.49 , Issue.4 , pp. 418-442
    • Wong, T.Y.1    Law, K.T.2    Lui, J.C.S.3
  • 15
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework
    • Osanaiye, O., Choo, K.K.R., Dlodlo, M., Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67 (2016), 147–165, 10.1016/j.jnca.2016.01.001.
    • (2016) J. Netw. Comput. Appl. , vol.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.K.R.2    Dlodlo, M.3
  • 16
    • 84928914432 scopus 로고    scopus 로고
    • Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation
    • Nam, J., Choo, K.K.R., Han, S., Kim, M., Paik, J., Won, D., Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation. PLoS ONE, 2015, 10.1371/journal.pone.011670910.
    • (2015) PLoS ONE
    • Nam, J.1    Choo, K.K.R.2    Han, S.3    Kim, M.4    Paik, J.5    Won, D.6
  • 17
    • 84893008558 scopus 로고    scopus 로고
    • An IP traceback protocol using a compressed hash table, a sinkhole router and data mining based on network forensics against network attacks
    • Jeong, E.H., Lee, B.K., An IP traceback protocol using a compressed hash table, a sinkhole router and data mining based on network forensics against network attacks. Future Gener. Comput. Syst. 33 (2014), 42–52.
    • (2014) Future Gener. Comput. Syst. , vol.33 , pp. 42-52
    • Jeong, E.H.1    Lee, B.K.2
  • 18
    • 84900613991 scopus 로고    scopus 로고
    • ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters
    • Saurabh, S., Sairam, A.S., ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. Comput. Commun. 42 (2014), 60–69.
    • (2014) Comput. Commun. , vol.42 , pp. 60-69
    • Saurabh, S.1    Sairam, A.S.2
  • 19
    • 84893112536 scopus 로고    scopus 로고
    • A novel path-based approach for single-packet IP traceback
    • Lu, N., Wang, Y., Su, S., et al. A novel path-based approach for single-packet IP traceback. Secur. Commun. Netw. 7:2 (2014), 309–321.
    • (2014) Secur. Commun. Netw. , vol.7 , Issue.2 , pp. 309-321
    • Lu, N.1    Wang, Y.2    Su, S.3
  • 21
    • 84958025843 scopus 로고    scopus 로고
    • Survey on key revocation mechanisms in wireless sensor networks
    • Ge, M., Choo, K.K.R., Wu, H., Yu, Y., Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63 (2016), 24–38.
    • (2016) J. Netw. Comput. Appl. , vol.63 , pp. 24-38
    • Ge, M.1    Choo, K.K.R.2    Wu, H.3    Yu, Y.4
  • 22
    • 3142749817 scopus 로고    scopus 로고
    • Probabilistic packet marking with non-preemptive compensation
    • Tseng, Y., Chen, H., Hsieh, W., Probabilistic packet marking with non-preemptive compensation. IEEE Commun. Lett. 8:6 (2004), 359–361.
    • (2004) IEEE Commun. Lett. , vol.8 , Issue.6 , pp. 359-361
    • Tseng, Y.1    Chen, H.2    Hsieh, W.3
  • 23
    • 84952311701 scopus 로고    scopus 로고
    • Accurate and efficient object tracking based on passive RFID
    • Yang, L., Cao, J., Zhu, W., et al. Accurate and efficient object tracking based on passive RFID. IEEE Trans. Mob. Comput. 14:11 (2015), 2188–2200.
    • (2015) IEEE Trans. Mob. Comput. , vol.14 , Issue.11 , pp. 2188-2200
    • Yang, L.1    Cao, J.2    Zhu, W.3
  • 24
    • 84925063940 scopus 로고    scopus 로고
    • An incentive game based evolutionary model for crowd sensing networks
    • Liu, X., Ota, K., Liu, A., Chen, Z., An incentive game based evolutionary model for crowd sensing networks. Peer-to-Peer Netw. Appl. 9:4 (2016), 692–711, 10.1007/s12083-015-0342-2.
    • (2016) Peer-to-Peer Netw. Appl. , vol.9 , Issue.4 , pp. 692-711
    • Liu, X.1    Ota, K.2    Liu, A.3    Chen, Z.4
  • 25
    • 84963804113 scopus 로고    scopus 로고
    • Service pricing decision in cyber-physical systems: insights from game theory
    • Liu, X., Dong, M., Ota, K., Hung, P., Liu, A., Service pricing decision in cyber-physical systems: insights from game theory. IEEE Trans. Serv. Comput. 9:2 (2016), 186–198, 10.1109/TSC.2015.2449314.
    • (2016) IEEE Trans. Serv. Comput. , vol.9 , Issue.2 , pp. 186-198
    • Liu, X.1    Dong, M.2    Ota, K.3    Hung, P.4    Liu, A.5
  • 26
    • 84921327888 scopus 로고    scopus 로고
    • Quality of energy provisioning for wireless power transfer
    • Dai, H., Chen, G., Wang, C., et al. Quality of energy provisioning for wireless power transfer. IEEE Trans. Parallel Distrib. Syst. 26:2 (2015), 527–537.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.2 , pp. 527-537
    • Dai, H.1    Chen, G.2    Wang, C.3
  • 27
    • 84964414645 scopus 로고    scopus 로고
    • LSCD: a low storage clone detecting protocol for cyber-physical systems
    • Dong, M., Ota, K., Yang, L.T., et al. LSCD: a low storage clone detecting protocol for cyber-physical systems. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 35:5 (2016), 712–723, 10.1109/TCAD.2016.2539327.
    • (2016) IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. , vol.35 , Issue.5 , pp. 712-723
    • Dong, M.1    Ota, K.2    Yang, L.T.3
  • 30
    • 0000135667 scopus 로고
    • Logarithmic normal distribution for description of sieved forage materials
    • Waldo, D.R., Smith, L.W., Cox, E.L., et al. Logarithmic normal distribution for description of sieved forage materials. J. Dairy Sci. 54:10 (1971), 1465–1469.
    • (1971) J. Dairy Sci. , vol.54 , Issue.10 , pp. 1465-1469
    • Waldo, D.R.1    Smith, L.W.2    Cox, E.L.3
  • 31
    • 84891933258 scopus 로고    scopus 로고
    • Management and applications of trust in wireless sensor networks: a survey
    • Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C., Management and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. 80:3 (2014), 602–617.
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.3 , pp. 602-617
    • Han, G.1    Jiang, J.2    Shu, L.3    Niu, J.4    Chao, H.C.5
  • 32
    • 84978056011 scopus 로고    scopus 로고
    • A comprehensive analysis for fair probability marking based traceback approach in WSNs
    • Liu, A., Liu, X., Liu, Y., A comprehensive analysis for fair probability marking based traceback approach in WSNs. Secur. Commun. Netw., 2016, 10.1002/sec.1515.
    • (2016) Secur. Commun. Netw.
    • Liu, A.1    Liu, X.2    Liu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.