Abstract
In this paper we introduce the detection details and experimental results of our proposed Service-oriented and User-centric Intrusion Detection System (SUIDS). SUIDS is designed for ubiquitous computing environments like a smart home/office. It adopts a novel auditing mechanism and flexible system architecture to meet the special requirements of ubiquitous networks. Specifically, the paper shows how a string-based method is used in a user profile to represent the user’s short-term behavior in due course; and how an appropriate string length and threshold value are determined in order to balance the system’s false alarm rate and detection effectiveness. As a result, SUIDS achieve real-time intrusion detection in ubiquitous networks with a lightweight and adaptable detection model.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Weiser, M.: The computer for the 21st century. Scientific American (International Edition) 265(3), 66–75 (1991)
Stajano, F.: Security for ubiquitous computing. Wiley, Chichester (2002) ISBN 0470844930
Thompson, H., Whittaker, J., Andrews, M.: Intrusion detection: perspectives on the insider threat. Computer Fraud & Security, 13–15 (Janaury 2004)
Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Annales des Telecommunications 55(7-5), 361–378 (2000)
Zhou, B., Shi, Q., Merabti, M.: A framework for intrusion detection in heterogeneous environments. In: Proceedings of 3rd IEEE Consumer Communications and Networking Conference (CCNC 2006), Las Vegas, Nevada, USA, Janaury 2006, vol. 2, pp. 1244–1248 (2006)
Zhou, B., Shi, Q., Merabti, M.: A novel service-oriented and user-centric intrusion detection system for ubiquitous networks. In: Proceedings of IASTED International Conference on Communication, Network and Information Security (CNIS 2005), Phoenix, Arizona, USA, November 2005, pp. 76–81 (2005)
Du, Y., Wang, H., Pang, Y.: Design of a distributed intrusion detection system based on independent agents. In: IEEE Proceedings of International Conference on Intelligent Sensing and Information Processing, pp. 254–257 (2004)
Northcutt, S., Novak, J.: Network intrusion detection (New Riders Pub, (2002) c2003) ISBN: 0735712654
Marks, D., Mell, P., Stinson, M.: Optimizing the scalability of network intrusion detection system using mobile agents. Journal of Network and Systems Management 12(1), 95–110 (2004)
Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P., Javitz, H., Valdes, A., Garvey, T.: A real-time intrusion detection expert system (IDES) - final technical report. Computer Science Laboratory, SRI International, Menlo Park, Califomia (February 1992)
Zhang, Z., Manikopoulos, C., Jorgenson, J.: Architecture of generalized network service anomaly and fault thresholds. In: MMNS 2001, pp. 241–255 (2001)
GTNetS homepage, http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/
Royer, E., Toh, C.-K.: A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks. IEEE Pers. Commun., 46–55 (April 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhou, B., Shi, Q., Merabti, M. (2006). Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_38
Download citation
DOI: https://doi.org/10.1007/11751632_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)