DocumentCode
3319965
Title
Attack Detection for Resource-Constrained Network Devices
Author
Lu, H. Karen
Author_Institution
Technol. & Innovation, Gemalto, Inc., Austin, TX
fYear
2008
fDate
13-18 April 2008
Firstpage
351
Lastpage
356
Abstract
Many small devices are capable of connecting to the Internet now. The trend of pervasive computing and networking is going strong. At the same time, security threats on the Internet continue to increase. Existing defense mechanisms against network-based attacks can hardly apply to small network devices due to limitations of their computing resources. This paper presents a method to mitigate this problem. The approach embeds the attack detection mechanism inside the device´s network module. It focuses on the operational behavior of the module to identify abnormal events. The mechanism does not compete for resources with the main function of the device. It has little impact on the system performance. Furthermore, the method may detect unknown attacks.
Keywords
Internet; telecommunication security; ubiquitous computing; Internet; attack detection; defense mechanism; pervasive computing; resource-constrained network device; security threat; Computer crime; Computer networks; IP networks; Intrusion detection; Network servers; Protection; Smart cards; System performance; Web and internet services; Web server; Security token; attack detection; embedded systems;
fLanguage
English
Publisher
ieee
Conference_Titel
Systems, 2008. ICONS 08. Third International Conference on
Conference_Location
Cancun
Print_ISBN
978-0-7695-3105-2
Electronic_ISBN
978-0-7695-3105-2
Type
conf
DOI
10.1109/ICONS.2008.32
Filename
4497149
Link To Document