• DocumentCode
    3319965
  • Title

    Attack Detection for Resource-Constrained Network Devices

  • Author

    Lu, H. Karen

  • Author_Institution
    Technol. & Innovation, Gemalto, Inc., Austin, TX
  • fYear
    2008
  • fDate
    13-18 April 2008
  • Firstpage
    351
  • Lastpage
    356
  • Abstract
    Many small devices are capable of connecting to the Internet now. The trend of pervasive computing and networking is going strong. At the same time, security threats on the Internet continue to increase. Existing defense mechanisms against network-based attacks can hardly apply to small network devices due to limitations of their computing resources. This paper presents a method to mitigate this problem. The approach embeds the attack detection mechanism inside the device´s network module. It focuses on the operational behavior of the module to identify abnormal events. The mechanism does not compete for resources with the main function of the device. It has little impact on the system performance. Furthermore, the method may detect unknown attacks.
  • Keywords
    Internet; telecommunication security; ubiquitous computing; Internet; attack detection; defense mechanism; pervasive computing; resource-constrained network device; security threat; Computer crime; Computer networks; IP networks; Intrusion detection; Network servers; Protection; Smart cards; System performance; Web and internet services; Web server; Security token; attack detection; embedded systems;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Systems, 2008. ICONS 08. Third International Conference on
  • Conference_Location
    Cancun
  • Print_ISBN
    978-0-7695-3105-2
  • Electronic_ISBN
    978-0-7695-3105-2
  • Type

    conf

  • DOI
    10.1109/ICONS.2008.32
  • Filename
    4497149