DocumentCode :
3319965
Title :
Attack Detection for Resource-Constrained Network Devices
Author :
Lu, H. Karen
Author_Institution :
Technol. & Innovation, Gemalto, Inc., Austin, TX
fYear :
2008
fDate :
13-18 April 2008
Firstpage :
351
Lastpage :
356
Abstract :
Many small devices are capable of connecting to the Internet now. The trend of pervasive computing and networking is going strong. At the same time, security threats on the Internet continue to increase. Existing defense mechanisms against network-based attacks can hardly apply to small network devices due to limitations of their computing resources. This paper presents a method to mitigate this problem. The approach embeds the attack detection mechanism inside the device´s network module. It focuses on the operational behavior of the module to identify abnormal events. The mechanism does not compete for resources with the main function of the device. It has little impact on the system performance. Furthermore, the method may detect unknown attacks.
Keywords :
Internet; telecommunication security; ubiquitous computing; Internet; attack detection; defense mechanism; pervasive computing; resource-constrained network device; security threat; Computer crime; Computer networks; IP networks; Intrusion detection; Network servers; Protection; Smart cards; System performance; Web and internet services; Web server; Security token; attack detection; embedded systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, 2008. ICONS 08. Third International Conference on
Conference_Location :
Cancun
Print_ISBN :
978-0-7695-3105-2
Electronic_ISBN :
978-0-7695-3105-2
Type :
conf
DOI :
10.1109/ICONS.2008.32
Filename :
4497149
Link To Document :
بازگشت