Skip to main content
Top

2016 | OriginalPaper | Chapter

The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring

Authors : Ilya Lebedev, Irina Krivtsova, Viktoria Korzhuk, Nurzhan Bazhayev, Mikhail Sukhoparov, Sergey Pecherkin, Kseniya Salakhutdinova

Published in: Internet of Things, Smart Spaces, and Next Generation Networks and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The wireless network of low-power devices of Smart home and Internet of Things is considered. The signs of unauthorized access are defined. The analysis of the characteristics of systems based on wireless technologies obtained from the experiment results of passive monitoring and active polling of device forming the network infrastructure is conducted. The state-analyzing model based on the identity, quantity, frequency and temporal characteristics is presented. Evaluation of the information security state is focused on analyzing of the system normal functioning profile excluding the search of signatures and characteristics of anomalies under different kinds of attacks. The accumulation of data for decision-making is carried out by comparison of the statistical information of service message from the terminal nodes in passive and active modes. The proposed model can be used to determine the technical characteristics of the devices of wireless ad-hoc networks and to make recommendations concerning the information security state analysis.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications. MDPI Sens. 14(2), 2732–2755 (2014)CrossRef Kumar, P., Ylianttila, M., Gurtov, A., Lee, S.-G., Lee, H.-J.: An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor networks-based applications. MDPI Sens. 14(2), 2732–2755 (2014)CrossRef
2.
go back to reference Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, M.: Multi agent simulation using discrete event and soft-computing methodologies. Proc. IEEE Int. Conf. Syst. Man Cybern. 2, 1711–1716 (2003) Sridhar, P., Sheikh-Bahaei, S., Xia, S., Jamshidi, M.: Multi agent simulation using discrete event and soft-computing methodologies. Proc. IEEE Int. Conf. Syst. Man Cybern. 2, 1711–1716 (2003)
3.
go back to reference Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-agent Systems (SASEMAS 2004), pp. 85–101 (2004) Page, J., Zaslavsky, A., Indrawan, M.: Countering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proceedings of the First International Workshop on Safety and Security in Multi-agent Systems (SASEMAS 2004), pp. 85–101 (2004)
4.
go back to reference Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and reputation mechanisms for multi-agent robotic systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 106–120. Springer, Heidelberg (2014) Zikratov, I.A., Lebedev, I.S., Gurtov, A.V.: Trust and reputation mechanisms for multi-agent robotic systems. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 106–120. Springer, Heidelberg (2014)
5.
go back to reference Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), 80–86 (2013). Art. no. 6504448CrossRef Wyglinski, A.M., Huang, X., Padir, T., Lai, L., Eisenbarth, T.R., Venkatasubramanian, K.: Security of autonomous systems employing embedded computing and sensors. IEEE Micro 33(1), 80–86 (2013). Art. no. 6504448CrossRef
6.
go back to reference Lebedev, I., Korzhuk, V.: The monitoring of information security of remote devices of wireless networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2015. LNCS, vol. 9247, pp. 3–10. Springer, Heidelberg (2015)CrossRef Lebedev, I., Korzhuk, V.: The monitoring of information security of remote devices of wireless networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2015. LNCS, vol. 9247, pp. 3–10. Springer, Heidelberg (2015)CrossRef
7.
go back to reference Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash equilibrium and Marcov chains to enhance game theoretic approach for VANET security. In: Kumar, M.A., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191–199. Springer, Heidelberg (2013)CrossRef Prabhakar, M., Singh, J.N., Mahadevan, G.: Nash equilibrium and Marcov chains to enhance game theoretic approach for VANET security. In: Kumar, M.A., Selvarani, R., Kumar, T.V.S. (eds.) Proceedings of ICAdC. AISC, vol. 174, pp. 191–199. Springer, Heidelberg (2013)CrossRef
8.
go back to reference Bazhayev, N., Lebedev, I., Korzhuk, V., Zikratov, I.: Monitoring of the information security of wireless remote devices. In: 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings 7338553, pp. 233–236 (2015) Bazhayev, N., Lebedev, I., Korzhuk, V., Zikratov, I.: Monitoring of the information security of wireless remote devices. In: 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings 7338553, pp. 233–236 (2015)
9.
go back to reference Nikolaevskiy, I., Lukyanenko, A., Polishchuk, T., Polishchuk, V.M., Gurtov, A.V.: isBF: scalable in-packet bloom filter based multicast. Comput. Commun. 70, 79–85 (2015)CrossRef Nikolaevskiy, I., Lukyanenko, A., Polishchuk, T., Polishchuk, V.M., Gurtov, A.V.: isBF: scalable in-packet bloom filter based multicast. Comput. Commun. 70, 79–85 (2015)CrossRef
10.
go back to reference Al-Naggar, Y., Koucheryavy, A.: Fuzzy logic and Voronoi diagram using for cluster head selection in ubiquitous sensor networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 319–330. Springer, Heidelberg (2014) Al-Naggar, Y., Koucheryavy, A.: Fuzzy logic and Voronoi diagram using for cluster head selection in ubiquitous sensor networks. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2014. LNCS, vol. 8638, pp. 319–330. Springer, Heidelberg (2014)
11.
go back to reference Chehri, A., Hussein, T.: Moutah survivable and scalable wireless solution for e-health and emergency applications. In: Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care, EICS4MED 2011, Pisa, Italy, pp. 25–29 (2011) Chehri, A., Hussein, T.: Moutah survivable and scalable wireless solution for e-health and emergency applications. In: Proceedings of the 1st International Workshop on Engineering Interactive Computing Systems for Medicine and Health Care, EICS4MED 2011, Pisa, Italy, pp. 25–29 (2011)
Metadata
Title
The Analysis of Abnormal Behavior of the System Local Segment on the Basis of Statistical Data Obtained from the Network Infrastructure Monitoring
Authors
Ilya Lebedev
Irina Krivtsova
Viktoria Korzhuk
Nurzhan Bazhayev
Mikhail Sukhoparov
Sergey Pecherkin
Kseniya Salakhutdinova
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-46301-8_42

Premium Partner