期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A blockchain future for internet of things security: a position paper 被引量:17
1
作者 Mandrita Banerjee Junghee Lee Kim-Kwang Raymond Choo 《Digital Communications and Networks》 SCIE 2018年第3期149-160,共12页
Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Th... Internet of Things (IoT) devices are increasingly being fotmd in civilian and military contexts, ranging from smart cities and smart grids to Internet-of-Medical-Things, Internet-of-Vehicles, Internet-of-Military-Things, Internet-of- Battlefield-Things, etc. In this paper, we survey articles presenting IoT security solutions published in English since January 2016. We make a nmnber of observations, including the lack of publicly available loT datasets that can be used by the research and practitioner communities. Given the potentially sensitive nature of IoT datasets, there is a need to develop a standard for sharing IoT datasets among the research and practitioner communities and other relevant stakeholders. Thus, we posit the potential for blockehain technology in facilitating secure sharing of IoT datasets (e.g., using blockchain to ensure the integrity of shared datasets) and securing loT systems, before presenting two conceptual blockchain-based approaches. We then conclude this paper with nine potential research questions. 展开更多
关键词 Blockchain Blockchain security collaborative security Internet-of-military things DATASET SELF-HEALING security Intrusion-prevention system Predictive security Predictive security
下载PDF
Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System 被引量:8
2
作者 Zhen Chen Fuye Han +2 位作者 Junwei Cao Xin Jiang Shuo Chen 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第1期40-50,共11页
Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bot... Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets, well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. New emerging botnet attacks degrade the status of Internet security further. To address these problems, a practical collaborative network security management system is proposed with an effective collaborative Unified Threat Management (UTM) and traffic probers. A distributed security overlay network with a centralized security center leverages a peer-to-peer communication protocol used in the UTMs collaborative module and connects them virtually to exchange network events and security rules. Security functions for the UTM are retrofitted to share security rules. In this paper, we propose a design and implementation of a cloud-based security center for network security forensic analysis. We propose using cloud storage to keep collected traffic data and then processing it with cloud computing platforms to find the malicious attacks. As a practical example, phishing attack forensic analysis is presented and the required computing and storage resources are evaluated based on real trace data. The cloud- based security center can instruct each collaborative UTM and prober to collect events and raw traffic, send them back for deep analysis, and generate new security rules. These new security rules are enforced by collaborative UTM and the feedback events of such rules are returned to the security center. By this type of close-loop control, the collaborative network security management system can identify and address new distributed attacks more quickly and effectively. 展开更多
关键词 cloud computing overlay network collaborative network security system computer forensics anti-botnet ANTI-PHISHING hadoop file system EUCALYPTUS amazon web service
原文传递
Collaborative Network Security in Multi-Tenant Data Center for Cloud Computing 被引量:5
3
作者 Zhen Chen Wenyu Dong +3 位作者 Hang Li Peng Zhang Xinming Chen Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第1期82-94,共13页
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile... A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network 展开更多
关键词 data center network network security software defined network collaborative network security multi- tenant network virtualization intelligent flow processing cloud computing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部