TY - CHAP
T1 - Unwanted Traffic Detection and Control Based on Trust Management
AU - Yan, Zheng
AU - Kantola, Raimo
AU - Zhang, Lifang
AU - Ma, Yutan
PY - 2017/1/1
Y1 - 2017/1/1
N2 - Networks such as the Internet, mobile cellular networks, and self-organized ad hoc networks have dramatically changed our daily life and brought tremendous benefits to us. However, they are also bogged down by unwanted traffic, which is malicious, harmful, or unexpected for its receivers. In order to control the unwanted traffic over the networks, especially the mobile Internet, we propose a generic scheme named TruCon for unwanted traffic detection and control based on trust management in this chapter. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a global trust operator, traffic and behavior analysis at hosts, and traffic observation at network service providers. Thus, the proposed scheme can conduct unwanted traffic detection and control by integrating distributed and centralized functions and supporting both defensive and offensive approaches of unwanted traffic control. We successfully applied the scheme to control SMS spam and unwanted contents in pervasive social networking and implemented it under the infrastructure of software-defined networking (SDN). System implementation and evaluation showed that the scheme is effective with regard to accuracy and efficiency for intrusion detection and unwanted traffic control. It is also robust against a number of internal misleading system attacks, such as hide evidence attack, bad-mouthing attack, and on-off attack, playing in conjunction with traffic intrusions. Meanwhile, the scheme can provide personalized unwanted traffic control based on unwanted traffic detection behaviors.
AB - Networks such as the Internet, mobile cellular networks, and self-organized ad hoc networks have dramatically changed our daily life and brought tremendous benefits to us. However, they are also bogged down by unwanted traffic, which is malicious, harmful, or unexpected for its receivers. In order to control the unwanted traffic over the networks, especially the mobile Internet, we propose a generic scheme named TruCon for unwanted traffic detection and control based on trust management in this chapter. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a global trust operator, traffic and behavior analysis at hosts, and traffic observation at network service providers. Thus, the proposed scheme can conduct unwanted traffic detection and control by integrating distributed and centralized functions and supporting both defensive and offensive approaches of unwanted traffic control. We successfully applied the scheme to control SMS spam and unwanted contents in pervasive social networking and implemented it under the infrastructure of software-defined networking (SDN). System implementation and evaluation showed that the scheme is effective with regard to accuracy and efficiency for intrusion detection and unwanted traffic control. It is also robust against a number of internal misleading system attacks, such as hide evidence attack, bad-mouthing attack, and on-off attack, playing in conjunction with traffic intrusions. Meanwhile, the scheme can provide personalized unwanted traffic control based on unwanted traffic detection behaviors.
UR - http://www.scopus.com/inward/record.url?scp=84992463486&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-44257-0_4
DO - 10.1007/978-3-319-44257-0_4
M3 - Chapter
AN - SCOPUS:84992463486
SN - 978-3-319-44256-3
T3 - Studies in computational intelligence
SP - 77
EP - 109
BT - Information Fusion for Cyber-Security Analytics
A2 - Alsmadi, Izzat M.
A2 - Karabatis, George
A2 - AlEroud, Ahmed
PB - Springer
ER -