Unwanted Traffic Detection and Control Based on Trust Management

Zheng Yan*, Raimo Kantola, Lifang Zhang, Yutan Ma

*Tämän työn vastaava kirjoittaja

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussaChapterScientificvertaisarvioitu

1 Sitaatiot (Scopus)

Abstrakti

Networks such as the Internet, mobile cellular networks, and self-organized ad hoc networks have dramatically changed our daily life and brought tremendous benefits to us. However, they are also bogged down by unwanted traffic, which is malicious, harmful, or unexpected for its receivers. In order to control the unwanted traffic over the networks, especially the mobile Internet, we propose a generic scheme named TruCon for unwanted traffic detection and control based on trust management in this chapter. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a global trust operator, traffic and behavior analysis at hosts, and traffic observation at network service providers. Thus, the proposed scheme can conduct unwanted traffic detection and control by integrating distributed and centralized functions and supporting both defensive and offensive approaches of unwanted traffic control. We successfully applied the scheme to control SMS spam and unwanted contents in pervasive social networking and implemented it under the infrastructure of software-defined networking (SDN). System implementation and evaluation showed that the scheme is effective with regard to accuracy and efficiency for intrusion detection and unwanted traffic control. It is also robust against a number of internal misleading system attacks, such as hide evidence attack, bad-mouthing attack, and on-off attack, playing in conjunction with traffic intrusions. Meanwhile, the scheme can provide personalized unwanted traffic control based on unwanted traffic detection behaviors.

AlkuperäiskieliEnglanti
OtsikkoInformation Fusion for Cyber-Security Analytics
ToimittajatIzzat M. Alsmadi, George Karabatis, Ahmed AlEroud
Sivut77-109
Sivumäärä33
ISBN (elektroninen)978-3-319-44257-0
DOI - pysyväislinkit
TilaJulkaistu - 1 tammikuuta 2017
OKM-julkaisutyyppiA3 Kirjan osa tai toinen tutkimuskirja

Julkaisusarja

NimiStudies in computational intelligence
KustantajaSpringer
Vuosikerta691
ISSN (painettu)1860-949X

Sormenjälki

Sukella tutkimusaiheisiin 'Unwanted Traffic Detection and Control Based on Trust Management'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä