A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure sensor networks for perimeter protection
2003
Computer Networks
Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of
doi:10.1016/s1389-1286(03)00352-9
fatcat:upy4k4p3xndtlhughkinas3r3m
more »
... the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.
Using DAMLOIL to classify intrusive behaviours
2003
Knowledge engineering review (Print)
We present such a communications infrastructure in Undercoffer et al. (2003) . ...
Target-centric ontology: attributes of the class intrusion In constructing our ontology, we conducted an empirical analysis (Undercoffer & Pinkston, 2002) of the features and attributes, and their interrelationships ...
doi:10.1017/s0269888904000049
fatcat:u6atmhurdfbwbe3zrnkilcgxtq
Modeling Computer Attacks: An Ontology for Intrusion Detection
[chapter]
2003
Lecture Notes in Computer Science
We state the benefits of transitioning from taxonomies to ontologies and ontology specification languages, which are able to simultaneously serve as recognition, reporting and correlation languages. We have produced an ontology specifying a model of computer attack using the DARPA Agent Markup Lan-guage+Ontology Inference Layer, a descriptive logic language. The ontology's logic is implemented using DAMLJessKB. We compare and contrast the IETF's IDMEF, an emerging standard that uses XML to
doi:10.1007/978-3-540-45248-5_7
fatcat:wdg3bgzetjbkfahxqqzsqlqvau
more »
... e its data model, with a data model constructed using DAML+OIL. In our research we focus on low level kernel attributes at the process, system and network levels, to serve as those taxonomic characteristics. We illustrate the benefits of utilizing an ontology by presenting use case scenarios within a distributed intrusion detection system.
On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study
[article]
2003
We examine the intersection of data mining and semantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an application of distributed data mining. We have produced an ontology specifying a model of computer attacks. Our model is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strategies using data derived from CERT/CC advisories and NIST's ICAT
doi:10.13016/m2pr7mz41
fatcat:ejg5bmj67nbp7famfjpg4koc74
more »
... se. We present our attack model first as a taxonomy and convert it to a target-centric ontology that will be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies for the classification of computer attacks and intrusions, in favor of ontologies. We illustrate the benefits of utilizing an ontology by comparing a use case scenario of our ontology and the IETF's Intrusion Detection Exchange Message Format Data Model.
SHOMAR: An Open Architecture for Distributed Intrusion Detection Services
[article]
2019
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion detection. Current research indicates that a distributed intrusion detection paradigm may afford greater coverage, consequently providing an increase in security. In some cases, DIDS offer an alternative to centralized analysis, consequently improving scalabity. SHOMAR, the distributed architecture presented in this paper, provides an open framework that enables secure access to heterogeneous software
doi:10.13016/m2oqx6-ad6q
fatcat:u6ijy3yuzjchdf4w6ezdd3etga
more »
... d hardware components of a distributed intrusion detection system. SHOMAR is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. This framework supports a broad spectrum of approaches, ranging from hierarchical to peer-to-peer. The system topology and rules governing access to intrusion detection services is based solely upon policy, which is enforced through the use of a capability manager. The protoype system uses Java. The Extensible Markup Language is the sole medium for data exchange between intrusion detection components. SHOMAR provides a distributed service infrastructure independent of the underlying communications network.
Page 96 of IEEE Transactions on Computers Vol. 52, Issue 1
[page]
2003
IEEE Transactions on Computers
Peter Turner Wen-Guey Tzeng
U
Jeffrey Undercoffer Shambhu Upadhyaya Nikolaos Uzunoglu
V
Vara Varavithya
Peter Varman
Andreas Veneris Srikanth Venkataraman Narayanan Vijaykrishnan Frédéric Vivien
Viadimir ...
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing
[article]
2018
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key
doi:10.13016/m2cele-q69y
fatcat:vu42y7uhyjaxrhniifuy2qkht4
more »
... that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certi cates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad-hoc.
2002 reviewers list
2003
IEEE transactions on computers
Tse Chau-Wen Tseng Nobuo Tsuda
Jon Turner
Peter Turner Wen-Guey Tzeng
U
Jeffrey Undercoffer Shambhu Upadhyaya Nikolaos Uzunoglu
V
Vara Varavithya
Peter Varman
Andreas Veneris Srikanth Venkataraman Narayanan ...
doi:10.1109/tc.2003.1159756
fatcat:pov4eg3d2bgd7jkcvfkm6fqcpm
MONI: Mobile Agents Ontology based for Network Intrusions Management
2008
International Journal of Advanced Media and Communication
Le modèle d'ontologie peut être centré sur la cible, comme celui proposé par jeffrey Undercoffer & al. ...
Modèle d'ontologie centré sur la cible Jeffrey Undercoffer & al soutiennent que les attaques sont regroupés suivant quatre principaux critères : le composant système ciblé, les moyens utilisés pour réaliser ...
doi:10.1504/ijamc.2008.020181
fatcat:n5rjqevnmfggvk7e23jyd5vtry
Basic Approaches Of Development Of Data Center Protection Systems
Базові підходи розвитку систем захисту центру центру обробки даних
2018
Naukovì dopovìdì Nacìonalʹnogo unìversitetu bìoresursiv ì prirodokoristuvannâ Ukraïni
Базові підходи розвитку систем захисту центру центру обробки даних
Undercoffer, Jeffrey L. Intrusion detection: modeling system state to detect and classify anomalous behaviors. 2004. 3. ...
doi:10.31548/dopovidi2018.02.025
fatcat:pqtzjtqlnrbvzjkl6byf6k6fqa
Standardization of all Information Security Management Systems
2011
International Journal of Computer Applications
It was explained by Jeffrey Undercoffer et al paper copiously [17] . ...
doi:10.5120/2307-2592
fatcat:jemrtpmdhncfdldgewjlde6qx4
Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure
2010
International Journal of Computer Applications
It was explained by Jeffrey Undercoffer et al paper copiously [10] . For example they showed ontology in Syn Flood Attack is similar to Figure3.
Figure3. ...
doi:10.5120/760-962
fatcat:jfubmeimp5hk3g4j5cabuh44zu
Toward an Efficient Ontology-Based Event Correlation in SIEM
2016
Procedia Computer Science
The first research work was done by Jeffrey Undercoffer et al. 17 . They produced an ontology that specify a model of computer attack. ...
Since the work of Jeffrey many other ontologies was proposed. ...
doi:10.1016/j.procs.2016.04.109
fatcat:z2kmm4n5wja75km7qr4jeetffa
Ontology-based distributed intrusion detection system
2009
2009 14th International CSI Computer Conference
The first research was done by Jeffrey Undercoffer and et al. [1] , [2] . They produced an ontology specifying a model of computer attack. ...
doi:10.1109/csicc.2009.5349372
fatcat:tltbqowvjrgjzfhdjgxeobbauq
Security of Wireless Sensor Networks: Current Status and Key Issues
[chapter]
2010
Smart Wireless Sensor Networks
References [1] Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi and John Pinkston, "Secure sensor networks for perimeter protection", Computer Networks, vol. 43, no. 4, pp. 421-435, 2003. ...
doi:10.5772/13158
fatcat:ws2madxcabbslnog6zoysvfbd4
« Previous
Showing results 1 — 15 out of 18 results