Filters








18 Hits in 0.64 sec

Secure sensor networks for perimeter protection

Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston
2003 Computer Networks  
Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of
more » ... the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.
doi:10.1016/s1389-1286(03)00352-9 fatcat:upy4k4p3xndtlhughkinas3r3m

Using DAMLOIL to classify intrusive behaviours

JEFFREY UNDERCOFFER, ANUPAM JOSHI, TIM FININ, JOHN PINKSTON
2003 Knowledge engineering review (Print)  
We present such a communications infrastructure in Undercoffer et al. (2003) .  ...  Target-centric ontology: attributes of the class intrusion In constructing our ontology, we conducted an empirical analysis (Undercoffer & Pinkston, 2002) of the features and attributes, and their interrelationships  ... 
doi:10.1017/s0269888904000049 fatcat:u6atmhurdfbwbe3zrnkilcgxtq

Modeling Computer Attacks: An Ontology for Intrusion Detection [chapter]

Jeffrey Undercoffer, Anupam Joshi, John Pinkston
2003 Lecture Notes in Computer Science  
We state the benefits of transitioning from taxonomies to ontologies and ontology specification languages, which are able to simultaneously serve as recognition, reporting and correlation languages. We have produced an ontology specifying a model of computer attack using the DARPA Agent Markup Lan-guage+Ontology Inference Layer, a descriptive logic language. The ontology's logic is implemented using DAMLJessKB. We compare and contrast the IETF's IDMEF, an emerging standard that uses XML to
more » ... e its data model, with a data model constructed using DAML+OIL. In our research we focus on low level kernel attributes at the process, system and network levels, to serve as those taxonomic characteristics. We illustrate the benefits of utilizing an ontology by presenting use case scenarios within a distributed intrusion detection system.
doi:10.1007/978-3-540-45248-5_7 fatcat:wdg3bgzetjbkfahxqqzsqlqvau

On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study [article]

Anupam Joshi, Jeffrey Undercoffer, University, My, University, My
2003
We examine the intersection of data mining and semantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an application of distributed data mining. We have produced an ontology specifying a model of computer attacks. Our model is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strategies using data derived from CERT/CC advisories and NIST's ICAT
more » ... se. We present our attack model first as a taxonomy and convert it to a target-centric ontology that will be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies for the classification of computer attacks and intrusions, in favor of ontologies. We illustrate the benefits of utilizing an ontology by comparing a use case scenario of our ontology and the IETF's Intrusion Detection Exchange Message Format Data Model.
doi:10.13016/m2pr7mz41 fatcat:ejg5bmj67nbp7famfjpg4koc74

SHOMAR: An Open Architecture for Distributed Intrusion Detection Services [article]

Jeffrey Undercoffer, Filip Perich, Charles Nicholas, Maryland Shared Open Access Repository, Maryland Shared Open Access Repository
2019
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion detection. Current research indicates that a distributed intrusion detection paradigm may afford greater coverage, consequently providing an increase in security. In some cases, DIDS offer an alternative to centralized analysis, consequently improving scalabity. SHOMAR, the distributed architecture presented in this paper, provides an open framework that enables secure access to heterogeneous software
more » ... d hardware components of a distributed intrusion detection system. SHOMAR is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. This framework supports a broad spectrum of approaches, ranging from hierarchical to peer-to-peer. The system topology and rules governing access to intrusion detection services is based solely upon policy, which is enforced through the use of a capability manager. The protoype system uses Java. The Extensible Markup Language is the sole medium for data exchange between intrusion detection components. SHOMAR provides a distributed service infrastructure independent of the underlying communications network.
doi:10.13016/m2oqx6-ad6q fatcat:u6ijy3yuzjchdf4w6ezdd3etga

Page 96 of IEEE Transactions on Computers Vol. 52, Issue 1 [page]

2003 IEEE Transactions on Computers  
Peter Turner Wen-Guey Tzeng U Jeffrey Undercoffer Shambhu Upadhyaya Nikolaos Uzunoglu V Vara Varavithya Peter Varman Andreas Veneris Srikanth Venkataraman Narayanan Vijaykrishnan Frédéric Vivien Viadimir  ... 

A Secure Infrastructure for Service Discovery and Access in Pervasive Computing [article]

Jeffrey Undercoffer, Filip Perich, Andrej Cedilnik, Lalana Kagal, Anupam Joshi, Maryland Shared Open Access Repository, Maryland Shared Open Access Repository
2018
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Key
more » ... that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certi cates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad-hoc.
doi:10.13016/m2cele-q69y fatcat:vu42y7uhyjaxrhniifuy2qkht4

2002 reviewers list

2003 IEEE transactions on computers  
Tse Chau-Wen Tseng Nobuo Tsuda Jon Turner Peter Turner Wen-Guey Tzeng U Jeffrey Undercoffer Shambhu Upadhyaya Nikolaos Uzunoglu V Vara Varavithya Peter Varman Andreas Veneris Srikanth Venkataraman Narayanan  ... 
doi:10.1109/tc.2003.1159756 fatcat:pov4eg3d2bgd7jkcvfkm6fqcpm

MONI: Mobile Agents Ontology based for Network Intrusions Management

Thomas Ndie Djotio, Claude Tangha, Florette Ngangue Tchangoue, Bernabe Batchakui
2008 International Journal of Advanced Media and Communication  
Le modèle d'ontologie peut être centré sur la cible, comme celui proposé par jeffrey Undercoffer & al.  ...  Modèle d'ontologie centré sur la cible Jeffrey Undercoffer & al soutiennent que les attaques sont regroupés suivant quatre principaux critères : le composant système ciblé, les moyens utilisés pour réaliser  ... 
doi:10.1504/ijamc.2008.020181 fatcat:n5rjqevnmfggvk7e23jyd5vtry

Basic Approaches Of Development Of Data Center Protection Systems
Базові підходи розвитку систем захисту центру центру обробки даних

A. V. Kropachev, Bell Integrator USA Automation Solution Department Manager USA, Colorado, D. O. Zuev, Independent Consultant Lead Arcitect, Network and Cloud USA, Colorado
2018 Naukovì dopovìdì Nacìonalʹnogo unìversitetu bìoresursiv ì prirodokoristuvannâ Ukraïni  
Undercoffer, Jeffrey L. Intrusion detection: modeling system state to detect and classify anomalous behaviors. 2004. 3.  ... 
doi:10.31548/dopovidi2018.02.025 fatcat:pqtzjtqlnrbvzjkl6byf6k6fqa

Standardization of all Information Security Management Systems

Afshin Rezakhani, AbdolMajid Hajebi, Nasibe Mohammadi
2011 International Journal of Computer Applications  
It was explained by Jeffrey Undercoffer et al paper copiously [17] .  ... 
doi:10.5120/2307-2592 fatcat:jemrtpmdhncfdldgewjlde6qx4

Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure

Afshin Rezakhani Roozbahani, Leila Rikhtechi
2010 International Journal of Computer Applications  
It was explained by Jeffrey Undercoffer et al paper copiously [10] . For example they showed ontology in Syn Flood Attack is similar to Figure3. Figure3.  ... 
doi:10.5120/760-962 fatcat:jfubmeimp5hk3g4j5cabuh44zu

Toward an Efficient Ontology-Based Event Correlation in SIEM

Tayeb Kenaza, Mahdi Aiash
2016 Procedia Computer Science  
The first research work was done by Jeffrey Undercoffer et al. 17 . They produced an ontology that specify a model of computer attack.  ...  Since the work of Jeffrey many other ontologies was proposed.  ... 
doi:10.1016/j.procs.2016.04.109 fatcat:z2kmm4n5wja75km7qr4jeetffa

Ontology-based distributed intrusion detection system

F. Abdoli, M. Kahani
2009 2009 14th International CSI Computer Conference  
The first research was done by Jeffrey Undercoffer and et al. [1] , [2] . They produced an ontology specifying a model of computer attack.  ... 
doi:10.1109/csicc.2009.5349372 fatcat:tltbqowvjrgjzfhdjgxeobbauq

Security of Wireless Sensor Networks: Current Status and Key Issues [chapter]

Chun-ta Li
2010 Smart Wireless Sensor Networks  
References [1] Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi and John Pinkston, "Secure sensor networks for perimeter protection", Computer Networks, vol. 43, no. 4, pp. 421-435, 2003.  ... 
doi:10.5772/13158 fatcat:ws2madxcabbslnog6zoysvfbd4
« Previous Showing results 1 — 15 out of 18 results