A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful ofdoi:10.1016/s1389-1286(03)00352-9 fatcat:upy4k4p3xndtlhughkinas3r3m
more »... the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.
We present such a communications infrastructure in Undercoffer et al. (2003) . ... Target-centric ontology: attributes of the class intrusion In constructing our ontology, we conducted an empirical analysis (Undercoffer & Pinkston, 2002) of the features and attributes, and their interrelationships ...doi:10.1017/s0269888904000049 fatcat:u6atmhurdfbwbe3zrnkilcgxtq
Lecture Notes in Computer Science
We state the benefits of transitioning from taxonomies to ontologies and ontology specification languages, which are able to simultaneously serve as recognition, reporting and correlation languages. We have produced an ontology specifying a model of computer attack using the DARPA Agent Markup Lan-guage+Ontology Inference Layer, a descriptive logic language. The ontology's logic is implemented using DAMLJessKB. We compare and contrast the IETF's IDMEF, an emerging standard that uses XML todoi:10.1007/978-3-540-45248-5_7 fatcat:wdg3bgzetjbkfahxqqzsqlqvau
more »... e its data model, with a data model constructed using DAML+OIL. In our research we focus on low level kernel attributes at the process, system and network levels, to serve as those taxonomic characteristics. We illustrate the benefits of utilizing an ontology by presenting use case scenarios within a distributed intrusion detection system.
We examine the intersection of data mining and semantic web in this paper. We briefly identify some points where they can impact one another, and then develop a specific example of intrusion detection, an application of distributed data mining. We have produced an ontology specifying a model of computer attacks. Our model is based upon an analysis of over 4,000 classes of computer attacks and their corresponding attack strategies using data derived from CERT/CC advisories and NIST's ICATdoi:10.13016/m2pr7mz41 fatcat:ejg5bmj67nbp7famfjpg4koc74
more »... se. We present our attack model first as a taxonomy and convert it to a target-centric ontology that will be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies for the classification of computer attacks and intrusions, in favor of ontologies. We illustrate the benefits of utilizing an ontology by comparing a use case scenario of our ontology and the IETF's Intrusion Detection Exchange Message Format Data Model.
Distributed Intrusion Detection Systems (DIDS) offer an alternative to centralized intrusion detection. Current research indicates that a distributed intrusion detection paradigm may afford greater coverage, consequently providing an increase in security. In some cases, DIDS offer an alternative to centralized analysis, consequently improving scalabity. SHOMAR, the distributed architecture presented in this paper, provides an open framework that enables secure access to heterogeneous softwaredoi:10.13016/m2oqx6-ad6q fatcat:u6ijy3yuzjchdf4w6ezdd3etga
more »... d hardware components of a distributed intrusion detection system. SHOMAR is built upon a simplified Public Key Infrastructure that provides for authentication, non-repudiation, anti-playback, and access control. This framework supports a broad spectrum of approaches, ranging from hierarchical to peer-to-peer. The system topology and rules governing access to intrusion detection services is based solely upon policy, which is enforced through the use of a capability manager. The protoype system uses Java. The Extensible Markup Language is the sole medium for data exchange between intrusion detection components. SHOMAR provides a distributed service infrastructure independent of the underlying communications network.
IEEE Transactions on Computers
Peter Turner Wen-Guey Tzeng U Jeffrey Undercoffer Shambhu Upadhyaya Nikolaos Uzunoglu V Vara Varavithya Peter Varman Andreas Veneris Srikanth Venkataraman Narayanan Vijaykrishnan Frédéric Vivien Viadimir ...
Security is paramount to the success of pervasive computing environments. The system presented in this paper provides a communications and security infrastructure that goes far in advancing the goal of anywhere - anytime computing. Our work securely enables clients to access and utilize services in heterogeneous networks. We provide a service registration and discovery mechanism implemented through a hierarchy of service management. The system is built upon a simplified Public Keydoi:10.13016/m2cele-q69y fatcat:vu42y7uhyjaxrhniifuy2qkht4
more »... that provides for authentication, non-repudiation, anti-playback, and access control. Smartcards are used as secure containers for digital certi cates. The system is implemented in Java and we use Extensible Markup Language as the sole medium for communications and data exchange. Currently, we are solely dependent on a base set of access rights for our distributed trust model however, we are expanding the model to include the delegation of rights based upon a predefined policy. In our proposed expansion, instead of exclusively relying on predefined access rights, we have developed a flexible representation of trust information, in Prolog, that can model permissions, obligations, entitlements, and prohibitions. In this paper, we present the implementation of our system and describe the modifications to the design that are required to further enhance distributed trust. Our implementation is applicable to any distributed service infrastructure, whether the infrastructure is wired, mobile, or ad-hoc.
Tse Chau-Wen Tseng Nobuo Tsuda Jon Turner Peter Turner Wen-Guey Tzeng U Jeffrey Undercoffer Shambhu Upadhyaya Nikolaos Uzunoglu V Vara Varavithya Peter Varman Andreas Veneris Srikanth Venkataraman Narayanan ...doi:10.1109/tc.2003.1159756 fatcat:pov4eg3d2bgd7jkcvfkm6fqcpm
Le modèle d'ontologie peut être centré sur la cible, comme celui proposé par jeffrey Undercoffer & al. ... Modèle d'ontologie centré sur la cible Jeffrey Undercoffer & al soutiennent que les attaques sont regroupés suivant quatre principaux critères : le composant système ciblé, les moyens utilisés pour réaliser ...doi:10.1504/ijamc.2008.020181 fatcat:n5rjqevnmfggvk7e23jyd5vtry
Naukovì dopovìdì Nacìonalʹnogo unìversitetu bìoresursiv ì prirodokoristuvannâ Ukraïni
Базові підходи розвитку систем захисту центру центру обробки даних
Базові підходи розвитку систем захисту центру центру обробки даних
Undercoffer, Jeffrey L. Intrusion detection: modeling system state to detect and classify anomalous behaviors. 2004. 3. ...doi:10.31548/dopovidi2018.02.025 fatcat:pqtzjtqlnrbvzjkl6byf6k6fqa
It was explained by Jeffrey Undercoffer et al paper copiously  . ...doi:10.5120/2307-2592 fatcat:jemrtpmdhncfdldgewjlde6qx4
It was explained by Jeffrey Undercoffer et al paper copiously  . For example they showed ontology in Syn Flood Attack is similar to Figure3. Figure3. ...doi:10.5120/760-962 fatcat:jfubmeimp5hk3g4j5cabuh44zu
The first research work was done by Jeffrey Undercoffer et al. 17 . They produced an ontology that specify a model of computer attack. ... Since the work of Jeffrey many other ontologies was proposed. ...doi:10.1016/j.procs.2016.04.109 fatcat:z2kmm4n5wja75km7qr4jeetffa
2009 14th International CSI Computer Conference
The first research was done by Jeffrey Undercoffer and et al.  ,  . They produced an ontology specifying a model of computer attack. ...doi:10.1109/csicc.2009.5349372 fatcat:tltbqowvjrgjzfhdjgxeobbauq
Smart Wireless Sensor Networks
References  Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi and John Pinkston, "Secure sensor networks for perimeter protection", Computer Networks, vol. 43, no. 4, pp. 421-435, 2003. ...doi:10.5772/13158 fatcat:ws2madxcabbslnog6zoysvfbd4
« Previous Showing results 1 — 15 out of 18 results