Attack Detection and Distributed Forensics in Machine-to-Machine NetworksShow others and affiliations
2016 (English)In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 6, p. 49-55Article in journal (Refereed) Published
Abstract [en]
The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honeypot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.
Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2016. Vol. 30, no 6, p. 49-55
National Category
Telecommunications Communication Systems
Identifiers
URN: urn:nbn:se:hh:diva-32566DOI: 10.1109/MNET.2016.1600113NMISI: 000390423400009Scopus ID: 2-s2.0-85015100023OAI: oai:DiVA.org:hh-32566DiVA, id: diva2:1051571
Funder
Knowledge Foundation
Note
Funding: NSFC (61572262); NSF of Jiangsu Province (BK20141427); NUPT (NY214097); the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (NUPT), Ministry of Education (NYKL201507); the Qinlan Project of Jiangsu Province; the Research Council of Norway under Project 240079/F20; and the Knowledge Foundation, Sweden.
2016-12-022016-12-022020-02-03Bibliographically approved