Attack Detection and Distributed Forensics in Machine-to-Machine Networks
2016 (English)In: IEEE Network, ISSN 0890-8044, E-ISSN 1558-156X, Vol. 30, no 6, 49-55 p.Article in journal (Refereed) Published
The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honeypot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.
Place, publisher, year, edition, pages
Piscataway, NJ: IEEE, 2016. Vol. 30, no 6, 49-55 p.
Telecommunications Communication Systems
IdentifiersURN: urn:nbn:se:hh:diva-32566DOI: 10.1109/MNET.2016.1600113NMOAI: oai:DiVA.org:hh-32566DiVA: diva2:1051571
Funding: NSFC (61572262); NSF of Jiangsu Province (BK20141427); NUPT (NY214097); the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (NUPT), Ministry of Education (NYKL201507); the Qinlan Project of Jiangsu Province; the Research Council of Norway under Project 240079/F20; and the Knowledge Foundation, Sweden.2016-12-022016-12-022016-12-02Bibliographically approved