Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Secure information flow in a multi-threaded imperative language
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
SAFKASI: a security mechanism for language-based systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
Communications of the ACM - Digital rights management
IEEE Transactions on Parallel and Distributed Systems
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Practical Reasoning about Accountability in Electronic Commerce Protocols
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems
IEEE Transactions on Mobile Computing
An Efficient Logging Scheme for Recoverable Distributed Shared Memory Systems
ICDCS '97 Proceedings of the 17th International Conference on Distributed Computing Systems (ICDCS '97)
Log-based rollback recovery without checkpoints of shared memory in software DSM
The Journal of Supercomputing
Integration of mobility and intrusion detection for wireless ad hoc networks: Research Articles
International Journal of Communication Systems
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Communications of the ACM - Organic user interfaces
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
International Journal of Security and Networks
International Journal of Security and Networks
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection
International Journal of Security and Networks
An agent-based framework for intrusion detection alert verification and event correlation
International Journal of Security and Networks
Log-based distributed intrusion detection for hybrid networks
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking
IEEE Transactions on Parallel and Distributed Systems
Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks
International Journal of Security and Networks
Privacy and security: Usable security: how to get it
Communications of the ACM - Scratch Programming for All
Data-logging and supervisory control in wireless sensor networks
International Journal of Sensor Networks
Responsibility and blame: a structural-model approach
Journal of Artificial Intelligence Research
Flow-net methodology for accountability in wireless networks
IEEE Network: The Magazine of Global Internetworking
Experimental analysis of application-level intrusion detection algorithms
International Journal of Security and Networks
IEEE 802.11 user fingerprinting and its applications for intrusion detection
Computers & Mathematics with Applications
IEEE Transactions on Information Technology in Biomedicine - Special section on affective and pervasive computing for healthcare
A Quantitative Study of Accountability in Wireless Multi-hop Networks
ICPP '10 Proceedings of the 2010 39th International Conference on Parallel Processing
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
Efficient decision tree for protocol analysis in intrusion detection
International Journal of Security and Networks
An intrusion detection technique based on continuous binary communication channels
International Journal of Security and Networks
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
IEEE Wireless Communications
Security configuration management in intrusion detection and prevention systems
International Journal of Security and Networks
Intrusion prevention with two-level user authentication in heterogeneous wireless sensor networks
International Journal of Security and Networks
International Journal of Security and Networks
Hi-index | 0.00 |
In this paper, we first present a scheme called flow-net, which is designed to record events and their relations through the collaboration of the nodes in a network. Flow-net can be used to accomplish accountability and to detect attacks in networks. Then, we present two novel methods to evaluate the accountability of a network via the users' accepted overhead (called Q-Accountable Logging by Overhead) and the flow-net record depth (called P-Accountable Logging), respectively. Finally, we study how flow-net records are used to determine whether a potential attack occurs.