scispace - formally typeset
Proceedings ArticleDOI

User Behavior Identification for Trust Management in Pervasive Computing Systems

TLDR
A novel user behavior identification and profile management system to detect the suspicious behaviors, and a dynamically triggered reaction module to monitor the suspicious node and collect the necessary evidences is introduced.
Abstract
Pervasive computing systems are becoming widespread as the next generation of computing systems. In pervasive computing systems, the users are frequently hopping from one computing space to another, which makes user profile management an essential component of the system. Because such a dynamic-populated computing system has to be new corner-friendly, malicious users with bad reputation to a system may take advantage of the system by claiming themselves as new users. In addition, user identity can also be compromised by controlling the victim node via normal invasions or even by inside identity thefts. A valid user identity is the foundation and prerequisite of trust. Failures to correctly identify a user are catastrophic to trust management system. Traditional intrusion detection systems can only detect an attack when it already happens. But before the intrusion the attackers may have some specific behavioral signatures indicating of their suspicious identities. We need a more powerful and practical system to identify these suspicious behaviors and signal an early warning to stop them. In this paper we assume that user identity is compromised either by attacking and controlling a node or by malicious users' claiming themselves as new users. We introduced a novel user behavior identification and profile management system to detect the suspicious behaviors, and a dynamically triggered reaction module to monitor the suspicious node and collect the necessary evidences

read more

Citations
More filters
Book ChapterDOI

User Tracking Based on Behavioral Fingerprints

TL;DR: The pervasiveness of wireless communications networks is advancing particularly in metropolitan areas and increased mobility comes with privacy and security related issues, so the development of effective countermeasures is only possible with a thorough understanding of such attacks.
Proceedings ArticleDOI

A new method for evaluating cloud computing user behavior trust

TL;DR: This paper proposed a new method for user behavior trust evaluation that considers user's identification code and mac address to prevent the registration of members with multiple user names and makes available the information of user behavior Trust in other cloud computing environments.

Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices

TL;DR: This list of icons and symbols from around the world shows the variety of icons, symbols and symbols that have been discovered over the years and how their use has changed over time.
Patent

Static program analysis in an object-relational mapping framework

TL;DR: In this article, a static program analysis on a set of processor executable instructions associated with an object-relational mapping (ORM) framework is presented. But it does not address the security risk of the propagation path.
Proceedings ArticleDOI

Behavior-Aware Role Based Trust Management

TL;DR: A behavior-aware role based trust management model that is extended to include variables that represent cumulative behaviors and reputation-aware credentials are introduced to describe the trust movement policy driven by enforced behaviors.
References
More filters
Journal ArticleDOI

The Computer for the 21st Century

Mark D. Weiser
- 01 Sep 1991 - 
TL;DR: Consider writing, perhaps the first information technology: The ability to capture a symbolic representation of spoken language for long-term storage freed information from the limits of individual memory.
Journal Article

The computer for the 21st century

TL;DR: In this article, the authors propose that specialized elements of hardware and software, connected by wires, radio waves and infrared, will soon be so ubiquitous that no-one will notice their presence.
Proceedings Article

Snort - Lightweight Intrusion Detection for Networks

TL;DR: Snort provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected.
Journal ArticleDOI

Using encryption for authentication in large networks of computers

TL;DR: Use of encryption to achieve authenticated communication in computer networks is discussed and example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee.
Journal Article

The Computer for the Twenty-First Century

Mark D. Weiser
- 01 Jan 1991 -