Virtual flow-net for accountability and forensics of computer and network systems

Information/secret leaking cannot always be recorded in digital log files. In other words, in log files, not all information/events are recorded, and it is thus impossible to trace the paths of secret leaking on the basis of log files alone. In this paper, to resolve the difficulty of the lack of information, we utilize user–relationship graphs, or social networks, to compensate for the required information. We also utilize a probabilistic analysis to build virtual links to follow information flows. User–relationship graphs are constructed from several flow-net data structures over a longer period so that we can avoid missing embedded threats such as hostile codes. We call this approach virtual flow-net. Copyright © 2011 John Wiley & Sons, Ltd.

[1]  Jon M. Kleinberg,et al.  Small-World Phenomena and the Dynamics of Information , 2001, NIPS.

[2]  Hamdy S. Soliman,et al.  Enhancing AODV routing protocol over mobile ad hoc sensor networks , 2011, Int. J. Sens. Networks.

[3]  Rabab Kreidieh Ward,et al.  Increasing energy efficiency in sensor networks: blue noise sampling and non-convex matrix completion , 2011, Int. J. Sens. Networks.

[4]  Yang Xiao,et al.  Accountable MapReduce in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[5]  Franco Zambonelli,et al.  Landslide monitoring with sensor networks: experiences and lessons learnt from a real-world deployment , 2011, Int. J. Sens. Networks.

[6]  Brandon Dixon,et al.  Using an edge-dual graph and k-connectivity to identify strong connections in social networks , 2008, ACM-SE 46.

[7]  Adel Ali Al-Jumaily,et al.  Per node deployment based detection of controlled link establishment attack in distributed sensor networks , 2011, Int. J. Sens. Networks.

[8]  Georgios Kalogridis,et al.  Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.

[9]  Tassos Dimitriou,et al.  Scatter - secure code authentication for efficient reprogramming in wireless sensor networks , 2011, Int. J. Sens. Networks.

[10]  Guoliang Xue,et al.  Authenticating strangers in Online Social Networks , 2011, Int. J. Secur. Networks.

[11]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[12]  Yang Xiao,et al.  Building Accountable Smart Grids in Neighborhood Area Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[13]  Maurizio Longo,et al.  Energy-efficient collaborative tracking in wireless sensor networks , 2011, Int. J. Sens. Networks.

[14]  Dhiraj K. Pradhan,et al.  Fault-tolerant de-Bruijn graph based multipurpose architecture and routing protocol for wireless sensor networks , 2011, Int. J. Sens. Networks.

[15]  Moustafa Youssef,et al.  A source authentication scheme using network coding , 2011, Int. J. Secur. Networks.

[16]  Lada A. Adamic,et al.  How to search a social network , 2005, Soc. Networks.

[17]  Bo Fu,et al.  GlobalView: building global view with log files in a distributed/networked system for accountability , 2014, Secur. Commun. Networks.

[18]  Jie Wu,et al.  Friendship-based location privacy in Mobile Social Networks , 2011, Int. J. Secur. Networks.

[19]  Y. Taché,et al.  Editorial , 2011, Peptides.

[20]  Ananthanarayanan Chockalingam,et al.  Enhancing lifetime of wireless sensor networks using multiple data sinks , 2011, Int. J. Sens. Networks.

[21]  H. Russell Bernard,et al.  A Pseudomodel of the Small World Problem , 1979 .

[22]  Daisuke Takahashi,et al.  Accountability using flow-net: design, implementation, and performance evaluation , 2012, Secur. Commun. Networks.

[23]  M E J Newman,et al.  Identity and Search in Social Networks , 2002, Science.

[24]  E. Todeva Networks , 2007 .

[25]  Gerhard P. Hancke,et al.  Actor coordination using info-gap decision theory in wireless sensor and actor networks , 2011, Int. J. Sens. Networks.

[26]  Xenofon D. Koutsoukos,et al.  RF angle of arrival-based node localisation , 2011, Int. J. Sens. Networks.

[27]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[28]  Abdelrahman Desoky,et al.  Edustega: an Education-Centric Steganography methodology , 2011, Int. J. Secur. Networks.

[29]  Feng Qi,et al.  A green wireless sensor network for environmental monitoring and risk identification , 2011, Int. J. Sens. Networks.

[30]  Jean-Lien C. Wu,et al.  A cluster-based algorithm for redundant nodes discovery in dense sensor networks , 2011, Int. J. Sens. Networks.

[31]  Victor C. M. Leung,et al.  Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks , 2011, INFOCOM WKSHPS 2011.

[32]  Shahram Latifi,et al.  Partial iris and recognition as a viable biometric scheme , 2011, Int. J. Secur. Networks.

[33]  Jing Liu,et al.  Temporal Accountability and Anonymity in Medical Sensor Networks , 2011, Mob. Networks Appl..

[34]  Fan Zhang,et al.  Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node , 2011, Int. J. Sens. Networks.

[35]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[36]  Ilaria Giordani,et al.  Querying sensor data for environmental monitoring , 2011, Int. J. Sens. Networks.

[37]  Benjamin W. P. Ramsey,et al.  Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.

[38]  Bo Fu,et al.  An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[39]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010 .

[40]  K. P. Subbalakshmi,et al.  KL-sense secure image steganography , 2011, Int. J. Secur. Networks.

[41]  Kenji Leibnitz,et al.  A uniform airdrop deployment method for large-scale wireless sensor networks , 2011, Int. J. Sens. Networks.

[42]  Neeraj Jaggi,et al.  A three dimensional sender anonymity metric , 2011, Int. J. Secur. Networks.

[43]  P. Killworth,et al.  The reversal small-world experiment , 1978 .

[44]  Jingyuan Zhang,et al.  Hidden information in Microsoft Word , 2011, Int. J. Secur. Networks.

[45]  Funian Li Adaptive resource allocation in multiuser cooperative networks with proportional rate constraints , 2011, Int. J. Sens. Networks.

[46]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[47]  Jon M. Kleinberg,et al.  Navigation in a small world , 2000, Nature.

[48]  Walter Lang,et al.  Testing network protocols and signal attenuation in packed food transports , 2011, Int. J. Sens. Networks.

[49]  D. Watts,et al.  An Experimental Study of Search in Global Social Networks , 2003, Science.

[50]  Hrishikesh B. Acharya,et al.  Is That You? Authentication in a Network without Identities , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[51]  Michal Wódczak Autonomic cooperative networking for wireless green sensor systems , 2011, Int. J. Sens. Networks.

[52]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[53]  Yang Xiao,et al.  P-Accountable Networked Systems , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[54]  Yang Xiao,et al.  Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[55]  Guang Gong,et al.  On the (in)security of two Joint Encryption and Error Correction schemes , 2011, Int. J. Secur. Networks.

[56]  Siu-Ming Yiu,et al.  Exclusion-intersection encryption , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[57]  Yang Xiao,et al.  Accountable Administration and Implementation in Operating Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[58]  Matthew N. O. Sadiku,et al.  An intrusion detection technique based on continuous binary communication channels , 2011, Int. J. Secur. Networks.

[59]  Azeddine Bilami,et al.  HEEP (Hybrid Energy Efficiency Protocol) based on chain clustering , 2011, Int. J. Sens. Networks.

[60]  Haibin Yu,et al.  Error compensation algorithm in wireless sensor networks synchronisation , 2011, Int. J. Sens. Networks.

[61]  Koushik Kar,et al.  Multi-sensor activation for temporally correlated event monitoring with renewable energy sources , 2011, Int. J. Sens. Networks.

[62]  Craig C. Lundberg Patterns of Acquaintanceship in Society and Complex Organization , 1975 .

[63]  Deepa Kundur,et al.  Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.

[64]  Ramez Elmasri,et al.  Fundamentals of Database Systems, 5th Edition , 2006 .

[65]  Cormac J. Sreenan,et al.  Cross-layer routing and time synchronisation in wireless sensor networks , 2011, Int. J. Sens. Networks.

[66]  Shensheng Tang,et al.  An epidemic model with adaptive virus spread control for Wireless Sensor Networks , 2011, Int. J. Secur. Networks.

[67]  Jie Wu,et al.  A Quantitative Study of Accountability in Wireless Multi-hop Networks , 2010, 2010 39th International Conference on Parallel Processing.

[68]  Yang Xiao,et al.  Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.

[69]  Hua Wang,et al.  Security and privacy in RFID systems: [special issue of International Journal of Security and Networks] , 2010 .

[70]  Stanley Milgram,et al.  An Experimental Study of the Small World Problem , 1969 .

[71]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[72]  Yang Xiao,et al.  Accountability in smart grids , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[73]  Daisuke Takahashi,et al.  Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability , 2008, 2008 IEEE International Conference on Communications.

[74]  Kannan Govindan,et al.  Rendezvous based trust propagation to enhance distributed network security , 2011, INFOCOM WKSHPS 2011.

[75]  Symeon Papavassiliou,et al.  Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies , 2011, Int. J. Sens. Networks.

[76]  Daisuke Takahashi,et al.  Retrieving knowledge from auditing log-files for computer and network forensics and accountability , 2008, Secur. Commun. Networks.

[77]  A. S. Poornima,et al.  PERSEN: power-efficient logical ring based key management for clustered sensor networks , 2011, Int. J. Sens. Networks.

[78]  Samir Khuller,et al.  Improved approximation algorithms for uniform connectivity problems , 1995, STOC '95.

[79]  Daisuke Takahashi,et al.  Wireless telemedicine and m-health: technologies, applications and research issues , 2011, Int. J. Sens. Networks.

[80]  Daisuke Takahashi,et al.  IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..

[81]  Yang Xiao,et al.  PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks , 2010, ISA.

[82]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .