Accountability using flow-net: design, implementation, and performance evaluation

Accountability is a very important topic for computer and networking systems. It helps to answer questions such as, “What happened?” and, “Who did it?” These two questions are also related to forensics; however, forensics normally tries to answer these questions by adding some human factors (such as a guess or an instinct due to missing evidence, as well as human involvements) under the available system. Accountability, on the other hand, can only be achieved by significantly improving the current system with the result that forensics becomes trivial in an accountable system. Furthermore, each entity in the system must be held responsible for its activities. In order to provide accountability, a better logging system is necessary so that not only their activities but also their relationships may be captured. To this end, our previous work proposed a novel logging mechanism, flow-net methodology, for accountability. In this paper, we extend the flow-net methodology and present its design and implementation in wireless networks. We also evaluate the performance of flow-net and compare it with that of audit log files. Copyright © 2011 John Wiley & Sons, Ltd.

[1]  Chik How Tan,et al.  Low-power authenticated group key agreement for heterogeneous wireless networks , 2006, Int. J. Secur. Networks.

[2]  Xiaowen Zhang,et al.  Looking at a class of RFID APs through GNY logic , 2010, Int. J. Secur. Networks.

[3]  Dijiang Huang Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[4]  Geoffrey Smith,et al.  Secure information flow in a multi-threaded imperative language , 1998, POPL '98.

[5]  Claudio Soriente,et al.  Using audio in secure device pairing , 2009, Int. J. Secur. Networks.

[6]  Arnold L. Rosenberg Accountable Web-computing , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[7]  Constantinos E. Goutis,et al.  Server side hashing core exceeding 3 Gbps of throughput , 2007, Int. J. Secur. Networks.

[8]  Martin Feldhofer,et al.  On the security of RFID devices against implementation attacks , 2010, Int. J. Secur. Networks.

[9]  Y. Taché,et al.  Editorial , 2011, Peptides.

[10]  Adrian Perrig,et al.  Designing user studies for security applications: a case study with wireless network configuration , 2009, Int. J. Secur. Networks.

[11]  Xinyuan Wang The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones , 2006, Int. J. Secur. Networks.

[12]  Neeraj Suri,et al.  An approach to synthesise safe systems , 2006, Int. J. Secur. Networks.

[13]  Panayotis G. Cottis,et al.  Overview of satellite communication networks security: introduction of EAP , 2009, Int. J. Secur. Networks.

[14]  Fei Hu,et al.  Towards a realistic testbed for wireless network reliability and security performance studies , 2008, Int. J. Secur. Networks.

[15]  Ren-Junn Hwang,et al.  An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks , 2010, Int. J. Secur. Networks.

[16]  Thomas Magedanz,et al.  Intrusion Detection System for Denial-of-Service flooding attacks in SIP communication networks , 2009, Int. J. Secur. Networks.

[17]  Claudio Soriente,et al.  Secure pairing of interface constrained devices , 2009, Int. J. Secur. Networks.

[18]  Bing Wu,et al.  Experimental analysis of application-level intrusion detection algorithms , 2010, Int. J. Secur. Networks.

[19]  Yang Xiao,et al.  P-Accountable Networked Systems , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[20]  Mahalingam Ramkumar,et al.  Secure collaborations over message boards , 2006, Int. J. Secur. Networks.

[21]  Pamela Samuelson Digital Rights Management {and, or, vs.} the Law , 2003 .

[22]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[23]  Barry E. Mullins,et al.  Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.

[24]  Sven Laur,et al.  User-aided data authentication , 2009, Int. J. Secur. Networks.

[25]  Jie Wu,et al.  Clique-based group key assignment in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[26]  Chao Chen,et al.  Deriving a closed-form expression for worm-scanning strategies , 2009, Int. J. Secur. Networks.

[27]  Robin Berthier,et al.  An evaluation of connection characteristics for separating network attacks , 2009, Int. J. Secur. Networks.

[28]  Yacine Challal,et al.  Adaptive clustering for scalable key management in dynamic group communications , 2008, Int. J. Secur. Networks.

[29]  Yang Xiao,et al.  Accountability in smart grids , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[30]  Daisuke Takahashi,et al.  Complexity Analysis of Retrieving Knowledge from Auditing Log Files for Computer and Network Forensics and Accountability , 2008, 2008 IEEE International Conference on Communications.

[31]  Vasileios Karyotis,et al.  A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.

[32]  Chao Chen,et al.  On the scalability of Delay-Tolerant Botnets , 2010, Int. J. Secur. Networks.

[33]  Georgios Kalogridis,et al.  Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.

[34]  Chuanyi Ji,et al.  Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.

[35]  Ricardo Dahab,et al.  On the design of secure protocols for hierarchical sensor networks , 2007, Int. J. Secur. Networks.

[36]  Mohamed G. Gouda,et al.  Vulnerability analysis of certificate graphs , 2006, Int. J. Secur. Networks.

[37]  Supakorn Kungpisdan,et al.  Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.

[38]  Pin-Han Ho,et al.  A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks , 2008, Int. J. Secur. Networks.

[39]  Nirwan Ansari,et al.  Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.

[40]  R. Edwards,et al.  Interpreters/Translators and Cross-Language Research: Reflexivity and Border Crossings , 2002 .

[41]  Yang Xiao,et al.  Attacks and countermeasures in multi-hop Cognitive Radio Networks , 2009, Int. J. Secur. Networks.

[42]  J. Morse,et al.  Verification Strategies for Establishing Reliability and Validity in Qualitative Research , 2002 .

[43]  Jie Wu,et al.  A Quantitative Study of Accountability in Wireless Multi-hop Networks , 2010, 2010 39th International Conference on Parallel Processing.

[44]  Yang Xiao,et al.  Building a wireless capturing tool for WiFi , 2009, Secur. Commun. Networks.

[45]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2007, Int. J. Secur. Networks.

[46]  Keith Mayes,et al.  An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing , 2010, Int. J. Secur. Networks.

[47]  Indrajit Ray,et al.  Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents , 2008, Int. J. Secur. Networks.

[48]  Liqun Chen,et al.  On security proof of McCullagh?Barreto's key agreement protocol and its variants , 2007, Int. J. Secur. Networks.

[49]  Lillykutty Jacob,et al.  Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks , 2008, Int. J. Secur. Networks.

[50]  Adel Bouhoula,et al.  Firewall filtering rules analysis for anomalies detection , 2008, Int. J. Secur. Networks.

[51]  Abdelmadjid Bouabdallah,et al.  TKS: a transition key management scheme for secure application level multicast , 2009, Int. J. Secur. Networks.

[52]  Rajashekar Kailar,et al.  Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[53]  Xukai Zou,et al.  A novel Conference Key Management solution for Secure Dynamic Conferencing , 2008, Int. J. Secur. Networks.

[54]  Matthew K. Franklin,et al.  A survey of key evolving cryptosystems , 2006, Int. J. Secur. Networks.

[55]  Jing Liu,et al.  Temporal Accountability and Anonymity in Medical Sensor Networks , 2011, Mob. Networks Appl..

[56]  Jie Wu,et al.  PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[57]  Ali Movaghar-Rahimabadi,et al.  Anonymous authentication protocol for GSM networks , 2008, Int. J. Secur. Networks.

[58]  Hsiao-Hwa Chen,et al.  DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.

[59]  H. Jonathan Chao,et al.  Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.

[60]  Taieb Znati,et al.  End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.

[61]  Paul Helman,et al.  Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..

[62]  Javier Herranz,et al.  Aggregate designated verifier signatures and application to secure routing , 2007, Int. J. Secur. Networks.

[63]  Robert F. Mills,et al.  An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols , 2012, Int. J. Secur. Networks.

[64]  Li Xu,et al.  Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks , 2010, Int. J. Secur. Networks.

[65]  Manmeet Mahinderjit Singh,et al.  Trust in RFID-enabled Supply-Chain Management , 2010, Int. J. Secur. Networks.

[66]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[67]  Raheem A. Beyah,et al.  Using link RTT to passively detect unapproved wireless nodes , 2009, Int. J. Secur. Networks.

[68]  A. Tamilarasi,et al.  A backpressure technique for filtering spoofed traffic at upstream routers , 2010, Int. J. Secur. Networks.

[69]  Hairong Qi,et al.  Load-balanced key establishment methodologies in wireless sensor networks , 2006, Int. J. Secur. Networks.

[70]  Djamel Djenouri,et al.  Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks , 2009, Int. J. Secur. Networks.

[71]  Zhoujun Li,et al.  Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security , 2010, Int. J. Secur. Networks.

[72]  Susana Garrido Azevedo,et al.  Radio frequency identification: a case study of healthcare organisations , 2010, Int. J. Secur. Networks.

[73]  Huaxiong Wang,et al.  Efficient multicast stream authentication for the fully adversarial network model , 2007, Int. J. Secur. Networks.

[74]  Haiping Xu,et al.  Formal modelling and analysis of XML firewall for service-oriented systems , 2008, Int. J. Secur. Networks.

[75]  Bodo Möller,et al.  Strong password-based authentication in TLS using the three-party group Diffie?Hellman protocol , 2007, Int. J. Secur. Networks.

[76]  Qijun Gu,et al.  Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.

[77]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[78]  Xuemin Shen,et al.  A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.

[79]  Myung J. Lee,et al.  A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.

[80]  Sujeet Shenoi,et al.  Forensic analysis of SCADA systems and networks , 2008, Int. J. Secur. Networks.

[81]  Johnny S. Wong,et al.  An agent-based framework for intrusion detection alert verification and event correlation , 2008, Int. J. Secur. Networks.

[82]  Yusheng Ji,et al.  Secure and efficient data transmission in RFID sensor networks , 2010, Int. J. Secur. Networks.

[83]  Robert F. Mills,et al.  Using PLSI-U to detect insider threats by datamining e-mail , 2008, Int. J. Secur. Networks.

[84]  Deirdre K. Mulligan,et al.  Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.

[85]  Weili Wu,et al.  Handling inheritance violation for secure interoperation of heterogeneous systems , 2009, Int. J. Secur. Networks.

[86]  Mark A. Shayman,et al.  On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.

[87]  Yi Mu,et al.  Convertible identity-based anonymous designated ring signatures , 2006, Int. J. Secur. Networks.

[88]  Indrajit Ray,et al.  Origins: an approach to trace fast spreading worms to their roots , 2008, Int. J. Secur. Networks.

[89]  Robert F. Mills,et al.  Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees , 2010, Int. J. Secur. Networks.

[90]  Michael K. Reiter,et al.  Seeing-Is-Believing: using camera phones for human-verifiable authentication , 2009, Int. J. Secur. Networks.

[91]  Mooi Choo Chuah,et al.  Syntax vs. semantics: competing approaches to dynamic network intrusion detection , 2008, Int. J. Secur. Networks.

[92]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010 .

[93]  Joseph B. Evans,et al.  Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.

[94]  Mark J. Rodrigues,et al.  Perceived barriers to the widespread commercial use of Radio Frequency Identification technology , 2010, Int. J. Secur. Networks.

[95]  Noureddine Boudriga,et al.  Visibility: a novel concept for characterising provable network digital evidences , 2009, Int. J. Secur. Networks.

[96]  Xiaoqi Ma,et al.  Verifying security protocols by knowledge analysis , 2008, Int. J. Secur. Networks.

[97]  Victor C. M. Leung,et al.  Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..

[98]  Riccardo Bettati,et al.  Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.

[99]  Yang Xiao,et al.  Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[100]  Sencun Zhu,et al.  LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network , 2007, Int. J. Secur. Networks.

[101]  Yi-Bing Lin,et al.  End-to-end security mechanisms for SMS , 2006, Int. J. Secur. Networks.

[102]  Yi-Bing Lin,et al.  NTP-DownloadT: a conformance test tool for secured mobile download services , 2008, Int. J. Secur. Networks.

[103]  Shahram Latifi,et al.  An iris and retina multimodal biometric system , 2008, Int. J. Secur. Networks.

[104]  Reuven R. Levary,et al.  An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.

[105]  Elisa Bertino,et al.  Workflow authorisation in mediator-free environments , 2006, Int. J. Secur. Networks.

[106]  Jie Wu,et al.  An efficient group key management scheme for mobile ad hoc networks , 2009, Int. J. Secur. Networks.

[107]  Paul Rabinovich,et al.  Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.

[108]  Pieter H. Hartel,et al.  Secure pairing with biometrics , 2009, Int. J. Secur. Networks.

[109]  Michaël Rusinowitch,et al.  Efficient decision tree for protocol analysis in intrusion detection , 2010, Int. J. Secur. Networks.

[110]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[111]  Panayiotis Kotzanikolaou,et al.  Multilayer key establishment for large-scale sensor networks , 2008, Int. J. Secur. Networks.

[112]  Mohan S. Kankanhalli,et al.  Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.

[113]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[114]  Benjamin W. P. Ramsey,et al.  Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.

[115]  Li Bai,et al.  A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.

[116]  Chik How Tan,et al.  A new signature scheme without random oracles , 2006, Int. J. Secur. Networks.

[117]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[118]  M. W. Raad A ubiquitous mobile telemedicine system for the elderly using RFID , 2010, Int. J. Secur. Networks.

[119]  Ming-Hour Yang,et al.  Lightweight authentication protocol for mobile RFID networks , 2010, Int. J. Secur. Networks.

[120]  N. Asokan,et al.  Standards for security associations in personal networks: a comparative analysis , 2009, Int. J. Secur. Networks.

[121]  Pei Cao,et al.  Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[122]  Micah Sherr,et al.  On the (un)reliability of eavesdropping , 2008, Int. J. Secur. Networks.

[123]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[124]  Aggelos Kiayias,et al.  Secure scalable group signature with dynamic joins and separable authorities , 2006, Int. J. Secur. Networks.

[125]  Michael K. Reiter,et al.  Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[126]  Jamal N. Al-Karaki,et al.  Analysis of routing security-energy trade-offs in wireless sensor networks , 2006, Int. J. Secur. Networks.

[127]  Ying Li,et al.  Enhancing Intrusion Detection System with proximity information , 2010, Int. J. Secur. Networks.

[128]  Krishna M. Sivalingam,et al.  An efficient One-Time Password authentication scheme using a smart card , 2009, Int. J. Secur. Networks.

[129]  Tzong-Chen Wu,et al.  Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks , 2010, Int. J. Secur. Networks.

[130]  Kiseon Kim,et al.  Security assessments of IEEE 802.15.4 standard based on X.805 framework , 2010, Int. J. Secur. Networks.

[131]  Mukesh Singhal,et al.  An escrow-less identity-based group-key agreement protocol for dynamic peer groups , 2009, Int. J. Secur. Networks.

[132]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[133]  Jianping Pan,et al.  Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.

[134]  Sukumar Nandi,et al.  Secure user-identification and key distribution scheme preserving anonymity , 2008, Int. J. Secur. Networks.

[135]  Pamela Samuelson,et al.  DRM {and, or, vs.} the law , 2003, CACM.

[136]  Ding-Zhu Du,et al.  An one-way function based framework for pairwise key establishment in sensor networks , 2008, Int. J. Secur. Networks.

[137]  Guang Gong,et al.  Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks , 2007, Int. J. Secur. Networks.

[138]  Renato J. O. Figueiredo,et al.  Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[139]  L. Sun,et al.  Security and privacy on low-cost Radio Frequency Identification systems , 2010, Int. J. Secur. Networks.

[140]  George Kesidis,et al.  A taxonomy of internet traceback , 2006, Int. J. Secur. Networks.

[141]  Ju Wang,et al.  A cross-layer authentication design for secure video transportation in wireless sensor network , 2010, Int. J. Secur. Networks.

[142]  Thomas Johansson,et al.  Three ways to mount distinguishing attacks on irregularly clocked stream ciphers , 2006, Int. J. Secur. Networks.

[143]  Andrew W. Appel,et al.  SAFKASI: a security mechanism for language-based systems , 2000, TSEM.

[144]  Yang Xiao,et al.  PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks , 2010, ISA.

[145]  Sylvie Perreau,et al.  Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.

[146]  Eyal de Lara,et al.  Proximity-based authentication of mobile devices , 2009, Int. J. Secur. Networks.

[147]  Fagen Li,et al.  ID-based threshold proxy signcryption scheme from bilinear pairings , 2008, Int. J. Secur. Networks.

[148]  Shivakant Mishra,et al.  Limiting DoS attacks during multihop data delivery in wireless sensor networks , 2006, Int. J. Secur. Networks.

[149]  Shiuh-Pyng Shieh,et al.  Authentication and secret search mechanisms for RFID-aware wireless sensor networks , 2010, Int. J. Secur. Networks.

[150]  Deepa Kundur,et al.  Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.