Notice of RetractionBuilding global view with log files in a distributed/network system

In a previous work, a novel flow-net methodology for accountability was proposed to build accountable audit data as well as to retrieve useful information by exploring the audit data. In this work, we attempt to instantiate the flow-net methodology in a distributed/networked system by exploiting log files which are recorded locally on each node in the system. To improve the efficiency of retrieving data, we propose the idea of building a global view of the system with a clustered log collecting scheme to help the monitoring node gain a whole view of the system by building up and maintaining high level log files.

[1]  Yang Xiao Accountability for wireless LANs, ad hoc networks, and wireless mesh networks , 2008, IEEE Communications Magazine.

[2]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[3]  Mark A. Shayman,et al.  On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.

[4]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2007, Int. J. Secur. Networks.

[5]  John C.-I. Chuang,et al.  Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM.

[6]  Yang Xiao,et al.  Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[7]  Jie Wu,et al.  Clique-based group key assignment in Wireless Sensor Networks , 2008, Int. J. Secur. Networks.

[8]  Scott Shenker,et al.  An Accountability Interface for the Internet , 2007 .

[9]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[10]  Nirwan Ansari,et al.  Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.

[11]  Jeffrey S. Chase,et al.  The role of accountability in dependable distributed systems , 2005 .

[12]  Pei Cao,et al.  Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[13]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[14]  Lillykutty Jacob,et al.  Secure hybrid routing with micro/macro-mobility handoff mechanisms for urban wireless mesh networks , 2008, Int. J. Secur. Networks.

[15]  Yi-Bing Lin,et al.  NTP-DownloadT: a conformance test tool for secured mobile download services , 2008, Int. J. Secur. Networks.

[16]  Qijun Gu,et al.  Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.

[17]  Chuanyi Ji,et al.  Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.

[18]  Riccardo Bettati,et al.  Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.

[19]  Butler W. Lampson,et al.  31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .

[20]  Jeffrey S. Chase,et al.  Trust but verify: accountability for network services , 2004, EW 11.

[21]  Victor C. M. Leung,et al.  Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..

[22]  Archana Ganapathi,et al.  Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.

[23]  Shahram Latifi,et al.  An iris and retina multimodal biometric system , 2008, Int. J. Secur. Networks.

[24]  Paul Rabinovich,et al.  Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.

[25]  Yang Xiao,et al.  Detection of Fraudulent Usage in Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.

[26]  Paul Laskowski,et al.  Network monitors and contracting systems: competition and innovation , 2006, SIGCOMM 2006.

[27]  Jianping Pan,et al.  Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.

[28]  Ding-Zhu Du,et al.  An one-way function based framework for pairwise key establishment in sensor networks , 2008, Int. J. Secur. Networks.

[29]  Hsiao-Hwa Chen,et al.  DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.

[30]  H. Jonathan Chao,et al.  Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.

[31]  Taieb Znati,et al.  End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.