An Implementation Scheme of Flow-Net and Its Applications on Detecting Attacks in Wireless Networks

In this paper, we propose an implementation scheme of flow-net which is designed to record events and their relations. Different implementation schemes of the flow-net are introduced and compared. Under the collaboration of the nodes in a network, all of the events in the network are recorded and the relations of the events can be clearly described by flow-net. Because of the clear description of the events' relations, flow-net can be used to detect attacks in networks by using the fingerprint of the attacks.

[1]  Geoffrey Smith,et al.  Secure information flow in a multi-threaded imperative language , 1998, POPL '98.

[2]  Deirdre K. Mulligan,et al.  Implementing Copyright Limitations in Rights Expression Languages , 2002, Digital Rights Management Workshop.

[3]  Arnold L. Rosenberg Accountable Web-computing , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[4]  Yang Xiao,et al.  Implementation and evaluation of accountability using flow-net in wireless networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[5]  Daisuke Takahashi,et al.  IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..

[6]  Andrew W. Appel,et al.  SAFKASI: a security mechanism for language-based systems , 2000, TSEM.

[7]  Yang Xiao Flow-net methodology for accountability in wireless networks , 2009, IEEE Network.

[8]  J. Morse,et al.  Verification Strategies for Establishing Reliability and Validity in Qualitative Research , 2002 .

[9]  Rajashekar Kailar,et al.  Accountability in Electronic Commerce Protocols , 1996, IEEE Trans. Software Eng..

[10]  Paul Helman,et al.  Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse , 1993, IEEE Trans. Software Eng..

[11]  Renato J. O. Figueiredo,et al.  Fine-grain access control for securing shared resources in computational grids , 2002, Proceedings 16th International Parallel and Distributed Processing Symposium.

[12]  Pamela Samuelson,et al.  DRM {and, or, vs.} the law , 2003, CACM.

[13]  Pamela Samuelson Digital Rights Management {and, or, vs.} the Law , 2003 .

[14]  Supakorn Kungpisdan,et al.  Practical Reasoning about Accountability in Electronic Commerce Protocols , 2001, ICISC.