Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments

J. Walker, Travis Jones, Mansour Mortazavi, R. Blount
{"title":"Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments","authors":"J. Walker, Travis Jones, Mansour Mortazavi, R. Blount","doi":"10.1109/CyberC.2011.53","DOIUrl":null,"url":null,"abstract":"The computing paradigm of ubiquitous/pervasive computing has changed the way in which nomadic computer users interact with computer devices and network systems. Modern ubiquitous computing devices have enabled nomadic computer users to interact with computer and network systems anywhere and at anytime. Although the issue of cyber security has been overlooked by many within the community, these devices provide users with a rich set of context-relevant information including location, usage data, and even the location/state of similar devices within the reach. Cyber Security has become a matter of national, economic, and societal importance. Present-day attacks on the nation's computer systems do not simply damage an isolated machine or disrupt a single enterprise system. Instead, modern attacks target infrastructure that is integral to the economy, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the national economy. As a result of our interconnected world no device is an island, and security still remains a significant obstacle for ubiquitous and pervasive environments, partially in terms intrusions. This paper examines intrusion detection within ubiquitous and pervasive environments within the context of plan recognition as means to classify attacks both quantitatively and qualitatively.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberC.2011.53","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The computing paradigm of ubiquitous/pervasive computing has changed the way in which nomadic computer users interact with computer devices and network systems. Modern ubiquitous computing devices have enabled nomadic computer users to interact with computer and network systems anywhere and at anytime. Although the issue of cyber security has been overlooked by many within the community, these devices provide users with a rich set of context-relevant information including location, usage data, and even the location/state of similar devices within the reach. Cyber Security has become a matter of national, economic, and societal importance. Present-day attacks on the nation's computer systems do not simply damage an isolated machine or disrupt a single enterprise system. Instead, modern attacks target infrastructure that is integral to the economy, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the national economy. As a result of our interconnected world no device is an island, and security still remains a significant obstacle for ubiquitous and pervasive environments, partially in terms intrusions. This paper examines intrusion detection within ubiquitous and pervasive environments within the context of plan recognition as means to classify attacks both quantitatively and qualitatively.
普适计算环境下的网络安全问题
无处不在/普适计算的计算范式已经改变了游牧计算机用户与计算机设备和网络系统交互的方式。现代无处不在的计算设备使流浪的计算机用户能够随时随地与计算机和网络系统进行交互。尽管网络安全问题被社区中的许多人所忽视,但这些设备为用户提供了一组丰富的与上下文相关的信息,包括位置、使用数据,甚至是范围内类似设备的位置/状态。网络安全已成为事关国家、经济和社会的重要问题。当今对国家计算机系统的攻击不仅仅是破坏一台孤立的机器或破坏单个企业系统。相反,现代攻击的目标是经济和日常生活不可或缺的基础设施。计算机网络与食品、水、交通和能源一样,成为国民经济运行的重要资源。由于我们的互联世界,没有任何设备是一座孤岛,对于无处不在和无处不在的环境,安全仍然是一个重大障碍,部分原因是入侵。本文在计划识别的背景下,研究了无处不在和无处不在的环境中的入侵检测,作为定量和定性分类攻击的手段。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信