{"title":"A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community","authors":"Munene W. Kanampiu, J. Zhan","doi":"10.1109/CyberSecurity.2012.30","DOIUrl":null,"url":null,"abstract":"For a network community, passive attacks are of the nature of eavesdropping on, monitoring of, transmissions where the goal of the attacker is to obtain information that is being transmitted. Unlike active attacks that are easy to detect and prevent, passive attacks are difficult to detect and therefore hard to prevent. Research in this area has mainly focused on preventing the attacks rather than detecting the covert attacker. For example existing eavesdropping schemes address the problem mainly by employing encryption. But encryption by itself is not enough because passive attacks can occur in more ways than just observing exposed data. It is also known that encryption is not always applicable for example in open wireless communication protocols. This observation has motivated us to design a scheme that aims to reduce such attackers' capability extent by intercepting and eradicating them as soon as possible. Our scheme detects, sequesters, investigates, and expels such malicious passive actors from the networked community.","PeriodicalId":162858,"journal":{"name":"2012 International Conference on Cyber Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSecurity.2012.30","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
For a network community, passive attacks are of the nature of eavesdropping on, monitoring of, transmissions where the goal of the attacker is to obtain information that is being transmitted. Unlike active attacks that are easy to detect and prevent, passive attacks are difficult to detect and therefore hard to prevent. Research in this area has mainly focused on preventing the attacks rather than detecting the covert attacker. For example existing eavesdropping schemes address the problem mainly by employing encryption. But encryption by itself is not enough because passive attacks can occur in more ways than just observing exposed data. It is also known that encryption is not always applicable for example in open wireless communication protocols. This observation has motivated us to design a scheme that aims to reduce such attackers' capability extent by intercepting and eradicating them as soon as possible. Our scheme detects, sequesters, investigates, and expels such malicious passive actors from the networked community.