Mobile-Based DoS Attack Security Agent in Sensor Networking
Autor: | Sungmo Jung, Seoksoo Kim, Donghyun Kim, Dae-Joon Hwang |
---|---|
Rok vydání: | 2015 |
Předmět: |
Information privacy
Computer science Covert channel Data security Cloud computing 02 engineering and technology Computer security computer.software_genre Asset (computer security) Security information and event management Logical security 0202 electrical engineering electronic engineering information engineering Data Protection Act 1998 Electrical and Electronic Engineering Security bug Cloud computing security business.industry 020206 networking & telecommunications Provisioning Computer Science Applications Security service Software security assurance Network Access Control Security through obscurity 020201 artificial intelligence & image processing business computer Mobile device Countermeasure (computer) Computer network |
Zdroj: | Wireless Personal Communications. 86:91-107 |
ISSN: | 1572-834X 0929-6212 |
DOI: | 10.1007/s11277-015-3098-3 |
Popis: | Cloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time. |
Databáze: | OpenAIRE |
Externí odkaz: |