Afshin Jahanbin, Ahmad Ghafarian, Seyed Amin Hosseeini Seno, Samane Nikookar
언어
영어(ENG)
URL
https://www.earticle.net/Article/A205382
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
원문정보
초록
영어
Due to the impact of wireless sensor networks (WSN) on dramatic reduction in computational and energy resources, research on the implications of this type of networks would be considered as a deliberate and update point. One of the main issues in these networks is the security. During transfer of data from source nodes to sink nodes or vice versa, many WSNs require applications to protect data privacy. Besides, computational and energy and memory limitations of WSNs and also defenseless environment that may be applied to them, make the possibility that these types of attacks occur more often. In this study, we provide a design using intelligent multi-agent systems that help us during the crime and after crime occurred to obtain more accurate forensics reports presentable to the court of law. A feature of the design of intelligent multi-agent system is to obtain evidence during crime, without the suspect realizing it; in fact, we can do live acquisitions. The proposed design was raised in WSN networks for first time. The investigation in firewall forensics consists of analyzing and interpreting information related to computer attacks which is contained in firewall log files. But the log files content is generally mysterious and difficult to decode. This paper proposes an intelligent system that automates the firewall forensics process and helps the security administrators to manage, exploit and interpret the firewall log file contents.
목차
Abstract 1. Introduction 2. Properties of an Intelligent Agent 3. Related Works 4. Investigation of Wireless Sensor Network (WSN) 4.1. Hardware Components of a Sensor Node: 4.2. Security in WSN 4.3. Security Requirements in WSN 5. Classification of Attacks 6. Our Proposed System 7. Conclusion Resources
보안공학연구지원센터(IJDTA) [Science & Engineering Research Support Center, Republic of Korea(IJDTA)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Database Theory and Application
간기
격월간
pISSN
2005-4270
수록기간
2008~2016
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Database Theory and Application Vol.6 No.5