مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

1,218
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

0
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

DETECTING INTEGRITY ATTACKS TO A DATA STREAM MANAGEMENT SYSTEM

Pages

  57-70

Abstract

 In recent years, Cyber Warfare has been one of the most essential war scenes for intelligence and military organizations. As the volume of data is increased, data stream processing and data security would be the basic requirements of military enterprises. Although, by data encryption no one can have access to data contents, but adversaries can delete some records from data stream or add some counterfeit records in it without any knowledge about records contents. Such attacks are called integrity attacks. Because integrity control in DSMS is a continuous process, it may be categorized in passive defense activities. In this paper, we present a probabilistic auditing model for integrity control of received stream results via an unsecured environment. In our architecture, users and data stream owners are trusted and channels are unsecured. The server is considered a black box and auditing process is fulfilled by contribution between data stream owner and users. We exploit existing DATA STREAM MANAGEMENT SYSTEMS (DSMS) without any modification. Our method has no significant cost on users side and detects integrity attacks accurately and rapidly. Correctness and convergence of our probabilistic algorithm is proved and our evaluation shows very good results.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    GHAYOORI SALES, M., SALMANI, K., & HAGHJOO, M.. (2011). DETECTING INTEGRITY ATTACKS TO A DATA STREAM MANAGEMENT SYSTEM. (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY, 2(2 (4)), 57-70. SID. https://sid.ir/paper/167263/en

    Vancouver: Copy

    GHAYOORI SALES M., SALMANI K., HAGHJOO M.. DETECTING INTEGRITY ATTACKS TO A DATA STREAM MANAGEMENT SYSTEM. (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY[Internet]. 2011;2(2 (4)):57-70. Available from: https://sid.ir/paper/167263/en

    IEEE: Copy

    M. GHAYOORI SALES, K. SALMANI, and M. HAGHJOO, “DETECTING INTEGRITY ATTACKS TO A DATA STREAM MANAGEMENT SYSTEM,” (JOURNAL OF ADVANCED DEFENCE SCIENCE AND TECHNOLOGY) JOURNAL OF PASSIVE DEFENCE SCIENCE AND TECHNOLOGY, vol. 2, no. 2 (4), pp. 57–70, 2011, [Online]. Available: https://sid.ir/paper/167263/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button