Research on Context Aware Network Security Model

نویسندگان

  • Xiaohui Guo
  • Xinmin Zhang
  • Haiyan Ren
  • Xiao Zhang
چکیده

According to high development of internet and mobile internet technologies, more and more services and applications are researched and are becoming more and more important in people’s life. At the same time, there are still many risks that virus attack from internet. Network security is facing more challenges than before, such as attack method becoming more diversify, attack times are increasing rapidly, and attack behavior are becoming a system to damage network security. What’s more, application data is more changeable that before, which makes it more difficult to judge which behavior is attack and response to the attack. Current network security system can’t prevent a system level attack, what’s more, can’t response to the attack quickly and effectively. Therefore, this paper designed a new context aware network security model to prevent various attack effectively, present the context declaim algorithm to judge network attack, and then designed a data share mechanism to share attack information with peer machine, which can decrease the response time deeply. Finally, this paper designed a set experiment to validate the quality and performance of context based network security model, the result shows this model can prevent network attack effectively and more memory saving in changeable application.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Context-aware Modeling for Spatio-temporal Data Transmitted from a Wireless Body Sensor Network

Context-aware systems must be interoperable and work across different platforms at any time and in any place. Context data collected from wireless body area networks (WBAN) may be heterogeneous and imperfect, which makes their design and implementation difficult. In this research, we introduce a model which takes the dynamic nature of a context-aware system into consideration. This model is con...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Context-Aware Recommender Systems: A Review of the Structure Research

 Recommender systems are a branch of retrieval systems and information matching, which through identifying the interests and requires of the user, help the users achieve the desired information or service through a massive selection of choices. In recent years, the recommender systems apply describing information in the terms of the user, such as location, time, and task, in order to produce re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JNW

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2013