Real-time devices monitoring is a fundamental task of network security. When networks are threatened by cyberattacks, we need accurate monitoring data for timely detecting and disposing network threats. However, in resource-constrained networks, due to limitation of device processing capacity or network bandwidth, it is usually difficult to collect monitoring information precisely and efficiently. To address this problem, we propose a novel threat-driven data collection method. Our method firstly analyses features of the existing or potential network threats, then chooses devices that most probably be affected by the threats, and finally selects data items consistent to the threat features for those screened target collection devices. Experiment results prove that our threat-driven data collection method not only improves the collection efficiency with a satisfying data accuracy, but also reduces devices resource cost of gathering monitoring data, making it suitable for security management in resource-constrained networks.
CITATION STYLE
Li, J., Yin, L., Guo, Y., Li, C., Li, F., & Chen, L. (2017). A novel threat-driven data collection method for resource-constrained networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10394 LNCS, pp. 486–496). Springer Verlag. https://doi.org/10.1007/978-3-319-64701-2_36
Mendeley helps you to discover research relevant for your work.