2014
DOI: 10.1007/s11277-014-1604-7
|View full text |Cite
|
Sign up to set email alerts
|

Accountability and Q-Accountable Logging in Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
2

Relationship

5
3

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 46 publications
0
7
0
Order By: Relevance
“…Temporal accountability was studied in [75]. Some quantifiable accountability schemes were proposed in [76,77]. Multiple resolution logging with flow-net for accountability was studied in SSH (Secure Shell) was developed to keep network traffic protected through encryption, however, studies show that in recent years, brute-force attack against SSH, ftp, and telnet servers is the most common form of attack [81].…”
Section: Secure and Accountable Internetmentioning
confidence: 99%
“…Temporal accountability was studied in [75]. Some quantifiable accountability schemes were proposed in [76,77]. Multiple resolution logging with flow-net for accountability was studied in SSH (Secure Shell) was developed to keep network traffic protected through encryption, however, studies show that in recent years, brute-force attack against SSH, ftp, and telnet servers is the most common form of attack [81].…”
Section: Secure and Accountable Internetmentioning
confidence: 99%
“…At the same time, submit and save the obtained evidence. There are some dynamic forensics concept of logs collection and analysis system [8] [9][10], Grobler, et al proposed that the dynamic forensics method is still in the development stage, and there is no standard definition and standardized process; at the same time, users should participate in the process of forensic analysis as little as possible. So, they put forward a multi component view of forensics process [11].…”
Section: Researches On Electronic Forensics At Home and Abroadmentioning
confidence: 99%
“…The IDSs are devices that monitor network or host activities for malicious actions or policy violations . The IDS systems maintain logged data that record system activities and check the logged data for suspicious activities in real time using predefined patterns . The decisions made by the IDS systems according to predefined policies are often logged as well.…”
Section: Introductionmentioning
confidence: 99%