Abstract

The computing paradigm of ubiquitous/pervasive computing has changed the way in which nomadic computer users interact with computer devices and network systems. Modern ubiquitous computing devices have enabled nomadic computer users to interact with computer and network systems anywhere and at anytime. Although the issue of cyber security has been overlooked by many within the community, these devices provide users with a rich set of context-relevant information including location, usage data, and even the location/state of similar devices within the reach. Cyber Security has become a matter of national, economic, and societal importance. Present-day attacks on the nation's computer systems do not simply damage an isolated machine or disrupt a single enterprise system. Instead, modern attacks target infrastructure that is integral to the economy, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the national economy. As a result of our interconnected world no device is an island, and security still remains a significant obstacle for ubiquitous and pervasive environments, partially in terms intrusions. This paper examines intrusion detection within ubiquitous and pervasive environments within the context of plan recognition as means to classify attacks both quantitatively and qualitatively.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.