首页> 外文期刊>Journal of computer security >A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement
【24h】

A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement

机译:关于数据出处的全面调查:最先进的方法及其对IOT安全执行的部署

获取原文
获取原文并翻译 | 示例
       

摘要

Data provenance collects comprehensive information about the events and operations in a computer system at both application and kernel levels. It provides a detailed and accurate history of transactions that help delineate the data flow scenario across the whole system. Data provenance helps achieve system resilience by uncovering several malicious attack traces after a system compromise that are leveraged by the analyzer to understand the attack behavior and discover the level of damage. Existing literature demonstrates a number of research efforts on information capture, management, and analysis of data provenance. In recent years, provenance in IoT devices attracts several research efforts because of the proliferation of commodity IoT devices. In this survey paper, we present a comparative study of the state-of-the-art approaches to provenance by classifying them based on frameworks, deployed techniques, and subjects of interest. We also discuss the emergence and scope of data provenance in IoT network. Finally, we present the urgency in several directions that data provenance needs to pursue, including data management and analysis.
机译:数据出处在应用程序和内核级别收集有关计算机系统中的事件和操作的全面信息。它提供了一个详细的和准确的事务历史记录,有助于在整个系统上描绘数据流方案。数据出处有助于通过在分析仪利用的系统妥协后揭示多种恶意攻击迹线来实现系统弹性,以了解攻击行为并发现损坏水平。现有文献展示了关于信息捕获,管理和数据出处分析的一些研究工作。近年来,由于商品物联网设备的扩散,物联网设备的出处吸引了几项研究工作。在本调查论文中,我们展示了通过基于框架,部署的技术和感兴趣的主题对他们进行分类来源的最先进方法的比较研究。我们还讨论了IOT网络中数据出差的出现和范围。最后,我们呈现了若干方向的紧迫性,数据出处需要追求,包括数据管理和分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号