Decentralized, Cooperative, Secure and Privacy – Aware Monitoring for Trustworthiness

  • Sathya Rao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7449)


Trustworthiness, in terms of resilience to failures and malicious activities, is a key issue in today’s data networks; its provision is very challenging due to the large geographical scale of network accidents (e.g., routing accidents and software faults), as well as from the presence of distributed and coordinated inter-domain infrastructures specifically set up for malicious activities (e.g., botnets). This scenario is even worsened by the extremely high volume of traffic flowing across the Internet which makes traditional intra-domain monitoring systems based on centralized storage and post-processing analysis inadequate. In addition, any approach designed to overcome such limitations will ultimately have to handle massive amounts of data about users; this creates serious privacy concerns, also surrounded by legal implications [6]. On the other hand, cooperative cross-domain monitoring mechanisms that involve data exchange among the collaborating partners, create the danger of disclosing business-critical information.


Information Communication Technology Access Control Model Malicious Activity Large Geographical Scale Coordination Layer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Berger, A., Cesareo, J., D’Alconzo, A.: Collaborative network defense with minimum disclosure. In: 2011 IEEE Global Telecommunications Conference, GLOBECOM 2011 (2011)Google Scholar
  2. 2.
    Bianchi, G., Rajabi, H., Sgorlon, M.: Enabling conditional cross-domain data sharing via a cryptographic approach. In: 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application, IMSAA (2011)Google Scholar
  3. 3.
    Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: 19th USENIX Security Symposium (2010)Google Scholar
  4. 4.
    Huici, F., Pietro, A.D., Trammell, B., Hidalgo, J.M.G., Ruiz, D.M., d’Heureuse, N.: Blockmon: A high-performance composable network traffic measurement system. In: Posters and Demos Session at ACM SIGCOMM 2012. ACM (to appear, 2012)Google Scholar
  5. 5.
    Koukovini, M.N., Papagiannakopoulou, E.I., Lioudakis, G.V., Kaklamani, D.I., Venieris, I.S.: A Workflow Checking Approach for Inherent Privacy Awareness in Network Monitoring. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 295–302. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  6. 6.
    Lioudakis, G.V., Gaudino, F., Boschi, E., Bianchi, G., Kaklamani, D.I., Venieris, I.S.: Legislation-aware privacy protection in passive network monitoring. In: Portela, I.M., Cruz-Cunha, M.M. (eds.) Information Communication Technology Law, Protection and Access Rights: Global Approaches and Issues. IGI Global (2010)Google Scholar
  7. 7.
    Papagiannakopoulou, E.I., Koukovini, M.N., Lioudakis, G.V., Garcia-Alfaro, J., Kaklamani, D.I., Venieris, I.S.: A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. In: Garcia-Alfaro, J., Lafourcade, P. (eds.) FPS 2011. LNCS, vol. 6888, pp. 208–217. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sathya Rao
    • 1
  1. 1.KYOS SARLGenevaSwitzerland

Personalised recommendations