The proliferation of radio frequency identification (RFID) tags has implied that the pervasive RFID technology has become object of a broad range of malicious attacks, such as RFID malwares. This research is aimed at integrating the principles of both ontology and fuzzy logic modelling techniques in the intrusion detection paradigm to perform alert verification and correlation and determine this kind of attack. The proposed approach relies on three key points: (i) heterogeneous sensors diffused throughout the RFID infrastructure; (ii) fuzzy rules to handle imprecision and fuzziness in calculation of a confidence for each detected symptom in the verification procedure; (iii) a formal alert model, represented by means of an ontology and combined with fuzzy rules to represent knowledge for reasoning about complementary alert evidence and provide a comprehensive view of relevant symptoms indicating really potential attacks. Experimental tests are reported to give a proof of the feasibility of the methodology in the detection of malwares in RFID systems.

An Ontology-based Fuzzy Approach for Alert Verification and Correlation in RFID Systems

Massimo Esposito
2013

Abstract

The proliferation of radio frequency identification (RFID) tags has implied that the pervasive RFID technology has become object of a broad range of malicious attacks, such as RFID malwares. This research is aimed at integrating the principles of both ontology and fuzzy logic modelling techniques in the intrusion detection paradigm to perform alert verification and correlation and determine this kind of attack. The proposed approach relies on three key points: (i) heterogeneous sensors diffused throughout the RFID infrastructure; (ii) fuzzy rules to handle imprecision and fuzziness in calculation of a confidence for each detected symptom in the verification procedure; (iii) a formal alert model, represented by means of an ontology and combined with fuzzy rules to represent knowledge for reasoning about complementary alert evidence and provide a comprehensive view of relevant symptoms indicating really potential attacks. Experimental tests are reported to give a proof of the feasibility of the methodology in the detection of malwares in RFID systems.
2013
Istituto di Calcolo e Reti ad Alte Prestazioni - ICAR
Inglese
Khaled Elleithy, Tarek Sobh
Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering
International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2011)
767
779
13
978-1-4614-3557-0
http://link.springer.com/chapter/10.1007%2F978-1-4614-3558-7_66
Springer New York
New York
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
3-12 December 2010
Fuzzy logic
Intrusion detection
Radio frequency identification
1
none
Esposito, Massimo
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/176088
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? ND
social impact