Abstract
Trusted Connection Authentication (TCA) is a critical part of network security access solution. TCA is a kind of high level trusted network access techniques which can create trusted connections between client and remote networks through two-way user authentication and platform identification in TTP. However, there are general security problems after accessed to the network which are not much considered by existing TCA schemes. Therefore, this paper proposes a reinforced TCA architecture, TCA-BA, which extends a network behavior layer on the basis of TCA. Firstly, network behavior eigenvalue extraction is proposed by using time and host network flow characteristics. Secondly, a new method is illustrated in which we classify the behavior by Naïve Bayes Algorithm, measure the network abnormal behavior by minimum risk bayes rules, identify these behaviors which have accessed to the network. Finally, the experimental results present that our architecture can effectively identify the abnormal behavior in the network and protect the network security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, Y., Yi, X., Li, K., et al.: Formal verification of trusted connection architecture. Comput. Sci. 39(s3), 230–233 (2012)
Xiao, Y.L., Wang, Y.M., Pang, L.J.: Security analysis and improvement of TNC IF-T protocol binding to TLS. China Commun. (Engl. Ed.) 10(7), 85–92 (2013)
Vidal, J.M., Orozco, A.L.S., Villalba, L.J.G.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38 (2017)
Luo, Y.B., Wang, B.S., Wang, X.F., et al.: RPAH: a moving target network defense mechanism naturally resists reconnaissances and attacks. IEICE Trans. Inf. Syst. 100(3), 496–510 (2017)
Liu, W.W., Han, Z., Shen, C.X.: Trusted network connection control scheme based on terminal behavior. J. Commun. 30(11), 127–134 (2009)
Zhang, J.L., Zhang, G.L., Zhang, X.F.: Real-time evaluation mechanism based on double evidence classification of user behavior. Int. J. Secur. Appl. 31–42 (2016)
Wang, H., Chen, Y.Y., Liu, S.F.: Intrusion detection system based on improved Naive Bayes algorithm. Comput. Sci. 41(4), 111–115 (2014)
Niu, L., Sun, Z.L.: PCA-AKM algorithm and its application in intrusion detection. computer. Science 45(2), 226–230 (2018)
Wang, Z., Ren, J., Zhang, D.: A deep-learning based feature hybrid framework for spatiotemporal saliency detection inside videos. Neurocomputing (2018)
Zhang, J.M., Ren, J.C., Zhao, H.M.: Novel segmented stacked autoencoder for effective dimensionality reduction and feature extraction in hyperspectral imaging. Neurocomputing 185, 1–10 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Xu, W., Zhang, J., Zhang, Y. (2018). A Trusted Connection Authentication Reinforced by Bayes Algorithm. In: Ren, J., et al. Advances in Brain Inspired Cognitive Systems. BICS 2018. Lecture Notes in Computer Science(), vol 10989. Springer, Cham. https://doi.org/10.1007/978-3-030-00563-4_71
Download citation
DOI: https://doi.org/10.1007/978-3-030-00563-4_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00562-7
Online ISBN: 978-3-030-00563-4
eBook Packages: Computer ScienceComputer Science (R0)