The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Port knocking is a first technique introduces to prevent attackers from discovering and exploiting potentially vulnerable service on a network host, while allowing authenticated users to access these services. Despite being potentially useful tool, it suffers various vulnerabilities such as TCP replay, port scanning and etc. This project proposes a new approach over the existing Port Knocking by employing...
In recent years, there has been an increasing interest in the authentication process due to the key role that it has in the network security. Port Knocking (PKn) is an authentication method in which data transmits through the closed ports. This method is prone to attacks when attackers sniff the network. This paper proposes a new method which is called “Secure Port Knock-Tunneling” to eliminate both...
The security of the electricity delivery system has received much attention recently with increasing focus on Smart Grids. While substations used to be protected by concrete walls and barbed wire, today the industry is getting worried about attacks over the communication infrastructure. In this paper, we analyse the primary threats and present a first cut of a security architecture. We suggest security...
Security plays a large role in e-commerce application system, the physical layer structure, anti-SQL injection, RBAC, password policy are important aspects of E-commerce application system security policy which will be analyzed in this paper.
A semi-infrastructured ad hoc network is a wireless MANET subnetwork connected to a structured backbone network (LAN). This kind of network is becoming popular for low cost implementation and practicability issues. But the security is being considered as the major bottleneck of such semi-infrastructured Ad Hoc network. Uncontrolled access medium, dynamically changing topology, mobility of the hosts...
Embedded system is a dedicated computer system with application as the core, computer technology as the basis, and the software and hardware of which can be cut to meet the strict request of the application system in functionality, reliability, cost, size and power, is a new technical development direction following the IT network technologies. This paper discusses a new type of embedded network security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.