The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A common technique hackers use to break into a computer host is to route their traffic through a chain of stepping-stone hosts. There is no valid reason to use a long connection chain for remote login such as SSH connections. One way to protect a host of being attacked is to identify long connection chains connecting into the host. This paper proposes a novel method to identify long connection chains...
Along with recent Internet security threats, different security measures have emerged. Whilst these security schemes ensure a level of protection against such threats, they sometimes have significant impact on perceived Quality of Service (QoS). There is thus need to retrieve ways for an efficient integration of security requirements with their QoS counterparts. In this paper, we devise a Quality...
In this paper we propose the DISC-SeT framework to handle the representation, solution computation and verification of temporal and security requirements in the services composition. The proposed approach provides a flexible event calculus based composition design, that allows for modeling different temporal (response time, time-units and other) and security aspects (access control, confidentiality...
This paper proposes a lightweight, fast, and efficient traffic intensity-based intrusion detection method for wireless sensor networks (WSNs), containing a large number of nodes which transmit data periodically. Intrusion detection method is based on analysis of neighbor's behavior and thresholding technique, applied to selected parameters: the number of received packets in a time window of a given...
Desktop virtualization is a new delivery method in which desktop operating systems execute in a data center and users access their applications using stateless "thin-client" devices. This paradigm promises significant benefits in terms of data security, flexibility, and reduction of the total cost of ownership. It is important to further improve this approach while maintaining good user...
Malicious software often infects a corporate network by exploiting security holes in web browsers to infiltrate a PC when its user visits a dodgy website. Compromised machines can then be linked up to form “Bot-nets” under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests. This Paper looks at identity concealment techniques and Bot-net characteristics...
Various tools, which are capable to evade different security mechanisms like firewall, IDS and IPS, exist and that helps the intruders for sending malicious traffic to the network or system. So, inspection of malicious traffic and identification of anomalous activity is very much essential to stop future activity of intruders which can be a possible attack. In this paper we present a flow based system...
This contribution presents validation results of an intuitive approach named `GrADAR' for automatically selecting response measures to DoS attacks. It creates and maintains a model of a computer network and of the availability of its resources from the observations of deployed monitoring systems. The graph-based model is able to express both the effects of DoS attacks and response measures as reactions...
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks, where the attacker needs no access to a clock. In the context of client-side web application security, we present JavaScript-based...
The paper is devoted to present various intelligent, distributed network-based intrusion detection systems architectures and quality measures. Moreover an impact of network and their intrusion detection system architectures parameters on the intrusion detection systems quality is discussed.
A main concern for network intrusion detection systems is the ability of an intruder to evade the detection by routing through a chain of intermediate stepping-stone hosts. The intruders have developed some evasion techniques such as injecting chaff packets or timing jitter. Such evasion techniques cause most of the previous timing-based detection algorithms to fail. In this paper, we address these...
Robustness and reliability with respect to the successful completion of a schedule are crucial requirements for scheduling in multi-agent systems because agent autonomy makes execution environments dynamic and nondeterministic. We introduce a model to incorporate trust which indicates the probability that an agent will comply with its commitments into scheduling, thus improving the predictability...
Risk-based information trading systems have recently emerged as a new paradigm for enabling information sharing in dynamic environments. Such systems build an information trading market whose commodity is information (quantized into objects) and whose currency is monetized evaluated risk. In these trading systems, risk is calculated by the information seller (and consequently charged to the information...
A key way in which banks mitigate the effects of phishing is to have fraudulent websites removed or abusive domain names suspended. This dasiatake-downpsila is often subcontracted to specialist companies. We analyse six months of dasiafeedspsila of phishing Website URLs from multiple sources, including two such companies. We demonstrate that in each case huge numbers of Websites may be known to others,...
A traditional host-based intrusion detection system (HIDS) has to continuously monitor thousands of objects on the host, regardless of whether or not there are any attacks and in what scenarios these attacks have been occurred. This leads to a huge consumption of system resources. In this paper, we put forward an approach that dynamically adjusts the objects a HIDS monitors according to the expected...
The paper is devoted to discuss selected issues of distributed intrusion detection system composed of two complementary parts: distributed monitoring system and distributed decision making system. The aim of the paper is to formulate and investigate various aspects of distributed monitoring system optimization. The discussed optimization tasks are motivated by assumption that quality of decision making...
Sending spam is a profitable activity for spammers and more than 95% of the Internet messages will be spams in a near future. This paper presents a tool that helps developers of anti-spam systems to monitor the current spammer behavior, monitor the performance of current anti-spam systems, and analyze new anti-spam mechanisms developed. Performance analyses for the mostly used anti-spam mechanisms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.