The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
This paper proposes an enhanced Interface to Network Security Functions (I2NSF) framework. To improve the whole packet throughput and manage resource of Network Security Functions (NSFs), the enhanced I2NSF framework monitors NSFs and distributes incoming packets to NSFs efficiently. Even if the legacy framework that provides security services using Software-Defined Networking (SDN) and Network Functions...
Existing attestation solutions based on Linux Integrity Measurement Architecture treat the network as an untrusted input. Thus, they often employ strict access control mechanisms with tunneling policies to prevent network flows from tainting the system. However, these different access control policies are challenging for administrators to model and verify for different Linux deployments, making them...
Big data becomes a real opportunity and a serious worry for data managers, data scientists, researchers and even for business managers. An opportunity as a set of powerful technologies and a bunch of interesting concepts that aim resolving business problems of an organization. A worry because big data implies big challenges and big resources that make harder the task of mining value from all the available...
Process Control Systems (PCSs) are the operating core of Critical Infrastructures (CIs). As such, anomaly detection has been an active research field to ensure CI normal operation. Previous approaches have leveraged network level data for anomaly detection, or have disregarded the existence of process disturbances, thus opening the possibility of mislabelling disturbances as attacks and vice versa...
Data characteristics stored in the database evolve over the time. Nowadays, it is inevitable to store all states of the objects over the time. Paradigms of conventional database are based on managing actual states, which are inappropriate. Therefore, temporal approach has been developed. In this paper, we deal with our proposed temporal solution based on attribute level architecture, which can be...
Modern vehicles are running complex and safety critical applications distributed over several Electronic Control Units (ECUs). Some ECUs are equipped with communication interfaces providing access to other devices, networks or remote services. Since the number of attack vectors is increasing, an early investigation of the impact of attacks becomes steadily more important. This paper gives an example...
Current cloud computing data centers are usually based on large-scale clusters, including thousands of servers. The monitoring and management of resource is very important to the operation of cloud systems, which usually employ the traditional centralized monitoring mechanisms. The main defects of the centralized management mechanism are the bottleneck of system, the communication traffic and the...
In this paper we introduce a simple model of multi-market trading. An identical security trades on two independent trading platforms. Prices and quotes are connected only by the strategic behavior of traders. The experimental design varies the degree to which traders monitor and act on information from both markets. We report on the degree of integration between the two markets as measured by the...
Despite the many benefits of virtualisation, security remains the main challenge for virtualisation in cloud computing. Even though a number of solutions like intrusion detection, malware introspection among others, have been developed and implemented by many security professionals, monitoring, visibility and infrastructure still pose security threats to virtualisation in cloud computing. In this...
Amongst the therapies available to stroke sufferers, one that is gaining attention is the application of video games to encourage therapeutic movement. The Limbs Alive project at Newcastle University has developed a system that gathers therapeutic game data from patients, uses statistical tools to estimate a number of performance metrics and presents the results to patients and clinicians via web...
The spring up of cloud storage, such as Hadoop HDFS, Open Stack Swift, brings us more intelligent storage solutions. Nowadays, the most commercial version of cloud storage system puts more emphasis on high-performance and high-availability, very little attention is given to privacy protection. This paper proposes a user influence-based data distribution optimization method, User Rank, which migrate...
Nowadays, many industries and government can exploit Big Data to extract valuable insight. Such insight can help decision makers to enhance their strategies and optimize their plans. It helps the organization to gain a competitive advantage and provides added value for many economic and social sectors. In fact, several governments have launched programs, with important funds, in order to enhance research...
With the rapid development of computer technology and application of Internet is becoming more and more widely, the Internet plays a more and more important role in people's life. At the same time, all kinds of network security events emerge in endlessly, seriously threaten the application and development of the Internet. With the purpose of safety, network monitoring, have more and more important...
Nowadays we need more services and more security in hi-tech environment for accessing the data from DW because data which is stored in Data Warehouse is crucial and sensitive. These sensitive data is used by decision maker to make the strategies decision to analyze the status and development of an origination. The data of Data Warehouse can easily access by an unauthorized user through unfair means...
Nowadays information and automation technology infrastructures, as used in Critical Infrastructures, manufacturing plants or distributed sensor networks, have become very complex and dependant to automation. This does not only demand for higher bandwidths and bit rates in connecting network technologies, furthermore major security issues arise as seen over the last years. The vision of secure information...
Managing critical infrastructures under the growing cyber-threat is becoming a matter of international urgency. The volume and frequency of cyber-related incidents on the rise yearly, and the level of sophistication is increasing. Critical infrastructures are key service providers and heavily interconnected, meaning any damaging impact would result in devastating consequences and potential cascading...
Inadvertent data disclosure by insiders is considered as one of the biggest threats for corporate information security. Data loss prevention systems typically try to cope with this problem by monitoring access to confidential data and preventing their leakage or improper handling. Current solutions in this area, however, often provide limited means to enforce more complex security policies that for...
Insider attack is one of the key attacks in wireless sensor networks(WSNs). Despite its destructive force to network functions is huge, insider attackers are difficult to be detected only by the traditional techniques. Meanwhile, existing secure routing schemes are also vulnerable to insider attack and low energy-efficient due to their deterministic nature. Once a normal node is compromised or captured,...
With the level of cyber-attacks increasing in volume and sophistication, the need for improved counter measures is growing. The repercussions of a successful attack on a critical infrastructure would result in a paralysing impact on the economy and the general population as a whole. For that reason, the framework proposed in our previous work details the use of a system for supporting security. Our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.