The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Insider attacks in which misbehaving Virtual Machines (VMs) take part of the cloud system and learn about its internal vulnerabilities constitute a major threat against cloud resources and infrastructure. This demands setting up continuous and comprehensive security arrangements to restrict the effects of such attacks. However, limited security resources prohibit full detection coverage on all VMs...
Wireless Sensor Networks (WSNs) is collection of large number of sensor nodes which are of limited capabilities, to collect sensitive information. With the advancement of this technology, one of the major concerns these days is of security. There are so many attacks possible on WSN, in Distributed-Denial of Service (DDOS) attacks, malicious nodes adapts many attacks such as flooding attack, black...
Flow-based inspection is playing an important role in network security monitoring systems such as intrusion detection, attacks detection and so on. Traditional flow scheduling strategies are usually based on calculated hash values of input flows which is fixed for a long time. As the bandwidth grows dramatically these years, it is observed that servers handling flow inspections may be crashed due...
Cloud Computing is the key technology of today's cyber world which provides online provisioning of resources on demand and pay per use basis. Malware attacks such as virus, worm and rootkits etc. are some threats to virtual machines (VMs) in cloud environment. In this paper, we present a system call analysis approach to detect malware attacks which maliciously affect the legitimate programs running...
Traditional multi-step attack correlation approaches based on intrusion alerts face the challenge of recognizing attack scenarios because these approaches require complex pre-defined association rules as well as a high dependency on expert knowledge. Meanwhile, they barely consider the privacy issues. Under such circumstance, a novel algorithm is proposed to construct multi-step attack scenarios based...
In wireless ad hoc networks (WANETs), collaboration among nodes is usually inefficient and the network is vulnerable to various attacks. Although some intrusion detection systems (IDSs) and reputation strategies have been proposed to enhance the network's robustness, the significant power consumption they cause will reduce the networks' lifetime. In this paper, we propose a power-efficient mechanism...
Internet of Things (IoT) has emerged these last years as one of the most attractive subjects in both the research community and the public. As a sub-domain, Wireless Sensor Networks (WSNs) have been attracting a lot of interest. However, the resource-constraint characteristics of physical objects in those networks presumably limit the design and development of security protocols. Whilst, sensor nodes...
In the global internet it is impossible to predict future challenges in server security. A publicly available server must perform its service and at the same time resist malicious intrusions and break-in attempts. This short paper examines a scenario of two cloned servers that run in parallel in order to detect previously unknown, novel attacks. One server is internet-exposed, the other runs in a...
Nodes in MANETs are subject to many security leaks, because the communication between nodes occurs using the wireless medium without an infrastructure. Each node has a limited amount of energy available, because they are powered by batteries. Performing monitoring operations to establish whether a node is fair or not requires a large amount of energy, hence their reduction is desirable when they are...
To secure IaaS cloud environments, multiple layers of security mechanisms must be deployed and monitored. When a threat is detected, it must be appropriately acted upon. A common problem with monitoring such approaches is the sheer volume of alarms generated. Some alerts may be false positives, others are informational. It is challenging for cloud providers to quickly interpret which events to act...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
MANETs are networks composed of mobile nodes connected using the wireless medium to communicate each other. The MANET nature makes it subject to various types of security leaks. External nodes could interfere with the communication, fair nodes could be compromised at any time by malicious agents. Another issue regards the limited amount of energy available to nodes, so their behavior could become...
Today's world is made of electronic networks. Everyday huge amount of sensitive data are passed through these networks. These networks are the backbones of the industries like banking, transportation, healthcare, defense, communication etc. So securing the data passed through these networks is essential. Organizations are investing more and more money to secure their data from the attackers. On the...
The increased computation and storage capabilities of smartphones have attracted more and more cybercriminals to write mobile malware for different purposes. Due to the popularity of smartphones in both personal life and business, it is empowering an emerging mobile security threat issue. In this paper, we present an intrusion detection system that incorporates not only network features but also host-based...
Despite recent emerging development in intrusion detection or network monitoring, malicious attacks and misbehavior remain a high-risk issue within network traffic. In this paper, we present a proactive solution called MMT (Montimage1 Monitoring Tool) that allows facilitating network security and performance monitoring and operation troubleshooting. We demonstrate the improvements of MMT in comparison...
In smart grid, demand side management (DSM) became increasingly important to improve the energy efficiency. It requires sophisticated real-time embedded control systems to manage distributed energy resources. These network-connected systems will be exposed to wide range of security threats when incorporating information and communication technologies. Securing embedded systems has unique resource...
The Intrusion Detection System architectures used in commercial and research systems have a number of problems that limit their configurability. An important problem of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. Thus, the IDS does not have the ability to detect new attacks. We propose in this paper a...
The agents used in the intrusion detection architectures have multiple characteristics namely delegation, cooperation and communication. However, an important property of agents: learning is not used. The concept of learning in existing IDSs used in general to learn the normal behavior of the system to secure. For this, normal profiles are built in a dedicated training phase, these profiles are then...
Voice over IP (VoIP) gains more and more attractiveness by large companies as well as private users. Therefore, the risk increases that VoIP systems get attacked by hackers. In order to effectively protect VoIP users from misuse, researchers use, e.g., honeynets to capture and analyze VoIP attacks occurring in the Internet. Global VoIP security threats are analyzed by studying several millions of...
Traditional intrusion detection systems are not adaptive enough to cope with the dynamic characteristics of cloud-hosted virtual infrastructures. This makes them unable to address new cloud-oriented security issues. In this paper we introduce SAIDS, a self-adaptable intrusion detection system tailored for cloud environments. SAIDS is designed to re-configure its components based on environmental changes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.