The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose two simple and practically feasible countermeasures to address the Route Spoofing and Resource Exhaustion attacks in Software Defined Networking (SDN) scenarios. For Route Spoofing attack, we introduce a new technique called “selective blocking” which blocks an adversary node to use a genuine user's active routes, and for Resource Exhaustion attack, we propose a “periodic...
The reports from last years outline the fact that the web crawlers (robots, bots) activities generate more than a half of web traffic on Internet. Web robots can be good (used for example by search engines) or bad (for bypassing security solutions, scraping, spamming or hacking), but usually all take up the internet bandwidth and can cause damage to businesses that rely on web traffic or content....
Threats within the network are a security risk with which you deal daily. Due to this, the use of more complex means of security than the Firewall should be considered to perform the analysis of the traffic behavior of the network by means of devices of next generation such as Systems of Detection and Prevention of Intrusions (IDPS). This article presents a comparison of commercial systems and open...
Software-Defined Networks (SDN) is an emerging area that promises to change the way we design, build, and operate network architecture. It tends to shift from traditional network architecture of proprietary based to open and programmable network architecture. However, this new innovative and improved technology also brings another security burden into the network architecture, with existing and emerging...
Software defined networking (SDN) is a novel networking paradigm which decouples control plane from data plane. This separation facilitates a high level of programmability and manageability. On the other hand, it makes the SDN controller a bottleneck and hence vulnerable to control plane saturation attack. One of the key mechanism to achieve control plane saturation is via TCP SYN flooding attack...
In this paper, we have studied and described the security of SIP Trunk on IMS network (IP Multimedia Subsystem) via SBC (Session Border Controller), introduced a model by installing SBC to connect between IMS Network and IP-PBX in concept of SIP Trunk and present new method to increase performance of SIP Trunk by specified concurrent call, setting the caller discrimination to filter subscriber number...
To provide reliable network and cloud services, it is necessary to perform precise monitoring and security analysis of cloud, ISP and local networks. Current SOHO (Small Office Home Office) devices have very limited resources and can not provide precise network security monitoring in local networks. Therefore we have designed small and low-power network probe which is able to analyse the network traffic...
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to every system object in systems-on-chip (SoCs). Access decisions are administered by a security logic “server" implemented as an extension of the...
Against the background of data explosion and cloud computing, this paper investigates a branch of the cloud computing technology which is known as VDI (virtual desktop infrastructure). Users can access data and information via cloud desktops with the endpoint devices. The paper studies OpenStack - a famous open-source cloud platform which has been widely used, and introduces a secure, optimized and...
The rapid growth of Internet-of-Things (IoT) devices, such as smart-bulbs, smoke-alarms, webcams, and health-monitoring devices, is accompanied by escalating threats of attacks that can seriously compromise household and personal safety. Recent works have advocated the use of network-level solutions to detect and prevent attacks on smart-home IoT devices. In this paper we undertake a deeper exploration...
As the sophisticated attacks are increased continuously, the attack analysis technologies are getting more important. It is needed to collect attack related information or data first for the attack analysis. But attackers make an effort to get rid of all the attack related information that they can find and adopt anti-forensic technologies as well, so it is quite difficult to collect sufficient information...
The Border Gateway Protocol (BGP) plays a critical role in the Internet providing connectivity to hosts across the world. Unfortunately, due to its limited security, attackers can hijack traffic by generating invalid routes. Some detection systems for route hijacking have been presented, but they require non-public information, high resources, or can easily be circumvented by attackers. We propose...
Cyber-attacks from terrorist, national enemies, disgruntled employees are on the rise now on an Oil Refineries, on shore petroleum fields, off-shore Platforms, Oil and Gas Pipe Lines which will have a catastrophic impact on oil production and in turn on economy of the country, it can also cause serious damage to the environment living being, and even human lives. There is a dire need to protect Petroleum...
Cyber-attacks are steadily increasing in both their size and sophistication. To cope with this, Intrusion Detection Systems (IDSs) are considered mandatory for the protection of critical infrastructure. Furthermore, research is currently focusing on collaborative architectures for IDSs, creating a Collaborative IDS (CIDS). In such a system a number of IDS monitors work together towards creating a...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Trafile monitoring is a challenging task that has been addressed by various research studies in recent years, especially for large networks. However, fewer studies have been conducted on home networks. In this paper, we tackle trafile monitoring issue in home networks focusing on anomaly detection use case. In fact, home networks are observing a continuous increase of complexity lead by the introduction...
This paper presents a software implementation for an Intrusion Detection System (IDS) and Honeypot zone based on network traffic analysis. HoneYDSPK monitors real time network traffic and blocks the potential sources of attacks by sending commands to the firewall controller. The application is based on the Cisco SDN implementation One Platform Kit. This paper comes with a new approach by allowing...
Web sites have been great diversity because of their purposes and structures today and many web sites are working on hosting services. A hosting service is one of the network services for outsourcing construction and maintenance of the servers. Thus, the web site operators are free from hardware setting and server maintenance. On the other hand, web sites have been exposed to cyber attacks. To counter...
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
The most effective security starts with real time visibility into all activity on all systems, networks, database and applications. In this paper the focus in on structured data however, some semi-structured and unstructured data is also explored. Whether the source is from network traffic, user activity, or the application user, any variation from normal of abnormal activity could indicate that a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.