The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of big data, the huge amount of data information has brought huge industry value, but the network security problem has become more and more prominent. From the discussion about the definition and characteristics of big data, the article introduces the means of network security data visualization, and make use of the characteristics of big data-5V features are mapped to network security...
This paper describes a new collaborative approach to detect two different types of Covert Storage Channels (CSCs) that utilize TCP flag and packet sequence number in network packets. Tested in Software-defined networking (SDN), a multistage detection mechanism coordinates monitors, correlators and SDN controllers to first quickly alert traffic anomalies, then to conduct on demand selective deep-inspection...
As the sophisticated attacks are increased continuously, the attack analysis technologies are getting more important. It is needed to collect attack related information or data first for the attack analysis. But attackers make an effort to get rid of all the attack related information that they can find and adopt anti-forensic technologies as well, so it is quite difficult to collect sufficient information...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
This paper presents a software implementation for an Intrusion Detection System (IDS) and Honeypot zone based on network traffic analysis. HoneYDSPK monitors real time network traffic and blocks the potential sources of attacks by sending commands to the firewall controller. The application is based on the Cisco SDN implementation One Platform Kit. This paper comes with a new approach by allowing...
This paper presents preliminary findings on a novel method to remotely fingerprint a network of Cyber Physical Systems and demonstrates the ability to remotely infer the functionality of an Industrial Control System device. A monitoring node measures the target device's response to network requests and statistically analyzes the collected data to build and classify a profile of the device's functionality...
Network forensic is a offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection in the network. Network examination manage unstable and persuasive data. Network traffic movement is spread and afterward lost, so organize legal sciences is frequently a devoted examination...
With the rapid growth in the number of mobile phone users, mobile payments have become an important part of mobile e-commerce applications. Secure payment systems directly affect the security of e-commerce systems. This paper proposes an anomaly detection mechanism supported by an information entropy method to improve mobile payments security. The simulation result shows that it can realize the effective...
Abstract- Voice over IP (VoIP) technologies such as Skype are becoming increasingly popular and widely used in different organisations, and therefore identifying the usage of this service at the network level becomes very important. Reasons for this include applying Quality of Service (QoS), network planning, prohibiting its use in some networks and lawful interception of communications. Researchers...
Grid computing is evolving fast, with specific needs for computing power, storage capacity and available bandwidth. Network security is a big concern for grid networks because attacks can endanger the availability of grid usual services. High amounts of data transferred between sites can make difficult the traffic analysis needed to identify possible cyber-attacks. This paper presents some aspects...
One of the challenges facing information technology (IT) security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and conduct a forensics analysis to determine an appropriate course of action. This process is complicated significantly by the volume of traffic that can be associated with a production device environment. A honey net...
Due to the sharp rise in computer network attacks through botnets, current security monitoring tools will be insufficient for effective botnet traffic detection. In fact, most of the existing tools are text-based and there is a lack of effective user friendly interface that can facilitate detection of botnet traffic in large datasets. Moreover, most of these tools are based on reactive approaches...
The finalization of the 100 Gbps Ethernet Specification has been a tremendous increase in these rates arriving into data centers creating the need to perform security monitoring at 100 Gbps no longer simply an academic exercise. We show that by leveraging the 'heavy tail flow effect' on the IDS infrastructure, it is possible to perform security analysis at such speeds within the HPC environment. Additionally,...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Wireless Sensor Network(WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory makes sensor networks infeasible to use conventional security...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
In order to make the healthy and stable operation of the next generation Internet, this paper designs a network traffic monitoring system oriented IPv6. The System uses the collected Net Flow data to make statistics and analysis. The key technologies used in the system were introduced and the main framework of the system was given. The system has been tested in the cernet2, and the test results show...
In this paper, we propose a bot detection method that enhances traffic analysis of Network based IDS (NIDS) by using process contextual information obtained from monitored machines. Existing NIDS classifies hosts suspected of doing both of the Command and Control (C&C) communication and infection activities as bots. However, this approach cannot conduct finer-grained analysis than IP address level,...
Cluster technology has witnessed a tremendous inception in computing world. The technique integrates the standard computing resources to generate more processing power and other hardware strengths. The collection of interconnected stand-alone computers ensures high availability, increased throughput, scalability and improved performance. We have developed a dynamic cluster based approach for high...
Vehicular ad hoc networks support a wide range of promising applications including vehicular sensing networks, which enable vehicles to cooperatively collect and transmit the aggregated traffic data for the purpose of traffic monitoring. The reported literatures mainly focus on how to achieve the data aggregation in dynamic vehicular environment while the security issue especially on the authenticity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.