The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function...
Biometrics based authentication systems face the major challenge in securing the template. Although multi-modal biometric techniques and cryptographic techniques offer security but they can be easily compromised. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e. keeping it unimodal but still offering the same security as that of the combined...
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. The fuzzy vault scheme provides supreme security to the templates which are stored in a database or smart card. Compared to an ordinary system which...
A technique has been presented to use ECG (Electrocardiogram) for human identification. Earlier researches were tested on PTB or MIT-BIH ECG data which was recorded once a person is at rest and will give erroneous results if the heart beat rate changes depending upon human activity. Hence time and amplitude normalization is necessary for identification. In this technique, R peaks of ECG signal are...
This paper analyses the unlinkability and the irreversibility of the iris biometric template protection system based on Bloom filters introduced at ICB 2013. Hermans et al. presented at BIOSIG 2014 an attack on the unlinkability of these templates. In the worst case, their attack succeeds with probability at least 96%. But in their attack, they assume protected templates generated from the same iriscode...
Advanced Persistent Threat (APT) poses a serious threat to cyber security, and its unique high unpredictability, deep concealment and grave harmfulness make the traditional network monitoring technology facing unprecedented challenges in the background of massive and complicated network traffic. This paper aimed for the urgent demand of APT network monitoring. Relying on the rapid development of big...
There has been an increasing interest in big data and big data security with the development of network technology and cloud computing. However, big data is not an entirely new technology but an extension of data mining. In this paper, we describe the background of big data, data mining and big data features, and propose attribute selection methodology for protecting the value of big data. Extracting...
The new undergraduate colleges is the useful supplement of current higher education in China, and is the cornerstone for promoting EFA(Education For All). However, the teaching quality of these colleges has affected to a certain extent due to the incensement of the number of students, the decline of the quality of students, and the shortage of teachers. The PDCA method is a mature ring management...
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS solutions are not suitable for cloud environments. This paper presents a hierarchical and autonomous cloud based intrusion detection system, HA-CIDS. The framework continuously monitors...
Network attack path analysis is an important method for analyzing the security status of computer network, which can automatically analyze the correlation between network vulnerabilities and potential threats resulting from vulnerabilities. It plays a guiding role in establishing network security policy. This paper chooses NVD and Bugtraq as vulnerability data sources, and extracts key properties...
Biometric based authentication can provide strong security for identifying the users. In addition, the security of biometric data is important, because most biometric data is not changeable in a lifetime. However, cancellable biometrics can stores a non-invertible transformed version of the biometric data. Namely, the biometric data is safely remained even if the storage is compromised. The cryptographic...
The image/video quality is a key issue in security video systems. Therefore the objective image/video quality criteria are extensively studied. In this paper, the novel full reference objective metric for image quality assessment is proposed. This metric is based on FSIM. The ROI detection is embedded in order to improve the performance. For ROI estimation, the ground truth data together with two...
The cyber threat landscape is evolving at a much faster rate than corporate cyber defenses are. Malicious actors have become more audacious in their exploit attempts during the past two years as evidenced by the growing number of publicly acknowledged breaches in the commercial and industrial sectors. Motivations range the gamut from “hacktivism” to corporate espionage. This paper will discuss one...
To determine the source camera of a query image, the fingerprint from the query image needs to be compared with the fingerprints in the reference fingerprint database. Traditionally, the query fingerprint is compared with these reference fingerprints one by one in sequence. For a large database, however, such a brute-force search is inefficient and time-consuming. How to accurately locate the correct...
The Insider Threat Security Reference Architecture, ITSRA, provides an enterprise wide solution to insider threat. The architecture consists of four security layers -- Business, Information, Data, and Application. Organizations should deploy and enforce controls at each layer in order to address insider attacks. Each layer does not function in isolation or independently of other layers. Rather, the...
The cyber situational awareness of an organization determines its effectiveness in responding to attacks. Mission success is highly dependent on the availability and correct operation of complex computer networks, which are vulnerable to various types of attacks. Today, situational awareness capabilities are limited in many ways, such as inaccurate and incomplete vulnerability analysis, failure to...
Effective design and implementation of any IT Optimization process relies on critical technical and business insights about IT environment. The essential information, which relates to hardware and software assets, is often in collective possession of the infrastructure and application specialists. In this paper, we describe the Knowledge Harvesting & Information Synthesis System (KHISS), which...
BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as IrisCodes. Unlike existing techniques, BioEncoding does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating...
Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. Many types of unimodal biometric systems have been developed. However, these systems are only capable to provide low to middle range of security feature. Thus, for higher security feature, the combination of two or more...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.