The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid growth of application migration, the anonymity in data center networks becomes important in breaking attack chains and guaranteeing user privacy. However, existing anonymity systems are designed for the Internet environment, which suffer from high computational and network resource consumption and deliver low performance, thus failing to be directly deployed in data centers. In order...
Software-Defined Networks (SDN) is an emerging area that promises to change the way we design, build, and operate network architecture. It tends to shift from traditional network architecture of proprietary based to open and programmable network architecture. However, this new innovative and improved technology also brings another security burden into the network architecture, with existing and emerging...
In cloud environment, client user credential protection is a critical security capability that is target of adversarial attacks, especially, in cloud file synchronization applications. Among the various adversarial attacks, MITC (Man in the Cloud) attack on commercial cloud storage applications has emerged as a critical threat because it is easy to launch and hard to detect. In this paper, we propose...
Flow-based inspection is playing an important role in network security monitoring systems such as intrusion detection, attacks detection and so on. Traditional flow scheduling strategies are usually based on calculated hash values of input flows which is fixed for a long time. As the bandwidth grows dramatically these years, it is observed that servers handling flow inspections may be crashed due...
Abstract- A number of challenges are facing the design of secure datacenter environments, such as applications high throughput requirements, low latency applications, scalability, ability to detect Advanced Persistent Threats (APT), bring your own device (BYOD), and protection against Distributed denial of service (DDOS) attacks. Software Defined networking (SDN) is an emerging paradigm that provides...
A cost effective and easy to create security system that can be installed in the public as well as private transport system for the safety of the passengers is presented in this paper. The system is intended to increase the safety as well as provide security to the commuters especially females. A mechanical switch is provided near to the passenger which can be pressed under uncompromising situation...
In this present day Embedded field most of research focused is on Embedded Linux. Our focus in this paper is Sensor Networking and Automation used for domestic and industrial applications. Using Rassberry Pi 2 developing on python editor & cortex processor presents a design and prototype implementation of new home ill automation system that uses WiFi technology as a network infrastructure connecting...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
The complexity of modern communication networks and innovative cyber-attacking methods make it difficult to automatically detect and prevent attacks. Software-Defined Networking (SDN) separates the forwarding of network traffic from the decision plane of the network and offers a central and programmable interface for the configuration of the network. In this paper, a novel approach to integrate end-to-end...
Dynamic Host Configuration Protocol (DHCP) starvation is an insider attack which prevents legitimate DHCP clients from acquiring network configuration parameters from DHCP server. The classical methods of creating starvation attack has a practical difficulty in wireless networks where an Access Point (AP) mandates a client to associate with unique MAC address before it can transmit such requests....
The implementation of an Islamic or Sharia core banking system (SCBS) must transform information technology into an enabler of business by providing an agile platform to achieve corporate objectives. It often forms an integral part of a business transformation program addressing key banking issues. The objective of this paper is to propose the development and implementation of an integrated sharia...
Test beds are essential in teaching and research on computer networks and security. However, designing and deploying a test bed is an expensive task. Various virtualization technologies make this task easier by enabling the creation and deletion of virtual machines (VMs) and their networks in less time on a single physical infrastructure. However, these VM based test beds are heavy-weight. In this...
The dynamic demilitarized zone (DMZ) model considers both network performance and security, and dynamically responds to traffic demands in real-time. We realize this dynamic DMZ model based on an OpenFlow-enabled switch and controller. In our approach, the controller detects flows with bit rate greater than a given threshold (elephant flows) and controls the switch in order to reroute elephant flows...
Cloud computing is based on virtualization, where a single physical resource is virtualized into multiple virtual resources. Processor and network virtualization offer many advantages like saving in hardware cost, energy consumption, human effort and management of resources. In this paper we have evaluated the effect of network and processor virtualization using popular open source tools, Open vSwitch...
In this paper, we implement an Open Flow based fully functional 802.1X access network and an IP based cognitive access network which are interconnected as edge networks to our SDN core. We realize seamless mobility in the WLAN domain and mobility between WLAN and Cognitive networks for the clients with dual band support. The pre-installed flows on the backbone aggregate traffic from access networks...
Recent work on integration of SDNs with application-layer systems like Hadoop has created a class of system, SDN-Enabled Applications, which implement application-specific functionality on the network layer by exposing network monitoring and control semantics to application developers. This requires domain-specific knowledge to correctly reason about network behavior and properties, as the SDN is...
The development of the mobile Internet brought about by the thriving mobile intelligent terminals has made it possible to access to the Internet anytime and anywhere. While people enjoy the convenience, they also suffer from a series of security threats caused by cyber-attacks. IPS brings reliability and security in a network system and is regarded as one of the most popular security devices. However,...
Information privacy protection is an essential problem in internal networks. The Bell-LaPadula Model (abbreviated BLP) is a state machine model used for enforcing access control, while it can't be used for networks. L-BLP model is designed for Local Area Networks(LAN) while it can't be proved security. We reveal the security problems in L-BLP and propose a security model based on BLP. We define five...
The security level of networks virtual access is one of the key indexes to evaluate the IaaS capability in cloud computing. Due to the introduction of virtualization technology, the boundaries of physical security domain have been broken and thus the traditional network access security and management strategies are not applicable any longer. Therefore, the security management of convergence between...
We proposed an improved 3GPP system and WLAN interworking network architecture by adding a management server in current architecture. This paper described the switchover process, the function of management server (MS). It analysed the security, load balance, manageability and robustness.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.