The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Industrial Control Systems (ICS) networks are an increasingly attractive for attackers. The case of 2015 Ukraine cyber attack where hackers abused the ICS system to create a blackout is a good illustration of this interest. However, to achieve physical effects, it is necessary for attackers to embed themselves deep within the target network. So, attackers must protect this investment by using covert...
Local area network (LAN) access is the top vector for insider threats and misuses according to the Verizon's Data Breach Investigations Report. Address Resolution Protocol (ARP) is often exploited by the attackers who have gained access to the LAN. It is critical for students to learn how attacks on ARP work and know the countermeasures. In an earlier work, authors developed a hands-on lab to help...
Personal Cloud Storage (PCS) is a very popular Internet service. It allows users to backup data to the cloud as well as to perform collaborative work while sharing content. Notably, content sharing is a key feature for PCS users. It however comes with extra costs for service providers, as shared files must be synchronized to multiple user devices, generating more downloads from cloud servers. Despite...
The optical network management system is very important for optical equipment monitoring and managing, the timeliness and accuracy are very critical parameters. Automatic discovery of network nodes is the embodiment of automation of network management system. However, most of the traditional automatic discovery method is based on the ICMP protocol, which is to ping all the IP addresses in local area...
Cloud Control System is proposed based on Cloud Computing, Networked Control System and Internet of Things. It inherits the “3C” (Computing, Control and Communication) from Cyber-physical System and provides powerful ability of data storage and processing to serve control system. It is getting popularity day by day in the modern CS architecture, because of its ground breaking future applications....
Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
In this paper, we discuss a peer-to-peer (P2P) model of a topic-based publish/subscribe (PS) system (P2PPS model) where each peer process (peer) can both subscribe and publish event messages with topics and there is no centralized coordinator. Each peer has to causally deliver event messages in which the peer is interested. In our previous studies, the TBC (topic-based causally delivery) protocol...
Substation automation systems provide high level of automation for both substation and distribution network. Communication in modern substation automation systems is based on Ethernet, TCP/IP and interoperable protocols within standard network infrastructure. Communication security and reliability become important and must be considered to ensure correct operation of substation automation systems...
Correct additional fields text in AES3 Stream Format section of Annex I. (NOTE: This corrigendum was not published as a separate document, but was incorporated in IEEE Std 1722-2016)
The Work Elf is defined as an assistant in our desktop. The software completes the data manipulation by the XML file interface in Qt. It also achieves the interactive function by the GUI controls. It combined with UDP protocol to complete the networking function. And it combined with TCP protocol and SMTP protocol to complete the mail sending function. Therefore, this software built its all modules...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. As the study for solving this problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. As one scheme...
Verizon's Data Breach Investigations Report states that local area network (LAN) access is the top vector for insider threats and misuses. In Ethernet, the common vulnerabilities come from Address Resolution Protocol (ARP). It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures, which include static ARP cache entries, improved...
Networks rely on broadcasts and multicasts for some of the most basic services such as auto-configuration. In the recent past, application layer protocols have increasingly made use of the broadcast mechanism. Examples of these applications include Dropbox, Spotify or BitTorrent Sync. Given that broadcasts can be seen by every device in a broadcast domain, information that can be gleaned from this...
The security issues of smart grid have drawn more and more attention in the recent years. As a foundational part of smart grid, the cyber and physical security of advanced metering infrastructure (AMI) is of critical importance. Various securing solutions for AMI have been proposed, most of which based on cryptographic technology. However, as learned from experiences in IT environment, intrusion detection...
Software-Defined Networking (SDN) is bringing DevOps [1] capabilities to current networks, reducing the time-to-market for new services and thereby providing a strong incentive for adoption to Service Providers and Network Operators. However, the current SDN landscape is extremely fragmented, so that different open and closed source controller frameworks such as OpenDaylight [2], Ryu [3], Floodlight...
Nowadays security is a major concern. Address resolution Protocol (ARP) is a most popular communication protocol in the LAN. ARP is mapping from IP address (32 bits) into MAC address (48 bits). ARP has some limitations like lack of states and authentication. So attacker can exploit these vulnerabilities and gain unauthorized access to one's sensitive data. There are some attacks against ARP like MAC...
Various applications require the use of accurate time. However, public cloud providers do not currently offer accurate time as a cloud service. We study the level of precision that can be achieved in current public cloud environments, and make the case for time-as-a-service, which can considerably improve the precision of timekeeping in the cloud.
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.