The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DDoS attack is one of the major concerns for network and cloud service providers, due to its substantial impact on revenue/cost and especially on their reputation. Also, network administrators are looking for solutions to manage voluminous data traffic. SDN is an emerging networking paradigm that provides a flexible network management. Hence, SDN is being widely adopted for wired, wireless, and mobile...
Over the past several years, billions of dollars have been invested globally to build out high speed networks for consumers and businesses alike. Today home internet speed of 100 Mbps are common with some areas offering home networking speeds of 1 Gbps. During the same time period, enormous compute capacity has been deployed in data centers at the core of the internet — primarily to deliver new services...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
This work presents a methodology for evaluating informatics security in any kind of organization. We use the ISO-27002/2013 standard and the Mexican equivalent NMX-I27002.NYCE-2009 as basis to follow. The standards stablish fourteen controls: human factors, technological, process, and legal controls. The organization must choose adequate controls for it, then It can use the ”Minimal Distance Method...
This paper proposes a new Distributed Deny of Service attack in Named Data Networking, and analyzes the Interest Flooding Attack in the case of conspiracy between the consumer and the content provider. After collusion with the content provider server, the attacker sends an Interest Flooding Attack request that can be satisfied, and the content provider server delays a large enough time to return the...
To resist the growth of abnormal traffic such as P2P, DDoS and Internet worms, this paper discusses a circuit design to realize real-time abnormal traffic detection from broadband networks. Real-time counting of cardinality is the key of the circuit. Although our previous study showed the effectiveness of cardinality counting to detect various abnormal traffic, the slowness of DRAM access prevented...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
Information-Centric Networking (ICN) is a recent paradigm that claims to mitigate some limitations of the current IP-based Internet architecture. The centerpiece of ICN is named and addressable content, rather than hosts or interfaces. Content-Centric Networking (CCN) is a prominent ICN instance that shares the fundamental architectural design with its equally popular academic sibling Named- Data...
The deceitful practice of Typosquatting involves deliberately registering Internet domain names containing typographical errors that primarily target popular domain names, in an effort to redirect users to unintended destinations or steal traffic for monetary gain. Typosquatting has existed for well over two decades and continues to be a credible threat to this day. While much of the prior work has...
DNS caches are an extremely important tool, providing services for DNS as well as for a multitude of applications, systems and security mechanisms, such as anti-spam defences, routing security (e.g., RPKI), firewalls. Subverting the security of DNS is detrimental to the stability and security of the clients and services, and can facilitate attacks, circumventing even cryptographic mechanisms. We study...
Software-Defined Networking (SDN) emerges as a recent paradigm that grants a holistic network visibility and flexible network programmability, facilitating rapid innovation of protocol and services. Although SDN provides greater control over traffic flow than ever before, it also introduced new challenges and issues to be addressed with its management. In that light, the security and reliability of...
Tor hidden Services are used to provide anonymity service to users on the Internet without disclosing the location of the servers so as to enable freedom of speech. However, existing Tor hidden services use decentralized architecture making it easier for an adversary to launch DHT-based attacks. In this paper, we present practical Eclipse attacks on Tor hidden services that allow an adversary with...
With the increase in the sophistication of cyberattacks, collaborative defensive approaches such as Collaborative IDSs (CIDSs) have emerged. CIDSs utilize a multitude of heterogeneous monitors to create a holistic picture of the monitored network. Nowadays, a number of research institutes and companies deploy CIDSs that publish their alert data publicly, over the Internet. Such systems are important...
Port scanning is widely used in Internet prior for attacks in order to identify accessible and potentially vulnerable hosts. In this work, we propose an approach that allows to discover port scanning behavior patterns and group properties of port scans. This approach is based on graph modelling and graph mining. It provides to security analysts relevant information of what services are jointly targeted,...
The denial of service attack is the most powerful damaging attacks used by hackers to harm a business or organization. This attack is one of most dangerous cyber-attacks. It causes service outages and the loss of millions, depending on the time of attack. In past few years, the use of the attack has enlarged due to the accessibility of free tools. This tool can be blocked simply by having a good firewall,...
As technology rises in innovation and proliferation in the present times, with everyday life melding into the digital realm, so too rise the dangers and threats that such a digital dimension presents. In an age where cyber space has become so synced with physical lives, we must learn the need for cyber security and endeavor to propagate awareness for the same. In this paper, we explore and summarize...
Distributed Denial of Service (DDoS) attacks employing reflected UDP amplification are regularly used to disrupt networks and systems. The amplification allows one rented server to generate significant volumes of data, while the reflection hides the identity of the attacker. Consequently this is an attractive, low risk, strategy for criminals bent on vandalism and extortion. To measure the uptake...
Fraud has existed long before the advent of modern technology; however, we can increasingly observe how this profit-driven enterprise is entering the cyberspace. Our paper focuses on a case study of two scam schemes targeting international students at Penn State. The scams have been perpetrated in either a physical (i.e., phone scam) or online (i.e., Craigslist scam) form. However, this dichotomy...
Traffic monitoring and analysis has become necessary to understand the nature of information flowing within an organization. This is particularly important due to the recent trend of increase in the percentage of anomalous traffic in the overall organizational traffic composition. In this work, we attempt to determine the typical characteristics seen in various organizational network traffic. We use...
With the increased use of ICT in different areas of contemporary life, the widespread access to the Internet, and the use of social media, individuals and organisations face constant threats and challenges resulting from the bad consequences of cybercrimes. Research shows that the incidence of cybercrime is increasing. In response to these threats and challenges, government and law enforcement agencies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.