The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network intrusion detection systems are widely deployed to detect cyberattacks against computer networks. These systems generate large numbers of security alerts that require manual review by security analysts to determine the appropriate courses of action required. The review of these security alerts is time consuming and can cause fatigue for security analysts, especially during long work shifts...
Previous work on machine learning for intrusion detection in mobile tactical networks using the extremely lightweight intrusion detection (ELIDe) system has shown that ELIDe can approximate signature-based intrusion detection using significantly less resources and power than the traditional intrusion detection system without significantly degrading accuracy. ELIDe also performs binary classification...
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security challenge to be addressed. In this paper, we propose a DNS query-based DDoS attack mitigation system using Software-Defined Networking (SDN) to block the network traffic for DDoS attacks. With some features provided...
New and unseen network attacks pose a great threat to the signature-based detection systems. Consequently, machine learning-based approaches are designed to detect attacks, which rely on features extracted from network data. The problem is caused by different distribution of features in the training and testing datasets, which affects the performance of the learned models. Moreover, generating labeled...
Despite widespread use of commercial anti-virus products, the number of malicious files detected on home and corporate computers continues to increase at a significant rate. Recently, anti-virus companies have started investing in machine learning solutions to augment signatures manually designed by analysts. A malicious file's determination is often represented as a hierarchical structure consisting...
We consider a communication problem in which a transmitter encodes a source into several streams that are subject to modification by an omniscient adversary while en route. We design encodings with a distortion guarantee that degrades gradually as the number of streams that the adversary alters increases. Notably, we find that a mixture of highly redundant coding and uncoded transmission outperforms...
Tire Pressure Monitoring Systems (TPMS) offer real-time diagnostics of the status of a vehicle's tires via a wireless communications link back to the vehicle. These links, which provide data, mandated by the NHTSA, generally possess low security/low privacy, leading to a demonstrated potential for spoofing attacks or tracking a person/vehicle through the unencrypted emission of the tire's unique identifier...
MU-MIMO beamforming offers great potential for the AP with multiple antennas to serve multiple receivers concurrently. A key factor to implement the MU-MIMO system is the CSI feedback mechanism. However, it might be exploited by malicious attackers to threaten the transmission security of benign clients. To better explore the attacks through false CSI feedback in MU-MIMO systems, this paper proposes...
Traditional cryptographic secret key establishment mechanisms are facing challenges with the fast growth of high-performance computing, and can be very costly in many settings, e.g. in wireless ad-hoc networks, since they consume scarce resources such as bandwidth and battery power. As an alternative, link-signature-based (LSB) secret key extraction techniques have received many interests in recent...
Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different wireless devices. However, network administrators...
In this paper, we investigate the information-theoretic secrecy of a system with multiple legitimate receivers and multiple eavesdroppers. This system is subject to the Nakagami-m fading. Unlike some existing works, we do not assume that the fading parameters are identical or integers. Although the complexity is significantly increased, we are able to derive a set of closed-form formulas for the outage...
Standard applications are unable to perform well in delay- and disruption-tolerant networks (DTNs) due to frequent lack of end-to-end connectivity and long communication delays. Such applications must be thus adapted to be able to operate in disadvantageous network conditions. In a previous work on adapting standard tactical applications for DTN networks, we proposed how such an adaptation may be...
Mobile ad-hoc networks (MANET) are of particular importance in military communications. With the trend towards higher throughput requirements and spectrum congestion, researchers have looked at using multi-antenna techniques to enable concurrent transmissions within a one-hop MANET. However, the acquisition overhead has been shown to be a problem when dealing with concurrent transmission in MANET...
In a wireless ad hoc multimedia network, how does the Quality of Experience (QoE) of the user affect the level of Situational Awareness (SA)? Is maximum QoE necessary for high SA? In this empirical study, we propose a novel measurement approach to quantify SA based on the QoE of the user. The relationship between QoE and network Quality of Service (QoS) metrics such as delay and packet loss is well...
Traffic in military ad hoc networks are often broadcast or multicast traffic. A robust and efficient way to handle this type of traffic is the multi-point-relay (MPR) method. Furthermore, frequency spectrum is a scarce resource and must often be shared by several networks resulting in a risk for internetwork interference. The objective of this paper is to analyze the effects from internetwork interference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.