The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aimed at the problem of Byzantine Attack in secure network communication, the network security assumptions which may contain Byzantine attacks are analyzed and described firstly. Then a secure random network coding model is proposed for resisting the Byzantine attacks where the CBC (Cipher Block Chaining) technology is combined with random network coding, we prove the correctness and security also,...
One of the key components of IEEE 802.11i authentication protocol to defend against various malicious attacks is its 4-way handshake scheme. However, since Message 1 in the handshake scheme has not been protected by the Message Integrity Code (MIC), the original 4-way handshake scheme specified by the IEEE standard is vulnerable to the Denial of Service (DoS) attacks and DoS flooding attacks. Several...
Because of enormous complexity of security protocols and lack of efficient security protocol modeling method, how to evaluate the WLAN security protocols poses unique and formidable challenges. To address this issue, a universal and extensible simulation platform for WLAN security protocols is proposed. First, the architecture of the platform is presented, which provides a unified interface to extend...
With the ever-changing threat of network, packet-filtering firewall, an important instrument for resisting threat, has become the effective measure of host-computer protection. Its ability depends on the capability of filtered rules. This paper first describes filtered rules formally, and then tests the rules including the verification of special aims and security analysis based on model checking...
Immune-Soft Man (ISM), a new concept, is an immune intelligent entity. ISM lives and acts in the computer network environment. It has great capabilities to deal with some things in certain circumstances without manual intervention and supervision. Comparing with Agent and Robot, ISM not only has more all-around humanized intelligence, humanized behavior and function, but also has the ability of environment...
We present a honeynet-based collaborative defense framework and an improved highly predictive blacklisting algorithm is developed to generate highly personalized and predictive blacklists for individual networks by correlating historic attackers captured by honeynet deployed in each network. In this way, different networks can defend new attackers in a collaborative way because one network will notify...
This paper has a thorough study and improvement to the SE-BGP security mechanism based on analyzing the merit and shortcoming of many kinds of BGP security mechanism proposed in recent years. The improvement project makes up the insufficiency of original project, has a good extendibility and easy deploying, enabling the SE-BGP security mechanism to have a better guarding ability.
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace...
Network security situation awareness provides the unique high level security view based upon the security alert events. But the complexities and diversities of security alert data on modern networks make such analysis extremely difficult. In this paper, we analyze the existing problems of network security situation awareness system and propose a framework for network security situation awareness based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.