The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic changes of grid entities can result in security problems in the grid environment and in efficient use of resources. Resource provider may maliciously exaggerate resource performance and unilaterally contract termination. The original deadline and budget constraint method for resource scheduling is not suitable for unreliable environment. By employing trust mechanism into grid environment,...
With serious situation of data leakage in many enterprises, sensitive dataflow protection based on Trusted Virtual Domains (TVD) has been gradually paid much attention to. Remote attestation among two or more entities across trusted virtual domains is an important means to ensure sensitive dataflow, but the existing schemes could not satisfy the higher requirements of flexibility and security in the...
Traditional security approaches are not sufficient to deal with the protection and survivability of highly distributed information systems operating in unbounded networks. In view of the deficiencies of the essential servicespsila self-recovering when the survivable system is not available, an efficient self-adjusting reconfiguration framework on system survivability is presented based on the service-level...
Continuously increasing volume of security data makes it important to develop an advanced alert correlation system that can reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. In this paper, we propose a new method of constructing attack scenarios in order to recognize attacker's high-level strategies and predict upcoming attack intentions. We mine frequent...
Huge volume of security data from different security devices can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore, it is important to develop an advanced alert correlation system that can reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. In this paper, we proposed a new method of mining...
Since security audit data increased so dramatically, management and analysis of these security data become a challenge issue. In our system SATA (security alerts and threat analysis), we proposed a new method of learning multi-stage attack strategies through attack sequence mining method to recognize attacker's high-level strategies and predicting upcoming attack intentions. We first apply an attack...
Large volume of security data can overwhelm security managers and keep them from performing effective analysis and initiating timely response. Therefore, it is important to develop an advanced alert correlation system to reduce alert redundancy, intelligently correlate security alerts and detect attack strategies. In our system, we introduced statistical filtering method in attack plan recognition...
Since security audit data increased so dramatically, management and analysis of these security data become a critical and challenge issue. SATA (security alerts and threat analysis project) aims at analyzing the security events and detecting the security threat. In this paper, we proposed a novel method of constructing attack scenarios model in order to recognize multi-stage attack behaviour and predict...
More and more intrusion detection systems were developed, but most of these systems have very poor accuracy. To overcome this problem, a self-adaptive anomaly detection system was developed using fuzzy detection anomaly algorithm with negative selection of biology. The algorithm improves the accuracy of the detection method and produces a novel method to measure the deviation from the normal that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.