The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management...
While gracefully combining FMIPv6 and HMIPv6 together, F-HMIPv6 enables the best performance in terms of handover latency and signaling overhead. Recently, to protect F-HMIPv6, Kang and Park proposed a security scheme. This scheme successfully achieves seamless integration with FHMIPv6 while providing the session key exchange as well as the mobile node authentication. In this paper, Kang-Park's scheme...
Traffic security is one of the most important problems to be improved for our daily environment, especially in Japan. Surveillance systems are effectively used to observe intrusion into dangerous and security area. They are well evaluated to monitor whether people enter such an area or not. A remote surveillance system has been developed, which supports users of mobile phones to facilitate network...
Intrusions are one of the most important issues in the current Internet environment. Therefore, a lot of researchers and companies elaborated countermeasure techniques such as intrusion detection systems (IDS) and intrusion prevention systems (IPS). These systems detect intrusions and prevent attackers from succeeding in their intrusion attempts. They usually rely on pattern matching and therefore,...
New threats are constantly appearing on the Internet. System administrators have developed many tools to try to mitigate those threats, however, currently available countermeasures are still limited. Moreover, it is difficult for system administrators to fully understand what happens in their networks in (near) real time. We focus on the monitoring of network traffic sent to unused IP addresses with...
A surveillance system is designed and implemented with network cameras, an integrated Web/mail server, mobile computing devices as GUI, and remote control devices. It can obtain JPEG images from network cameras, process them, and accumulate them into its database. It can also receive requests from clients, analyze them, and perform services of remote monitoring and/or controlling. Image processing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.