The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-hop wireless networks (MWNs) are rapidly gaining attention, because they can provide a wide coverage area to Internet users. To provide stable and high-performance network environments, security issues must be addressed. This paper focuses on the security issues in terms of anomalous relay nodes inside networks because their malicious behaviors can degrade the performance of MWNs. To maintain...
Intrusion detection system records worm's signature, and detects the attack that lurks in traffic based on it. However, to detect the worm that corrects, and changes some oneself, a highly accurate detection technique for distinguishing the code that seems to be the worm included in traffic is requested. In this paper, we pay attention to the Toth et al.'s method to extract the executable code included...
New threats are constantly appearing on the Internet. System administrators have developed many tools to try to mitigate those threats, however, currently available countermeasures are still limited. Moreover, it is difficult for system administrators to fully understand what happens in their networks in (near) real time. We focus on the monitoring of network traffic sent to unused IP addresses with...
The importance of the method for finding out the worms that are made through the modification of parts of their original worms increases. It is difficult to detect these worms by comparing with the simple definition that past anti-virus software adapts. Moreover, if it is not an already-known worm, it is not possible to detect it. In this paper, we pay attention to the Toth et al.'s method to extract...
The vulnerabilities, e.g., DoS attack or dictionary attack, are shown in 4-way handshake which is the re- key protocol used in wireless LAN security standard IEEE 802.11i. And the countermeasures against these are already proposed. In this paper, we propose key distribution scheme using matched filter. This paper shows that our proposal improves the resistance against DoS attack with less computational...
With the growth of the Internet, various types of services, such as World Wide Web (WWW), file transfer protocol (FTP), remote login, etc., are widely expanded. Consequently, it is difficult for users to manage all the authentication information, e.g., user ID/Password pairs, keys, and certificates, since the authentication information has been increased to use those services. Therefore, single sign-on...
The security of computer networks has become a priority during the past few years. More and more organizations heavily depend on services that are provided by computer networks and this trend is certainly going to rise in the near future. At the same time, malicious attacks against such systems are also increasing in number and variety. System administrators can try to prevent these attacks with the...
Anonymity in peer-to-peer network means that it is difficult to associate a particular communication with a sender or a recipient. Recently, anonymous peer-to-peer framework, called GNUnet, was developed. A primary feature of GNUnet is resistance to traffic-analysis. However, Kugler analyzed a routing protocol in GNUnet, and pointed out traceability of initiator. In this paper, we propose an alternative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.