The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social networks (OSN) are developing rapidly. Most prior OSN researches have been focused on network application layer. However, the social relationships and topology characteristics of OSN can be utilized to enhance the function, performance and security of network protocols in every layer. This paper presents the concept of social-aware plane and designs a novel model (EPSP) to enhance network...
The email conversations reconstruction and analysis is a key task of the digital forensic, however, most forensic tools only parse email data without analysis. This paper presents a novel thread-based conversations reconstruction mechanism that provides an effective analysis and statistics of the email flows for multi-person. The mechanism includes a data extraction rule for email headers extraction...
Alert fusion is a key problem in distributed intrusion detection system (DIDS). The paper proposes a distributed intrusion alert fusion scheme based on multiple keywords and routing infrastructure: distributed hash table (DHT). All the related alerts produced by local sensor can be routed and fused to their corresponding peers by multiple keywords, while evenly distributing unrelated alerts to different...
Alert fusion is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more succinct and high-level view of security event or attempted intrusions. Unfortunately, the serialized alerts by detected or created time will hide the intrinsic order between alerts. It is a disadvantage to alert fusion. In this paper, we proposed an alert fusion method based...
The most common task for a forensic investigator is to search a hard disk to find interesting evidences. While, the most search tools in digital forensic field fundamentally utilize text string match and index technology, which produce high recall (100%) and low precision. Investigators frequently waste vast time on huge irrelevant search hits. In this paper, we propose an improved method for ranking...
In this paper, we present a dynamic evolution system and build up a model to trace the transition of the system state. This new model differs from the previous methods, such as Bayesian network, artificial neural network, in two aspects: it can adapt the changes of the environment automatically, and it does not need a special training phase to build up a model. Theoretical analysis shows that it is...
The architecture and characteristic of wireless mesh networks (WMN), as well as the significance of intrusion detection system (IDS) in its application were investigated. Based on the embedded analyzing of IDS technologies in ad hoc network and WLAN (wireless local area network), combined with the security requirements in WMN itself, it is concluded that both the architecture of distributed and cooperative...
Intrusion alert fusion is a key problem in distributed intrusion detection system (DIDS). In this paper, we propose a distributed intrusion alert fusion scheme based on Multi Keywords. All the related alarms produced by local sensor can be evenly routed and fused to its corresponding sensor fusion centers (SFCs) by multi keywords, while evenly distributing unrelated alarms to different SFCs. We use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.