The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Honeypot is a system that aims to detect and analyze malicious attacks attempted on a network in an interactive manner. Because the primary objective of a honeypot is to detect enemies without being known to them, it is important to hide its existence. However, as several studies have reported, exploiting the unique characteristics of hosts working on a consecutive IP addresses range easily reveals...
As reliance on Internet connected systems expands, the threat of damage from malicious actors, especially undetected actors, rises. Masquerade attacks, where one individual or system poses as another, are among the most harmful and difficult to detect types of intrusion. Previous efforts to detect masquerade attacks have focused on host-based approaches, including command line, system call, and GUI...
SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions resulting in unauthorized database access. We provide a novel technique to identify the possibilities of such attacks. The central theme of our technique is based on automatically developing a model...
This paper studies a method for getting necessary QoS for user satisfaction. For a service, its user satisfaction can have some aspects and must be treated from every aspect. However, it is not easy to find feasible QoS that satisfies a user from every aspect. This paper assumes QoS mapping with the multiple linear regression and defines a QoS mapping matrix. By popular matrix operations, which include...
Network coding is a novel technique to improve network throughput and performance by efficient encoding over the intermediate nodes in the network and works particularly well in multicasting. We expect that network coding will reduce the bandwidth utilization of IP broadcasting services that provide multichannel services and high quality videos using IP multicast. However, it is difficult to apply...
SIP has an authenticated identity management mechanism, named SIP Identity (in RFC4474), that has integrity verification as part of it. SIP Identity uses the public key infrastructure (PKI), which entails certificate management whereby parties get a certificate from the certificate authority (CA) and periodically update it. This presents problems when a user agent (UA) uses SIP Identity. In this paper,...
We describe a web-based survey to assess how to evaluate a reputation by referring to his or her history of actions and taking account of his or her opponent's reputation. The analysis indicates that there is a distinction between possible actions with an opponent having bad reputations. That is, cooperative action with opponents that have bad reputations is less favorable than cooperative action...
Recently, many power analysis attacks have been proposed. Since the attacks are powerful, it is very important to implement cryptosystems securely against the attacks. We propose countermeasures against power analysis attacks for elliptic curve cryptosystems based on Koblitz curves (KCs), which are a special class of elliptic curves. That is, we make our countermeasures be secure against SPA, DPA,...
The use of Public Malware Sandbox Analysis Systems (public MSASs) which receives online submissions of possibly malicious executables from an arbitrary user, analyzes their behavior by executing them in a testing environment (i.e., a sandbox), and sends analysis reports back to the user, have increased in popularity. In such systems, the sandbox for analysis is often connected to the Internet as modern...
In a federation, single sign-on (SSO) for web applications can be achieved by performing authentication at the user's home organization called identity provider (IdP) and authorization at the service provider (SP). The IdP provides the user's information to the SP though the attribute exchange and the SP assigns the authorized access level for the user according to the data in the attributes. The...
A problem in the social-network-based intaraction distribution is that people are less motivated to forward information when psychological forwarding cost is large. The simplest solution for this is to compensate for the cost by giving people incentive reward when they forward information. However, it is unclear that, even if we successfully propagate information over the whole social network by the...
For P2P contents sharing, a construction method of unstructured overlay is known for improving search efficiency and preventability of downloading polluted contents. To design better construction method, we need a good metric of the two performances for overlay. Existent metrics are insufficient for measuring the two performances simultaneously in the situation where there are peers whose probabilities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.