The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the construction of 3G networks and the development of mobile internet, mobile service is updating quickly. Meanwhile, the mobile phone viruses became the next target. Mobile phone viruses are a destructive procedure, just like the computer virus (program), which is also infectious and destructive. This will constraint the development of the smart mobile phones. The study of the characteristics...
With the wide usage of internet in many fields, networks are being exposed to many security threats, such as distributed denial of service (DDoS) attack, worm/virus, and so on. So prevention failure of network security leads to the revealing of information or interruption of network services, thereby results in the enormous economic loss. In this paper, we propose an effective method for defense against...
This paper describes an attempt to identify the relationships between the using of a mobile device and an online shopper's trust in use of electronic payment systems in order to see how the adoption of a mobile device can contributes positively to increase shoppers' trust in their used of electronic payment systems. Therefore, this trust will increase shopper's intention to purchase online. It also...
Peer-to-peer (P2P) communities over the Internet contain a large amount of trust evidences that can be used to compute the reputation of peers, but existing reputation systems merely uses the evidences within the scope of one community, neglecting the social characteristics of peers' reputation that can only be actually derived from information based on all communities they participate in. We believe...
In recent years, there has been a constant barrage of worms over the Internet. To develop appropriate tools for thwarting quick spread of worms, researchers are trying to understand the behavior of the worm propagation with the aid of epidemiological models. In this paper, two improvements of classical SIS (susceptible-infectious-susceptible) and SIR (susceptible-infectious-recovered) models with...
Nowadays, the traditional network protocol layered only by the basic communication functions can create barriers rather than stimulants to its further development. This paper analyzes the problems and challenges of the classic Internet communication protocol, explicit the important features that NGI (next generation Internet) of vitality architecture possess under the current networks environment,...
Privacy is one of the most important issues in providing high-quality ubiquitous network services to users over the Internet. Although several privacy aware access control models have been proposed in recent years, these models still rely mostly on the traditional access control models designed primarily for security. When privacy becomes a main concern, these models are no longer adequate. In this...
We consider principal component analysis (PCA) in decomposable Gaussian graphical models. We exploit the prior information in these models in order to distribute its computation. For this purpose, we reformulate the problem in the sparse inverse covariance (concentration) domain and solve the global eigenvalue problem using a sequence of local eigenvalue problems in each of the cliques of the decomposable...
With the rapid development of Internet applications and the fast increasing number of users, the traditional network protocol layered only by the basic communication functions can create barriers rather than stimulants to its further development. This paper analyzes the problems and challenges of the classic Internet communication protocol, explicit the important features that NGI (next generation...
The Intrusion Detection Systems (IDSs) play an important role in monitoring networks, but they lack abilities in automated intrusion response; the Intrusion Prevention Systems (IPSs) can guard networks in entrance, but they have no abilities in response inner-intranet attacks; many proposals focus on solutions in automated intrusion response, but they still have various problems existed, the main...
In the last few years the number and impact of security attacks over the Internet, and in particular against VoIP, have been continuously increasing. To face this issue, the use of intrusion detection systems (IDSs) has emerged as a key element in network and application security. In this paper we address the problem considering a novel statistical technique for detecting attacks towards the SIP protocol...
We propose a model for using firewall log entries of denied inbound Internet traffic for indirect discovery of local IP addresses that have security problems. This method is used successfully to discover two computers on the network of Southern Illinois University which were infected with malicious feral software, as well as two more IP addresses on the university network with other security problems.
This paper analyzes the problems within current anti-spoofing mechanisms and proposes a new SSL protected trust model. Then, this paper describes the attacks on SSL protected trust model. This paper also proposes the new automatic detecting security indicator (ADSI) scheme to defend against spoofing attacks on SSL protected Web servers. This paper describes the ADSI-based trust model. In a secure...
Traditional subjective logic provides a specific belief calculus that uses opinion to express beliefs, but it does not support the time property. In the heterogeneous, dynamic, and open networks such as the Internet, we propose a time-related trust model based on subjective logic theory. The proposed model consists of two additional factors compared with the traditional one: a time-related attenuation...
The growing popularity of mobile ad hoc networks (MANETs) makes them increasingly attractive to malicious code writers, and malicious code targeting MANETs has already begun to appear. In this paper, using the theories of complex networks, we present a propagation model of malicious code in WiFi-based MANETs and investigate the propagating behaviors of the malicious code in such networks by means...
The term security network intelligence is widely used in the field of communication security network. A number of new and potentially concepts and products based on the concept of security network intelligence have been introduced, including smart flows, intelligent routing, and intelligent Web switching. Many intelligent systems focus on a specific security service, function, or device, and do not...
IDOP_SP (IPTV DRM interactive operating platform security protocol) protocol is a applied complicated protocol which distributes digital media content in the Internet. The flow of the protocol is based on the behavior of Web service composition and the digital content is transmitted to the customer in the form of hybrid digital objects. But the protocol security only can be assured after the protocol...
Computer system security evaluation by using mean time-to-compromise criteria is presented in this paper. The outcome of the attack highly depends on the attacker skill level. The attacker skill level distribution must be estimated, normal skill level distribution in the skill group is suggested in the model. The article concludes with simulation results and evaluation of the chosen attacker skill...
Denial-of-service (DoS) attacks remain a challenging problem in the Internet. By making resources unavailable to intended legitimate clients, DoS attacks have resulted in significant loss of time and money for many organizations, thus, many DoS defense mechanisms have been proposed. In this paper we propose live baiting, a novel approach for detecting the identities of DoS attackers. Live baiting...
Modeling worm propagation has been an important research subject in the Internet-worm research community. An accurate analytical propagation model allows us to study the spreading speed and traffic pattern of a worm under an arbitrary set of worm/network parameters, which is often computationally too intensive for simulations. More importantly, it gives us an insight into the impact of each worm/network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.