The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Network (WSN) applications are typically event-driven. While the source codes of these applications may look simple, they are executed with a complicated concurrency model, which frequently introduces software bugs, in particular, transient bugs. Such buggy logics may only be triggered by some occasionally interleaved events that bear implicit dependency, but can lead to fatal system...
The following topics are dealt with: multimedia computing; information networking; information security; communication security; network security; cultural heritage environment security; information privacy; social network; watermarking; multimedia search; multimedia mining; mobile Internet; wireless network security; network steganography; service-oriented architecture; services computing; and multimedia...
Ad Hoc network is a newly developed network without fixed infrastructure and a changing topology. Its vulnerability makes it prone to attacks, which brings greater challenges for intrusion detection for Ad Hoc. Through analyzing the existing intrusion detection techniques as well as the characteristics of Ad Hoc network, this paper has proposed an intrusion detection technique based on class association...
Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating...
The following topics are dealt with: neural networks; equalisation; mobile and cellular communications; optical communications; data security; human factors in communications; coding and modulation; optical networks; database and optimisation; time-frequency analysis; computer vision and recognition; audio and speech processing; wireless networks; watermarking; digital filters; network coding and...
Common methods for Intrusion Detection Systems (IDS) lack in security as they are postmortem approaches: Unwanted Internet Traffic (UIT) is detected and/or blocked only after UIT has inflicted serious damage. Even though some forecasting techniques have been applied to improve IDS in the last few years, three major gaps lie in those techniques: sensors employment, the use of just one forecasting technique...
IPSec is a policy-driven security mechanism. How to react on the diversity of network security and quickly generate corresponding security policy is one of the core issues of IPSec. This article introduces the traditional IPSec security policy and demonstrates an improved mechanism of implementing the IPSec security policy. Secondly, it constructs the security policy model based on ID3 algorithm by...
The early detection of multistage attacks like DDoS and coordinated spamming poses a major challenge for existing counter-measures based on reactive blacklists. One approach to addressing this challenge would be to profile hosts that engage in scanning activity and predict their future actions. However, this requires understanding how hosts evolve their scanning behaviour. In order to address this...
The paper presents the results of an empirical study of the intrusion detection methods in wireless sensor networks (WSN). It intends to verify if networking of heterogeneous sensors in WSN improves the system reliability and security. Unlike many other reported approaches, which employ conventional networking intrusion detection techniques in a WSN environment, this paper presents methods specific...
Signing electronic messages authentication is an issue of significant importance for computer and telecommunication systems. To solve efficiently some special practical problems the multisignature protocols are applied. New multisignature protocols based on the elliptic curves and discrete logarithm problem in finite groups are proposed to solve the problem of simultaneous signing contracts. The protocols...
This paper combines the results of research on social psychology, and has designed a trust model for rumor spreading. It is considered that when information exchanges between people, the trust of information is related to the interpersonal closeness. In addition, this paper uses Monte Carlo method to find the key source nodes in rumor spreading by comparing the total number of spread nodes and spreading...
The threat of distributed denial of service (DDoS) has become a major issue in network security and is difficult to detect because all DDoS traffics have normal packet characteristics. Various detection and defense algorithms have been studied. One of them is an entropy-based intrusion detection approach that is a powerful and simple way to identify abnormal conditions from network channels. However,...
Together with the extensive deployment of computer networks, the number of network attacks is greatly increasing. These attacks affect to availability and quality of services of the networks as well as confidentiality of private or important information data. In this paper, we present two network intrusion detection (IDS) techniques which are C4.5 decision tree and Ripper rules to assess and test...
Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether...
Network-based intrusion detection and prevention systems -NIDS /NIPS- have been widely implemented in order to build layered information security infrastructures. Many intrusion detection and prevention algorithms have been developed and its operation modes imply benefits and drawbacks that are not taken into account when choosing a network IDS/IPS. This paper assesses the network security provided...
The session initiation protocol (SIP) is an application-layer control protocol for creating, modifying, and terminating sessions with one or more participants in the IP-based telephony environment.Yang et al. and Huang et al. proposed a secure authentication scheme for session initiation protocol.Yang's scheme is based on Deffi-Hellman key agreement scheme and a combination of hash functions. In 2006,...
Network attack graphs are originally used to evaluate what the worst security state will be if a network is under attack. Along with observed intrusion evidences, we can further use attack graphs to extrapolate the current security state of a concerned network. Methods have been proposed in recent years to use observed intrusion evidences to compute the node belief metric of network attack graphs...
We discuss a systematic approach to network forensic collection and analysis of data in converged networks. Since attacks cannot be completely avoided, it is necessary to have appropriate forensics systems. Upon integration into a network forensic infrastructure, we expect this forensic model will enable a faster response and more structured investigations of VoIP-based network attacks.
Tiered wireless sensor networks (WSNs) have many advantages over traditional WSNs. However they are vulnerable to security attacks, especially those targeting at the storage nodes that bu er and process the data readings from sensors. In this paper, we propose a Secure Data Collection protocol - SDC to support time-based queries in tiered WSNs. With small overhead introduced to data communication,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.