The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyber attacks are a critical threat to government infrastructure, commercial enterprises and personal devices. When belligerents attack cyber systems, they need to spread laterally to reach high value targets and communicate with their command and control sites. Intuitively, a layered defense including intrusion detection systems will limit the adversary's exploitation of the target. We apply lessons...
As cloud services using the virtualized technique are emerging and developing rapidly, protection of cloud services is a key issue. Most research efforts focus on reducing the attack surface observed by the external attackers, which is an impractical solution for a complex system like virtualized infrastructure. In order to deceive the attackers and waste their time and efforts, three attack surface...
In this paper, we propose a theoretical framework to investigate the eavesdropping behavior in underwater acoustic sensor networks. In particular, we quantify the eavesdropping activities by the eavesdropping probability. Our derived results show that the eavesdropping probability heavily depends on acoustic signal frequency, underwater acoustic channel characteristics (such as spreading factor and...
The next era of computing is the evolution of the Internet of Things (IoT) and Smart Cities with development of the Internet of Simulation (IoS). The existing technologies of Cloud, Edge, and Fog computing as well as HPC being applied to the domains of Big Data and deep learning are not adequate to handle the scale and complexity of the systems required to facilitate a fully integrated and automated...
P2P (Peer-to-Peer) network has extensive functionality in variety of fields. Accordingly, P2P users share huge amounts of data. The widespread usage of P2P systems can make it a potential truck for worms. The attractiveness of a particular P2P group can be reduced by widely spread malicious peers. Now internet community has concentrated more on its security. One of the solutions prevailing to prevent...
It has been shown that secure communication between two partners can be achieved with devices containing components with quantum properties. While such devices are in timid stages of practical availability, the quantum properties exhibited are well defined theoretically: quantum bits (qubits) in persistent quantum states, quantum transformations or gates applicable on qubits, and quantum communication...
Fault trees (FT) are widespread models in the field of reliability, but they lack of modelling power. So, in the literature, several extensions have been proposed and introduced specific new modelling primitives. Attack trees (AT) have gained acceptance in the field of security. They follow the same notation of standard FT, but they represent the combinations of actions necessary for the success of...
Fuzzy Grey Cognitive Map (FGCM) is an innovative soft computing technique mixing Fuzzy Cognitive Maps and Grey Systems Theory. FGCMs are supervised learning fuzzy-neural systems typically modeled with signed fuzzy grey weighted digraphs, generally involving feedbacks. It is hard to find an accurate mathematical model to describe this decision-making because it includes a high uncertainty and the factors...
Advances in embedded RF devices and sensor nodes have witnessed major expansion of end user services such as Internet of Things (IoT) and Cloud Computing. These prospective smart embedded and sensor devices normally interconnect to the internet using wireless technology (e.g. radio frequency, Wi-Fi) and run on top of CoAP and TFTP protocols. In this paper, we present a RF Simulator v1.1 which simulates...
Computational Red Teaming (CRT) is a computational approach to test defences. In this paper, we use develop a CRT system to assess the physical security of any building, provided the building is designed with Building Information Models (BIM). BIMs are similar to 3D Computer Aided Design (CAD) models but with the addition of extra layers of information on the building system and components. Through...
The safety of passengers is a major concern to airports. In the event of crises, having an effective and efficient evacuation process in place can significantly aid in enhancing passenger safety. Hence, it is necessary for airport operators to have an in-depth understanding of the evacuation process of their airport terminal. Although evacuation models have been used in studying pedestrian behavior...
Botnets are one of the most serious threats to Internet security. Isolated and single point security defense technologies can't effectively counteract large-scale, distributed botnet attacks, such as Spamming and Distributed Denial of service attack. Collaboration among different kind of security devices is needed. To solve this problem, we proposed a conceptual model of botnet collaborative defense...
A resilient system is designed to survive and recover from failure or attack. Evaluating resilience strategies for a computer network is difficult because their effectiveness depends on numerous, complex, and interacting factors. This paper presents a simulation prototype for experimenting with resilience strategies, demonstrates scoring metrics for comprehensive evaluations, and highlights simulation...
Probabilistic risk assessment provides a practical approach for assessing the security capabilities of systems. Terrorism risk assessment requires estimation of the probabilities and consequences of hypothetical attacks against a target. In order to address the interdependencies between the different elements present in the target environment we propose to develop a computer-based model. The model...
Nowadays the use of the Internet has become something massive and indispensable. But, how protected are internet users from cyber attacks? It is very difficult to see the impact of worm viruses in real networks. One of the best ways is to run attacking tools for intruding real networks and to get sufficient information on phenomena occurred in the networks during the attacks. However, it is impossible...
The estimation of security risks in complex information and communication technology systems is an essential part of risk management processes. A proper computation of risks requires a good knowledge about the probability distributions of different upcoming events or behaviours. Usually, technical risk assessment in Information Technology (IT) systems is concerned with threats to specific assets....
Education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. An ETEN is an infrastructure that consists of advanced distributed learning, collaborative working and distributed simulation systems, and can be designed as an intercloud of many global and private clouds. Intercloud approach introduces new opportunities to improve the performance...
The study of complex systems, either physical or cyber, could be carried out by experimenting with real systems, software simulators or emulators. This paper presents an innovative framework for an experimentation environment that incorporates both physical and cyber systems. The proposed approach uses soft real-time simulation for physical processes (based on Simulink) and an emulation test bed (based...
Apart from mechanisms to make crowd-sourcing secure, the reliability of a collaborative system is dependent on the economic incentives of its potential contributors. We study several factors related to the incentives in a community-based security system, including the expectation on the social influence and the contagion effect of generosity. We also investigate the effects of organizing community...
In this paper, we propose a strongly resilient polynomial-based random key pre-distribution scheme for multiphase wireless sensor networks (RPoK): a private sub-key is not directly stored in each sensor node by applying the polynomial-based scheme to the RoK scheme. Such a polynomial is linearly transformed using forward and backward keys in order to achieve the forward and backward security of polynomials...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.