The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
Internet Protocol Security (IPSec) is a standard suite of protocols defined by Internet Engineering Task Force (IETF) to provide security which includes data authentication, integrity, and confidentiality. IPSec provides data security at the IP packet level. IPSec developed for IPv6 as well as for IPv4. IPSec protocol provides an elegant solution to the security problem of IP protocol, at IP layer...
Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, we propose an approach to provide secure...
Network traffic generation was the subject of many research projects in the past, but none of them could generate network data which has the same nature as a traffic from human or machine behavior. In this paper we introduce a related work in this field of area focusing on advantages and disadvantages, such as authenticity, inaccuracy, wrong timings and real-time generation. Further, we propose a...
Since several years the number of VoIP (Voice over IP) infrastructures increases and, consequently, the number of VoIP users increases too. Under these circumstances VoIP systems get more and more attractive for attackers, since the probability of successful attacks increases and attackers gain benefits, e.g., money with fee-based telephone numbers. Therefore, this paper describes a solution to capture,...
Electronic payment systems are increasingly in need of improvement as they constitute the base for electronic commerce which is rapidly dominating much trade and particularly retail. One such system that allows payments of low value is known as micro payment system the main requirement for which is naturally `low cost of transaction'. Pay word is a micro payment system which uses hash chains and achieves...
In order to make the healthy and stable operation of the next generation Internet, this paper designs a network traffic monitoring system oriented IPv6. The System uses the collected Net Flow data to make statistics and analysis. The key technologies used in the system were introduced and the main framework of the system was given. The system has been tested in the cernet2, and the test results show...
Protocols for electronic voting are becoming popular with the widespread use of Internet. In this paper we propose an e-voting protocol. Our architecture is unique in that it attempts to integrate two topics of much relevance in e-voting: secure coding and information security. The former sometimes referred to as defensive programming provides defense against certain exploits while the latter deals...
Combined with the grid development, this article analyzed the current widespread adoption of authentication mechanisms and researched GSI program and KX.509 program in different grid environment. With the proxy idea of KX.509, using and implementing a Web-login module to build the grid authentication model in the Globus environment. The module provides the transparent user certificate generation,...
IPsec is also an important security protocol for next generation Internet (NGI) and it has become a hot topic in security communication research to increase IPsec's performance without any security decreasing. In this article, we analyze the implementation of IPsec's security policy database (SPD) and its searching method. We also proposed an optimized design for the SPD with hash table based on chaining...
Transactional printing and fulfillment is an area of the graphic communications industry that requires highly advanced informational assurance and security, not only on a digital level, but also once the information is printed. Financial institutions and other service providers exchange confidential information about individuals and business accounts directly with the printer. If this information...
Many Websites on the Internet are based on database, especially Websites which use database to display the pages actively such as ASP, PHP and JSP. However, because of SQL attack, people pay much attention to the security of database on the Internet. Different from many protection systems deployed between Web servers and Internet, this article designed a database protection system between Web server...
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however,...
An important privacy issue in location based services (LBS) is to hide a user's identity and location while still providing quality location based services. A user's identity can be easily hidden through anonymous Web browsing services. However, a user's location can reveal a user's identity. For example, a user at home may want to ask queries such as ldquoFind the nearest hospital around merdquo...
One of the most important issues in traditional and modern networks architecture is security. Data integrity and authenticity are the most critical points that a network security model should protect and ensure. Authentication, Authorization and Accounting model (AAA Protocol) is one of the most portable security concepts. Authentication acts providing proof of authenticity for stored data and verifying...
Web database is a combined production with database technology and Web technology, it stores and manages a great deal of data, if they are embezzled or juggled, which maybe bring enormous political and economic losses to the society. So it is imperative to properly establish security for Web database against illegitimate intrusion. The host identity protocol (HIP) is designed by the Internet Engineering...
Along with the rapid growth of Internet, the importance of safe network authentication becomes more evident than ever before. Cryptography mainly cares about secrecy in communication. Encrypting the transmitting data could prevent others from stealing important information, but this only solves the problem on the one hand, as for how to prevent them from destroying important data would be additional...
With the advent of the Internet and the World Wide Web, the focus on securing information has become a topic of increasing importance. To ensure the security of information in a society of e-commerce, e-business, and e-sharing it is essential for graduates of computer science departments to be trained in the fundamentals of information security and to gain hands-on experience with security tools....
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.