The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The spring up of cloud storage, such as Hadoop HDFS, Open Stack Swift, brings us more intelligent storage solutions. Nowadays, the most commercial version of cloud storage system puts more emphasis on high-performance and high-availability, very little attention is given to privacy protection. This paper proposes a user influence-based data distribution optimization method, User Rank, which migrate...
In large network environment, in the application of Etrust Intrusion Detection and Netflow Analysis, we need to solve the following problems: data type and acquisition method. An overall comparison between 4 current netflow acquisition technologies based on flow is made in this paper from network application level, flow data comprehensiveness, data acquisition protocol, installation and deployment...
Transportation systems have emerged into a critical underlying structure, heavily sustaining all industrial sectors. Along them, monitoring systems were developed in order to increase the quality of the provided services. The research areas in this field have split in two directions: monitoring systems for tracking the products from delivery source to final destination, including temporary storage...
Parametric anomaly detection is generally a three steps process where, in the first step a model of normal behavior is calibrated and thereafter, the obtained model is used in order to reduce the entropy of the observation. The second step generates an innovation process that is used in the third step to make a decision on the existence or not of an anomaly in the observed data. Under favorable conditions...
Anomaly detection is considered an important data mining task, aiming at the discovery of elements (also known as outliers) that show significant diversion from the expected case. More specifically, given a set of objects the problem is to return the suspicious objects that deviate significantly from the typical behavior. As in the case of clustering, the application of different criteria lead to...
In this paper we propose an online lightweight anomaly symptom detection and process's resource usage control mechanism. Our system collects fine-grain resource information that can reflect the subtle changes of the application's behavior. Then it creates models with a learning based algorithm without manual configurations. If an anomaly symptom is detected, the automatic procedure will start. The...
Analyzing and processing complex information by using computer aim at mine ventilation manage system in coal mine, this paper put forward feasible and reliable technical decision to the urgent requirements of coal mine safe technology and locale status. By studying middle component and application server, the design approach of building coal mine ventilation safe information network centered on safe...
A common technique hackers use to break into a computer host is to route their traffic through a chain of stepping-stone hosts. There is no valid reason to use a long connection chain for remote login such as SSH connections. One way to protect a host of being attacked is to identify long connection chains connecting into the host. This paper proposes a novel method to identify long connection chains...
Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impacts. Detecting and analyzing them is very costly because of their qualities and complexities. There has been some research approaches carried out in order to detect them. The approaches can be classified into two main groups based on their used analysis features: static feature...
Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g. Denial of Service attacks) may drastically degrade the overall performance of such systems and cannot be detected by typical authentication mechanisms. In this paper we propose a generic security management...
Ambient intelligence is an emerging discipline that brings intelligence to our everyday environments and makes those environments sensitive to us. Ambient Intelligence technologies are more and more frequently adopted in scenarios, like healthcare, crisis management, remote monitoring and control, which are critical for human safety. This requires that such a kind of applications be designed taking...
BitTorrent is a widely deployed P2P file sharing protocol, extensively used to distribute digital content and soft- ware updates, among others. Recent actions against torrent and tracker repositories have fostered the move towards a fully distributed solution based on a distributed hash table to support both torrent search and tracker implementation. In this paper we present a security study of the...
The development of cyber society has fostered the emergence of e-commerce, which is active with business and private transactions. Nevertheless, it also emboldened malicious activities that damage users' profit in the society. Among these activities, Distributed Denial of Services (DDoS), which imposes an excessive workload on network entities such as hosts, is one of the most devastating form of...
Secure components are subject to physical attacks whose aim is to recover the secret information that they store. Most of works which aim to protect these components generally consist in developing protections (or countermeasures) taken one by one. But this "countermeasure-centered" approach drastically decreases the performances of the whole chip in terms of power and speed. Our work is...
In this paper we propose a new method to help managing and supervising security in large networks. We use Fuzzy Description Logics (FDL) to model a composite Intrusion Detection system (CIDS). We show that this hybrid method is more efficient than crisp ones in complex environments.
AJAX (Asynchronous Javascript and XML) is a confederation of technologies aimed at providing improved user interaction with web-based applications. While AJAX provides an improved user experience, it also comes with its baggage of problems. The lack of formal semantics makes AJAX applications difficult to build, debug, understand, and validate. Different component technologies of AJAX (e.g., XMLHttpRequest...
In this paper a new approach based on using reference validation mechanism to improve system reliability is proposed. Since device drivers are the main cause of system failure, they are chosen as case study. Thus by improving driver reliability, security of the whole system is improved. To monitor driver functionality and also manage kernel memory, lightweight hypervisor layer is used, and reference...
Log event correlation is an effective means of detecting system faults and security breaches encountered in information technology environments. Centralized, database-driven log event correlation is common, but suffers from flaws such as high network bandwidth utilization, significant requirements for system resources, and difficulty in detecting certain suspicious behaviors. Distributed event correlation...
Our contribution in this paper is two fold. First we provide preliminary investigation results establishing program based anomaly detection is effective if short system call sequences are modeled along with their occurrence frequency. Second as a consequence of this, built normal program model can tolerate some level of contamination in the training dataset. We describe an experimental system Sequencegram,...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.