The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction, to assure confidentiality, availability and integrity. The new trends of telecommunications of the last year is the move towards the transmission of voice over traditional packet switched IP network, voice over IP, that has become a valid alternative...
Network monitoring is an important method of network management and preserving safe operation. This paper presents a switched LAN (local area network) monitor mechanism based on ARP spoofing. Using WinPcap library function to capture the packets in switched LAN, the method contributes to the follow-up data analysis and detection of attack. Experimental data and analysis results show the effectiveness...
IEEE802.11 wireless local area networks (WLAN) are widely deployed as extension to corporate wired LAN infrastructures. The implication of including WLAN as part of the computing infrastructure means more critical information and data is carried over the air. The threats of intrusion and denial of service is real since wireless networks have broadcasted traffic. IEEE 802.11 defines WEP, WPA and WPA2...
Currently there is a growing belief that using peer-to-peer (P2P) approach leads to noticeable improvement in the performance of network management systems (NMSs). However P2P systems can be potential vehicle for active worms which can spread in all manager peers in a short time. This issue has not been studied in the literature. In this paper we address effects of active worm propagation in a P2P...
Trust management techniques must be adapted to the unique needs of the system architectures and problem domains to which they are applied. Certain characteristics of swarms, such as their lightweight, ephemeral nature and indirect communication, make this adaptation especially challenging. In this paper we look at the trust issues and opportunities in swarm-based autonomic computing systems and find...
The IP multimedia subsystem is a basis for a significant new architecture which offers network operators the opportunity to expand their services, integrating voice and multimedia communications and delivering them into new environments with new purposes. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. Using IMS bears several new security challenges. In...
During the last years, Internet facilities like email, the world-wide-web (WWW), and e-commerce have generated a boost of Internet growth, making offering services possible in fundamentally new ways. One of these services is Voice over IP (VoIP), also named Internet Telephony (IP telephony). With most major telecommunications carriers preparing for VoIP mass deployment, the security of service cannot...
Bilingual Teaching is one of the important measures to bring China's higher education in line with international practices. However, there are many issues to be studied and discussed in this new teaching approach. Based on the practice and experience of bilingual approach in teaching the course of network security and management, this paper explored the necessity and significance of offering bilingual...
We discuss the near-term and far-term security, trust and dependability challenges in wireless and mobile telecommunications, in an always-connected environment. We identify some relevant technological and threat trends and propose research priorities in order to solve and respond to the future security-related challenges. Threat trends include increase of complexity and connectivity and challenges...
A genetic algorithm based policy management system judges the validity of network events according to the rules defined in the rule base. These rules are either IP addresses or combination of IP address and some other parameters, such as port numbers etc. This paper discusses the design and benefits of rule base which is based on finite state machines. Since whenever a new network event comes, the...
Designing a networked system (NS), which consists of various network equipments and uses LAN technology, has become increasingly important. However, there have been few studies on NS design. Our previous study suggests that a well managed NS from an access control viewpoint has a fixed degree distribution, regardless of connection restriction. In this paper, we find an approximation function of its...
Summary form only given. Logs generated by operating systems and application programs provide important information to a network administrator. Logs are used for various purposes including security management, audit, and forensics of intranet. To use logs for such purposes, it is important that logs are reliably retrieved from hosts in the intranet. But the syslog protocol which is widely used for...
Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation...
In this paper, we identify a vulnerability of IEEE 802.11 wireless Mesh LANs in which a compromised mesh point can still receive data from other mesh points. Then we propose a new protocol that can counter this attack by considering the effective period of both the mesh points (MPs) when decide the lifetime of the key shared between them. We also amend 802.11s draft in order not to bring about a fundamental...
Network defense is an elusive art. The arsenal to defend our devices from attack is constantly lagging behind the latest methods used by attackers to break into them and subsequently into our networks. To counteract this trend, we developed a distributed, scalable approach that harnesses the power of collaborative end-host detectors or sensors. Simulation results reveal order of magnitude improvements...
Recently trusted network becomes hot topic in network security domain. By introducing the concept of "trusted attribute", we proposed grade division scheme, which was called hierarchy trusted network framework (HTNF). Also we detailedly explained the partition rules of trusted attributes and the approach to grade division. We discussed the potential applications of presented framework, and...
The major technical objectives of the RC-NSPES are to provide a framework for the concurrent operation of reactive and pro-active security functions to deliver efficient and optimised intrusion detection schemes as well as enhanced and highly correlated rule sets for more effective alerts management and root-cause analysis. The design and implementation of the RC-NSPES solution includes a number of...
Getting a better grasp of computer network security is of great significance to protect the normal operation of network system. Based on rough set (RS), clustering model, security features reduction and clustering algorithm are presented, which provides a basis of network security strategies. Further research is to mine and process the dynamic risks and management of network security. Using the reduction...
Content matching based algorithms form the core of many network security devices. It is one of the critical components due to the fact that it allows making decisions based on the actual content flowing through the network. The most important parameters that go into the design of a content matching algorithm are its performance and accuracy of detection. Although this topic had received significant...
Reliable Server Pooling (RSerPool) denotes the new IETF standard for a lightweight server redundancy and session failover framework for availability-critical applications. A number of research papers have already addressed the service and pool management performance of RSerPool in general. However, the important topic of security, including the system robustness against intentional attacks, has not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.