The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of smart devices and lowering prices of sensing devices, adoption of Internet of Things (IoT) is gaining momentum. These IoT devices come with greater threat of being attacked or compromised that could lead to Denial of Service (DoS) and Distributed Denial of Service (DDoS). The high volume of IoT devices with high level of heterogeneity, magnify the possibility of security threats...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Mobile devices are used for communication and for tasks that are sensitive and subject to tampering. Indeed, attacks can be performed on the users' devices without user awareness, this represents additional risk in mission critical scenarios, such as Public Protection and Disaster Relief (PPDR). Intrusion Detection Systems are important for scenarios where information leakage is of crucial importance,...
Quality of Service (QoS) is an important enabler for communication in industrial environments. The Arrowhead Framework was created to support local cloud functionalities for automation applications by means of a Service Oriented Architecture. To this aim, the framework offers a number of services that ease application development, among them the QoSSetup and the Monitor services, the first used to...
The use of counterfeit smart grid devices throughout the smart grid communication infrastructure represents a real problem. Hence, monitoring and early detection of counterfeit smart grid devices is critical for protecting smart grid's components and data. To address these concerns, in this paper, we introduce a novel system level approach to identify counterfeit smart grid devices. Specifically,...
System Protection Schemes (SPS) are considered as an effective tool for enhancing the resilience of the power system towards rare contingencies. The validation of SPS is difficult by using conventional SCADA data due to its inherent low scan rate and skewedness. Under such condition, Synchrophasors has been found to be better suited for performance evaluation SPS and review of its design. This paper...
Performance and compliance objectives have become crucial for critical sites. Balancing security, energy and costs with operational objectives is the current main challenge for critical site administrators. While current systems are not integrated enough to provide an overall view of the site performances on such targets, the FUSE-IT project intend to propose a new paradigm: the convergence of monitoring...
Electromagnetic Security refers to the compliance of electronic devices with Information Security requirements with regards to EMC/EMI issues, and has important implications where there are Functional Safety or other risks to be managed. In this study, the resilience and the integrity of electronic devices are the topics of interests. Many studies were devoted to the analysis and the classification...
The Cloudifier project deals with the design and development of an ecosystem of toolsfor the assisted migration to a cloud or multi-cloud environment of scientificand business-oriented distributed applications. Recent surveys show that many of theorganizations that are not yet running their applications in the cloud are experimentingwith infrastructure-as-a-service mode. The Cloudifier tools will...
We have presented a scheme for faster replication of data on cloud storage to mobile devices named as ERCD. In this the mobile devices with limited bandwidth can easily get the latest versions of files from the cloud storage and in similar way the user changes from the mobile devices could be updated in cloud storage fast. The motivation behind this scheme is the fact that the mobile devices are slow...
With the escalation of attacks that target mobile devices there is an increasing need for efficient monitoring tools. Due to computation, storage, and power constraints of the devices, these monitoring tools may overload the entire system causing severe performance degradation for the running applications. Moreover, they can be pushed by resource-intensive applications and may not perform an adequate...
In todays growing and ever changing world of computer networks, management systems need to have the abilities of intellectual reasoning, dynamic real time decision making, experience based self-adaptation and improvement. Furthermore, ever increasing size and complexity of computer networks require automation for their management systems. Automation minimizes human involvement which produces effective...
Both SNMP and Netflow have advantages and disadvantages in traffic collect and manage, by study, introduced a new network traffic management combining Netflow based on Hash aggregation with SNMP, use hash aggregation to combine the large number of original Netflow data, achieved the compression store of original traffic data and efficient network system management, make full use of the advantages...
In this paper a new approach based on using reference validation mechanism to improve system reliability is proposed. Since device drivers are the main cause of system failure, they are chosen as case study. Thus by improving driver reliability, security of the whole system is improved. To monitor driver functionality and also manage kernel memory, lightweight hypervisor layer is used, and reference...
Successful "cracking" of bit-level security compromises network integrity and physical layer augmentation is being investigated to improve overall security. Intra-cellular security is addressed here using device-specific RF "Distinct Native Attribute" (RF-DNA) fingerprints in a localized regional air monitor, with targeted applications including cellular networks such as the Global...
Grid portal is a secure web environment where user can monitor and execute grid applications, access grid resources, services, and collaborate with other users. A grid portal allows an organization to have a single URL that enables users to gain browser-based access to applications and any customized information in a virtualized, unified and secure way. The main requirement for this grid portal is...
In order to accomplish the automatic and intelligent management to the satellite network, this paper designs a policy-driven self-management model which integrates all network management function components by policy engine to manage the network. In the model, policy decision point receives soft-faulty events, conducts policy decision-making and sends the results to the corresponding management function...
The widespread use of standard, worldwide and vendor-independent OPC UA specifications in industrial environment introduces many benefits as it allows to keep open the market of the industrial applications. On the other hand, OPC UA adopts a very complex software infrastructure to realise the data exchange between industrial applications and devices (e.g. mainframes, PLC, microcontroller); this complexity...
Cluster technology has witnessed a tremendous inception in computing world. The technique integrates the standard computing resources to generate more processing power and other hardware strengths. The collection of interconnected stand-alone computers ensures high availability, increased throughput, scalability and improved performance. We have developed a dynamic cluster based approach for high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.