The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Botnets are considered by specialists, in both industry and academy, as one of the greatest threats to security on the Internet. These networks are composed by a large number of malware-infected hosts acting under a central command. They are usually employed to perform DDoS attacks or phishing scams. The behaviour of these botnets evolves due the adoption of new and sophisticated infection methods,...
Today's approach to security is based on perimeter defense and relies heavily on firewalls, Intrusion detection systems (IDS) and Intrusion prevention systems. Despite years of research and investment in developing such reactive security methodologies, our critical systems remain vulnerable to cyber attacks. In our approach we assume that intrusions are inevitable and our effort is focused on minimizing...
Botnets have become a serious threat to Internet and are often deployed to control a large pool of zombies and perform notorious activities such as DDoS, information theft and spam sending. In this paper, a new method is developed for detecting IRC botnets by analyzing the characteristic of packet size sequence of the TCP conversation between IRC zombies and their command and control (C&C) servers...
In this paper, we examine general mechanisms that a network covert channel may exploit, and we characterize the essence of network covert channels, which are decided by overt sources. So we present a taxonomy of network covert channels based on entropy of overt sources. We classify overt sources into three categories, as variety entropy, constrant entropy and fixed entropy sources, and name the network...
Collaborative applications are feasible nowadays and are becoming more popular due to the advancement in Internetworking technology. The typical collaborative applications, in India include the space research, military applications, higher learning in Universities and satellite campuses, state and central government sponsored projects, e-governance, e-healthcare systems, etc. In such applications,...
Cluster system can be considered as a solution when high performance system is deployed because cluster system can provide the high performance, mass storage, scalability and so on with relative low cost in comparison with super computer system. For the trusted service against various malicious attacks, the trusted operational environment is very critical in order to guarantee that their services...
The GridFTP by Allcock, W. (2003) protocol defines a general- purpose mechanism for secure, reliable, high-performance data movement. GridFTP has been widely used for efficiently transferring large volumes of data. It is based on the Internet FTP protocol and thus involves two communication channels: a control channel and a data channel. The commands and responses flow over the control channel, and...
Autonomic networks are networks that are self- organized with decentralized control and management. Accurate trust establishment and maintenance is essential for secure and reliable message transmissions in autonomic networks. Because of the mobility and dynamics, trust management in autonomic networks is a much more dynamic problem than in traditional server-based networks. In traditional networks,...
Penetration testing is an important branch of network security evaluation, which aims at providing all-round investigation to find the vulnerabilities and security threats in systems and networks. Former penetration testing platforms lack the adaptability when applied to different types of systems or networks, and the manual tests which are prevailed in those platforms are usually long and complex...
This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a subset of the security typed Web language constructs to express the security properties that must be held in the language with respect to its formal semantics to prevent insecure information flow in Web application system...
Trust management, with trust collecting mechanism as one of its foundations, has been the focus of more and more researches in grid security. This paper analyzes shortages of existing trust collecting mechanisms, and then proposes a novel trust collecting mechanism by introducing the idea of publish/subscribe scheme used in messaging system. The objective of this mechanism is to support dynamic trust...
Our proposed design, which we refer to as re-traffic pricing (RTP), aims to defense against application-level distributed denial-of-service (App-DDoS) attacks which is a rapidly growing problem. RTP prevents the server form overloading and encourages all the users to spend re-traffic which the legitimate users are assumed to have more of than the attackers to bid for the service resources. We apply...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.