The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Correctional Service Canada (CSC) operates 57 Institutions equipped with a range of mission critical Security, Communications and Access Management systems. These include CCTV assessment, intrusion detection, radio communications and door control systems. User Interfaces range from colour graphic touch screens to knobs, push buttons etc. Operational and technical challenges include the following issues:...
This paper describes a method to efficiently canvass an area of interest using distributed sensing methods, assisted by fault-tolerant resource management. By implementing multiple aircraft in an assessment configuration, aerial monitoring and diverse sensing can be accomplished through the use of ad-hoc networking principles; aircraft act as nodes, each being a distributed agent in the network. Combined...
The security of Advanced Metering Infrastructures (AMIs) is of critical importance. The use of secure protocols and the enforcement of strong security properties have the potential to prevent vulnerabilities from being exploited and from having costly consequences. However, as learned from experiences in IT security, prevention is one aspect of a comprehensive approach that must also include the development...
Ad hoc networks are a promising technology for implementing the ubiquitous computing paradigm. And, as in any other domain, security is a very important aspect. Authentication, as a first security goal to be achieved, has been targeted by many protocol propositions. But in order to use an implementation of such a protocol in a real situation, its security properties must be proved. Formal verification...
Home Security Systems have existed for many years. There are security devices such as digital cameras or sensors deployed in the home or office. We present an OSGi based security architecture for a home security system. This system consists of Service Location Protocol (SLP), Session Initiation Protocol (SIP) and Open Service Gateway initiative (OSGi) to achieve automated services, device discovery...
The security of Industrial Critical Infrastructures is become a prominent problem with the advent of modern ICT technologies used to improve the performances and the features of the SCADA systems. In this paper we present an innovative approach to the design of Intrusion Detection Systems. The aim is to be able to detect complex attacks to SCADA systems, by monitoring its state evolution. By complex...
Intrusion Detection Systems (IDS) deploy various sensors that collect data, process this data and report events. The process of combining these events or superordinate incidences is known as event correlation. The key issues of this process are (1) to find a way how to combine events based on different data types (e. g. log entries, connection statistics or protocol identifiers), (2) to build a model...
Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement is an SLA specification that addresses the need of both producers and consumers of services to specify and negotiate terms and conditions of access to these services. This specification has gained wide acceptance in both the Grid computing and Web Services communities. WS-Agreement...
U.S. Immigration and Customs Enforcement is overwhelmed with the number of containers entering U.S.A. on a regular basis. Although containers are pre-screened and inspected at the time of shipment, it does not necessarily address all security risks. Containers stay en-route for long enough time that their contents can be tempered with or altered according to the procedures/needs of a terrorist attack...
In this paper we aim at presenting an implementation of a new MA_IDS (mobile agent for intrusion detection system) model, based on misuse approach. Through its ease to detect simulated attacks, we show that the use of mobile agents has practical advantages for intrusion detection. Based on a set of simulated intrusions, we established a comparative experimental study of four IDSs, showing that most...
Countermeasures against botnet, which has been recognized as the Internet??s biggest threat, are urgently needed to create a safe Internet environment. However, the current technology lags behind the evolution of botnet, and, unlike in the past, mutual cooperation among ISPs and countries is essential. As botnet is distributed internationally rather than in a particular ISP domain, international cooperation...
The Internet is consisting of autonomous systems each managed by individual and rival organizations, which makes it very difficult to capture as a whole. Internet situation awareness can be accomplished by creating a common basis for private and public operators to monitor their networks. Thus, an overlay monitoring layer is needed, which can be utilized to address a very important aspect for a more...
As network becomes faster, there is an emergence need for parallel intrusion detection techniques to keep up with the rapid increase in link speed. Resource scheduling plays a key role in parallel detection schemes. Its primary function is to assist a parallel network-based intrusion detection system (NIDS) to achieve high performance in network environment. In this paper, we introduce an abstract...
We study the problem of secure routing in wireless sensor networks where the sensors and the sink can move during the execution of remote monitoring applications and communication is not necessarily directed towards the sink. We present a new routing protocol that builds upon a collection of mechanisms so that the integrity and confidentiality of the information reported to the controlling authorities...
The processing speed of conventional network-based intrusion detection systems (NIDSs) is incompetent as to the rapid increase in network link speed. This problem imposes an emerging need for new detection technologies. In this paper, we introduce a multi-core technique which opens up another way for fast intrusion detection by proper workload partitioning and parallel detection on high-speed link...
The IPv6 over low-power wireless personal area network (6LoWPAN) typically includes devices that work together to connect the physical environment to real-world applications, e.g., wireless sensors. However, since, in some cases, security may be requested at the application layer as need, and then, security problems should be identified such as security threats model, threats analysis, attack scenarios,...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Improving the quality of healthcare and the prospects of "aging in place" using wireless sensor technology requires solving difficult problems in scale, energy management, data access, security, and privacy. We present AlarmNet, a novel system for assisted living and residential monitoring that uses a two-way flow of data and analysis between the front- and back-ends to enable context-aware...
It is becoming increasingly difficult to implement effective systems for preventing network attacks, due to the combination of (1) the rising sophistication of attacks requiring more complex analysis to detect, (2) the relentless growth in the volume of network traffic that we must analyze, and, critically, (3) the failure in recent years for uniprocessor performance to sustain the exponential gains...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.