The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
CAPTCHA is an automated test that humans can pass, but current computer programs can't pass any program that has high success over a CAPTCHA can be used to solve an unsolved Artificial Intelligence (AI) problem. The most widely used CAPTCHAs rely on the sophisticated distortion of text images rendering them unrecognizable to the state of the art of pattern recognition techniques, and these text-based...
E-mail communication is indispensable nowadays, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed by user feedback, to block subsequent near-duplicate...
With rapid development of urban construction, there are more and more urban construction archives, more and more types of construction archives. The traditional ways for submitting the urban construction archives, such as paper-based submission, disk-based submission and email-based submission, can't meet the much more complex demands. The shortage of paper-based way is that it can't be in time and...
The system proposed describe the global/universal database containing the information about the registered user's personal, financial, medical, family and almost every information about the user in multiple meta tag languages, duly verified by the users country authorities(citizen registration authorities)and protected by the users login name and password. In our proposed system this database will...
Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper we present empirical analysis of attackers activities based on data collected by two high-interaction honeypots. The contributions of our work include: (1) Classification of the malicious traffic to port scans, vulnerability...
It's convenient for people's communication by Internet's rapid growth. Tengxun QQ is IM with excellent function using by large amount of Internet users and because of its large cardinal number of users, it becomes a target which is attacked by many Internet illegal users. This paper firstly introduces us QQ virus and their classification, virus phenomenon and several solutions about attacking for...
The processing system of network security event is a typical complicated system depending on the collaborative work of multi-agent system, and how to constructs the collaborative work platform is a common problem. In this paper, we designed collaboration system CPS4NSE with B/S structure to deal with a large number of events which are transacted by a large number of personnel. First of all, the deployment...
In the context of anti-spam filtering, we investigated the performance of the Naive Bayesian classifier and Distributed Checksum Clearinghouse. Based on these two methods, we constructed an anti-spam filtering system, which is capable of identifying spam, maintaining normally to deliver and receive e-mails as well. Meanwhile, we performed a thorough evaluation of the system on the benchmark corpus...
SQL injection attacks continue to be a major problem for Web applications. We investigate design considerations for an application layer honeypot to attract and learn about SQL injection attacks. The honeypot responds with indications of vulnerability leading attackers ultimately to disinformation that could be useful to track them. The honeypot restricts attackers from escalating the attack to the...
The JXTA-Overlay project is an effort to use JXTA technology to provide a generic set of functionalities that can be used by developers to deploy P2P applications. Since its design mainly focuses on issues such as scalability or overall performance, it does not take security into account. However, as P2P applications have evolved to fulfill more complex scenarios, security has become a very important...
Because of virus and worms which make use of vulnerability of computer systems, computer software is getting in trouble increasingly. Although there are opportunities to defend these attacks at an earlier stage, people undergo several serious disturbances because many administrators and users didn't realize the essentiality of the patch management. The paper designs and implements a patch management...
With the development of Internet, there are numerous vulnerabilities in variety of software because of bugs at the design. Vendors support corresponding patches to repair the software bugs in their web pages. The paper presents an infrastructure for automated precautionary measures that enables network and system administrators to manage security vulnerabilities. The infrastructure enables incoming...
After an analysis of some critical limitations of current challenge-response based email anti-spam techniques, the paper describes a solution to the deadlock problem and a way to dramatically improve the speed of the challenge-response process. It involves generating and maintaining email lists of trusted senders, and a backward-compatible extension to the SMTP protocol. In the end, the paper describes...
As many people are now taking advantages of on-line services, the value of the private data they own comes into sight as a problem of fundamental concern. This paper takes the position that, individuals are entitled to secure control over their personal information, disclosing it as part of a transaction only when they are fairly compensated. To make this a concrete possibility, users require technical...
Social networks heavily rely on the concept of reputation. Some platforms implement formalized systems to express reputation, for example as a rating, but the concept is broader and very often the reputation of a user, the perceived quality of a product, the popularity of a TV show or any other subject of published information stems from a more informal collection of comments and recommendations....
A Directory Harvest Attack or DHA is a technique used by spammers in an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database. Directory Harvest Attackers send the blank mail to the server to collect the valid user-id. They do this by observing the server's reply. Traditionally attackers use single IP address to send mails. Recently...
We present a new approach for if-anonymity protection in Location-Based Services (LBSs). Specifically, we depersonalize location information by ensuring that each location reported for LBSs is a cloaking area that contains K different footprints-historical locations of different mobile nodes. Therefore, the exact identity and location of the service requestor remain anonymous from LBS service providers...
This paper serves to introduce the SANS Internet Storm Center, and more specifically, its data collection and analysis processes pertaining to information security incidents. It reviews both the technical means of collection as those that rely on human input, and describes the various analysis and output processes. In addition, it provides some case studies on how incidents are handled using the tools...
Insider attacks constitute one of the most potent, yet difficult to detect threats to information security in the cyber-domain. Malicious actions perpetrated by privileged insiders usually circumvent intrusion detection systems (IDS) and other mechanisms designed to detect and prevent unauthorized activity. In this paper, we present an architectural framework and technique to aid in situation awareness...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.