The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious actors are increasingly using TLS to evade deep packet inspection (DPI). In response, vendors and enterprises have turned to man-in-the-middle (MITM) proxies to enable security monitoring of encrypted traffic. This approach not only breaks the end-to-end authentication component of TLS but requires clients to trust a root certificate that allows the proxy to masquerade as any domain. This...
Distributed storage allows to outsource a document to the cloud such that multiple users can easily access the file. The protection of the document stored relies on secret sharing, which generates and distributes shares of the document to the storage servers. However, the users have to trust that a certain amount of storage servers behaves honestly and do not lose (retrievability) or reveal (confidentiality)...
Security scheme in indoor object positioning has become a special challenge in the recent time. The characteristic of indoor environment due to obstacles or building material leads a lack of range-based position estimation. A security scheme determined to protect data towards unauthorized party. The proposed SCLoc is an object position platform with AES 128 cryptography system equipped on each node...
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different...
Attacks of Ransomware are increasing, this form of malware bypasses many technical solutions by leveraging social engineering methods. This means established methods of perimeter defence need to be supplemented with additional systems. Honeypots are bogus computer resources deployed by network administrators to act as decoy computers and detect any illicit access. This study investigated whether a...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
Model based performance gives an efficient support for controlling the quality of service (QOS) as well as the cost of enterprise application. The two important quality measures are service availability and response time in cloud perspective. Though the expensive high decision monitoring probabiliy necessary to identify key model parameter, such as CPU utilization of particular request that are commonly...
Mobile device based academic monitoring system (AMS) are inherently open systems and thereby vulnerable to various attacks. This paper proposes a security and privacy framework for AMS, which is based on a security model with the tree permission hierarchy using bilinear pairing. The proposed framework supports privacy based on anonymity, untraceability, and security for confidentiality, integrity,...
During the recent past, the demand on High Throughput Computing has been increasing because of the new scientific challenges. Since the access to several computational resources to manage thousands of simulations can be difficult for scientists, different initiatives have tried to provide the scientific community with interfaces that are user-friendly for several computational resources. Usually,...
Cloud customers need guarantees regarding the security of their virtual machines (VMs), operating within an Infrastructure as a Service (IaaS) cloud system. This is complicated by the customer not knowing where his VM is executing, and on the semantic gap between what the customer wants to know versus what can be measured in the cloud. We present an architecture for monitoring a VM's security health,...
In this article, we propose an algorithm for the management of the structure of the tunnel connections in large, distributed nature, corporate network. Management is here understood as monitoring the availability and health of key elements and dynamic reconfiguring the system in situations of failure symptoms. It was assumed that the algorithm can be used in cases where the correct functioning of...
Sensitive information leaking of network servers attacked by malwares or hackers is a serious security risk of Internet. The paper presents a dynamic taint tracking based method to automatically detect sensitive data leaking. The method automatically tags sensitive data as taint data and monitors the propagation of taint data in memory. If the sensitive data is sent by sockets or written into files,...
Sustainability of software architectures has gained increasing attention to cope with factors causing architectural changes such as requirements changes, technological changes, and changes in business strategies and goals. However, there has not been much work on architectural sustainability. In this paper, we present a novel approach for addressing architectural sustainability with respect to non-functional...
Modern trojans are equipped with a functionality, called WebInject, that can be used to silently modify a web page on the infected end host. Given its flexibility, WebInject-based malware is becoming a popular information-stealing mechanism. In addition, the structured and well-organized malware-as-a-service model makes revenue out of customization kits, which in turns leads to high volumes of binary...
SSH protocol is commonly used to connect to a server in the enterprise network for operation and maintenance (O&M). However, it also brings some security problems in the monitoring and auditing because the protocol itself encrypts and compresses the transmission data. This article will introduce an SSH protocol audit system based on the proxy technology. Our system can completely monitor all...
The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc)...
Tools that analyse critical business activities such as Business Process Monitoring (BPM) or Business Activity Monitoring (BAM) have been utilised in enterprise operations successfully over the past few years. However, with the increasing demand for more up-to-date information and analysis, real time process and event monitoring are becoming increasingly important. But monitoring business processes...
The region weather modification information operation conditions website system for integrated monitor and analysis based on B/ S (Browser/ Server) mode is developed, which is to meet the need of the weather modification professional work. The system is developed by using the .NET platform and ASP.NET technology. Applying the WebGIS technology, weather modification map release can be realized by using...
Communication such as web browsing is often monitored and restricted by organizations and governments. Users who wish to bypass the monitoring and restrictions often relay their (encrypted) communication via proxy servers or anonym zing networks such as Tor. While this type of solution allows users to hide the content of their communication and often bypass the restrictions, the mere use of a proxy...
We propose a new structuring mechanism and architecture for construction of overlay networks spanning multiple clouds. We have designed and implemented Suorgi for this purpose, a run-time that supports extensibility of cloud infrastructures. Novice users can now construct their private cloud overlay networks without explicit programming knowledge. Key to support this is meta-code, preprogrammed code...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.