The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Active Millimeter-Wave (MMW) imaging is to be applied to security systems. Envelope phase detection (EPD) method will realize both short scanning time and low cost. The method uses an array of receiving antennas in combination with envelope detectors. We propose bulk linearly tapered slot antenna (LTSA) as the receiving antenna to realize low impedance. Unlike a conventional LTSA, a bulk LTSA antenna...
We propose XPROB, a generalized pool-based anonymous communication framework. XPROB defines a family of infinite pool-based anonymous communication systems with resistance against global active adversary (adversary with all capabilities to monitor all external activities of system, to delay and to create messages in the system). Our proposal is to solve the limitation of APROB Channel that concerns...
Predistribution of cryptographic keys is a widely used approach for establishing secure communication between network nodes which are severely resource-constrained. Many proposed key predistribution schemes make the implicit assumption that message contents need not be kept private from nodes other than the intended recipient. Messages in such schemes are not guaranteed to be confidential--they may...
The general method in which attackers obtain the control authority of the remote host is through the exploit code. As network security systems have mounted the desired signatures about exploits, they have reduced damage due to the spreading and reoccurrence of the exploits. However, to avoid signature-based detection techniques, exploits employing techniques such as polymorphism and metamorphism have...
Covert channels are widely used for secret information transmission on networks. Although packet length based covert channels have greatly enhanced tamper resistance, they are still vulnerable to detections due to abnormal network traffic. Thus, in this paper, we are motivated to design a novel protocol-independent covert channel that could deliver normal network traffic. We simulated our covert channel...
Although direct reciprocity (Tit-for-Tai) contribution systems have been successful in reducing freeloading in peer- to-peer overlays, it has been shown that, unless the contribution network is dense, they tend to be slow (or may even fail) to converge. On the other hand, current indirect reciprocity mechanisms based on reputation systems tend to be susceptible to sybil attacks, peer slander and whitewashing...
Denial of Service is becoming a growing concern. As our systems communicate more and more with other that we know less and less, they become increasingly vulnerable to hostile intruders who may take advantage of the very protocols intended for the establishment and authentication of communication to tie up our resources and disable our servers. Since these attacks occur before parties are authenticated...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Zero-day attacks - especially those that hide the attack exploit by using code obfuscation and encryption - remain a formidable challenge to existing network defenses. Many techniques have been developed that can address known attacks and similar new attacks that may arise in the future. Some methods, like Earlybird and Polygraph, focus on string-based content prevalence in payloads; others focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.