The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet is one of the most rapidly developing technologies. New protocols for the Internet are always developing. This article focuses on the way to simplify development process of new protocols and modeling of network devices. In this paper there is presented general solution architecture and main functional blocks are described. The main objective of this work was to create a general-purpose...
Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed,...
The evolution of IPv6 technology had become a worldwide trend and showed a significant increase, particularly with the near-coming era named “Internet of Things” or so-called IOT. Concomitant with the transition process from version 4 to version 6, there are open security hole that considered to be vulnerable, mainly against cyber-attacks that poses a threat to companies implements IPv6 network topology...
We are witnessing a growing interest around thecost of security in terms of energy consumption. For instance, in wired networking, some proposals have been put forwardto try to balance the efficacy of intrusion detection with theneed to save energy dynamically, by changing the amount ofresources dedicated to security analysis and routing on the basisof current load. These hybrid energy-aware Routers/IntrusionPrevention...
Nowadays, users' demands for tourism consumption continue to upgrade, more and more consumers complete the reservation of air tickets and hotels through online payment. Referring to previous researches, this paper established the users' online payment behavior intention model based on Unified Theory of Acceptance and Use of Technology (UTAUT) and put forward corresponding hypotheses. Then we adopt...
With the development of e-commerce and smart tourism, the combination of tourism and the internet has caused tourism purchasing in China to shift from traditional channels to online ones. However, while online tourism consumption has many advantages there are also high associated security risks. Understanding how perceived security impacts online tourism purchasing behavior is extremely important...
As one of the most widely-used Peer-to-Peer applications, BitTorrent system has gained a lot of successes in last decade. BitTorrent has been extensively studied in the literature. However, few research studies vulnerabilities of BitTorrent, and the abuses of BitTorrent have already impeded the wide adoption of the system. In this paper, we study a common attack on BitTorrent — the Leechers attack,...
Identity theft, fraud, and abuse are problems affecting all market sectors in society. Identity theft is often a "gateway" crime, as criminals use stolen or fraudulent identities to steal money, claim eligibility for services, hack into networks without authorization, and so on. The available data describing identity crimes and their aftermath is often in the form of recorded stories and...
Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart attacks. Various MTD techniques are developed to enhance the security of a networked system, but the effectiveness of these techniques is not well assessed. Security models (e.g., Attack Graphs (AGs)) provide formal methods of assessing security, but modeling the MTD techniques in security models has...
The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied...
Data usage has grown immensely in today's data sound and information poor technology age. Automated data collection tools and processes have led to the massive size of data stored in data marts and data warehouses, but a considerable amount of this data goes unutilized for information discovery. Data analytics in such enormous data has become increasingly challenging due to the growing variety, velocity,...
We describe the SPaCIoS project, illustrating its main objectives, the results obtained so far and those that we expect to achieve, in particular, the development of the SPaCIoS Tool, an integrated platform that takes as input a formal description of the system under validation, the expected security goals, and a description of the capabilities of the attacker, and automatically generates and executes...
We study the worm propagation dynamics in wireless sensor networks (WSN) with four different node deployment patterns, and propose a select immune mechanism which function by propagating anti-worm packets in WSN to curb the spreading of worms. By simulating worm propagation in WSN with and without immune mechanism, and analyzing the effects of different factors, we verify the cluster or group structure...
Based on TAM and TTF theory, we construct an adoption model to analyze factors that influence users adoption m-commerce. The theoretical model indicates that perceived fit have positive effect on perceived usefulness and perceived security, perceived value was positively related to intention to adopt m-commerce; moreover, perceived value mediates the effect of perceived usefulness and perceived security...
The development of systems based on embedded components is a challenging task because of the distributed, reactive and real-time nature of such systems. From a security point of view, embedded devices are basically systems owned by a certain entity and operated in a potentially hostile environment. Currently, a security engineering process for systems with embedded components that takes these considerations...
The worm is still one of the most serious threat to the Network security. The logical worm propagation model could characterize the propagation of Internet worms more exactly, and could be more helpful to carry out the worm protection, detection and suppression technology research. In the initial phase of this paper, a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was...
Nowadays the use of the Internet has become something massive and indispensable. But, how protected are internet users from cyber attacks? It is very difficult to see the impact of worm viruses in real networks. One of the best ways is to run attacking tools for intruding real networks and to get sufficient information on phenomena occurred in the networks during the attacks. However, it is impossible...
Network filters are designed and deployed to enforce restrictions for a variety of political, social, economical or merely security reasons. However, network filters can potentially be violated by attackers and thus may not be completely adequate to fulfill their tasks. This paper approaches the network filtering from a software engineering perspective by utilizing an automated method to analyze the...
At present, Thai e-Tailer discover a chance for operating their business in popularly type of virtual merchant via internet channel. Unfortunately, Thai e-Tailer faces to a problem concerning to the low level of trust for making an internet activity in view point of customer. Therefore, this document studied to e-Tailer: virtual merchant regarding to common threat and technological solution on e-Tailer...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.