The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking (SDN) is a networking paradigm to provide automated network management at run time through network orchestration and virtualization. A central controller realizes the automatic network configuration in SDN at run time by conforming to a control plane protocol (e.g., OpenFlow) and switches act as simple forwarding devices. However, SDN are susceptible to cyber attacks and...
Android permission framework is a part of Android OS to enforce secure cross application communication. However the android permission framework is very complex, and its descriptions are scattered in dozens of webpages. It is very difficult to understand the relationships among multiple permission levels and their potential vulnerabilities. This paper presents a formal model of the Android permission...
A multitude of issues affect the broader adoption of Cloud computing, with security arguably being amongst the most significant. To address security concerns, the process of threat analysis is advocated to assess potential attacks that can undermine the security goals. However, conducting threat analysis for the Cloud is a non-trivial task given the plethora of attack surfaces entailed in the multiple...
The time Bayes Petri net (TBPN) is discussed in this paper to evaluate the security of the filling system. Particularly, the initial event of the TBPN is computed by the Bayesian probability formula, which can be employed to transfer the continuous object into discrete event. And then, employing the time interval to calculate the decision function, and combining sequential consistency decision function...
Supervisory Control and Data Acquisition System (SCADA) communication forms major portion of substation automation in smart grid, as it monitors performances of substation components and their parameters. Till date keeping SCADA networks functional was prime focus, but now making it secure is biggest challenge because of their continuous connection to public networks. This paper presents security...
This paper addresses the use of events within discrete-event systems modeling formalisms, presenting the concept of event life time when enclosed in the detection of a specific behavior defined by sequences of events. This concept defines the time interval during which a macro-event is valid (a macro-event is an event computed as the result of a pre-defined sequence of events). Two types of life times...
Autonomic systems providing self-healing and self-protection capabilities have been proposed to efficiently automate rectification of system faults and recovery from malicious attacks. In fact, it becomes more and more difficult, labor-intensive, expensive and error-prone to conduct such recoveries. Self-healing techniques and security mechanisms are resource intensive and may affect system performances...
We propose, in this paper, a general modelling technique of an autonomic multi-tier system implementing self-healing and self-protection properties. The modelling is based on stochastic Petri nets (SPN). Our objective is to forecast the most appropriate configuration for a multi-tier system and ensure the effectiveness of the autonomic manager. We consider in our modelling an autonomic diagnostic...
The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied...
Cloud computing has attracted much interest recently from both industry and academic. However, it is difficult to construct perfectly secure mechanisms, in face of complex and various attack behaviors in cloud computing. In this paper, a stochastic game model (SGM) is proposed to describe the attack-defense behavior in cloud computing, the physical machine, attack-defense behavior and their attributes...
As Wireless Mesh network (WMN) is self-organizing, self-adaptive, low-cost and multi-hop, it has gradually become one of the next generation wireless networks for communication. The routing security is an important aspect of WMN. Once the routing protocol is under attack, other security measures of WMN become meaningless. Hence, detecting and resolving the attack for routing protocol is significant...
We present a method for hierarchically generating sound work flow nets by substitution of nets with multiple inputs and outputs. We show that our method is correct and generalizes the class of nets generated by other hierarchical approaches. We identify a notion of soundness that is preserved by such substitutions and correct a small omission in an earlier similar method.
In the last decade, a large body of research has been dedicated to the analysis, assessment and protection of critical infrastructures against potential threats that might affect the dependability, the security or the resilience of the services supported by such infrastructures. The concept of resilience is receiving increased attention. It is defined as the persistence of service delivery that can...
As the importance of non-functional requirements has increased, many researchers have become interested in software development process for non-functional requirements including the notation, modeling, and assessment of non-functional requirements. However, the characteristics of non-functional requirements are so sophisticated that there have been many topics that should be defined more clearly....
Intrusion detection systems (IDS) are one way to tackle the increasing number of attacks that exploit software vulnerabilities. However, the construction of such a security system is a delicate process involving: (i) the acquisition of the monitored program behavior and its storage in a compact way, (ii) the generation of a monitor detecting deviances in the program behavior. These problems are emphasized...
Survivability represents an important property of an information system which must withstand devastating malicious attacks and system failures, as well as continuously provide essential services to users. In this paper, we qualitatively analyze a system's states under different levels of attacks with varying system recovery abilities. Then, we use Colored Petri Net tools to simulate and measure the...
Traditional methods for evaluating network security neglect the correlation of network vulnerabilities. To solve this problem, a method based on Colored Petri Net (CPN) modeling is presented. Potential attack sequences are built according to the correlation of network vulnerabilities. The weakness and key paths can be found through analyzing the attack sequences. Simulation results show that the proposed...
The survivability of large, complex networks such as the Internet is an increasing concern, and some models have been presented to deal with network survivability problems. But these models are difficult to analyze because network is topologically complex, highly non-linear in their responses, and inherently unbounded to uniformly evaluate these survivability models, this paper develops a Network...
Air cargo export handling influences the cargo transportation speed. The Stochastic Petri Net (SPN) and homogeneous Markov chain (MC) were used in modeling the air cargo export handling system for performance analysis. The system capability was evaluated including steady probability, operation efficiency and system delay time. Taking a Chinese international air cargo terminal as research object, the...
Large and complex models can often benefit from parallel execution on multiple machines. In the Mobius modeling environment, this is especially true of models for which the user wants to examine several independent configurations or parameterizations. A remote job server with the capability to securely forward jobs to remote workstations or securely submit jobs via a standard batch submission system,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.