Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the development of ICT (Information and Communication Technology), computer and the Internet have become indispensable for people's social activities while cyber security threats keep on increase trend. Unfortunately, the current popular security facilities cannot efficiently detect cyber attacks due to a tremendous amount of network traffic needs to be analyzed. In this paper, we focus on DNS...
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security challenge to be addressed. In this paper, we propose a DNS query-based DDoS attack mitigation system using Software-Defined Networking (SDN) to block the network traffic for DDoS attacks. With some features provided...
Principles of the organization of the new network service intended for protected queries processing in the distributed information systems oriented on operation in multi-server network structures are considered. The use of the service for the pipeline queries processing in a chain of servers is described.
Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent notable Advanced Persistent Threat attacks. However, these documents are expressed in natural language. This limits the efficient reusability of the threat intelligence information...
Cloud database management systems (DBMSs) often decouple database instances from physical storage to provide reliability and high availability to users. This design can robustly handle a single point of failure, but needs substantial effort to attain good performance. In this paper, we analyze the decoupled architecture and present important optimization issues that we faced in implementing the design...
Last-level caches are increasingly distributed, consisting of many small banks. To perform well, most accesses must be served by banks near requesting cores. An attractive approach is to replicate read-only data so that a copy is available nearby. But replication introduces a delicate tradeoff between capacity and latency: too little replication forces cores to access faraway banks, while too much...
The universal diagram of creation of the virtual practical works for a row of disciplines of ICT is offered. Use the VirtualBox virtualization system for different variants of the practical works organization is considered. The diagram of the organization of a workshop on installation of the selected UNIXserver is provided. The conclusion about need of a combination of operation for a display class...
Continuous Integration (CI) and Continuous Delivery (CD) are widespread in both industrial and open-source software (OSS) projects. Recent research characterized build failures in CI and identified factors potentially correlated to them. However, most observations and findings of previous work are exclusively based on OSS projects or data from a single industrial organization. This paper provides...
Service infrastructures operated by different operators with own policies are being federated to agglomerate various services. To join a federation, an operator must comply with a federation agreement. As a result, it takes time for the operator to check the consistency between own policies and the agreement, and to establish a network connection to federation's infrastructure. To ease these concerns,...
It is estimated that, nowadays, around 40 records containing private data are leaked every second. Many of these illegally obtained records are due to the lack of security measures taken into consideration. One of the biggest mistakes that can be done, when it comes to data security, is to store data in plaintext, because a vulnerability that gives an attacker access to the database may result in...
The drastic increase in the commodity computer and network performance for the last generation has a resultant of faster hardware and more sophisticated software. But, the supercomputers of the current generation are still incapable of solving the current problems in the field of science, engineering, and business. This problems arises as a single machine cannot facilitate the availability of various...
Cloud computing is undoubtedly considered one of the most discussed topics in recent times, both in the research and business sectors. Various schools of thought have attempted to provide a fitting definition from many aspects. This computing paradigm can be defined as a web-based computing model designed to allow both off-site storage and easy data and digital file sharing. The SQL injection, which...
Recent reports on cloud computing performance have provided anecdotal evidence to suggest that it varies over time and according to the vendor. This variability could potentially detract from customer experience, and/or result in increased costs to cloud consumers. In order to investigate performance variability over time, this research measured a number of different services provided by five of the...
In recent years, many organizations, companies and government agencies have been suffering from brutality of targeted attacks. Especially, destructive targeted attacks such as Shamoon and Samas have been causing significant damages on the targets' cyber assets, disputing their critical business operations. Since such attacks tend to access many hosts simultaneously, a rapid incident response is essential...
Cloud Services have become an important part of the business world. Although public cloud services provide a range of advantages, it also creates concerns over security, network usage and the need for technical expertise in the management of the cloud. This paper describes a local private cloud which uses on-site hardware infrastructure and which incorporates a three tier management system. This device...
The Domain Name System (DNS) is a key part of the infrastructure of the Internet. Recent discussions have centered on the removal of the shared DNS resolver and the use of a local full-service resolver instead. From the viewpoint of the cache mechanism, these discussions involve removing the shared DNS cache from the Internet. Although the removal of unnecessary parts from a total system tends to...
For efficient operation of automated control systems for complex organizational-technical objects, you must provide certain information services to officials and automation systems. This is achieved through the functioning of the information subsystem of the automated control system with the required performance indicators. Information subsystem of the automated control system by providing information...
In identity federation, each service provider verifies the identity of a user based on authentication performed by an authentication server called an Identity Provider (IdP). When the IdP suffers from a trouble such that an unauthorized person has cracked into the IdP or the IdP is unreachable due to a network problem, all services in the federation may be stopped by the single trouble. Simple replication...
Recent technology advancements in the areas of compute, storage and networking, along with the increased demand for organizations to cut costs while remaining responsive to increasing service demands have led to the growth in the adoption of cloud computing services. Cloud services provide the promise of improved agility, resiliency, scalability and a lowered Total Cost of Ownership (TCO). This research...
If we send our data to the cloud, how do we know the cloud will not outsource our data to another cloud provider? We leverage the originator controlled access control policy (ORCON) which is originator focused and provides the opportunity to express consumer specific desires relating to our data in the cloud. We present a novel cloud trust policy framework which allows for the consumer to make more...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.