The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of computer network, its security problem has been urgent at present. Authentication is an important part in the network security. It can prevent illegal user from accessing network. Traditional authentication method is password. But it cannot resist dictionary and playback attack. This paper would design an authentication framework which is effective and security by using LDAP...
Network access control with intrusion detection system capabilities is currently being used to monitor and protect networks from malicious activities. In this paper, we propose a 3-tier architecture of a network access control that uses mobile agents to help reduce the shortcomings of currently available network access control devices. Our idea is to make use of the inherent characteristics of mobile...
Widespread application of computer network has evoked a lot of interest for cyber attackers to target these systems. In addition to cryptography based protective techniques such as authentication and authorization, several defense measures, like Intrusion Detection and Tolerance, and tools are employed to protect networks thereby, making security a critical issue. Therefore, the need for defining,...
With the popularity of computer network, smart card based remote user authentication is receiving more and more attention than ever. Recently, Liaw et al. proposed an efficient and complete remote user authentication scheme using smart cards. Its security depends on the one-way hash function and is nonce-based. They claim that it achieves more functionality and satisfies all criteria and can withstand...
Security incidents are becoming more serious and more common not only in computer networks, but also in automation networks. Automation devices are still more and more based on computers and they have the same weak points like standard computers. Actual trends in automation networks are among others wide automation networks covering several manufacture divisions or remote controlling of automation...
Configuring firewalls is a difficult task. The reason is that the effects of firewall rules cannot be seen during the configuration time. As a result, errors and loopholes in firewall rules are discovered only at the run time and they often cause attacks. In this paper, we develop a graph-based method for analyzing firewall rules with services. Our new model provides advantages over all existing methods...
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from renewable energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. This paper proposes a new two-level architecture for power-grid computer networks and to strength the networks'...
The technology of confidential connections in a computer network using key information pre-distributed independently and may be simultaneously in its segments or domains is proposed. Some key pre-distribution schemes are generalized using well-known hashing method. To support the proposed technology the modification of Kerberos-type protocol is considered. The proposal allows us to decrease an amount...
There are a number of techniques and pieces of hardware and software aimed at promoting information security. In the present paper it is presented a security system dynamically reconfigurable in FPGAs. SSDR presents a robust architecture, which enables the implementation of specific and general security policies in order to guarantee services such as confidentiality, authenticity, integrity, availability,...
There are a number of techniques and pieces of hardware and software aimed at promoting information security. In the present paper it is presented a security system dynamically reconfigurable in FPGAs. SSDR presents a robust architecture, which enables the implementation of specific and general security policies in order to guarantee services such as confidentiality, authenticity, integrity, availability,...
Having a firewall policy that is correct and complete is crucial to the safety of the computer network. An adversary will benefit a lot from knowing the policy or its semantics. In this paper we show how an attacker can reconstruct a firewall's policy by probing the firewall by sending tailored packets into a network and forming an idea of what the policy looks like. We present two approaches of compiling...
In this paper spam stopping firewalls are implemented through approximate text search algorithms, based on a systolic array paradigm. The implemented architecture works for patterns that contain don't cares, or, complement, and sub range symbols. A software implementation of an approximate text search algorithm has been made using the C programming language. Moreover, a hardware implementation is...
This paper is devoted to the new monitoring mechanism with suspicious hosts early localization that allows detect the network attacks with low level of incorrect detections. The structure of the monitoring system, based on suggested mechanism is designed. Also is described the experimental researches of the different types network monitoring systems and is analyzed their effectiveness for the attacks...
Dispatching managements information system (DMIS) receives real-time data from real-time systems and provides service for outer systems. Advanced technologies of network security are expected to be adopted in power system, whereas need modifying so as to be adaptable to real-time requirements. Compatible measures that should be taken to eliminate the insecure potential hazards now existing in DMIS...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.