The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proposals and some implementations of Internet of Things (IoT) systems for healthcare are described. Implications of current European Union legislation, the new General Data Protection Regulation, for the security and reliability of healthcare IoT systems and for the privacy of users of these systems are presented. Analytics of healthcare IoT data for the requirements of evidence based healthcare...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
Software Defined Network (SDN) is an advanced approach to designing dynamic, manageable, cost-effective, and adaptable network architectures. SDN will play a key role as an enabler for 5G and future networks. Transferring network monitoring functions to a software entity working in conjunction with configurable hardware accelerators through a scheme called Software Defined Monitoring (SDM) is one...
We present our thoughts on the design of a novel hybrid system for detecting anomalous traffic in large-scale, policy-rich data networks. A key innovation in our approach is the combination of static configuration analysis and dynamic traffic analytics. More specifically, we will first develop abstractions and mathematical models to formally model the network and security configurations to statically...
Flow-based inspection is playing an important role in network security monitoring systems such as intrusion detection, attacks detection and so on. Traditional flow scheduling strategies are usually based on calculated hash values of input flows which is fixed for a long time. As the bandwidth grows dramatically these years, it is observed that servers handling flow inspections may be crashed due...
As the sophisticated attacks are increased continuously, the attack analysis technologies are getting more important. It is needed to collect attack related information or data first for the attack analysis. But attackers make an effort to get rid of all the attack related information that they can find and adopt anti-forensic technologies as well, so it is quite difficult to collect sufficient information...
Traditional multi-step attack correlation approaches based on intrusion alerts face the challenge of recognizing attack scenarios because these approaches require complex pre-defined association rules as well as a high dependency on expert knowledge. Meanwhile, they barely consider the privacy issues. Under such circumstance, a novel algorithm is proposed to construct multi-step attack scenarios based...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Visual analysis on network security is a new area, it consists methods and technology of visualization and network security analysis, which has new challenges. Researchers on network security visualization have done certain extent research and accumulated much. Especially with the rapid development of visual analysis, visual network security analysis achieved rich results in recent years. However,...
Network security and defense plays important roles in network management system. The traditional network security monitoring systems usually employ lots of agents to collected data and then perform abnormal detection based on measurement of those data. This kind of framework needs lots of agents and usually occupies many bandwidths. Focus on this problem, we introduce the mobile agents into the network...
Security constrained scheduling has been widely implemented in various power system operations and electricity markets. The practice of securing post-contingency flows preventively to long-term ratings has resulted in transmission network under-utilization. This paper presents a security constrained scheduling process that has been implemented in the National Grid Electricity Balancing System. The...
Network forensic is a offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection in the network. Network examination manage unstable and persuasive data. Network traffic movement is spread and afterward lost, so organize legal sciences is frequently a devoted examination...
The development of the Internet of Things will greatly facilitate the process of patient's diagnosis and monitoring, with small IP-based wireless sensors implemented on the patient's body, his physiological parameters, such as blood pressure and heart rate, can be monitored remotely and continuously. This scenario must absolutely respect the confidentiality and privacy of patient's medical information,...
Software defined networking brings many possibilities to network security, one of the most important security challenge it can help with is the possibility to make network traffic pass through specific security devices, in other words, determine where to deploy these devices logically. However, most researches focus on high level policy and interaction framework but ignored how to translate them to...
DHCP starvation attack is one of problems that has occured over the network communication. A number of researches have been proposed to solve this problem. However, traditional solutions had some limitation which can lead to denial of service to legitimate users. This paper proposed the solution for detecting the abnormal DHCPREQUEST originated by malicious users in a period of time in order to prevent...
Nowadays bad adaptive performance of network intrusion prevention system (IPS) becomes the bottleneck of its development in face of complex and fickle attacks. The idea of cognitive network intrusion prevention is creatively put forward to solve the problem in this paper. Three basic problems of the cognitive IPS, knowledge representation, environmental perception and self-learning, are discussed...
After careful consideration of security problems of WiMAX network and based on the specification of the WiMAX itself, in this paper we have taken a novel approach to these issues by designing a WiMAX-based energy efficient intrusion detection system that has better performance and is more efficient. Our investigations indicate that this intrusion detection system can provide both an acceptable application...
The Future Internet will be populated by not just data and devices, but also services. Approaches in Service-Oriented Architectures are allowing new ways for users and developers to manage, control and benefit from the services that are being made available. However, this also introduces new threats for service ecosystems and with wider deployment comes a greater need to identify and tackle threats...
Grid computing is evolving fast, with specific needs for computing power, storage capacity and available bandwidth. Network security is a big concern for grid networks because attacks can endanger the availability of grid usual services. High amounts of data transferred between sites can make difficult the traffic analysis needed to identify possible cyber-attacks. This paper presents some aspects...
We introduce a computational model for networks that is suitable for supporting the administrative staff in estimating the threat that is caused by security relevant events, for identifying possible root causes for these events and for making predictions about the impact of attacks or countermeasures against attacks. We refer to expertise from the network management domain and extend the common methodologies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.