The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proposals and some implementations of Internet of Things (IoT) systems for healthcare are described. Implications of current European Union legislation, the new General Data Protection Regulation, for the security and reliability of healthcare IoT systems and for the privacy of users of these systems are presented. Analytics of healthcare IoT data for the requirements of evidence based healthcare...
in mobile social networks, legitimate transmitting nodes can be contrasted by malicious attackers acting on the purpose of disrupting communication. Our aim is to use game theory to identify malicious nodes. With respect to previous similar formulations, we consider a wider array of action options for the players, notably we include a choice about whether to engage or not in packet exchanging, and...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
Flow-based inspection is playing an important role in network security monitoring systems such as intrusion detection, attacks detection and so on. Traditional flow scheduling strategies are usually based on calculated hash values of input flows which is fixed for a long time. As the bandwidth grows dramatically these years, it is observed that servers handling flow inspections may be crashed due...
Evaluating security threat status is very important in network security management and analysis. Aquantitative hierarchical threat evaluation model is developed in this paper to evaluate security threat status of a computer network system and the computational method is developed based on the structure of the network and the importance of services and hosts. The evaluation policy from bottom to top...
Computer networks consist of several assets such as hardware, software, and data sources. These assets have often some vulnerabilities which can be exploited by attackers that violate security policies in the network. Considering the limited budget, the network administrator should analyze and prioritize these vulnerabilities to be able to efficiently protect a network by mitigating the most risky...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Mitigating security threats is a big challenge for network administrator, because threats can be exploited by attackers and lead to a cyber-attack. Therefore, network administrator should spend budget to eliminate vulnerabilities and prevent attacks. Removing all the vulnerabilities is not cost-effective and in some cases impractical. The primary goal of this paper is to prioritize network nodes based...
Recent years people have witnessed a surge of interest in APT attack, due to its complex and persistent attack characteristics. In order to prevent APT attacks, this article studies and analyzes a large number of APT attack cases which have been disclosed, gives an overview of APT attack lifecycle and attack techniques. This paper discusses the purposes of APT attacks and APT attack characteristics...
In complex networks, filters may be applied at different nodes to control how packets flow. In this paper, we study how to locate filtering functionality within a network. We show how to enforce a set of security goals while allowing maximal service subject to the security constraints. To implement our results we present a tool that given a network specification and a set of control rules automatically...
This paper provides a design of scalable and simple remote security exercise system and its performances. Serious understaffing problem in security area. Basic security skills are necessary to all people these days. We have two fundamental problems to solve this problem.
A key requirement for a smart grid deployment is a robust and secure communications network to access all components. We present a platform that provides easy connectivity to smart grid and automation components from the Internet with security and availability as the main objectives. The system is already in production for home automation remote access.
In typical IP network, load balancing is adopt to enable the load of all servers approach a global optimal balanced by dynamically dispatching new flows to different servers in the network. Linux Virtual Server (LVS) plays an important role in the dispatching process. However, previous LVS-based researches have failed to consider expansibility, efficiency and security. Based on this, we proposed a...
The threat of cyber-attacks grows up, as one can see by several negative security-news from companies and private persons. [7] Especially small-and-medium-sized enterprises (SME) are in focus of external attackers because they have not implemented sufficient security strategies and components for their networks yet. Additionally, tablets, smartphones, and netbooks changed the requirements of IT security...
Given the lack of authentication mechanisms, the address resolution protocols (ARPs) (address resolution protocol, neighbor discovery protocol, and so on) are vulnerable to attack, such as man in the middle and denial of service among others. Therefore, the safety problem of the address resolution (AR) has been significantly given focus, and, in this paper, two problems related to AR have been investigated...
In recent years, Botnets have become an important security problem on the Internet. Botnets have been used for many attacks, such as banking information theft, spam, distributed denial-of-service, identity theft and phishing. Then, they have been proposed as a major research topic in the network security. Although there are several surveys on the Botnets, they usually do not include a complete review...
Network forensic is a offset of digital forensics used for the monitoring and analysis of computer network traffic intended for collecting information, lawful proof against illegal activity, or intrusion detection in the network. Network examination manage unstable and persuasive data. Network traffic movement is spread and afterward lost, so organize legal sciences is frequently a devoted examination...
Honeynet represents a new strategy in defending the computer networks and systems against unauthorized access or hacking attempts. Not only it can detect and display the attack pattern or the tools utilized, it can also help in eliminating access to real systems by representing an emulation of the physical systems and services present within the network, thus delaying or confusing the intruder. In...
Industrial Automation systems are considered critical infrastructure as part of process and power plants. In view of the increased attacks on energy utilities, it has become a norm for the customers to be comprehended by the security requirements. Industrial Automation and Power System standards have evolved to address these requirements. An approach aligned to these standards and well integrated...
Health care is a highly regulated industry in which much value is placed upon privacy and confidentiality. The business of health care, particularly in certain academic environments, requires access to data of varying sensitivities, including information from the public Internet. This paper proposes a VLAN-based architecture for segregating data of varying sensitivities, a list of components that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.