The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network virtualization provides a flexible solution to reduce costs, share network resources and improve recovery time upon failure. An important part of virtual network management consists in migrating them in order to optimize resource allocation and react to link failures. However, the migration process might entail the loss of security properties in the virtual network, such as confidentiality...
Networking provides the main infrastructure for different recent applications. These applications are targets for different types of attack. In this paper a structured literature for different types of attacks has been proposed. It presents worms attacks. Latest network security technologies are investigated, the current situation and increasing demand for robust network security is analyzed. For...
In recent years, Botnets have become an important security problem on the Internet. Botnets have been used for many attacks, such as banking information theft, spam, distributed denial-of-service, identity theft and phishing. Then, they have been proposed as a major research topic in the network security. Although there are several surveys on the Botnets, they usually do not include a complete review...
Due to extensive use of various network services and web based applications and heterogeneous organizational security requirements, enterprise network configuration is becoming very complex that imposes high operational workload on both regular and experienced administrators. This complexity extensively reduces overall network assurability and usability which in turn make the network vulnerable to...
Due to the importance of topology discovery for many tasks of sensor networks, in this paper, we discuss the basic approaches for network topology discovery, point out the security issues of the network topology discovery and propose possible countermeasures.
Threatens faced by large-scale network attacks, it is of great importance to exert an emergency response, in order to mitigate the further hazardous caused by network attacks. To implement a reasonable control strategy, a minimal set of routers is computed in a network that can be used to control and reduce damage done by a large-scale attack such as worm or DDOS attacks. Our work focuses on large...
As a reaction to the threat of network security, the appliance of virtual private network (VPN) has become more and more prevalent. In order to support IPSec VPN on ForTER, the paper proposes an implementation model by IPSec security policy LFB, which is the critical step to achieve IPSec VPN on ForTER. Experiment results show the feasibility and effectiveness of the model.
Communication via self-organization is a practical and most common model for wireless sensor network. Its security, efficiency and cost and corresponding key management are one of the key research topics on WSN security. This paper proposes a group key management scheme for WSN based on an original self-organized structure, grid-loop. The group which we called grid-loop is constructed on distributed...
The botnet construction mechanism (BCM) is one of the key technologies of the botnets and the most important issue to both the attackers and the defenders. To the best of our knowledge, although the BCM has been mentioned in many researching papers, it has not been systemically studied. In this paper, we attempt to discuss the BCM methodically. We first give both the definition and its formalized...
Security breaches and attacks are critical problems in today's networking. A key-point is that the security of each host depends not only on the protection strategies it chooses to adopt but also on those chosen by other hosts in the network. The spread of Internet worms and viruses is only one example. This class of problems has two aspects. First, it deals with epidemic processes, and as such calls...
Now it is imperative to establish a flexible and secure access control model adapting to dynamic environments. Traditionally access control models focus on access decisions by the required credentials of users, but ignore the outside environment factors. In this paper, we consider that when locating different environments with dissimilar security status, user should have different permissions. Consequently,...
This paper proposes an achievement-based educational framework for teaching the network security course. We designed around a series of counter-activities of experiment, in which the students are divided into several groups, and their task is to attack and anti-attack each other, the winner will have a high score and a feeling of achievement. In contrast to just e-learning, the novel achievement-based...
Wireless sensor networks (WSN) have been identified as being useful in a variety of domains from the battlefield to environmental monitoring. We motivate the security problems that sensor networks face by developing a scenario representative of a circle-distributed 2-hops network model. Threats are identified to this model and a new lightweight security solution, comprised of the topology discovery...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.