The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) has proved to be a promising approach for creating next generation software based network ecosystems. It has provided us with a centralized network provision, a holistic management plane and a well-defined level of abstraction. But, at the same time brings forth new security and management challenges. Research in the field of SDN is primarily focused on reconfiguration,...
One of the strongest defenses from cyber-threats today is the use of intrusion detection systems. Port scanning is usually the first action that precedes an intrusion. In turn, the use of virtual network functions (VNF) for cloud computing has become a powerful tool for tenants to provide network functions in high-speed networks. In this paper, we propose a virtual network function to detect distributed...
The omnipresence of mobile devices and the great need to remain connected has brought to the forefront, the ever-growing need for wireless networks. This unprecedented growth of wireless networks and their use has resulted in an era where, the security of wireless networks has become a necessity. Currently the security methods to protect the Wi-Fi are based on the use of cryptography techniques to...
Technological advancement of Industrial Control Systems (ICS) and control systems automation over the past decade has brought greater interconnections of the control components. Modern control communication systems such as ModbusTCP are based on open standards that leverage Ethernet to allow interoperability between solutions from different vendors. The enhanced exchange of information has, as a side...
The IoT (Internet of Things) is one of the primary reasons for the massive growth in the number of connected devices to the Internet, thus leading to an increased volume of traffic in the core network. Fog and edge computing are becoming a solution to handle IoT traffic by moving timesensitive processing to the edge of the network, while using the conventional cloud for historical analysis and long-term...
The aim of Cloud Computing environment is to provide low cost, reliable, rapid, on-demand services to the users anywhere and anytime. But with its rapid development the security challenges are numerous. The capability of the malicious users to compromise cloud security from outside and inside has increased many folds. Hence organizations and users are skeptical about the security of cloud based services...
In this paper, we propose an integrated security architecture which combines policy based access control with intrusion detection techniques and trusted computing technologies for securing distributed applications running on virtualised systems. Our security architecture incorporates access control security policies for secure interactions between applications and virtual machines in different physical...
Intrusion detection systems (IDS) support the recognition of attacks, based on the analysis of either network traffic data (Network-based IDS) or application/system logs stored in a host (Host-based IDS). Exploiting heterogeneous data coming from both kinds of sources could be useful to detect coordinated attacks and to reduce the number of false alarms, but poses challenges in terms of both information...
Honeypots have been largely used to capture and investigate malicious behavior through deliberately sacrificing their own resources in order to be attacked. Hybrid honeypot architectures consisting of frontends and backends are widely used in the research area, specially due to the benefits of their high scalability and fidelity for detailed attacking data collection. A hybrid honeypot system often...
In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS...
With an aim of provisioning fast, reliable and low cost services to the users, the cloud-computing technology has progressed leaps and bounds. But, adjacent to its development is ever increasing ability of malicious users to compromise its security from outside as well as inside. The Network Intrusion Detection System (NIDS) techniques has gone a long way in detection of known and unknown attacks...
Technological advancement of Industrial Control Systems (ICS) and control systems automation over the past decade has brought greater interconnections of the control components. Increased interconnection provides end users with more information which facilitates improved system reliability. Modern control communication systems such as ModbusTCP are based on open standards that leverage Ethernet to...
Security and reliability are the major concern of our daily life usage of any network. But with the swift advancements in network technology, attacks are becoming more sophisticated than defenses. Although firewalls and router-based packet filtering are essential elements of an overall network security topology, they are not enough on their own. So, to brace the network from unauthorized access the...
Network Security is the most demanding domain in the Computer Science field. Network architectures are more vulnerable to malicious attacks. For this reason, updated mechanisms should be applied to network security. The concept of Network Intrusions Detection System helps in identifying the occurrence of malicious activity in a network. Various applications have been developed in order to detect attacks...
This paper takes advantage of the emerging multi-core computer architecture to design a general framework for mitigating network-based complexity attacks. In complexity attacks, an attacker carefully crafts “heavy” messages (or packets) such that each heavy message consumes substantially more resources than a normal message. Then, it sends a sufficient number of heavy messages to bring the system...
Network security is an ever growing field. As, the information technology have conquered almost all domains, the search for loop holes in the security increased tremendously. This led to the deployment of various hardware and software based security tools. One of the tools used for implementing security is intrusion detection systems (IDS). We address a problem that current intrusion detection systems...
Deployment of IoT devices for smart buildings and homes will offer a high level of comfortability with increased energy efficiency; but can also introduce potential cyber-attacks such as network intrusions via linked IoT devices. Due to the low-power and low-latency requirement to secure IoT network, traditional software based security system is not applicable. Instead, an embedded hardware-accelerator...
This paper presents a study on physical layer authentication problem for in vivo nano networks at terahertz (THz) frequencies. A system model based on envisioned nano network for in vivo body-centric nano communication is considered and distance-dependent pathloss based authentication is performed. Experimental data collected from THz time-domain spectroscopy setup shows that pathloss can indeed be...
For Software Defined Network(SDN), security is an important factor which affects its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection task by using the programmability of network. It will undoubtedly bring the heavy burden to the controller. More devastating, once the controller itself is attacked,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.