The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Botnets have become one of the major tools used by attackers to perform various malicious activities on the Internet, such as launching distributed denial of service attacks, sending spam, leaking personal information, and so on. In this paper, we present BotCatch, a behavior-based botnet detection system that considers multiple coordinated group activities in the monitored network to identify bot-infected...
Today's VANET applications are vastly focused towards fulfilling users' requirements on road and making their journey safe and comfortable. In particular, safety applications will provide secure information to users and introduce mechanisms to help reduce the death rate due to road accidents. The most important aspect in such environment is the integrity of this safety information; it must be at all...
Wireless network is one of the 2010s most important security issues. As smartphone(android) is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP have not being managed properly in terms of security, Wireless Internet users also dont recognize important of security. This situation causes grave security threats. This paper...
Currently the most popular secure protocol is SSL (Secure Sockets Layer), but it has some negative aspects: First, it imposes a heavier burden on handheld wireless devices, and when a certificate uses PKI (Public Key Infrastructure) e.g. RSA algorithms, it takes a long time to establish a secure connection between client and server. This paper proposes a lightweight protocol based on the SSL protocol,...
With the construction of 3G networks and the development of mobile internet, mobile service is updating quickly. Meanwhile, the mobile phone viruses became the next target. Mobile phone viruses are a destructive procedure, just like the computer virus (program), which is also infectious and destructive. This will constraint the development of the smart mobile phones. The study of the characteristics...
Mobility protocols are originally proposed to support ongoing Internet connectivity of hosts or networks in motion. However, the requirement of seamless connectivity in mobile environment and use of route optimization between the communicating nodes have introduced several security vulnerabilities to mobility protocols. In this paper, we explain with illustrative examples major security threats on...
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and/or the destination port number. In these previous researches, the chi-square values were calculated from one feature causing the degradation in the False-Positive when the same symbol...
The following topics are dealt with: scalable Internet application; application-driven network optimization; security issues; economic aspect; wireless network; space/earth delay/disruption tolerant networking; smart spaces and ubiquitous solution; and Internet traffic.
The NFC Forum has released a first candidate for their Signature Record Type Definition. This specification adds digital signatures to the NFC Data Exchange Format (NDEF), which is a standardized format for storing formatted data on NFC (Near Field Communication) tags and for transporting data across a peer-to-peer links between NFC devices. With an increasing number of applications of the NFC and...
This paper presents a novel NIDS evasion strategy that allows attackers to exploit network mobility to perform attacks undetectable by modern NIDSs. Mobility-based NIDS evasion works by combining traditional evasion techniques and node mobility. It represents a generally applicable evasion strategy that works on several protocols for node mobility, and it is effective against state-of-the- art and...
We present and compare architectures for using a fleet of high-speed Internet subscriber residential gateways to build a hotspot network for offload of cellular data-traffic. We address the central challenges of meeting the security and ease of use expectations of cellular telephony in implementation on popular smartphones and gateways. Attention is given to security shortcomings in the client software...
Geospatially-aware mobile devices and applications (GAMODAs) are increasingly penetrating both business and consumer markets. One of the primary concerns with GAMODAs is the new dimension of information privacy risk associated with users' location data. However, because this technology is relatively new, it is possible that much of this concern can be explained by the user's knowledge (or lack thereof)...
This demonstration shows an innovative concept that introduces PKI for mobile operators. A commercial 3G dongle is equipped with an USIM module used for subscriber's authentication. The USIM embeds a tiny SSL stack written for java cards. The 3G modem delivers internet connectivity and realizes strong mutual SSL authentication providing, in the presented use case, seamless access to real OPENID services.
This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures are the usage of a temporary key, TK, the...
This paper presents the results of a research study on the use of electronic communications by college students at public universities. We examine student perceptions and attitudes towards electronic communications, such as email, web browsing, using social networks, and other online activities, as well as their views and expectations of privacy and trust. We discuss a number of important characteristics...
Modern global aviation must rise up to the challenge of safely, securely and efficiently managing increasingly crowded skies under growing passenger, business and societal demands. The “e-enabled aircraft” plays a central role in overcoming this grand challenge. Aeronautical-specific and commercial wireless data links as well as Internet standards will tightly integrate this...
Host Identity Protocol (HIP) has security support to enable secured mobility and multihoming, both of which are essential for future Internet applications. Yet micro-mobility has not been efficiently and securely addressed by HIP and other mechanisms based on it. This paper introduces a method based on HIP to support micro-mobility in an efficient and secure manner. We present the architectural elements...
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
This paper describes how mobility and security services are provided together in a vehicular scenario based on WiMAX technology. MIPv6 and IKEv2 protocols have been chosen for this purpose, in particular the “Mip6d” and “OpenIKEv2” implementations respectively. But this cooperation is performed in a different way as usual, because they also implement an access control mechanism for visited networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.