The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
In order to build the cross-department and cross-regional road network monitoring and security service platform and related system, we puts forward and research three levels of integration technology. The application of integrated technology is designed and developed to implement the comprehensive application demonstration system of road network management.
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
With the increasing deployments of Network Functions Virtualization (NFV) in both industry and academia, it becomes necessary to design mechanisms for keeping the integrity of Service Function Chains (SFC) responsible for NFV services delivering. Despite the advances in the development of management and orchestration for NFV, solutions to keep SFCs resilient to well-known and zero-day threats are...
The Internet Of Things (IoT) is poised to make substantial inroads in all aspects of modern life before the end of this decade, including applications in smart grids, smart cities, transportation, crowdsensing, e-health, ambient assisted living, and home automation, to list just a few. Although it is recognized that IoTSec mechanisms and principles are needed across the entire IoT ecosystem, many...
The concept of Extension Headers, newly introduced with IPv6, is elusive and enables new types of threats in the Internet. Simply dropping all traffic containing any Extension Header — a current practice by operators-seemingly is an effective solution, but at the cost of possibly dropping legitimate traffic as well. To determine whether threats indeed occur, and evaluate the actual nature of the traffic,...
The information system audit developed in a data center it was based on the study of the domains of COBIT; for this reason the survey for each component it was developed with the goal of obtain the necessary information for audit. The analysis of this information, permited to establish the degree of compliance with international standards, and determine the maturity, risk levels of each of the components...
Clock synchronization is one of the most essential assets for distributed real-time systems, as sensing, control and actuation require synchronized communication to meet real-time deadlines. We propose a distributed monitoring method to detect if an adversary is interfering with the clock synchronization protocol. The monitor uses certain network indicators and a set of rules to decide about switching...
Internet of Things (IoT) technology has attracted much attention in recent years for its potential to alleviate the strain on healthcare systems caused by an aging population and a rise in chronic illness. Standardization is a key issue limiting progress in this area, and thus this paper proposes a standard model for application in future IoT healthcare systems. This survey paper then presents the...
A monitoring system plays an important role in the different open environments such as school, colleges, universities, offices, etc. An offline monitoring system continuously monitors the network and notify to the network administrator when any suspicious or abnormal activities happen within the network. The computer system has a standard processes along with some credentials which are predefined...
This paper presents an overview of an intelligence platform we have built to address threat hunting and incident investigation use-cases in the cyber security domain. Specifically, we focus on User and Entity Behavior Analytics (UEBA) modules that track and monitor behaviors of users, IP addresses and devices in an enterprise. Anomalous behavior is automatically detected using machine learning algorithms...
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Computing paradigm. Potential Cloud Service Customers (CSCs) do not trust delegating every kind of resources and data to external Cloud Service Providers (CSPs). The problem grows in complexity due to the increasing adoption of complex supply chains: CSPs that offer Sofware-as-a-Service (SaaS) cloud services...
This paper firstly introduces the background and significance of the communication management system in power system, and expounds the necessity of the construction of communication management system .view a whole solution of the system from the technical point, describes the physical architecture, logical architecture, and security architecture of communication management system, analyses the design...
With the increasing volume of container transport, the international community pay more and more attention to container security. This paper investigates the new concept, key function and key technologies available of the secure and smart container. Especially on the base of application and survey, this paper carries on the research of standard system. Under the current standard system frame, it works...
The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the...
Enforcement of noninterference requires proving that an attacker's knowledge about the initial state remains the same after observing a program's public output. We propose a hybrid monitoring mechanism which dynamically evaluates the knowledge that is contained in program variables. To get a precise estimate of the knowledge, the monitor statically analyses non-executed branches. We show that our...
Micro-policies, originally proposed to implement hardware-level security monitors, constitute a flexible and general enforcement technique, based on assigning security tags to system components and taking security actions based on dynamic checks over these tags. In this paper, we present the first application of micro-policies to web security, by proposing a core browser model supporting them and...
Fine grained information flow monitoring can in principle address a wide range of security and privacy goals, for example in web applications. But it is very difficult to achieve sound monitoring with acceptable runtime cost and sufficient precision to avoid impractical restrictions on programs and policies. We present a systematic technique for design of monitors that are correct by construction...
IoT(Internet of Things) is global infrastructure that enables any object to communicate. The term IoT is being widely used and that technologies are being applied to various areas. IoT technologies is expected to increase many services' convenience, expandability, accessibility and interoperability, but existing ICT environment could be exposed new security threats due to increased openness and IoT...
Wireless Body Area Network (WBAN) is extremely useful emerging technology having enormous utilities and benefits in everyday life not only for health care but also for athletic guidance, public protection, and end user electronics. With the arrival of less power and inexpensive wireless connectivity innovations, Body area Networks could be implemented using available complementary technology. Nonintrusive,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.