The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
At present time the unregistered SIM cards (here unregistered means the SIM cards which are registered with false information provided by dealer) are widely used for committing crimes in the perspective of Bangladesh. Due to the complexity of the present SIM card registration process, the subscribers are reluctant to register themselves. In this paper we propose a cloud based system model which demonstrates...
This paper presents a learning algorithm for adaptive network intrusion detection based on clustering and naïve Bayesian classifier, which induces a hybridization of unsupervised and supervised learning processes. The proposed approach scales up the balance detection rates for different types of network intrusions, and keeps the false positives at acceptable level in network intrusion detection....
Computer crime is a problem that continues to increase across the world. In this paper, we use a recent case of computer fraud by a rogue trader in Societe Generale, a French bank, to examine how the fraud was committed. We then discuss how to improve the risk control systems. Even with an improved risk control systems and strengthening of computer security systems, computer fraud cannot be prevented...
Today's fast developing modern information technology not only has a great impact on the social and economic activities but also more importantly has caused the innovation of modern auditing technology. In order to keep pace with the development of modern audit, the author adopted the method of computer data mining to analyze large quantities of data collected from the audited corporate, and work...
The undergraduate degree of computer and cyber security has been offered at the School of Information Technology, Phetchaburi Rajabhat University, Thailand since 2005. Our program requires direct field experience when students are taking upper-level courses. This is not only to ensure that students are well prepared for their future jobs, but also to raise awareness of how important and mandatory...
CAPTCHA is an automated test that humans can pass, but current computer programs can't pass any program that has high success over a CAPTCHA can be used to solve an unsolved Artificial Intelligence (AI) problem. The most widely used CAPTCHAs rely on the sophisticated distortion of text images rendering them unrecognizable to the state of the art of pattern recognition techniques, and these text-based...
The two-factor authentication scheme combined password with smart card is one of the most widely used methods. This paper analyzes the security performance of a latest proposed remote user authentication scheme and simulates the attacks it suffers: it's vulnerability to the password guessing attack, the server masquerade attack and lacks of password backward security. Based on the detailed security...
Centralized access control systems improve security and management feasibility in secure LAN (SLAN) system, but also bring in weak extensibility. System delay becomes non-ignorable facing with frequent requests from mass clients. We describe the design, implementation, and performance of a QoS-enabled system for access control system on SLAN. The system optimizes the flexibility and security. Through...
To know and exactly what's going on in Cyberworld is impossible. Thus, it is also very hard to forecast what is going to happen and what will be the outcome of a certain event. Actually, every manipulating or exploiting of cyber resources is done without any recognition. Thus policy makers currently faces the daunting challenge of identifying the actors responsible for launching politically motivated...
To the problem of hostile service brought by node anonymity in P2P system, this thesis proposes a reputation aware resource finding algorithm. This algorithm is based on routing indices (RIs) algorithm and adopts the conception of reputation to efficiently restrain the deceiving behavior of hostile nodes in P2P system and reduce the messages load in the system, which can ensure the reliability and...
Real-Time Embedded systems must respect a wide range of non-functional properties, including safety, respect of deadlines, power or memory consumption. We note that correct hardware resource dimensioning requires taking into account the impact of the whole software, both the user code and the underlying run time environment. AADL allows one to precisely capture all of them. In this article, we evaluate...
Permanence of the assurance challenge in computer and communication systems is described and justified. Models and methods of meeting the assurance challenge are briefly outlined.
At present, Thai e-Tailer discover a chance for operating their business in popularly type of virtual merchant via internet channel. Unfortunately, Thai e-Tailer faces to a problem concerning to the low level of trust for making an internet activity in view point of customer. Therefore, this document studied to e-Tailer: virtual merchant regarding to common threat and technological solution on e-Tailer...
Stepping-stone is the most popular way used to attack other computers. Some insiders use stepping-stone to launch their attacks pretending to be outsiders. In this paper, we propose a novel algorithm to detect stepping-stone insider attacks through comparing outgoing and incoming connections. We modify the existing packet matching algorithm by introducing sliding window to make the algorithm more...
The image information disguising technology is a new technology in information security domain in recent years. Using the S- rough sets theory and element migration's dynamic and randomness, in view of the image information disguising technology, proposed the image increase disguising and decrease disguising concept, has given image information disguising characteristic theorem based on the S- rough...
Intrusion detection has been at the center of intense research in the last decade owing to the rapid increase of sophisticated attacks on computer systems. Network Intrusion Detection Systems (NIDS) detect and prevent numerous security threats in network traffic. Recent Network Intrusion Detection Systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet...
Since the 21st century, artificial intelligence has deeply impacted the development process of every subject, such as Cybernetics, Information Theory, System Theory, Computer Science, physiology, etc., nearly involving any field and category in the human world in the theory and practice study. With the development of artificial intelligence, the internet has become a relatively new field. Today, with...
As newer software engineering technologies, such as Service-Oriented Architecture (SOA), become the basis for mission-critical systems, they must include security as a foundational capability. This paper highlights security concepts relevant to using SOA as a foundation for a Common Operating Environment (COE), i.e., a set of infrastructure and common services for developing and executing applications...
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security-relevant information. This paper scrutinizes this proposed method for security requirements specification and develops a different basic methodology that can be used for the stated purpose...
We propose a Deception Robust Control (DRC) for orchestrating the cyber sensors and cyber effectors present in typical enterprise information network systems operating in the ever changing situations that arise in servicing their missions. The theory and exemplar of deception control of focus here-though motivated by conventional warfare-applies to any partial information asymmetric stochastic game,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.