The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Free open wireless Internet access is a complimentary Wi-Fi service offered by most coffee shops, fast food restaurants and airports to their customers. For ease of access, these Wi-Fi networks are inherently insecure where no authentication/ encryption is used to protect customers wireless data. An attacker can easily deceive a wireless customer (WC) by setting up a rogue access point (RAP) impersonating...
Internet of Things (IoT) creates value through data that can be captured from connected assets and can improve the quality of our lives. Organizations can use IoT to gain a better understanding of their customers' requirements and can also improve processes such as supply chain, inventory management, investments and public safety. The increasing technological intensity of business is driving significant...
Network scanners are a valuable tool for researchers and administrators, however they are also used by malicious actors to identify vulnerable hosts on a network. Upon the disclosure of a security vulnerability, scans are launched within hours. These opportunistic attackers enumerate blocks of IP addresses in hope of discovering an exploitable host. Fortunately, defensive measures such as port knocking...
This paper proposes a framework for security services for Voice over IP (VoIP) and Voice over LTE (VoLTE) in commercial networks using Software-Defined Networking (SDN) and Network Functions Virtualization (NFV). The VoIP/VoLTE services are exposed to several security threats such as Denial-of-Service (DoS) attack, network sniffing, unauthorized services access, and VoIP spam. The conventional security...
We propose a new virtualized Peer-to-Peer (P2P) core-network architecture where each user gets its own private copy of the core network. This enables higher security and novel services, that cannot be deployed in today's architecture. We describe the new architecture in detail, presenting some of its many advantages and novel services. Lastly, we discuss some architectural options and their tradeoff...
The centralized zone data service (CZDS) was introduced by the Internet Corporation for Assigned Names and Numbers (ICANN) to facilitate sharing and access to zone data of the new generic Top-Level Domains (gTLDs). CZDS aims to improve the security and transparency of the naming system. In this paper, we investigate CZDS's transparency by measurement. By requesting access to zone data of all gTLDs...
Communication through the Internet raises privacy and confidentiality concerns. Protocols such as HTTPS may be used to protect the communication, but occasionally vulnerabilities that may allow snooping on packet content are discovered. To address this issue, we present MACHETE, an application-layer multi-path communication mechanism that provides additional confidentiality by splitting data streams...
The Border Gateway Protocol (BGP) plays a critical role in the Internet providing connectivity to hosts across the world. Unfortunately, due to its limited security, attackers can hijack traffic by generating invalid routes. Some detection systems for route hijacking have been presented, but they require non-public information, high resources, or can easily be circumvented by attackers. We propose...
Summative online examinations is a high stake process which faces many security threats. The lack of face-to-face interaction, monitoring or invigilation motivates many threats, which includes intrusion by hackers and collusion by students. This paper is based on a survey of literature to present a threat classification using security abuse case scenarios. Collusion is one of the challenging threats,...
Therapidly expanding use of the Internet for individual-driven needs coupled with the emergence of IoT devices calls for an identity management solution that opens-up closed systems to qualify users and devices securely anywhere on the Internet. This paper attempts to provide an objective overview of a user-centric identity and access management solution for securing the IoT devices that can help...
This article considers e-democracy as a socio-political resource and technology of the etatist model of Russian modernization. Based on the results of theoretical and empirical studies the article reveals the positive / negative factors affecting the legitimacy of public authorities and governance, Russian citizens' involvement in the political process. The analysis is focused on the risks and threats,...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
Device fingerprinting can provide useful information for vulnerability assessment and penetration testing, and can also facilitate the reconnaissance phase of a malicious campaign. This information becomes critical when the target devices are deployed in industrial environments, given the potential impact of cyber-attacks on critical infrastructure devices. In this paper, we propose a method for fingerprinting...
Border Gateway Protocol (BGP) takes the critical role in conveying routing information between thousand AS numbers in the internet network today. Therefore, this routing protocol is highly vulnerable to security issues that can devastate the internet itself.
In half of this population believes that life itself is impossible without the Internet, just as it would be without water or food. But question is that, how much our message is secured which you are sending to your friend or colleague via internet? And if it is not secured, how can our message are more secured? Answer is we can encrypt our message before sending to other user to minimize the chances...
The evolution of IPv6 technology had become a worldwide trend and showed a significant increase, particularly with the near-coming era named “Internet of Things” or so-called IOT. Concomitant with the transition process from version 4 to version 6, there are open security hole that considered to be vulnerable, mainly against cyber-attacks that poses a threat to companies implements IPv6 network topology...
The nefarious practice of cyber typosquatting involves deliberately registering Internet domain names containing typographical errors that primarily target popular domain names in an effort to steal their traffic for monetary gain. Typosquatting has existed for well over two decades and continues to be a credible threat to this day. In this work, we discuss the results of a user study that exposes...
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty—network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare...
The Internet is a medium for people to communicate with each other. Individuals and/or organizations are faced with increased security threats on the Internet. Many organizations prioritize on handling external security threats over internal security threats and for this reason, internal security threats are often missed or worst ignored. Domain Name System (DNS) is one of major Internet services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.