The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networks (SDNs) offer network defenders the opportunity to choose from a variety of protection techniques in response to different threats. In contrast, traditional network architectures often lack the flexibility to implement threat-specific security controls. This research was conducted on a hardware SDN test bed running custom security applications to demonstrate techniques that...
Recently, cyber attacks become so sophisticated that conventional countermeasures that focus on preventing intrusion are becoming less effective. Thus, recent countermeasures are focusing on after intrusion such as an incident response. We previously proposed a system in order to support network administrators performing incident responses. However, our previous system uses only anomaly detection...
Network management is a major issue in information world which requires high effective implementation to have properly structured information system for providing accurate data across a wide area. Efficiently functioning systems and management in a network, is necessity of up growing information sector. This needs a proper network for providing precise and accessible services to the clients over a...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
A city is smart when the social investment, human resources, communications and the building infrastructure, coexist harmoniously and systematically through the use of Information and Communication Technologies (ICT), which generates better quality of life and natural resources efficient management through the citizens participation. In Latin America and the Caribbean region some countries implement...
The prevalent use of systems-on-chip (SoCs) makes them prime targets for software attacks. Proposed security countermeasures monitor software execution in real-time, but are impractical, and require impractical changes to the internal logic of intellectual property (IP) cores. We leverage the software observability provided by the readily available SoC debug architecture to detect attacks without...
Data security has a critical role in the larger context of information and system security. In this paper, we propose the anomaly detection system for securing database. Our approach is based on analyzing the user's access pattern stored in database log and detecting the anomalous access event. We consider three methods for this, user pattern analysis, machine learning analysis, and rule-based access...
Moving Target Defense (MTD) is the concept of controlling change across multiple information system dimensions with the objective of increasing uncertainty and complexity for attackers. Increased uncertainty and complexity will increase the costs of malicious probing and attack efforts and thus prevent or limit network intrusion. As MTD increases complexity of the system for the attacker, the MTD...
Global Domain Name System (DNS) traffic provides a unique perspective on domain names usage by both legitimate users and suspicious applications. Beyond conventional DNS analysis queries and responses altogether, in this paper we investigate domain name queries to identify suspicious network traffic at.br country code Top-Level Domain (ccTLD) authoritative name servers. By monitoring and modeling...
The application of built-to-order embedded hardware designs in safety critical systems requires a high design quality and robustness during operation. Flawless execution of the involved software can be compromised by malfunctioning hardware components or by software-induced errors. Furthermore, intellectual property (IP) tends to become unavoidable in modern hardware designs. Any unexpected behavior...
Recently, over 100 Gbit/s ultra-high-speed shared IP networks have become available. The large bandwidth they provide can be shared among various users to transmit not only data but also high-quality video through a virtualized network (VN) configured with software defined network (SDN) technology on the shared IP network. The VN can also be reconfigured in case there is not enough bandwidth for the...
A targeted attack affects all terminals in a network. Therefore, in order to properly deal with such an attack, it is necessary to analyze the event information for each terminal in the network as well as all event information within the terminal. We have been studying a dynamic diagnostic method based on malware behavior in a network. We herein propose a malware detection method that works by dynamically...
One electrical fire detector with anti-electromagnetic interference(anti-EMI) is designed in this paper, to solve its deficiency in electromagnetic compatibility (EMC). The design utilizes RN8209G power chip to acquire the signal, and communicates with the host by CAN bus. According to dissemination of electromagnetic interference, the design is divided into hardware and software. In order to raise...
This paper presents implementation of a reactive base station selection scheme for millimeter-wave (mmWave) communications. In mmWave communications, the frame loss rate increases and the throughput sharply decreases when a pedestrian blocks a line-of-sight (LOS) path. To alleviate this human blockage problem, base stations can be selected so as to maintain LOS paths on the basis of communication...
Extensive use of third party IP cores (e.g., HDL, netlist) and open source tools in the FPGA application design and development process in conjunction with the inadequate bitstream protection measures have raised crucial security concerns in the past for reconfigurable hardware systems. Designing high fidelity and secure methodologies for FPGAs are still infancy and in particular, there are almost...
The complexity of network topology together with heterogeneity of network services make the network configuration a hard task, even for skilled and experienced administrators. In order to reduce the complexity of the network configuration, administrators have leveraged network policies, introducing hence new possibility of error. Indeed, erroneous and unexpected network behaviour (e.g., security flaws)...
In spite of significant ongoing research, the Border gateway protocol (BGP) still encompasses conceptual vulnerability issues regarding impersonating the ownership of IP prefixes for ASes (Autonomous Systems). In this context, a number of research studies focused on securing BGP through historical-based and statistical-based behavioural models. This paper proposes a novel algorithm aiming to track...
Over the last years the number of cyber-attacks has been constantly increasing. Since isolated Intrusion Detection Systems (IDSs) cannot cope with the number and sophistication of attacks, collaboration among the defenders is required. Collaborative IDSs (CIDSs) work by exchanging alert traffic to construct a holistic view of the monitored network. However, an adversary can utilize probe-response...
Application layer Distributed Denial of Service (DDoS) attacks, which are legitimate in packets and protocols, gradually become a pressing problem to the current network. How to effectively resist this type of attack is becoming even more challenging with the vast resources and techniques increasingly available to attackers. This paper studies the existing application layer DDoS attacks and provides...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.