The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attacks at the ??RFID layer??, where tags and readers interact, appear in the output data used by the ??strategic layer?? to monitor or authorize entities. Previous research has used contextual information from the ??real world layer?? or ??strategic layer?? for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce...
Information infrastructure is witnessing an evolution with the advent of Autonomic computing paradigm. Autonomic Computing Systems (ACS) is becoming more real and visible in present-day computing world, thus creating a context-aware-ubiquitous computing environment. Established IT Industry leaders have embraced this approach and a great deal of research and development is happening upon this area...
Intrusion detection system (IDS) is a security technology that attempts to identify and isolate ??Intrusions?? against computer systems. The major problem of IDS is the vulnerability to fragment attacks. For this problem we propose a new approach (ARD-FA : Association Rules to Detect Fragment Attack) using data mining techniques of links analyses. We develop this approach and show some improvement...
This paper presents a new approach to detect unknown worms on local networks. We propose a worm detection model based on propagation behavior of unknown worms within an intranet. The model firstly describes propagation behavior with a binary model vector structure. Then, it uses three-tier security filters to detect unknown worms. In contrast to traditional research which only focuses on how to detect...
Insider attacks is a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who take advantage of familiarity with the computational environment and abuse their privileges, can easily cause significant damage or losses. In this paper, we present an active defense model and framework of insider threat detection and sense. Firstly, we describe the...
Botnets detection is a relatively new and a very challenging research area. In this paper, we presented VMMBotsViewer, a VMM based botnet detection system that explores the network traffic behavior and system level botnets command and control event. Our experimental evaluation of VMMBotsViewer on many real-world network showed that it has very promising detection accuracy with very low false positive...
In this paper we consider an object detection problem for image based surveillance system that works in a predefined area. A real environment is a random spatial and temporal changing background, e.g. water waves, light, wind, rain, fog, etc. The suspicious objects (humans, cars, ships, etc.) are put in an observation area from either an area boundary or its surface. Therefore the object and environment...
Botnets have been recognized as one of the most important threats to the security of the Internet. They engage in Distributed Denial of Service (DDOS) attacks, email spamming and other malicious activities likewise. As evolving new features such as decentralized architecture, using P2P networks and etc, new Peer-to-Peer(P2P) botnets could no longer be indicated effectively and accurately by using...
Botnets have been recognized as one of the most important threats to the Internet security. They are engaged in DDOS attacks, email spamming and other malicious activities likewise. Traditional botnets usually organized themselves in a hierarchy architecture, which offers professionals opportunities to detect or defend the botnets in their servers. However, newly-appeared P2P botnet such as Storm...
Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world. In...
Security information exchange (SIE) is an information exchange system that lets analysts look at data in real time. Still in its early phase, the system already collects an enormous volume of data.
LR-WPANs mainly target low data rate and short range applications. Packet delivery in such networks is achieved through routing and packet forwarding. So we should provide security for both operations. In this paper, these two types of threats within the current LR-WPAN security architecture are identified and an efficient security framework (ESF) is presented. It protects both routing and data forwarding...
Countermeasures against botnet, which has been recognized as the Internet??s biggest threat, are urgently needed to create a safe Internet environment. However, the current technology lags behind the evolution of botnet, and, unlike in the past, mutual cooperation among ISPs and countries is essential. As botnet is distributed internationally rather than in a particular ISP domain, international cooperation...
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candidates. In this paper, a lightweight system-level detection and recovery infrastructure is presented for embedded systems. Inside the infrastructure, specific runtime protections have been implemented for different kernel objects,...
The malicious code has characteristic of various types, and its ability of hiding increases quickly. In this paper, according to the analysis of hiding technology of malicious programs, it proposed a new idea of detecting malware based on the raw data. Finally, the results are given, which are compared with the current security detection scanners. It is a beneficial attempt of this method in detecting...
For the protection of both routing and data forwarding operations, a network layer security solution has been provided as a solution for various security attacks in ad hoc networks. In this paper, to develop a security framework has been proposed. This security framework involves: detection of malicious nodes by the destination node, isolation of malicious nodes by discarding the path and prevention...
The aim of this study is to build a prototype of a multi-camera tracking system for a security system that enables us to track several human motions at one time. In this paper two innovative methods: foot step detection method and particle filtering method. Generally, to recognize a single human motion is easier than to link several human motions. This is because several human motions move different...
We propose an image processing system which searches the moving human and vehicles from the long-term surveillance video for intruder detection or parking lot monitoring, by comparing a series of retrieval queries like passing a certain area, moving direction, duration time and so on. In such a system, not only on-line detection from real-time video by pre-defined query but also quick re-search going...
The VoIP technology has been increasingly popular and the number of its users has surged in the past years, because of its economical advantage over the traditional PSTN services. As a side effect, various VoIP servers and clients are becoming attractive targets of malicious attacks. This paper outlines the detection rules we have formulated to detect fuzzing attacks, which attempt to crash a VoIP...
As a new distributed computing technology, mobile agent shows its wide prospect of application. But Some security problems are still exist in the widespread deployment of mobile agents' application. Since the mobile agent is completely exposed to remote host and easily be isolated and attacked by the malicious hosts, the protection of mobile agent on remote agent platform matters much. Obfuscation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.