The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, many organizations collect large volumes of event log data on a daily basis, and the analysis of collected data is a challenging task. For this purpose, data mining methods have been suggested in past research papers, and several data clustering algorithms have been developed formining line patterns from event logs. In this paper, we introduce an open-source tool called LogClusterC which...
The development of cloud computing technology and the popularization of cloud services have a great impact on the industry. On the one hand, cloud technology enhances network's operation efficiency and reduces the cost. On the other hand, the cloud resource can be accessed by any network equipment. It increases the chances that the identity of user is misrepresented and then led to many security problems...
The security of cloud environment is always a target for attackers in order to exploit any of the system's vulnerabilities. Recently, software-defined systems (SDS) has become a focus of several researches. Where, SDS is in the way to replace the traditional networking, in order to provide facilities which are based on remote and centralized control. The security of SDS is a major requirement to guarantee...
Developing novel security devices using nanotechnology has emerged as a promising new area since they offer higher reliability, small form factor, and anti-tampering features. Single-walled carbon nanotube (CNT) is promising to replace silicon as the future transistor channel material due to its superb electrical properties and intrinsic ultrathin body. However, several imperfections of this nanomaterial...
Biometrics based authentication systems face the major challenge in securing the template. Although multi-modal biometric techniques and cryptographic techniques offer security but they can be easily compromised. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e. keeping it unimodal but still offering the same security as that of the combined...
Open source and closed software security has been debated for decades, vulnerabilities reported for both types of software has been under scrutiny for years. In this study, a descriptive and correlation study for two selected systems is conducted using SPSS 19. The results show that the severity score average of Linux kernel vulnerabilities is lower by %30 than the severity score average of vulnerabilities...
With more companies turning towards cloud computing for storage and processing of their data, the security of the cloud becomes essential. However, cloud computing is vulnerable to many security threats, including data leakages, compromised credentials, presence of unauthorized users or entities, execution of insecure applications or programming interfaces and APIs, shared technology vulnerabilities,...
Most of the existing quantum key distribution protocols do not consider the fact that the source and measuring device cannot be trusted, which causes hidden danger, such as the side channel attack, resulting in unsafe quantum communication. Therefore, it is important to research quantum key distribution protocol under the conditions of non-trusted device. We show a quantum key distribution protocol...
In our previous work, well balanced pseudo random signed binary sequence generated by using trace function and Legendre symbol has been researched. Our previous sequence generated by applying primitive polynomial over odd characteristic field Fp, trace function and Legendre symbol. The important features such as period, periodic autocorrelation, and cross-correlation have already been well discussed...
Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the...
Protecting Critical Infrastructures (CIs) against contemporary cyber attacks has become a crucial as well as complex task. Modern attack campaigns, such as Advanced Persistent Threats (APTs), leverage weaknesses in the organization's business processes and exploit vulnerabilities of several systems to hit their target. Although their life-cycle can last for months, these campaigns typically go undetected...
Fixing some security failures are difficult because they cannot be easily reproduced. To address Hardly Reproducible Vulnerabilities (HRVs), security experts spend a significant amount of time, effort, and budget. Sometimes they do not succeed in the reproduction step and ignore some security failures. The exploitation of a vulnerability due to its irreproducibility may cause severe consequences....
This paper proposes a novel approach for pseudo random ternary sequence over finite field. The sequence is generated from a primitive polynomial over finite field applying trace function and möbius function. This paper further presents some important properties such as period, autocorrelation and cross-correlation of the generated sequence. The proposed approach is experimented on various bit length...
Visible Light Communication (VLC) is a promising technique for high-speed, low-cost wireless services with the rapid development and wide deployment of Light-Emitting Diodes (LEDs). However, the broadcast nature of the VLC makes eavesdroppers easily intercept the light communication in various settings, e.g., offices, conference rooms and airport lobbies. Although previous work put forward physical...
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
No matter how sophisticated and advanced an organization's security system is, it remains vulnerable due to the human factor. In this paper, we conducted a survey to analyze the patterns used by the faculty, staff, and students when generating passwords at a small sized university. We found that users are not as aware of security requirements and practices as they think. Moreover, the vast majority...
With the dramatic growth of network attacks, a new set of challenges has raised in the field of electronic security. Undoubtedly, firewalls are core elements in the network security architecture. However, firewalls may include policy anomalies resulting in critical network vulnerabilities. A substantial step towards ensuring network security is resolving packet filter conflicts. Numerous studies have...
Current Security Information and Event Management systems (SIEMs) constitute the central platform of modern security operations centers. They gather events from multiple sensors (intrusion detection systems, anti-virus, firewalls, etc.), correlate these events, and deliver synthetic views of the alerts for threat handling and security reporting. However, as the number of security incidents, and thus...
In this paper, the authors have proposed a new approach for generating multi-value sequence by utilizing primitive element, trace function, and k-th power residue symbol over odd characteristic field. Let p be an odd prime and Fp be an odd characteristic prime field, m be the degree of the primitive polynomial f(x), and k be a prime factor of p-1. In details, the procedure for generating multi-value...
Radio Frequency Identification Device (RFID) technology use in health care services has been shown to save lives, prevents errors, save costs and increases security. Implementation of RFID technology has been challenged with high implementation costs, substantial gap between technology implementation costs and the RFID-enabled benefits, lack of common standard of usage/data analysis and low operational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.