The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
Named Data Networking (NDN) is a clean state Internet paradigm that considers some security primitives in its original design, and one of the promising candidates for the future Internet architecture. However, it may suffer from the specific threats such as Interest Flooding Attacks (IFA). Most researches are focused on the defense against fake IFA, where the PIT resources in victim routers are exhausted...
In this paper, an online working condition monitoring system is designed to early warn environmental quality in manufacturing industry. It is very crucial to provide real time and accurate data for staffs, stakeholders and control center to monitor factory air quality at working place. By uploading the all collected data on internet, the environmental condition can be monitored in real time by users...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
Cross Site Scripting (XSS) vulnerability acts as one of the chief widespread security issues in web applications. By reviewing the literature pertaining to XSS vulnerability, it has been found that many investigations have directed their energy only on XSS vulnerability detection, but not many studies have concentrated on removing XSS vulnerability. This paper embed the removal stage of XSS vulnerability...
Defending against cache pollution attacks, highly detrimental attacks that are easy to implement in Named-Data Networking (NDN), currently suffers from the lack of coordination. Solving cache pollution attacks is a prerequisite for the deployment of NDN, which is widely considered to be the basis for the future Internet. We present CoMon++ to this end, a framework for lightweight coordination that...
Threats to information security can have great impact on business finances and company's reputation. Traditional methodologies for evaluating the maturity of data centers investigate security parameters to determine the compliance of data centers and international security norms. This paper proposes two innovative evaluation procedures to capture other security perspectives on data center environments:...
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth. We introduce a new client-side deduplication protocol, called DICE (Dual Integrity Convergent...
In this paper, we propose a novel secure and privacy-preserving scheme for enhancing security in vehicular cloud based tasks announcement. The proposed scheme uses an efficient multiple receiver signcryption technique with proxy re-encryption in order to prevent the private information of the vehicles from being disclosed during task announcement. By integrating the proxy re-encryption algorithm with...
Cloud computing is rather new, and there're, of course, concerns like data-protection. This technology is developing as a standard for data-sharing on remote storages. Cloud has been able to convince users and companies' owners to transfer their data to Cloud so they can use Cloud resources and reduce their costs. Due to importance of data for its owners, there's always concern about security. When...
Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent notable Advanced Persistent Threat attacks. However, these documents are expressed in natural language. This limits the efficient reusability of the threat intelligence information...
With SDN increasingly becoming an enabling technology for NFV in the cloud, many virtualized network functions need to monitor the network state in order to function properly. An outdated network view at the controllers can impact the performance of those virtualized network functions. In earlier work, we identified two main factors contributing to an outdated network view in the case of a load-balancer:...
A novel secure architecture for sensor networks that make use of the LoRaWAN (Long-Range Wide Area Network) protocol specification is proposed in this paper. The paper analyses potential security threats and provides the protection mechanisms and security recommendations to enable protected data transmission and to prevent unauthorized access and data loss in LoRaWAN sensor networks.
The Development of technological system have grown up rapidly including how to vote. In general, people are accustomed to vote by using ballot paper. In Indonesia, this way is considered ineffective both in terms of cost, time, and governance. Due to this, the creation of an electronic voting system or known as e-voting based on android for the voting system implemented can be performed more easily...
Lateral movement-based attacks are increasingly leading to compromises in large private and government networks, often resulting in information exfiltration or service disruption. Such attacks are often slow and stealthy and usually evade existing security products. To enable effective detection of such attacks, we present a new approach based on graph-based modeling of the security state of the target...
Cloud computing is a technology that facilitates numerous configurable resources in which the data is stored and managed in a decentralized manner. However, since the data is out of the owner's control, concerns have arisen regarding data confidentiality. Encryption techniques have previously been proposed to provide users with confidentiality in terms of outsource storage; however, many of these...
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
PUFs or Physically Unclonable Functions are emerging hardware security primitives that offer a lightweight alternative to standard security for highly restricted devices like RFIDs. PUFs, however, have been found to be vulnerable to modeling attacks and as such PUF-based authentication protocols had to employ cryptographic primitives to establish reliable security. We introduce a novel lightweight,...
The Address Resolution Protocol (ARP) provides the link between layer 3 IPv4 addresses and layer 2 (MAC) addresses. ARP has no facilities for authenticating the communicating parties and is therefore vulnerable to spoofing attacks. Observing that in modern networks the use of the DHCP server to allocate both static and dynamic addresses is more or less taken for granted, we propose to use the DHCP...
Software-Defined Networks (SDN) is an emerging area that promises to change the way we design, build, and operate network architecture. It tends to shift from traditional network architecture of proprietary based to open and programmable network architecture. However, this new innovative and improved technology also brings another security burden into the network architecture, with existing and emerging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.