The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the first performance benchmarks proposed more than 25 years ago, the concept of comparing/ranking computer systems or components has proven to be a powerful instrument to promote the improvement of specific computer or software features. Following this path, many benchmarking studies have extended the benchmarking model initially proposed for performance to address the comparison of different...
The popularization of smartphones and tablets and their increasing usage turns them into an attractive target for cyber attackers. This, together with the fact that many organizations employ a Bring Your Own Device (BYOD) policy, make assessing and comparing the security of mobile devices a key issue, in particular in what regards user-defined configurations as these have a huge impact on the potential...
Fundamentals of diversity and multi-version systems (MVS) are overviewed. Main concepts and taxonomy of multi-version computing, methods of diversity assessment and technologies of development are analyzed. Principle D3 (Defense-in-Depth&Diversity) is researched using FTA (failure tree analysis) to understand its influence on safety and security considering physical, design faults and attacks...
Critical infrastructures like smart grid and smart transportations are large-scale distributed CPSs and cyber-physical security is pivotal to their safety and security. Efficient security assessment can help administrators to protect CINs effectively and we propose a universal quantitative cyber-physical security assessment methodology which is based on cyber-physical dependence analyses. For given...
The design of path allegiance metric (PAM) based routing protocol leverages upon a trust management framework proposed in our earlier works. The PAM routing protocol strives to provide data plane security in mobile ad hoc network and its working is based upon the belief, disbelief and uncertainty components of the trust management framework which assigns a trust metric based upon the packet forwarding...
Cloud logs offer unprecedented opportunities to understand user behaviors in cloud applications and advance practices in engineering, user experience, and business. Currently, different stakeholders with relevant role-based questions use different tools for log analysis, but they share the goal of improving the same application and need to share log analyses to make decisions about application improvements...
Cyber-physical system integrity requires both hardware and software security. Many of the cyber attacks are successful as they are designed to selectively target a specific hardware or software component in an embedded system and trigger its failure. Existing security measures also use attack vector models and isolate the malicious component as a counter-measure. Isolated security primitives do not...
Some open systems must address a standard resourceallocation problem: how to collectivise and distribute aset of common-pool resources, with respect to multiple criteriasuch as fairness, inclusivity and sustainability. Previous work inself-organising multi-agent systems formalised Nicholas Rescher'stheory of distributive justice so that agents could self-organise theallocation according to contextualised...
Mission critical embedded systems should be capable of performing intended functions with resiliency against cyberattacks. The methodology of design-for-cybersecurity is now widely recognized, in which the effects of cybersecurity, or lack thereof, on system objectives must be determined. However, developers are often challenged by the difficulty of analyzing a system-under-design without complete...
Cloud Security is still considered one of the main factors inhibiting the diffusion of the Cloud Computing paradigm. Potential Cloud Service Customers (CSCs) do not trust delegating every kind of resources and data to external Cloud Service Providers (CSPs). The problem grows in complexity due to the increasing adoption of complex supply chains: CSPs that offer Sofware-as-a-Service (SaaS) cloud services...
IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks. However, previous work did not give much consideration to the negative effects that IP address mutation could bring to network performance. To be specific, there is a trade-off between network performance and security, which implies that when a...
In order to assess power systems for exposure to cascading contingencies, this paper proposes a risk-based stress indicator, which measures the ability of the system to handle possible ‘N-k’ contingencies under a specific operation point. Successive application of line outage distribution factor (LODF) is adopted to compute power flows following outage of K lines. The risk-based stress indicator provides...
This paper introduces an approach allowing cloud application developers, service providers to consider security and privacy requirements across the application lifecycle. Specifically, a DevOps framework has been described that took into account several emerging technologies such as Network Functions Virtualization (NFV) and Microservice Pattern Design. As an illustration, a proof-of-concept application...
The most important aim of Automated Intrusion Response Systems (AIRSs) is selecting responses that impose less cost on the protected system and which are able to neutralize intrusions progress effectively. Cost-sensitive AIRSs use different methods to launch efficient responses. In this regard, risk assessment as a component for assessing intrusion danger on the system is introduced in many papers...
Security protocols have been commonly used to protect secure communication in networked systems. It is often assumed that individual wireless nodes or leaders in a system are sincere and use techniques (authentication, permission, etc.) of these protocols to have secure communications. We discover that such protocols may be leaked by a sophisticated collusion attack (a type of attacks in which a node...
Cloud computing has become the norm in the provisioning of computing resources due to its flexible and proven reliability. Businesses perceive cloud services as a trend that presents enormous possibilities both in economic and technical terms. The growth in cloud services have also increased bottlenecks and security risks to business assets. Cloud security monitoring has remained relatively unexplored...
In this paper, we present a combined experimental and analytical investigation of the impact of security compliance on a three-tier web application hosted on a virtualized platform. We used two-group experimental design for our experiments, and analyzed the impact of security using the ANCOVA model. The results of experiments suggest that security measures have significant impact on system performance...
In this paper we study network security that arises from the link structure of the network. We propose a hypothetical network in which members defend themselves through a mechanism that relies on the community structure of the network, the community structure provides a basis for mutualtrustworthiness. The goal of the attacker is to take control of the entire network by spreading an infectious virus...
Today iris recognition systems are extensively used for security and authentication purposes due to their simplicity and high reliability. But these systems face a major challenge of being spoofed by high quality printed iris images or pictures captured by camera. The problem is aggravated by use of varying illumination conditions in an attack access attempt. This paper investigates spoofing attempts...
In this short paper we present a socio-technical framework for integrating a security risk escalation maturity model into a security information and event management system. The objective of the framework is to develop the foundations for the next generation socio-technical security information and event management systems (ST-SIEMs) enabling socio-technical security operations centers (ST-SOCs)....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.