vlajic, natalija chowdhury, mashruf litoiu, marin
In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be the increased tightening of regulations and controls against IP spoofing by world-wide Internet servi...
paulauskas, nerijus baskys, algirdas
Misuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as the undetected and successful attack may cause losses of critical resources. The anomaly-based intrusion detection system (IDS) ...
ogu, emmanuel c. ojesanmi, olusegun a. awodele, oludele kuyoro, ‘shade
Botnets have carved a niche in contemporary networking and cybersecurity due to the impact of their operations. The botnet threat continues to evolve and adapt to countermeasures as the security landscape continues to shift. As research efforts attempt to seek a deeper and robust understanding of the nature of the threat for more effective solution...
parres-peredo, alvaro piza-davila, ivan cervantes, francisco
Anomaly-based intrusion detection systems use profiles to characterize expected behavior of network users. Most of these systems characterize the entire network traffic within a single profile. This work proposes a user-level anomaly-based intrusion detection methodology using only the user&rsquo / s network traffic. The proposed profile is a colle...
Anand, Darpan Khemchandani, Vineeta
Published in
Sādhanā
E-governance or electronic governance is an application of Information and Communication Technology (ICT) for delivering cost-effective government services by any country to its citizens with reliability, transparency and efficiency. Majority of authentication schemes for e-governance in India are based on single-server environment. To access the s...
najman, michal
Adversarialní strojové učení má v principu dva cíle: navrhnout útočníka, který je schopen obejít detektor; a detektor, který úspěšně detekuje dané útočníky. Tyto protichůdné motivy jsou v této práci modelovány pomocí teorie her a je předpokládáno, že řešení hry leží ve Stackelbergově rovnováze. Abychom tuto rovnováhu nalezli, ukážeme, že z minimali...
štefunko, simon
Ciele tejto práce ležia v teoretickej analýze konceptu Internet vecí (IoT) a jeho bezpečnostných problémov, praktickom výskume a vývoji nového unikát-neho zariadenia zvaného "IoT honeypot". Analytická časť práce sumarizuje existujúce hardvérové a softvérové riešenia, a sústredí sa na technológiu Soft-vérom definovaného rádia (SDR), ktorá bola použi...
Wee, Jaehyung Choi, Jin-Ghoo Pak, Wooguil
Published in
Sensors (Basel, Switzerland)
Vehicle-to-Everything (V2X) requires high-speed communication and high-level security. However, as the number of connected devices increases exponentially, communication networks are suffering from huge traffic and various security issues. It is well known that performance and security of network equipment significantly depends on the packet classi...
Ding, Kemi Ren, Xiaoqiang Quevedo, Daniel E. Dey, Subhrakanti Shi, Ling
In this paper, we consider remote state estimation in an adversarial environment. A sensor forwards local state estimates to a remote estimator over a vulnerable network, which may be congested by an intelligent denial-of-service attacker. It is assumed that the acknowledgment information from the remote estimator to the sensor is hidden from the a...
Liu, Liang Chen, Wen Li, Tao Liu, Yuling
Published in
Sensors (Basel, Switzerland)
The security of wireless sensor networks (WSN) has become a great challenge due to the transmission of sensor data through an open and wireless network with limited resources. In the paper, we discussed a lightweight security scheme to protect the confidentiality of data transmission between sensors and an ally fusion center (AFC) over insecure lin...