6,047 Hits in 4.3 sec


Suman .
2020 International journal of computer science and mobile computing  
In this modern era, mostly all wireless software applications are hacked and injected because of several harmful activities.  ...  Henceforth, different frameworks were developed to measure the security level in software systems.  ...  Thus it attained massive accuracy for software testing. The practice of software security is processed to reduce the attack vulnerabilities.  ... 
doi:10.47760/ijcsmc.2020.v09i11.008 fatcat:4amv4ey3ordg7nyk4t3vhpkikm

Towards Crossfire Distributed Denial of Service Attack Protection using Intent-based Moving Target Defense over Software Defined Networking

Muhammad Faraz Hyder, Tasbiha Fatima
2021 IEEE Access  
ACKNOWLEDGMENT The Department of Computer Science and Software Engineering, NED University of Engineering and Technology, Karachi, Pakistan, supported this research project.  ...  [22] presented a framework known as Open Software Defined Framework (OSDF) which stipulates an array of high-level operating network facilities which may be evoked using managerial applications for  ...  Its goal is to generate Network OS (Operating System) that too an open source in order to enable service providers to model real SDNs (Software Defined Networks).  ... 
doi:10.1109/access.2021.3103845 fatcat:nvj3d6kfpzeqhcr44ys5i7dnrm

Software Defined Monitoring (SDM) for 5G mobile backhaul networks

Madhusanka Liyanage, Jude Okwuibe, Ijaz Ahmed, Mika Ylianttila, Oscar Lopez Perez, Mikel Uriarte Itzazelaia, Edgardo Montes de Oca
2017 2017 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN)  
We propose necessary modifications to Software Defined Mobile Network (SDMN) architecture to implement the SDM framework.  ...  way to attain the dynamism necessary for the monitoring of the next generation-networks.  ...  ACKNOWLEDGMENT This work has been performed in the framework of the SE-CUREConnect (Secure Connectivity of Future Cyber-Physical Systems) and Towards Digital Paradise projects.  ... 
doi:10.1109/lanman.2017.7972144 dblp:conf/lanman/LiyanageOAYPIO17 fatcat:al7wwhmgazfgtdlckk3i7iugzy

A Simulation Tool for Evaluating Attack Impact in Cyber Physical Systems [chapter]

Gianluca Dini, Marco Tiloca
2014 Lecture Notes in Computer Science  
However, it is not possible to defend from all possible attacks for cost and performance reasons. An attack ranking is thus necessary.  ...  We propose a simulative framework that makes it possible to rank attacks according to their impact. We also describe a case study to assert its usefulness and effectiveness.  ...  Acknowledgements This work has been partially supported by the EU FP7 Project PLANET, "Platform for the Deployment and Operation of Heterogeneous Networked Cooperating Objects" (, and  ... 
doi:10.1007/978-3-319-13823-7_8 fatcat:fgfwpmjoibho7eywvzuzdvuham

Detection and Prevention of Unknown Vulnerabilities on Enterprise IP Networks

Vincy Rose
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
The above framework detects and prevents unknown vulnerabilities in Enterprise IP networks. It also protects the behavior of the sessions performed by the user from the huge range of attacks.  ...  It helps in monitoring database requests and prevents the attacks. The proposed framework also implements worm and virus detection to evaluate malware from the data.  ...  It represents data collection for a network to be defined according to vulnerability database and exploit conditions.  ... 
doi:10.17762/ijritcc2321-8169.150286 fatcat:uvu2mkmy5rhb5j7c3mxf2774ki

A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)

K. Swapna Sudha, N. Jeyanthi
2021 Cybernetics and Information Technologies  
The emerging and current IoT applications are determined to be highly significant for improving the degree of efficiency, comfort and automation for its users.  ...  breach on the system will directly influences the life of the humans In this paper, a comprehensive review on Privacy requirements and application layer Security in Internet of Things (IoT) is presented for  ...  It defines the number of sensors within the network that detected an attack (excluding the attacked sensor). Min detection time.  ... 
doi:10.2478/cait-2021-0029 fatcat:agwfriewtnddljk46232i2klqm

Presenting a method to perform cyber maneuvers

2018 Turkish Journal of Electrical Engineering and Computer Sciences  
By injecting attacks and using the proposed algorithms, an impact assessment of each attack step on each of the elements of the environment has been done to identify potential threats.  ...  Performing cyber maneuvers in an operational environment is not easy. We need a cyber-situational awareness framework to perform its maneuvers to protect the cyberspace and to cope with its attacks.  ...  The algorithms presented in the subcategory of risk and vulnerability evaluation detect and evaluate the potential threats of the cyberspace, and by cyberattack injection, tracking and attack effect analysis  ... 
doi:10.3906/elk-1710-266 fatcat:2se4dwggwjgqllxawwciv367e4

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions

Zitian Liao, Shah Nazir, Habib Ullah Khan, Muhammad Shafiq, Shehzad Chaudhry
2021 Security and Communication Networks  
to protect software systems for the Internet of Things (IoT).  ...  Due to the practice of using components for new developments, security is one of the major concerns for researchers to tackle.  ...  the distributed cloud, a software-defined security framework was proposed in this paper. [62] Software-defined mobile network security is article gives a survey of software-defined mobile network (SDMN  ... 
doi:10.1155/2021/6677867 fatcat:4plhb5inyzdkpda4445u23govu


Vidya M.S, Mala C Patil, Dr. Shiva Murthy G
2021 Indian Journal of Computer Science and Engineering  
Software defined networking (SDN) plays a very important role to define enhanced content centric network for Industry 4.0 future internet architecture.  ...  This research study introduces a combine framework of data security aiming the futuristic Internet hosting services for content centric networks.  ...  [19] have suggested dual security strategies for vehicle network. Initially, the network hierarchy was composed of software-defined concept to normalize the network management.  ... 
doi:10.21817/indjcse/2021/v12i6/211206137 fatcat:b6w737uvmjaghl3f74blgb2mvi

A review: towards practical attack taxonomy for industrial control systems

Qais Saif Qassim, Norziana Jamil, Razali Jidin, Mohd Ezanee Rusli, Md Nabil Ahmad Zawawi, Md Zaini Jamaludin, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman
2018 International Journal of Engineering & Technology  
This paper presents a comprehensive review of existing cyber-attack taxonomies available in the literature and evaluates these taxonomies based on defined criteria.  ...  In order to understand the potential threats to these infrastructures and the mechanisms to protect them, different types of cyber-attacks applicable to these infrastructures need to be identified.  ...  Acknowledgement This research study is funded by TNB Seed Fund 2016 under a project 'R&D in Micro Cryptographic Engine for Protecting Data in SCADA Link'.  ... 
doi:10.14419/ijet.v7i2.14.12815 fatcat:wuqiungyhjhelchqcyy7stmkky

Secure Software-Defined Networking Communication Systems for Smart Cities: Current Status, Challenges, and Trends

Mohamed Rahouti, Kaiqi Xiong, Yufeng Xin
2020 IEEE Access  
In recent years, Software-Defined Networking (SDN) has emerged as a leading communication infrastructure candidate for smart cities.  ...  INDEX TERMS Communication system, OpenFlow, security, smart city, software defined networks. 12084 VOLUME 9, 2021 M.  ...  FIGURE 5 . 5 A visual illustration of a software-defined vehicular network. FIGURE 6 . 6 An SDN-enabled architecture for smart city.  ... 
doi:10.1109/access.2020.3047996 fatcat:cdxn6xeid5cvnkpqarvzrlvchi

Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain

Abdul Razaque, Fathi Amsaad, Meer Jaro Khan, Salim hariri, Shujing Chen, Siting chen, Xingchen Ji
2019 IEEE Access  
Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health.  ...  Additionally, the paper presents research on previous work that focuses on solving these cyber-attacks and identifies the strengths and limitations of the solutions for each attack.  ...  Aleroud and Alsmadi [70] proposed a technology that can control a DoS attack by using software-defined networking (SDN).  ... 
doi:10.1109/access.2019.2950849 fatcat:nk5ipbbbkrcrrecv6ihipnf6nm

A Fuzzy Classifier-Based Penetration Testing for Web Applications [chapter]

J. K. Alhassan, Sanjay Misra, A. Umar, Rytis Maskeliūnas, Robertas Damaševičius, Adewole Adewumi
2018 Advances in Intelligent Systems and Computing  
Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model.  ...  One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers.  ...  We acknowledge the support and sponsorship provided by Covenant University through the Centre for Research, Innovation and Discovery (CUCRID).  ... 
doi:10.1007/978-3-319-73450-7_10 fatcat:ytkgnyicsvhetlxavzlgadtpka

A Systematic Literature Review on the Cyber Security

Dr.Yusuf Perwej, Syed Qamar Abbas, Jai Pratap Dixit, Dr. Nikhat Akhtar, Anurag Kumar Jaiswal
2021 International Journal of Scientific Research and Management  
Cyber security is a set of technologies, processes, and practices aimed at preventing attacks, damage, and illegal access to networks, computers, programmes, and data.  ...  Cyber security safeguards the data and integrity of computing assets that are part of or connected to an organization's network, with the goal of defending such assets from all threat actors throughout  ...  A cyber security framework is a set of documents that define an organization's best practises for managing cyber security risk. Such frameworks lower a company's vulnerability exposure.  ... 
doi:10.18535/ijsrm/v9i12.ec04 fatcat:bxrsidjhpngdxgllk5cpomoyxa

DOS and Brute Force Attacks Faults Detection Using an Optimised Fuzzy C-Means

Karwan Qader, Mo Adda
2019 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications (INISTA)  
This paper explains how the commonly occurring DOS and Brute Force attacks on computer networks can be efficiently detected and network performance improved, which reduces costs and time.  ...  Therefore, network administrators attempt to instantly diagnose any network issues.  ...  Network security and conditions are required factors for maintaining performance, systems must implement control networks regarding tolerance, adaptability, scalability, attainability, and for faults  ... 
doi:10.1109/inista.2019.8778238 dblp:conf/inista/QaderA19 fatcat:5u3gmzwwxrchdm5jdygxpybmuq
« Previous Showing results 1 — 15 out of 6,047 results