2,315 Hits in 4.8 sec

An efficient deception architecture for cloud-based virtual networks [article]

Mohammad Qasem, Hussain M. J. Almohri
2020 arXiv   pre-print
The main goal of deceptive systems is to form a layer of defensive nodes in an Internet-accessible cloud-based virtual network to distract and deceive malicious clients.  ...  Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises.  ...  Misery Digraphs Misery digraphs [2] take a radical approach and form a the theoretical basis for deception in cloud-based virtual networks.  ... 
arXiv:2004.06933v1 fatcat:4ues34ybzzggpmvyitz3j5pf6q

Multi-stage Jamming Attacks Detection using Deep Learning Combined with Kernelized Support Vector Machine in 5G Cloud Radio Access Networks [article]

Marouane Hachimi, Georges Kaddoum, Ghyslain Gagnon, Poulmanogo Illy
2020 arXiv   pre-print
In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future architecture in terms of minimizing energy consumption and allocating resources efficiently by providing real-time  ...  , deceptive jamming, and reactive jamming.  ...  Abstract-In 5G networks, the Cloud Radio Access Network (C-RAN) is considered a promising future architecture in terms of minimizing energy consumption and allocating resources efficiently by providing  ... 
arXiv:2004.06077v2 fatcat:qorlxum74vaqra5bbwovpnbqbi

A Study on Data Security In Fog Computing

P S.Apirajitha
2018 International Journal of Engineering & Technology  
Fog Computing is also an extended version of cloud computing.  ...  Cloud Computing is also referred as heavy computing and dense form of computing power.  ...  Data can be secured in Fog computing in an efficient way by using some methodologies of Local Area Network which incorporates the accessing power of cloud system.  ... 
doi:10.14419/ijet.v7i2.19.15045 fatcat:cnuhab6kjfbwpb754r5wr6vyra

The MEERKATS Cloud Security Architecture

Angelos D. Keromytis, Roxana Geambasu, Simha Sethumadhavan, Salvatore J. Stolfo, Junfeng Yang, Azzedine Benameur, Marc Dacier, Matthew Elder, Darrell Kienzle, Angelos Stavrou
2012 2012 32nd International Conference on Distributed Computing Systems Workshops  
MEERKATS is a novel architecture for cloud environments that elevates continuous system evolution and change as first-rate design principles.  ...  Our goal is to enable an environment for cloud services that constantly changes along several dimensions, toward creating an unpredictable target for an adversary.  ...  of integrating and operating an architecture where "everything changes".  ... 
doi:10.1109/icdcsw.2012.42 dblp:conf/icdcsw/KeromytisGSSYBDEKS12 fatcat:a3hdhht6qzdd3p4a5eddpdvni4

Moving Target Defense for SDN-Based Cloud Datacenter Network Protection

2021 International Journal of Advanced Trends in Computer Science and Engineering  
The research also validates the outperformance of the proposed MTD technique in attack success rate via simulation on SDN-based cloud datacenter network experiments in a virtualized environment  ...  Based on the obtained information, the MTD mechanism using SDN can provide proactive, adaptive and affordable defense services for the exploitable aspects of the cloud datacenter network to increase uncertainty  ...  SIMULATION SETUP AND RESULTS PNAS Scenario To run a PNAS in Software Defined Network-based cloud data center network, an effective controller that handles the traffic efficiently were needed.  ... 
doi:10.30534/ijatcse/2021/421032021 fatcat:6xheceoopbdbljagcfwnqhwote

Key Enabling Technologies for Secure and Scalable Future Fog-IoT Architecture: A Survey [article]

Jianli Pan, Yuanni Liu, Jianyu Wang, Austin Hester
2018 arXiv   pre-print
We aim to draw an overall big picture of the future for the research and development in these areas.  ...  It is deemed as a paradigm shift from the current centralized cloud computing model and could potentially bring a "Fog-IoT" architecture that would significantly benefit the future ubiquitous Internet  ...  control for more efficient networking.  ... 
arXiv:1806.06188v1 fatcat:6oh6ygyqcngffaxkro5pv2dh4e

OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive Deception

Sang Seo, Dohoon Kim
2021 Applied Sciences  
international standard-based complex architecture and characterize it as game theory.  ...  This study aimed to alleviate the theoretical limitations of existing moving target defense (MTD) and decoy concepts and improve the efficiency of defensive deception technology within an organization.  ...  Facebook and LinkedIn, Twitter Virtual machine Virtual host-based information in cloud or virtual nets VPN VPN and proxy channel-based information (e.g.,, Cloud environment  ... 
doi:10.3390/app11083402 fatcat:h5dn6kwjffc5vjfoia2xx566mq

Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds

Hussain M. J. Almohri, Layne T. Watson, David Evans
2018 IEEE Transactions on Information Forensics and Security  
This paper introduces the concept of misery digraphs, which provide a theoretical foundation for creating intrusion deception in clouds.  ...  A deceiving cloud network architecture can significantly delay attacks (by stretching the attack path from a handful of steps to thousands), providing time for system administrators to intervene and resolve  ...  Throughout this article, we use an example cloud-based virtual network architecture that includes a valuable target to which the attackers wish to gain direct access.  ... 
doi:10.1109/tifs.2017.2779436 fatcat:i4vurucdrzhsjfxldhxn6kkmh4

Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure [chapter]

Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Hiren Patel
2012 IFIP Advances in Information and Communication Technology  
Though, the proposed scheme is implemented with a Eucalyptus framework, it may work well for other Cloud platforms. It can serve as model to study the behavior of NIDS for distributed environment.  ...  [7] proposed a framework for securing Cloud from DDoS attacks using an IDS in a virtual machine.  ...  Controlled use of honeypot generates less number of false alarms for unknown attacks making it an efficient solution for intrusion detection specific to private Cloud.  ... 
doi:10.1007/978-3-642-29852-3_6 fatcat:ptudrjrmhrex7pmhoc6c4kbkf4

The Perception of Information Security Threats Surrounding the Cloud Computing Environment

Heba Mohammed Fadhil
2018 International Journal of Computing and Digital Systems  
An up-and-coming area for study is the security of Cloud Computing, in particular for public clouds what can be provided from the infrastructure and computer resources owned by an outsourced party that  ...  a form for permitting services to user's everywhere is Cloud Computing; a suitable departure to the network is available upon request for a common set of constructive computing resources.  ...  are given as you pay for what you use. 2) Private Cloud The Private Cloud is a proprietary computing architecture to facilitate hosted services to be easily reached inside an organization at the rear  ... 
doi:10.12785/ijcds/070606 fatcat:j45txwi445e4bggomifg4jrjqq

Table of contents

2020 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)  
Service 0414 14.3 1570681085 Smart Cities Digital Transformation and 5G -ICT Architecture 0421 vii 14.4 1570681453 VSDM: A Virtual Service Device Management Scheme for UPnP- Based IoT Networks  ...  An Efficient Accelerated Learning Algorithm for Tracking of Unknown, Spatially Correlated Signals in Ad-Hoc Wireless Sensor Networks Smart Real-Time Autonomous Navigation System Using Integration of MEMS-Based  ... 
doi:10.1109/uemcon51285.2020.9298057 fatcat:p4v3pn2m2zaaxdgobcaw5db76m

Mitigating Data Exfiltration in Storage-as-a-Service Clouds [article]

Duane Wilson, Jeff Avery
2016 arXiv   pre-print
To counter these challenges, we propose a capability that aims to both detect and prevent the potential of data exfiltration by using a novel deception-based methodology.  ...  Research has shown that to adapt incident handling to cloud computing environments, cloud customers must establish clarity about their requirements on Cloud Service Providers (CSPs) for successful handling  ...  Extensibility, efficient management, and compatibility to virtualization-based context need to be introduced into many existing IDS implementations.  ... 
arXiv:1606.08378v1 fatcat:yrw5enyj2fb4vp7ijyuqt7hdd4

A Survey on C-RAN Security

Fengyu Tian, Peng Zhang, Zheng Yan
2017 IEEE Access  
Based on this, we indicate open research issues and propose future research trends. INDEX TERMS Cloud radio access network (C-RAN), security, security threats, 5G, trust.  ...  As a promising mobile wireless network architecture, compared with traditional RAN, C-RAN has incomparable advantages in terms of low power consumption, reduced base station (BS) numbers, and economic  ...  In the C-RAN architecture, virtualized BSs pool security is important for the overall network architecture.  ... 
doi:10.1109/access.2017.2717852 fatcat:scniungu3feefjpfno3dm2dtbi

Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems

Yuan Hong, Valerie Issarny, Surya Nepal, Mudhakar Srivatsa
2021 IEEE Transactions on Dependable and Secure Computing  
With newer technologies and paradigms getting increasingly embedded in the computing platforms and networked information systems/ infrastructures that form the digital foundation for our personal, organizational  ...  , machine learning robustness, authorizations, mobile computing, and deep learning for blockchain applications.  ...  efficiently verifying large-scale virtual infrastructures in cloud and Network Functions Virtualization (NFV) against network isolation policies.  ... 
doi:10.1109/tdsc.2021.3076120 fatcat:jd4cuxgklbbfvebajnnnp4o35m

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek for developing proactive, adaptive MTD mechanisms.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu
« Previous Showing results 1 — 15 out of 2,315 results