Filters








59 Hits in 1.9 sec

Demystifying configuration challenges and trade-offs in network-based ISP services

Theophilus Benson, Aditya Akella, Aman Shaikh
2011 Computer communication review  
ISPs are increasingly offering a variety of network-based services such as VPN, VPLS, VoIP, Virtual-Wire and DDoS protection.  ...  at the service edge inevitably becomes more complex over time, potentially hindering key management issues such as service upgrades and troubleshooting; and (3) there are key service-specific issues that  ...  We refer to such services as being network-based. Examples include VPN, VPLS, VoIP and DDoS protection.  ... 
doi:10.1145/2043164.2018471 fatcat:zcsmjcosnjamvdprgh663jwn5a

Demystifying configuration challenges and trade-offs in network-based ISP services

Theophilus Benson, Aditya Akella, Aman Shaikh
2011 Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM - SIGCOMM '11  
ISPs are increasingly offering a variety of network-based services such as VPN, VPLS, VoIP, Virtual-Wire and DDoS protection.  ...  at the service edge inevitably becomes more complex over time, potentially hindering key management issues such as service upgrades and troubleshooting; and (3) there are key service-specific issues that  ...  We refer to such services as being network-based. Examples include VPN, VPLS, VoIP and DDoS protection.  ... 
doi:10.1145/2018436.2018471 dblp:conf/sigcomm/BensonAS11 fatcat:2mosplx74fe2tlnnv72p3m2efq

When States Strike Back: Failures of Mediatized Activism in Azerbaijan and Turkey

Ilkin Mehrabov
2016 tripleC: Communication, Capitalism & Critique  
The article also reflects on the future of social media based activism and hacktivism, and provides a unified approach, which incorporates both types of mediatized activism in a complementary manner, by  ...  This article is a theoretical investigation of the failures of oppositional online movements in the year 2011 in Azerbaijan and Turkey.  ...  DDoS attacks are computer assaults that aim to disable website servers from delivering proper services.  ... 
doi:10.31269/triplec.v14i2.767 fatcat:7iagouncqjhfjoowow3drsi264

Cyber-Extortion: Duties and Liabilities Related to the Elephant in the Server Room

Adam J. Sulkowski
2007 Social Science Research Network  
This could result in significant damages for cell phone service companies and similar services that rely on long-term contracts as a source of revenue.  ...  information security services. 96 A.  ... 
doi:10.2139/ssrn.955962 fatcat:vcayg36lozeaze7qgphnybrp34

Citizens participation in budget making process of the State of Odisha (India): Opportunities, Learnings and Challenges

Pravas Ranjan Mishra
2014 Field Actions Science Reports  
Annual Budget of a government – a public proclamation by the State of its projected and actual expenditures – provides vital evidence of where a State sets its priorities – whether on the poor and marginalised  ...  For nearly a decade, leading civil society players in Odisha (India) have made intensive efforts to engage with legislators, media and academics.  ...  as a modest experiment in 2003.  ... 
doaj:1a351284ac2f491484cb493a7c126a55 fatcat:kbe7iczm5fenxo2o4m7lcyeo2i

Demystifying the Transferability of Adversarial Attacks in Computer Networks [article]

Ehsan Nowroozi, Yassine Mekdad, Mohammad Hajian Berenjestanaki, Mauro Conti, Abdeslam EL Fergougui
2022 arXiv   pre-print
This major property is known as transferability, and makes CNNs ill-suited for security applications.  ...  These botnets leverage the use of DDoS (Distributed Denial of Service) attack resulting in the unavailability of the IoT devices.  ...  Table VII shows that, in this scenario, the attack success rate decreases, as we have a full mismatch in networks and datasets. For a few experiments, we used the RIPE as a mismatch dataset for TN.  ... 
arXiv:2110.04488v3 fatcat:ppfeznlqzfhnddin3fctp2b35a

IoT Vertical Applications and Associated Security Requirements [chapter]

Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
2019 Demystifying Internet of Things Security  
Additionally, a phone can be used to pipe in multimedia including audio only, audio and video, or other encoded streams as a download service (where the phone is acting as a modem) and supply those inputs  ...  Security is a horizontal capability, as we have shown in Chapters 3 and 4.  ... 
doi:10.1007/978-1-4842-2896-8_6 fatcat:eznovqjwwbbn5a4czv3q5cj3cm

Intelligent Zero Trust Architecture for 5G/6G Networks: Principles, Challenges, and the Role of Machine Learning in the context of O-RAN [article]

Keyvan Ramezanpour, Jithin Jagannath
2022 arXiv   pre-print
While network virtualization, software-defined networking (SDN), and service-based architectures (SBA) are key enablers of 5G networks, operating in an untrusted environment has also become a key feature  ...  We highlight the challenges and introduce the concept of an intelligent zero trust architecture (i-ZTA) as a security framework in 5G/6G networks with untrusted components.  ...  A second critical task of the INSSA is anomaly detection. The goal of this task is to detect and prevent potential attacks, such as DoS and distributed DoS (DDoS), that target the PEP.  ... 
arXiv:2105.01478v2 fatcat:3cacrt5yhzejdl6znma2gn56cm

Threat Actor Type Inference and Characterization within Cyber Threat Intelligence [article]

Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang
2021 arXiv   pre-print
As the cyber threat landscape is constantly becoming increasingly complex and polymorphic, the more critical it becomes to understand the enemy and its modus operandi for anticipatory threat reduction.  ...  , and ambiguous higher-level information, such as the threat actor context, thereby limiting our ability to correlate with different sources to derive more contextual, accurate, and relevant intelligence  ...  One of the distributed denial-of-service (DDoS) attacks observed against the South Korean government websites was directly linked to malware used in the DarkSeoul attack [16] .  ... 
arXiv:2103.02301v4 fatcat:qg5jub26rrdkvpun6bc3pdeiaa

Informatics and bank transfers in the Big Data era [chapter]

2020 Management and evolution of the European Union member states in the Big Data era  
The term bank transfer has a broad and complex meaning, with rapid transfers without a "defined bank account", intra/interbank transfers, transfers between private companies and state institutions, or  ...  The technology is a risk-stimulating component, part of the overall risk system in this area.  ...  blocking (DoS, DDoS): application-level attacks with many small volumes target slowing down processes and services to block or interrupt the user exploitation of the cloud provider services;  pirated  ... 
doi:10.2478/9788395720475-009 fatcat:th4zttuuhjbbzanydeaaacqwa4

Demystifying Social Bots: On the Intelligence of Automated Social Media Actors

Dennis Assenmacher, Lena Clever, Lena Frischlich, Thorsten Quandt, Heike Trautmann, Christian Grimme
2020 Social Media + Society  
As a consequence, much research effort has been put into the classification and detection of social bots.  ...  This work provides a much needed new perspective on these questions.  ...  , or conducting DDoS attacks).  ... 
doi:10.1177/2056305120939264 fatcat:c45ejlaxozdalau55esyalrede

Addressing cloud computing security issues

Dimitrios Zissis, Dimitrios Lekkas
2012 Future generations computer systems  
computational power, storage or business applications, and obtaining them as services [1] .  ...  The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained. (D. Zissis), Dlek@aegean.gr (D.  ...  In cloud computing, the available service models are: • Infrastructure as a Service (IaaS).  ... 
doi:10.1016/j.future.2010.12.006 fatcat:j7wh6nux25ha7hlpuknlw443xi

Mentor's Musings on Security Standardization Challenges and Imperatives for Artificial Intelligence of Things

N. Kishor Narang
2022 IEEE Internet of Things Magazine  
Distributed denial-of-service (DDoS) attacks are already prolific and highly disruptive. Some of the services that have become so ingrained in our lives are at the mercy of bad actors at any time.  ...  For many years, using cloud services was the go-to option for consumers and businesses, as the ease of access that the cloud offered was unrivaled.  ... 
doi:10.1109/miot.2022.9773094 fatcat:ds7mdlqhijfbrcff3q6vmj6oee

UAE's Strategy Towards Most Cyber Resilient Nation

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
For a nation like UAE that is transforming into a digital nation at a rapid speed, while still having stakeholders with poor cybersecurity practices, UAE stands as a strong target for attacks by malicious  ...  In this paper, the authors suggest that just as the collaboration of the key stakeholders – government, academics, industry and society – depicted under the Quadruple Model is needed to develop an innovative  ...  The serious assessment of cryptocurrencies has drawn illegal trade on the Dark Web and payments through infections with ransomware, Distributed Denial of Service (DDoS) and tons of others.  ... 
doi:10.35940/ijitee.l3022.1081219 fatcat:a6flae4lozfx3fakpabymksyhu

A Low-Cost Full-Featured Extensible Laboratory For Online Hardware Engineering

Timothy Raymond Pearson
2014 International Journal of Online Engineering (iJOE)  
A secure, encrypted, plugin-based remote laboratory framework allows customization of programming and debug/test services to match physical laboratory resources.  ...  This paper describes the uLab, a new method and framework for remote hardware design laboratories, which uses Linux and FOSS to provide real-time design and debug services to students over standard RDP  ...  This process effectively prevents an anonymous Distributed Denial of Service (DDoS) attack against the hardware-access servers themselves.  ... 
doi:10.3991/ijoe.v10i3.3517 fatcat:zd2h3hn2bfc55fecx4znkafuwi
« Previous Showing results 1 — 15 out of 59 results