Filters








9,001 Hits in 8.9 sec

Hide and Seek: An Architecture for Improving Attack-Visibility in Industrial Control Systems [chapter]

Jairo Giraldo, David Urbina, Alvaro A. Cardenas, Nils Ole Tippenhauer
2019 Lecture Notes in Computer Science  
In its basic form, a security monitor is deployed somewhere in the industrial control network, observes a time-series of the operation of the system, and identifies anomalies in those measurements in order  ...  In the past years we have seen an emerging field of research focusing on using the "physics" of a Cyber-Physical System to detect attacks.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1007/978-3-030-21568-2_9 fatcat:7mjxvrjdrjbsxjfy7jsbyhevcq

Secure Image Hiding Algorithm using Cryptography and Steganography

Hemlata Sharma
2013 IOSR Journal of Computer Engineering  
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and  ...  Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non  ...  Acknowledgment We take this opportunity to express our deep sense of gratitude and sincere thanks to Mr S. T. Valunjkar, Director In-Charge, NIELIT centre, Aurangabad.  ... 
doi:10.9790/0661-1350106 fatcat:ufv3vx7pd5banok7b5eh7bup7y

Key terrain in cyberspace: Seeking the high ground

David Raymond, Tom Cross, Gregory Conti, Michael Nowatkowski
2014 2014 6th International Conference On Cyber Conflict (CyCon 2014)  
Key terrain might include a hill that overlooks a valley an enemy wants to control or a crossing point over a river that must be traversed before launching an attack.  ...  In military doctrine, key terrain refers to areas which, if seized, afford an advantage to an attacker or defender. When applied to geographic terrain, this definition is clear.  ...  Furthermore, by filtering malicious packets from traffic destined to a system visible on the network, cyberspace obstacles sometimes put target systems out of range of an attackers cyber weapons.  ... 
doi:10.1109/cycon.2014.6916409 dblp:conf/cycon/RaymondCCN14 fatcat:6ctm44aebreo7gdycqzlsc7d34

A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents

Milad Taleby Ahvanooey, Qianmu Li, Hiuk Jae Shim, Yanyan Huang
2018 Security and Communication Networks  
In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques.  ...  Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy.  ...  Acknowledgments This work was supported in part by National Natural Sci-  ... 
doi:10.1155/2018/5325040 fatcat:ah5kszr7i5dxvia4ciz3km27xi

Epiphany: A location hiding architecture for protecting critical services from DDoS attacks

Vamsi Kambhampati, Christos Papadopolous, Dan Massey
2012 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)  
To protect them we propose Epiphany, an architecture that hides the service IP addresses so that attackers cannot locate and target them.  ...  Clients in clean networks are not affected by attackers in other networks. Data proxies are assigned to clients based on their trust.  ...  INTRODUCTION As critical systems such as emergency response, industrial control systems, government and banking systems are moving to the public Internet, they become susceptible to threats such as DDoS  ... 
doi:10.1109/dsn.2012.6263945 dblp:conf/dsn/KambhampatiPM12 fatcat:z6i673oparcabhozdxmkxdlcqy

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search

Xiaojing Liao, Kan Yuan, XiaoFeng Wang, Zhongyu Pei, Hao Yang, Jianjun Chen, Haixin Duan, Kun Du, Eihal Alowaisheq, Sumayah Alrwais, Luyi Xing, Raheem Beyah
2016 2016 IEEE Symposium on Security and Privacy (SP)  
An interesting observation we make in our research is that such an attack almost always incurs a great semantic gap between the infected domain (e.g., a university site) and the content it promotes (e.g  ...  Promotional infection is an attack in which the adversary exploits a website's weakness to inject illicit advertising content.  ...  more visible to the user.  ... 
doi:10.1109/sp.2016.48 dblp:conf/sp/LiaoYWPYCDDAAXB16 fatcat:cxeuazg3mrclheqyy4v7cp5gpq

"Recreations for leisure hours": Popular Entertainment in Collins's Hide and Seek

Flora De Giovanni
unpublished
The detailed analysis of amusement he carries out in Hide and Seek is a significant step in the accomplishment of his objective, paving the way to the rise of sensation fiction, which, he seems to imply  ...  Collins's Hide and Seek (1854), is a valuable contribution to the Victorian debate on popular entertainment, punctuated as it is by references to the circus, the music hall and the painting exhibition.  ...  Moreover around 1854, while writing Hide and Seek, he launched an attack on the classicism of Claude and Poussin, of which Valentine's pictures appear to be a poor imitation.  ... 
fatcat:jpdc2ryp5vab7itfn2mpitx254

League Structure & Stadium Rent Seeking - The Role of Antitrust Revisited

David D. Haddock, Tonja Jacobi, Matthew Sag
2012 Social Science Research Network  
In most of the world, competitive merit determines entrance into leagues via a system known as promotion-and-relegation, whereby the worst performing teams in one competitive tier are demoted to the next  ...  We argue that no inherent cultural or political cross-Atlantic variations cause the differences; rather, it is the industrial organization of sports in the two countries-the structure of league control-that  ...  It is true that athletes in English soccer are also very well paid, but for reasons that are independent of promotion-and-relegation.  ... 
doi:10.2139/ssrn.1983447 fatcat:bocggzc5hjctnn6xhdaw46lgke

Seeking the Will of God: The Information Seeking Experiences of the Leaders of Nova Scotia Churches in Transition

David H. Michels
2014 Social Science Research Network  
In his own study he proposed that the pastor operates in a closed system when world and role are significantly dependent upon each other and in an open system of information seeking when world and role  ...  for improving engagement" (p. 125).  ...  In this study I would be seeking to gather ethnographic data about the church, and to interview in groups and individually leaders involved in shaping and implementing the vision for the church.  ... 
doi:10.2139/ssrn.2505083 fatcat:dnepiqqrkfggtkqrk3jyazqr4y

Deployment of Blockchain Technology in Software Defined Networks: A survey

Talal Alharbi
2020 IEEE Access  
In SDN, the network intelligence is centralized in a software entity so-called SDN controller, which enables network administrators to dynamically manage, secure, and optimize network resources and programmatically  ...  Despite the impressive benefits SDN has brought to network architecture, it introduces new security challenges and prompts different implementation strategies to spread attack vectors.  ...  ACKNOWLEDGMENT The author would like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project R-1441-58.  ... 
doi:10.1109/access.2020.2964751 fatcat:4ctdrthqozfnjiwxounred7gwm

Assessing Threats and Vulnerable Attacks of Health Care Data in Cloud-Based Environment

2019 International journal of recent technology and engineering  
Relaxations in access control architectures will compromise the security of entire architecture and practice.  ...  This becomes a mandatory requirement for designing and implementing an access control mechanism to identify intention of users who enter into the environment.  ...  Provided with risk management strategies and access controlling mechanisms, this model will be a secure solution for this industry.  ... 
doi:10.35940/ijrte.b1610.078219 fatcat:vhw3s5szfjfpjkcvpskif36vcm

The problem isn't attribution

David D. Clark, Susan Landau
2010 Proceedings of the Re-Architecting the Internet Workshop on - ReARCH '10  
As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network  ...  We analyze the different types of Internet-based attacks, and observe the role that currently available alternatives to attribution already play in deterrence and prosecution.  ...  INTRODUCTION As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables  ... 
doi:10.1145/1921233.1921247 fatcat:jxotll6fe5fxrpieuncab5kloi

Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model

William Steingartner, Darko Galinec, Andrija Kozina
2021 Symmetry  
Most organizations deploy an intrusion detection system (IDS) or next-generation firewall that picks up known attacks or attempts to pattern match for identification.  ...  Detection controls are usually placed to augment prevention at the perimeter, and not as consistently deployed for in-network threat detection.  ...  Security architecture is the design of artifacts that describe how security controls are positioned and how they relate to the overall system architecture.  ... 
doi:10.3390/sym13040597 fatcat:6thxnfbz4zf7jhi4lnenghqiqq

The Trusted Cloud: Addressing Security and Compliance [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
The intent is to improve visibility, control, and compliance for cloud services.  ...  Attackers are evolving from being hackers working on their own and looking for personal fame into organized, sophisticated attackers targeting specific types of data and seeking to gain and retain control  ... 
doi:10.1007/978-1-4302-6146-9_2 fatcat:k2wmlqogxzfbvhr6mle2wuwgze

Improving Software Defined Cognitive and Secure Networking [article]

Ijaz Ahmad
2020 arXiv   pre-print
The resulting networks comprise distributed control plane architectures that are complex in nature, difficult to integrate and operate, and are least efficient in terms of resource usage.  ...  Therefore, this thesis finds potential security vulnerabilities in SDN, studies proposed security platforms and architectures for those vulnerabilities, and presents future directions for unresolved security  ...  networks, leading to security compromises. • Denial of Service (DoS) attacks on the infrastructure: Lack of mechanisms to hide visible network control elements, and unencrypted control channels. • Signaling  ... 
arXiv:2007.05296v1 fatcat:pda2czqmxbavhpc6bk3bdciyay
« Previous Showing results 1 — 15 out of 9,001 results