Filters








64 Hits in 15.0 sec

Network forensics in a clean-slate Internet architecture

Tinus Strauss, Martin S. Olivier
2011 2011 Information Security for South Africa  
The paper shows that the architecture is well-suited for a distributed systems approach to forensics and that the network architecture increases the potential sources of reliable evidence.  ...  The paper first provides an overview of the architecture and how it compares to the well-established TCP/IP model. The architecture's network forensic features are then considered.  ...  The processing system could include a forensic agent which has sufficient permissions log the state of the IPC tasks. b) Detection: Detecting anomalous behaviour is usually the function of an system external  ... 
doi:10.1109/issa.2011.6027506 fatcat:gc47g7lvfba7dlhaml3endm4jq

Enabling an Anatomic View to Investigate Honeypot Systems: A Survey

Wenjun Fan, Zhihui Du, David Fernandez, Victor A. Villagra
2017 IEEE Systems Journal  
It is also useful for investigating the behaviour of attackers, and in particular, unknown attacks.  ...  Finally, the taxonomy is applied to a wide set of tools and systems in order to demonstrate its validity and predict the tendency of honeypot development.  ...  ACKNOWLEDGMENT The authors would like to thank Prof. D. Chadwick from the University of Kent, Canterbury, U.K., for conducting proofreading to improve the quality of this entire paper.  ... 
doi:10.1109/jsyst.2017.2762161 fatcat:nusjzggoabc5nc7lcocaemnkqm

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Nikolaos Pitropakis, Dimitra Anastasopoulou, Aggelos Pikrakis, Costas Lambrinoudakis
2014 Journal of Cloud Computing: Advances, Systems and Applications  
This paper proposes a methodology for detecting the co-residency and network stressing attacks in the kernel layer of a Kvm-based cloud environment, using an implementation of the Smith-Waterman genetic  ...  Computational systems are gradually moving towards Cloud Computing Infrastructures, using the several advantages they have to offer and especially the economic advantages in the era of an economic crisis  ...  Acknowledgements We sincerely thank all the researchers of the Systems Security Laboratory at University of Piraeus for the inspiration they provide and their useful comments throughout our research.  ... 
doi:10.1186/s13677-014-0020-6 fatcat:4hw2d4hfnjeyffkx45u2hmt3bu

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohamad Malli
2020 Microprocessors and microsystems  
They are closely related to Internet of Things (IoT) systems, except that CPS focuses on the interaction between physical, networking and computation processes.  ...  The fast and significant evolution of CPS affects various aspects in people's way of life and enables a wider range of services and applications including e-Health, smart homes, e-Commerce, etc.  ...  Acknowledgments This paper is supported with funds from the Maroun Semaan Faculty of Engineering and Architecture at the American University of Beirut.  ... 
doi:10.1016/j.micpro.2020.103201 pmid:32834204 pmcid:PMC7340599 fatcat:omeihta4vbe55cohyhbhi56mzm

Improving network intrusion detection system performance through quality of service configuration and parallel technology

Waleed Bul'ajoul, Anne James, Mandeep Pannu
2015 Journal of computer and system sciences (Print)  
Detection and Protection System (NIDPS) when deployed in highspeed networks.  ...  Our experiments demonstrate the weaknesses of NIDPSes, such as inability to process multiple packets and propensity to drop packets in heavy traffic and high-speed networks without analysing them.  ...  Advances in the utilisation of multi-processors for intrusion detection have yet to be fully exploited.  ... 
doi:10.1016/j.jcss.2014.12.012 fatcat:oqecyqsuj5gv3eybf6gl2lptdq

Network Attack Detection and Defense (Dagstuhl Seminar 16361)

Marc C. Dacier, Sven Dietrich, Frank Kargl, Hartmut König, Marc Herbstritt
2017 Dagstuhl Reports  
The seminar continued the series of Dagstuhl events Network Attack Detection and Defense held in 2008, 2012, and 2014.  ...  This report documents the program and the outcomes of Dagstuhl Seminar 16361 "Network Attack Detection and Defense: Security Challenges and Opportunities of Software-Defined Networking".  ...  Hosts running such an attack could be quickly isolated and then investigated by forensic mechanisms.  ... 
doi:10.4230/dagrep.6.9.1 dblp:journals/dagstuhl-reports/DacierDKK16 fatcat:y63cljtr2bc73iok6kmvwfdkbe

A Survey on Honeypot Software and Data Analysis [article]

Marcin Nawrocki, Matthias Wählisch, Thomas C. Schmidt, Christian Keil, Jochen Schönfelder
2016 arXiv   pre-print
In this survey, we give an extensive overview on honeypots. This includes not only honeypot software but also methodologies to analyse honeypot data.  ...  Smoke Detector mimics up to 22 services and emulates 19 distinct hosts in a network. Access attempts are reported. Complementary tools enable the analysis of logs.  ...  It aims at mimicking the behaviour of a web browser on a certain operating system in order to detect malicious contents. Thug uses the Google V8 Javascript engine and an own DOM tree implementation.  ... 
arXiv:1608.06249v1 fatcat:nlv2qdnmmvhxlmsfkyszl3owxq

A Survey of Security in Software Defined Networks

Sandra Scott-Hayward, Sriram Natarajan, Sakir Sezer
2016 IEEE Communications Surveys and Tutorials  
protect the internal network Secure traffic analysis system to trace malicious activities from attack on internal networks Secure Forensics [116] SDN-based forensic system to investigate faults Lightweight  ...  The system design consists of a transparent proxy, a threat analyser, a VM dispatcher, a victim host and an internet emulator to handle a wide range of attacks and to investigate malicious activities without  ... 
doi:10.1109/comst.2015.2453114 fatcat:7d46s7rtxrg3romy2zds72e5pm

A Review on Honeypot-based Botnet Detection Models for Smart Factory

Lee Seungjin, Azween Abdullah, NZ Jhanjhi
2020 International Journal of Advanced Computer Science and Applications  
Notably, a comparative analysis of the effectiveness of honeypot detection in various applications is accomplished and the application of honey in the smart factories is reviewed.  ...  Detecting botnet by honeypot is a detection method in which a resource is intentionally created within a network as a trap to attract botnet attackers with the purpose of closely monitoring and obtaining  ...  The reader sends the identified tag information to the host computer system. It consists of database and application software to processes the tag information [29] .  ... 
doi:10.14569/ijacsa.2020.0110654 fatcat:zkyul4cij5g37mnorccqf7b6xm

A Review of Computer Vision Methods in Network Security [article]

Jiawei Zhao, Rahat Masood, Suranga Seneviratne
2020 arXiv   pre-print
vision methods to build much secure networked systems.  ...  Increasingly, we are relying on networked infrastructure and with the advent of IoT, billions of devices will be connected to the internet, providing attackers with more opportunities to exploit.  ...  For example, heavy traffic flows from a single host in a network may not be detected by Snort without an operational rule.  ... 
arXiv:2005.03318v1 fatcat:pcng7535obec3l6fejkllbi3ii

Survey on Multi-Access Edge Computing Security and Privacy

Pasika Ranaweera, Anca Delia Jurcut, Madhusanka Liyanage
2021 IEEE Communications Surveys and Tutorials  
Thus, detecting the anomalous behaviour of ME Apps operating in MEHs is a paramount necessity. DL methods are ideal for such detection.  ...  static/dynamic malware analysis and anomaly detection in the current information systems [192] .  ... 
doi:10.1109/comst.2021.3062546 fatcat:u3xxvixiw5a4fdl2wxdla24ocu

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield, George Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny R.J. Fontaine, Avgoustinos Filippoupolitis, Etienne Roesch
2018 Computers & security  
Here, we classify applicable cyber threats according to a novel taxonomy, focusing not only on the attack vectors that can be used, but also the potential impact on the systems and ultimately on the occupants  ...  The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical  ...  In the wider sphere of information security, there is currently a distinct lack of digital forensics methodologies for IoT and cyber-physical systems.  ... 
doi:10.1016/j.cose.2018.07.011 fatcat:cq6g7sb5uvaavoth4myqadhmau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey.  ...  These operations enable routing to be performed in intermediary networks. The encrypted IPv4 address is inserted in the last 32-bits of the IPv6 destination address.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey.  ...  ACKNOWLEDGEMENT This material is based upon work supported by the National Science Foundation under grant numbers 1925484 and 1829698, funded by the Office of Advanced Cyberinfrastructure (OAC).  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

Software-Defined Networking: A Comprehensive Survey [article]

Diego Kreutz and Fernando M. V. Ramos and Paulo Verissimo and Christian Esteve Rothenberg and Siamak Azodolmolky and Steve Uhlig
2014 arXiv   pre-print
We provide an in-depth analysis of the hardware infrastructure, southbound and northbound APIs, network virtualization layers, network operating systems (SDN controllers), network programming languages  ...  and switches, promoting (logical) centralization of network control, and introducing the ability to program the network.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and a number of fellows that have contributed to this work.  ... 
arXiv:1406.0440v3 fatcat:usdyjgdys5h3foowmq6qvih3e4
« Previous Showing results 1 — 15 out of 64 results