Filters








34,884 Hits in 2.4 sec

Preventing Unauthorized Data Flows [chapter]

Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi
2017 Lecture Notes in Computer Science  
Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation.  ...  This new insight allows us to develop an efficient methodology to identify and prevent all unauthorized flows leading to confidentiality and integrity violations.  ...  Thus, any suspicious activity that could lead to an unauthorized data flow can be identified and prevented at the point of time that it occurs.  ... 
doi:10.1007/978-3-319-61176-1_3 fatcat:s5wasbohqzcxbpbnbgij255guu

An ATM Security Measure to Prevent Unauthorized Deposit with a Smart Card

Hisao OGATA, Tomoyoshi ISHIKAWA, Norichika MIYAMOTO, Tsutomu MATSUMOTO
2020 IEICE transactions on information and systems  
In this paper, we propose a security measure utilizing peripheral devices to prevent unauthorized deposits with a smart card.  ...  We proposed a security measure utilizing peripheral devices in an ATM for smart card transactions to prevent "unauthorized cash withdrawals" of logical attacks, and the fundamental framework as a generalized  ...  Fig. 2 2 Data flow example of existing deposit transaction. Fig. 3 3 An example of data flow and processes of existing deposit.  ... 
doi:10.1587/transinf.2019edp7143 fatcat:3dun4igksrbvxj642r2tk4qyaq

Identifying Security Challenges in Renewable Energy Systems

Anish Jindal, Angelos K. Marnerides, Andrew Scott, David Hutchison
2019 Proceedings of the Tenth ACM International Conference on Future Energy Systems - e-Energy '19  
We argue that such an analysis is very important to profile various attack vectors in the modern energy networks that consider DRESs and take necessary actions to prevent any data breaches in the future  ...  In order to detect such events, we argue that an adequate correlation between network and energy generation data is required.  ...  Therefore, it is important to detect and prevent any attempted unauthorized access to deployed DRES systems.  ... 
doi:10.1145/3307772.3330154 dblp:conf/eenergy/JindalMSH19 fatcat:f3ctvgjvmngoflx3yrfpctlr4u

On monitoring information flow of outsourced data

Anne V. D. M. Kayem
2010 2010 Information Security for South Africa  
We propose a conceptual framework, based on the concept of dependence graphs, for monitoring data exchanges between programs in order to prevent unauthorized access.  ...  Enforcing outsourced data privacy in untrustworthy environments is challenging because the data needs to be kept secret both from unauthorized users and the service provider (SP).  ...  The Information Flow Control Module, essentially acts to prevent unauthorized flows of data.  ... 
doi:10.1109/issa.2010.5588602 fatcat:nqhfx4zehrh63axujcyvmq4dhu

ASPECTS REGARDING THE MANAGEMENT OF THE DESIGN AND TESTING OF A NATURAL GAS MEASURING DEVICE

Paul Emil ILEA, Dan SĂVESCU, Augustin STOICA
2020 Zenodo  
Purpose – Limiting or stopping unauthorized natural gas consumption on natural gas meters.  ...  Practical implications – Verification of measuring devices with unauthorized intervention in the metrology laboratory and determination of measurement errors.  ...  Analyzing the data in table 2. we noticed that for the first method of unauthorized intervention (3.1) the results are catastrophic.  ... 
doi:10.5281/zenodo.6557489 fatcat:esitmrheunfxbp7vmbiuia27ai

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

Smita Saini, Deep Mann
2014 IOSR Journal of Computer Engineering  
Privacy is regarding to the user's sensitive information that resides onto the cloud, unauthorized secondary usage of the data.  ...  computing", as shown in following message flow. 5.1 Storing the data: it will show how user will store his/her data onto the cloud server and how it will prevent from unauthorized secondary usage.  ...  It prevents the privacy violation of unauthorized secondary usage of data and lack of user control. Sometime user data can be used by the unauthorized user or administrator.  ... 
doi:10.9790/0661-16376166 fatcat:ehmgrjjwxjatrkw3clglpphwme

Stochastic Pre-Classification for Software Defined Firewalls

Pritha Ghoshal, C. Jasson Casey, Paul V. Gratz, Alex Sprintson
2013 2013 22nd International Conference on Computer Communication and Networks (ICCCN)  
This paper proposes a novel architecture that decouples this linkage between authorized flow QoS and adversarial traffic, marginalizing disruption caused by unauthorized flows, and ultimately improving  ...  These attacks can greatly reduce the Quality of Service (QoS) received by existing authorized flows in the firewall.  ...  The separation prevents the adversarial traffic from utilizing resources of established authorized flows.  ... 
doi:10.1109/icccn.2013.6614198 dblp:conf/icccn/GhoshalCGS13 fatcat:mf3ez3kivvhbxm76yzbx34pfie

Some Basic Steps to Secure Web Application from Unauthorized Access

H. M.
2017 International Journal of Computer Applications  
But it has some probability to be hacked or data stolen by an unauthorized person. There are some common vulnerabilities of a web application.  ...  If it is possible to prevent the attack and then web application will be secure to protect user's information.  ...  Preventing SQL injection can prevent unauthorized data manipulation and access. Other research paper of Yao-Wen Huang [5] had added general script injection as web application vulnerabilities.  ... 
doi:10.5120/ijca2017915293 fatcat:awu3xsckdfb4tnkslcjumgorqi

A Preliminary Survey on the Security of Software-Defined Networks

Muhammet Fatih Akbaş, Enis Karaarslan, Cengiz Güngör
2016 International Journal of Applied Mathematics Electronics and Computers  
The number of devices connected to the Internet is increasing, data centers are growing continuously and computer networks are getting more complex.  ...  Firewall can control the traffic by modifying flow tables of switches in data plane.  ...  The security threats such as Denial of Service (DoS), unauthorized access, data leakage, data modification, malicious applications which are seen in all other network architectures is also seen in SDN  ... 
doi:10.18100/ijamec.270088 fatcat:s5gwtfgqifhxpkbd72kcg6tude

Network Attack Detection at Flow Level [chapter]

Aleksey A. Galtsev, Andrei M. Sukhov
2011 Lecture Notes in Computer Science  
In this paper, we propose a new method for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application.  ...  The main purpose of the new centre is to develop new techniques to detect and prevent various types of unauthorized network intrusion.  ...  The problem of preventing DDoS attacks, as well as unauthorized network intrusion; do not lose their sharpness, so SSAU created the Centre for the Study of Network Attacks.  ... 
doi:10.1007/978-3-642-22875-9_30 fatcat:hck5nwvgpbdv3keclu4v2w2i3u

Attacker Evidence System in WSN [chapter]

B. Srinivasa Rao, P. Premchand
2018 Communications in Computer and Information Science  
During the anomalous attacks, attackers manage to get unauthorized accesses to the network and harm the network system and services to make them ineffective.  ...  made to develop and implement a mechanism or scheme to find the evidence for the existence of an attacker in the network and to provide security measure to the WSN system by filtering the attacker to prevent  ...  The functional flow of data, data input, intruder detection, packet filtering, and reception packets are shown in data flow diagram (Fig. 2) .  ... 
doi:10.1007/978-981-13-0755-3_13 fatcat:2ehh2yhpxzgotp22pkhfgn4rr4

Development of the Software Application with Graphical User Interface for One Model Cyber Security

Ramaz R. Shamugia
2019 International Journal of Communications, Network and System Sciences  
The article is dedicated to the development of software application with graphical user interface for analyzing of the operation of Integrated System of Data Defense from cyber-threats (ISDD) which includes  ...  subsystems of detection and elimination of vulnerabilities existing in the system, as well as Requests of Unauthorized Access (RUA).  ...  In the above-described system there comes Poisson probable flow of requests for unauthorized access with collective intensity M = M1 -M2, where M1 and M2 are intensities of flow of requests for unauthorized  ... 
doi:10.4236/ijcns.2019.1212014 fatcat:tjqriyjyijgbfhett3cqlqqkxe

Page 31 of Journal of Systems Management Vol. 34, Issue 5 [page]

1983 Journal of Systems Management  
EXHIBIT I 1/0 Control and Data Entry Input Document Flow (24 Hour Turnaround) VO Control Data Entry Batch, Date— 2 Stamp & Number > | Key-in Data Documents ———— and Verify PS User Source Yk Document Output  ...  Another software package DYNAMT, prevents the input of unauthorized tapes during the operation of a system.  ... 

Whitelists Based Multiple Filtering Techniques in SCADA Sensor Networks

DongHo Kang, ByoungKoo Kim, JungChan Na, KyoungSon Jhang
2014 Journal of Applied Mathematics  
Recently IoT technologies begin to merge with supervisory control and data acquisition (SCADA) sensor networks to more efficiently gather and analyze real-time data from sensors in industrial environments  ...  The whitelists are referred to the flow filter in order to identify the abnormal flows. The command whitelist is used to detect unauthorized Modbus commands by the command filter.  ...  flows.  ... 
doi:10.1155/2014/597697 fatcat:v2fbjb5wgfa6foeh7qnrandgda

Personal health information security - Regulatory framework

H. Hamidović, J. Kabil
2013 IOSR Journal of Engineering  
Many data protection laws and the EU Data Protection Directive require that the data controller must implement appropriate technical and organizational measures to protect personal data.  ...  Personal health information is considered a special category of personal data, for which an extra level of protection is required under data protection rules.  ...  prevent the unauthorized entry of data into the information system, and any unauthorized consultation, modification or deletion of processed personal data (memory control); d. to prevent automated data  ... 
doi:10.9790/3021-03935255 fatcat:miyn3xhpmrdh3dnrz2p7mhpf3m
« Previous Showing results 1 — 15 out of 34,884 results