Página 26 dos resultados de 8247 itens digitais encontrados em 0.013 segundos

Detecção de eventos de segurança de redes por intermédio de técnicas estatísticas e associativas aplicadas a fluxos de dados

Proto, André
Fonte: Universidade Estadual Paulista (UNESP) Publicador: Universidade Estadual Paulista (UNESP)
Tipo: Dissertação de Mestrado Formato: 73 f. : il. color.
Português
Relevância na Pesquisa
366.15402%
Pós-graduação em Ciência da Computação - IBILCE; Este trabalho desenvolve e consolida um sistema de identificação e correlação de comportamentos de usuários e serviços em redes de computadores. A definição destes perfis auxiliará a identificação de comportamentos anômalos ao perfil de um grupo de usuários e serviços e a detecção de ataques em redes de computadores. Este sistema possui como estrutura base a utilização do padrão IPFIX – IP Flow Information Export – como exportador de informações sumarizadas de uma rede de computadores. O projeto prevê duas etapas principais: o desenvolvimento de um coletor de fluxos baseado no protocolo NetFlow, formalizado pela Internet Engineering Task Force (IETF) como padrão IPFIX, que acrescente melhorias na sumarização das informações oferecidas, consumindo menor espaço de armazenamento; a utilização de técnicas de mineração de dados estatísticas e associativas para detecção, correlação e classificação de comportamentos e eventos em redes de computadores. Este modelo de sistema mostra-se inovador na análise de fluxos de rede por meio da mineração de dados, empreendendo características importantes aos sistemas de monitoramento e segurança computacional...

Injeção de ataques baseado em modelo para teste de protocolos de segurança; Model-based attack injection for security protocols testing

Anderson Nunes Paiva Morais
Fonte: Biblioteca Digital da Unicamp Publicador: Biblioteca Digital da Unicamp
Tipo: Dissertação de Mestrado Formato: application/pdf
Publicado em 15/05/2009 Português
Relevância na Pesquisa
365.81605%
Neste trabalho apresentamos uma proposta de geração de ataques para testes de protocolos de segurança. O objetivo é detectar vulnerabilidades de um protocolo, que um atacante pode explorar para causar falhas de segurança. Nossa proposta usa um injetor de falhas para emular um atacante que possui total controle do sistema de comunicação. Como o sucesso dos testes depende principalmente dos ataques injetados, nós propomos uma abordagem baseada em modelos para a geração de ataques. O modelo representa ataques conhecidos e reportados do protocolo sob teste. A partir deste modelo, cenários de ataque são gerados. Os cenários estão em um formato que é independente do injetor de falhas usado. Usando refinamentos e transformações, pode-se converter a descrição do cenário de ataque em scripts específicos do injetor de falhas. A proposta pode ser completamente apoiada por ferramentas de software. Nós ilustramos o uso da proposta com um estudo de caso, um protocolo de segurança para dispositivos móveis; We present an attack injection approach for security protocols testing. The goal is to uncover protocol vulnerabilities that an attacker can exploit to cause security failures. Our approach uses a fault injector to emulate an attacker that has control over the communication system. Since the success of the tests depends greatly on the attacks injected...

Modeling security and cooperation in wireless networks using game theory

Kamhoua, Charles Alexandre Kenmogne
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
365.81605%
This research involves the design, development, and theoretical demonstration of models resulting in integrated misbehavior resolution protocols for ad hoc networked devices. Game theory was used to analyze strategic interaction among independent devices with conflicting interests. Packet forwarding at the routing layer of autonomous ad hoc networks was investigated. Unlike existing reputation based or payment schemes, this model is based on repeated interactions. To enforce cooperation, a community enforcement mechanism was used, whereby selfish nodes that drop packets were punished not only by the victim, but also by all nodes in the network. Then, a stochastic packet forwarding game strategy was introduced. Our solution relaxed the uniform traffic demand that was pervasive in other works. To address the concerns of imperfect private monitoring in resource aware ad hoc networks, a belief-free equilibrium scheme was developed that reduces the impact of noise in cooperation. This scheme also eliminated the need to infer the private history of other nodes. Moreover, it simplified the computation of an optimal strategy. The belief-free approach reduced the node overhead and was easily tractable. Hence it made the system operation feasible. Motivated by the versatile nature of evolutionary game theory...

Defense Against Node Compromise in Sensor Network Security

Chen, Xiangqian
Fonte: FIU Digital Commons Publicador: FIU Digital Commons
Tipo: Artigo de Revista Científica Formato: application/pdf
Português
Relevância na Pesquisa
365.8425%
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise...

Applying puzzle-based learning to cyber-security education

Dasgupta, D.; Ferebee, D.; Michalewicz, Z.
Fonte: Association for Computing Machinery; United States Publicador: Association for Computing Machinery; United States
Tipo: Conference paper
Publicado em //2013 Português
Relevância na Pesquisa
365.81605%
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and functionalities, both in software and hardware, making it very difficult for users to realize that they are under cyber attack or the cause of data breach, etc. It is also well-known fact that vulnerabilities at one component can affect other components in any computing device. But it is hard to realize the interdependencies of various components in order to secure the entire path to in and out of a cyber system. Puzzle-based Learning approach proved to have improved learning environment including mathematics, physics and computer science, however, there is very little work has been done in computer and cyber security. We introduced the Puzzle-based Learning to basic cyber security education. We believe that such an interactive learning environment will help students to understand complex attack paths and countermeasures for fraud detection, cybercrime, and advanced persistent threats (APTs). Students can learn not only to protect a specific system but also for a class of Internet-enabled systems with different hardware/software components and architecture, providing similar services.; Dipankar Dasgupta, Denise M. Ferebee, Zbigniew Michalewicz

A comprehensive pattern-driven security methodology for distributed systems

Uzunov, A.V.; Falkner, K.; Fernandez, E.B.
Fonte: IEEE Computer Society Publicador: IEEE Computer Society
Tipo: Conference paper
Publicado em //2014 Português
Relevância na Pesquisa
365.8425%
Incorporating security features is one of the most important and challenging tasks in designing distributed systems. Over the last decade, researchers and practitioners have come to recognize that the incorporation of security features should proceed by means of a systematic approach, combining principles from both software and security engineering. Such systematic approaches, particularly those implying some sort of process aligned with the development life-cycle, are termed security methodologies. One of the most important classes of such methodologies is based on the use of security patterns. While the literature presents a number of pattern-driven security methodologies, none of them are designed specifically for general distributed systems. Going further, there are also currently no methodologies with mixed specific applicability, e.g. for both general and peer-to-peer distributed systems. In this paper we aim to fill these gaps by presenting a comprehensive pattern-driven security methodology specifically designed for general distributed systems, which is also capable of taking into account the specifics of peer-to-peer systems. Our methodology takes the principle of encapsulation several steps further, by employing patterns not only for the incorporation of security features (via security solution frames)...

IPsec Modulation for Quality of Security Service

Sypropoulou, Evdoxia; Agar, Chris; Levin, Timothy E.; Irvine, Cynthia E.
Fonte: 15th International Parallel and Distributed Processing Symposium (IPDPS 2001), 10th Heterogeneous Computing Workshop (HCW 2001), (San Francisco, CA), pp. 810?823, IEEE Computer Society, April 2001.( Publicador: 15th International Parallel and Distributed Processing Symposium (IPDPS 2001), 10th Heterogeneous Computing Workshop (HCW 2001), (San Francisco, CA), pp. 810?823, IEEE Computer Society, April 2001.(
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
365.8425%
This paper discusses the modulation of security services in response to changes in network conditions or as a result of modified user or application security requirements. First, the notion of security variability and how security can be treated as a dimension of Quality of Service in distributed systems is described. We discuss how security choices presented to users or applications and limits on these choices can be defined and managed through dynamic network policies. A costing framework for managing resource utilization costs due to variant security is presented. And finally, we provide an analysis of how a specific security mechanism can be modulated to provide differing levels of security service in harmony with Quality of Security Service requests and we describe our proof of concept demonstration for such modulation with respect to IPSec.

A Trusted Path design and implementation for Security Enhanced Linux

Hilchie, Allan T.
Fonte: Monterey, California. Naval Postgraduate School Publicador: Monterey, California. Naval Postgraduate School
Português
Relevância na Pesquisa
365.81605%
Approved for public release; distribution is unlimited; The threat posed by malicious software and networked adversaries to computers has resulted in the development of mechanisms to provide assurance that security sensitive information is not being compromised. One such mechanism is called a Trusted Path. A Trusted Path provides a protected communications channel that permits the computer to authenticate itself to the user and for the user to authenticate to the system. This thesis provides a demonstration implementation of a Trusted Path for Security Enhanced Linux (SELinux) and is used to examine trusted paths, their design and implementation. Additionally, the effectiveness of a Trusted Path for SELinux is analyzed. This research is meant to provide a framework that could be used in combination with other efforts to enhance the security of SELinux.

Gerador de eventos para testes de configurações de um SIEM

Mendonça, Nuno Miguel Lobão
Fonte: Universidade de Lisboa Publicador: Universidade de Lisboa
Tipo: Dissertação de Mestrado
Publicado em //2015 Português
Relevância na Pesquisa
365.8425%
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2015; Os ataques informáticos são uma ameaça emergente para empresas que trabalham com dados sensíveis. Neste contexto, as ferramentas SIEM (Security Information and Event Management) ajudam na monitorização e correlação de eventos com o objetivo de detetar ataques informáticos. A enorme quantidade de dados recolhidos pelos SIEMs dificulta o trabalho de configurar a deteção de ataques na prática. Os SIEMs trazem configurações de segurança instaladas de raiz, contudo estas configurações provam-se muitas vezes insuficientes, pois as infraestruturas variam muito de acordo com as empresas e por esse motivo é frequente existirem “buracos” nas configurações de segurança que devem ser tratados pelas equipas de segurança responsáveis para tornar os seus SIEMs eficazes. Propomos neste documento uma solução para ajudar as equipas de segurança a identificarem os “buracos” nos seus SIEMs. Apesar de existirem ferramentas que possibilitam a injeção de eventos num SIEM para testes, a nossa difere dessas na medida em que conta com uma base de dados de eventos representativos de ataques reais, dessa forma aliviando as equipas da tarefa de identificação de eventos apropriados para testar os seus SIEMs eficazmente. A nossa ferramenta foi bem-sucedida na identificação de “buracos” em configurações de SIEMs supostamente robustas...

Cloud Computing framework for Computer Vision Research:An Introduction

Zhou, Yu
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 06/02/2013 Português
Relevância na Pesquisa
366.15402%
Cloud computing offers the potential to help scientists to process massive number of computing resources often required in machine learning application such as computer vision problems. This proposal would like to show that which benefits can be obtained from cloud in order to help medical image analysis users (including scientists, clinicians, and research institutes). As security and privacy of algorithms are important for most of algorithms inventors, these algorithms can be hidden in a cloud to allow the users to use the algorithms as a package without any access to see/change their inside. In another word, in the user part, users send their images to the cloud and configure the algorithm via an interface. In the cloud part, the algorithms are applied to this image and the results are returned back to the user. My proposal has two parts: (1) investigate the potential of cloud computing for computer vision problems and (2) study the components of a proposed cloud-based framework for medical image analysis application and develop them (depending on the length of the internship). The investigation part will involve a study on several aspects of the problem including security, usability (for medical end users of the service), appropriate programming abstractions for vision problems...

Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System

Ling, Amy Poh Ai; Masao, Mukaidono
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 01/08/2011 Português
Relevância na Pesquisa
365.8425%
This paper describes the background of smart information infrastructure and the needs for smart grid information security. It introduces the conceptual analysis to the methodology with the application of hermeneutic circle and information security functional requirement identification. Information security for the grid market cover matters includes automation and communications industry that affects the operation of electric power systems and the functioning of the utilities that manage them and its awareness of this information infrastructure has become critical to the reliability of the power system. Community benefits from of cost savings, flexibility and deployment along with the establishment of wireless communications. However, concern revolves around the security protections for easily accessible devices such as the smart meter and the related communications hardware. On the other hand, the changing points between traditional versus smart grid networking trend and the information security importance on the communication field reflects the criticality of grid information security functional requirement identification. The goal of this paper is to identify the functional requirement and relate its significance addresses to the consumer requirement of an information security of a smart grid. Vulnerabilities may bring forth possibility for an attacker to penetrate a network...

A Cross-Layer Security Analysis for Process-Aware Information Systems

Leitner, Maria; Ma, Zhendong; Rinderle-Ma, Stefanie
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 13/07/2015 Português
Relevância na Pesquisa
365.8425%
Information security in Process-aware Information System (PAIS) relies on many factors, including security of business process and the underlying system and technologies. Moreover, humans can be the weakest link that creates pathway to vulnerabilities, or the worst enemy that compromises a well-defended system. Since a system is as secure as its weakest link, information security can only be achieved in PAIS if all factors are secure. In this paper, we address two research questions: how to conduct a cross-layer security analysis that couple security concerns at business process layer as well as at the technical layer; and how to include human factor into the security analysis for the identification of human-oriented vulnerabilities and threats. We propose a methodology that supports the tracking of security interdependencies between functional, technical, and human aspects which contribute to establish a holistic approach to information security in PAIS. We demonstrate the applicability with a scenario from the payment card industry.

Chaotic iterations versus Spread-spectrum: chaos and stego security

Guyeux, Christophe; Friot, Nicolas; Bahi, Jacques M.
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Português
Relevância na Pesquisa
365.8425%
A new framework for information hiding security, called chaos-security, has been proposed in a previous study. It is based on the evaluation of unpredictability of the scheme, whereas existing notions of security, as stego-security, are more linked to information leaks. It has been proven that spread-spectrum techniques, a well-known stego-secure scheme, are chaos-secure too. In this paper, the links between the two notions of security is deepened and the usability of chaos-security is clarified, by presenting a novel data hiding scheme that is twice stego and chaos-secure. This last scheme has better scores than spread-spectrum when evaluating qualitative and quantitative chaos-security properties. Incidentally, this result shows that the new framework for security tends to improve the ability to compare data hiding scheme.

Model-Based Security Testing

Schieferdecker, Ina; Grossmann, Juergen; Schneider, Martin
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 28/02/2012 Português
Relevância na Pesquisa
365.8425%
Security testing aims at validating software system requirements related to security properties like confidentiality, integrity, authentication, authorization, availability, and non-repudiation. Although security testing techniques are available for many years, there has been little approaches that allow for specification of test cases at a higher level of abstraction, for enabling guidance on test identification and specification as well as for automated test generation. Model-based security testing (MBST) is a relatively new field and especially dedicated to the systematic and efficient specification and documentation of security test objectives, security test cases and test suites, as well as to their automated or semi-automated generation. In particular, the combination of security modelling and test generation approaches is still a challenge in research and of high interest for industrial applications. MBST includes e.g. security functional testing, model-based fuzzing, risk- and threat-oriented testing, and the usage of security test patterns. This paper provides a survey on MBST techniques and the related models as well as samples of new methods and tools that are under development in the European ITEA2-project DIAMONDS.; Comment: In Proceedings MBT 2012...

Security Embedding Codes

Ly, Hung D.; Liu, Tie; Blankenship, Yufei
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 07/02/2011 Português
Relevância na Pesquisa
365.8425%
This paper considers the problem of simultaneously communicating two messages, a high-security message and a low-security message, to a legitimate receiver, referred to as the security embedding problem. An information-theoretic formulation of the problem is presented. A coding scheme that combines rate splitting, superposition coding, nested binning and channel prefixing is considered and is shown to achieve the secrecy capacity region of the channel in several scenarios. Specifying these results to both scalar and independent parallel Gaussian channels (under an average individual per-subchannel power constraint), it is shown that the high-security message can be embedded into the low-security message at full rate (as if the low-security message does not exist) without incurring any loss on the overall rate of communication (as if both messages are low-security messages). Extensions to the wiretap channel II setting of Ozarow and Wyner are also considered, where it is shown that "perfect" security embedding can be achieved by an encoder that uses a two-level coset code.; Comment: Submitted to the IEEE Transactions on Information Forensics and Security

Checking Security Policy Compliance

Gowadia, Vaibhav; Farkas, Csilla; Kudo, Michiharu
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 30/09/2008 Português
Relevância na Pesquisa
365.8425%
Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.; Comment: 23 pages; submitted to TKDE; original submission 15 mar 2007; revised 20 jan 2008

A New Advanced User Authentication and Confidentiality Security Service

Majumder, Sanjay; Chakraborty, Sanjay; Das, Suman
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 18/06/2014 Português
Relevância na Pesquisa
365.8425%
Network & internet security is the burning question of today's world and they are deeply related to each other for secure successful data transmission. Network security approach is totally based on the concept of network security services. In this paper, a new system of network security service is implemented which is more secure than conventional network security services. This technique is mainly deals with two essential network security services, one is user authentication and other is data confidentiality. For user authentication this paper introduces Graphical Username & Voice Password approaches which provides better security than conventional username & password authentication process. In data confidentiality section this paper introduces two layer private key for both message encryption & decryption which is mainly applicable on 8 bit plain text data. This paper also provides the hints of introducing other two network security services (integrity and non-repudiation) as a future work.

GSM Security Using Identity-based Cryptography

Agarwal, Animesh; Shrimali, Vaibhav; Das, Manik Lal
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 03/11/2009 Português
Relevância na Pesquisa
365.8425%
Current security model in Global System for Mobile Communications (GSM) predominantly use symmetric key cryptography. The rapid advancement of Internet technology facilitates online trading, banking, downloading, emailing using resource-constrained handheld devices such as personal digital assistants and cell phones. However, these applications require more security than the present GSM supports. Consequently, a careful design of GSM security using both symmetric and asymmetric key cryptography would make GSM security more adaptable in security intensive applications. This paper presents a secure and efficient protocol for GSM security using identity based cryptography. The salient features of the proposed protocol are (i) authenticated key exchange; (ii) mutual authentication amongst communicating entities; and (iii) user anonymity. The security analysis of the protocol shows its strength against some known threats observed in conventional GSM security.; Comment: 10 pages

Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms

Marforio, Claudio; Masti, Ramya Jayaram; Soriente, Claudio; Kostiainen, Kari; Capkun, Srdjan
Fonte: Universidade Cornell Publicador: Universidade Cornell
Tipo: Artigo de Revista Científica
Publicado em 24/02/2015 Português
Relevância na Pesquisa
365.8425%
Phishing in mobile applications is a relevant threat with successful attacks reported in the wild. In such attacks, malicious mobile applications masquerade as legitimate ones to steal user credentials. In this paper we categorize application phishing attacks in mobile platforms and possible countermeasures. We show that personalized security indicators can help users to detect phishing attacks and have very little deployment cost. Personalized security indicators, however, rely on the user alertness to detect phishing attacks. Previous work in the context of website phishing has shown that users tend to ignore the absence of security indicators and fall victim of the attacker. Consequently, the research community has deemed personalized security indicators as an ineffective phishing detection mechanism. We evaluate personalized security indicators as a phishing detection solution in the context of mobile applications. We conducted a large-scale user study where a significant amount of participants that used personalized security indicators were able to detect phishing. All participants that did not use indicators could not detect the attack and entered their credentials to a phishing application. We found the difference in the attack detection ratio to be statistically significant. Personalized security indicators can...

PCI DSS case study: Impact in network design and security

María, Yudit
Fonte: Rochester Instituto de Tecnologia Publicador: Rochester Instituto de Tecnologia
Tipo: Tese de Doutorado
Português
Relevância na Pesquisa
366.316%
The Payment Card Industry Data Security Standard is a set of twelve security requirements applicable to all institutions and systems handling, storing or transmitting cardholder information. It was created by the main card brands in a united effort to respond to the increasing number of attacks and data breaches cases targeted and linked to card and cardholder data. The standard considers points such as policies design, data security, network architecture, software design, application security, transmission encryption requirements and so on. Being compliant with the standard can be both expensive and traumatic for any business willing to do it. This research analyzes the impact that this compliance achievement process can have on an enterprise. This work is focused on the networking infrastructure and security and application security in general. This is a case study based on a real situation, where real current procedures and implementations were evaluated against the standard requirements regarding networking design, security and applications security. This will provide a benchmark of the situation towards getting the compliance validation in the company subject of this case study.