The revolution of Internet brings new security risk like attacks against networks. distributed denial of service shows such feature clearly. Existing attack defense approaches, such as intrusion detection systems, are...
详细信息
The revolution of Internet brings new security risk like attacks against networks. distributed denial of service shows such feature clearly. Existing attack defense approaches, such as intrusion detection systems, are passive in response against various network attacks; because current attacks are decentralized, automated and intelligent. Some drawbacks of existing systems reveal the necessity of designing a new generation of systems adapted to dynamical environment. Classical security solutions can not easily deal with these necessities. Active networks approach provides interesting characteristics; it is a novel approach that gives networks and services flexibility and spontaneity. With an active network in place, we can build a more active and dynamic attack response by pushing the response actions nearby the attacker, where they can produce better results
A traditional way to improve security of wired computer network can be achieved by applying access control policies to the front door of network. However these policies may be not sufficient and effective any more whe...
详细信息
A traditional way to improve security of wired computer network can be achieved by applying access control policies to the front door of network. However these policies may be not sufficient and effective any more when applied to the wireless local area networks (WLANs). WLANs are different from the traditional wired LANs in terms of their exposure to potential threats, vulnerability andsecurity techniques. Intrusions to WLANs are facts of the everyday life and handling them becomes more and more difficult. Currently there is no standardised reference model which may help to design, compare and evaluate the existing or future intrusion handling systems (IHSs) for WLANs. Analysis of the commercial IHSs shows that they all are built as a proprietary systems which are neither taking into consideration existence of other IHSs nor they are trying to find the ways to establish inter-IHS collaboration which may help to achieve better security for the end- users. Hence this paper starts by an analysis of the features of existing IHSs for WLANs, follows with proposing the new ways to enhance their design, and then is discussing development of such a novel reference model for a scalable distributed IHS architecture.
The rising threat of cyber attacks makes the IP traceback problem very relevant to today's Internet security. Numerous approaches have been proposed to support IP traceability. They can be divided into proactive a...
详细信息
The rising threat of cyber attacks makes the IP traceback problem very relevant to today's Internet security. Numerous approaches have been proposed to support IP traceability. They can be divided into proactive and reactive solutions. Proactive measures record and exchange tracing information as packets are routed through the network. The victim uses the resulting traceback data for attack path reconstruction and subsequent attacker identification. On the other hand, a reactive traceback process is initiated in response to an attack; it starts from the victim and moves toward the attacker. Proactive solutions are very effective for tracing attacks that consist in single or few packets. On the other hand, they are very resource demanding since every packet - even legitimate - is analyzed. Moreover, in the case of long-period attacks, the tracing of the packets can succeed even when the whole process is initiated after the detection of the attack. These reasons lead to the conclusion that even if the reactive methods are not efficient against few-packets attacks, they still are efficient against major party of Internet attacks. In this paper we present a signaling architecture that reactively traces back the source(s) of an attack. This architecture is distributed, and based on the collaboration of several centralized per-administrative domain (AD) traceback systems
The objectives of the System security track of the 2ndinternationalconference on distributed Computing and Internet Technology were to discuss in depth the current state of the research and practice in computer secu...
详细信息
The paper discusses security issues of networks compliant with the recent IEEE 802.15.4 standard for low rate WPANs. A number of vulnerabilities at the MAC and PHY layer are identified, and a number of possible attack...
详细信息
Smart sensor networks increasingly become viable solutions to many challenging problems and will successively be employed in many areas in the near future. However, deploying a new technology without security and trus...
详细信息
The distributed Computing track of ICDCIT 2005 received 181 papers. Based on the review by the members of the Program Committee, 16 full and 9 short papers were selected for inclusion in the proceedings of the confere...
详细信息
In contrast with conventional wired networks, ad-hoc networks are characterized by the lack of a centralized administration and any fixed network infrastructure. Public Key Infrastructure (PKI) is a natural choice for...
详细信息
ISBN:
(纸本)9810545738
In contrast with conventional wired networks, ad-hoc networks are characterized by the lack of a centralized administration and any fixed network infrastructure. Public Key Infrastructure (PKI) is a natural choice for establishing trust in such networks. However, the traditional certificate revocation schemes (eg., the CRL) that require on-line trusted authorities or certificate repositories are not well suited for securing ad-hoc networks. In this paper, we propose a new distributed certificate revocation scheme based on one-way hash chain for ad-hoc networks. In our scheme, prior to entering a network, a mobile node is required to have a valid PKC issued by an off-line trusted CA. Specifically, No centralized authority holds responsibility to collect and publish certificate status information. Instead, the individual mobile node takes charge of its own certificate status by releasing a periodically updated hash value Finally we analyze the security, efficiency and scalability of this scheme in some details.
Recent advances in micro-electro-mechanical systems technology,wireless communications and digital electronics have enabled the development of sensor networks, in which a large number of sensor nodes collaborate to mo...
详细信息
Car crashes claim the lives of more than 100,000 people every year in the US alone. Forming ad-hoc networks among vehicles traveling on a highway can be very helpful to avoid such deadly accidents and pile-ups. In thi...
详细信息
暂无评论