Wyniki wyszukiwania dla: CHARACTERISTICS OF ATTACKS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: CHARACTERISTICS OF ATTACKS

Wyniki wyszukiwania dla: CHARACTERISTICS OF ATTACKS

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publikacja

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Pełny tekst do pobrania w portalu

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

    Publikacja

    - Rok 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publikacja
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Rok 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Service-based Resilience for Embedded IoT Networks

    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publikacja
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Rok 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System

    Publikacja

    - FLUCTUATION AND NOISE LETTERS - Rok 2015

    A recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...

    Pełny tekst do pobrania w portalu

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Pełny tekst do pobrania w portalu

  • Disaster-resilient communication networks: Principles and best practices

    Publikacja
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Rok 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Some Security Features of Selected IoT Platforms

    Publikacja

    - TASK Quarterly - Rok 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Pełny tekst do pobrania w portalu

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publikacja

    - Rok 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Pełny tekst do pobrania w portalu

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publikacja

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Pełny tekst do pobrania w portalu

  • Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements

    Publikacja
    • M. Pióro
    • M. Mycek
    • A. Tomaszewski
    • A. de Sousa

    - NETWORKS - Rok 2024

    In Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Pełny tekst do pobrania w portalu

  • Quality Modeling in Grid and Volunteer-Computing Systems

    Publikacja

    - Rok 2013

    A model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...

  • Cops, a fast robber and defensive domination on interval graphs

    Publikacja

    - THEORETICAL COMPUTER SCIENCE - Rok 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Pełny tekst do pobrania w portalu

  • Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks

    Publikacja

    Multihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...

    Pełny tekst do pobrania w portalu

  • Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents

    Electronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...

    Pełny tekst do pobrania w portalu

  • Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network

    Publikacja

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Pełny tekst do pobrania w portalu

  • Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System

    Publikacja

    Overhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publikacja

    - SENSORS - Rok 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Pełny tekst do pobrania w portalu

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Reliable Anycast and Unicast Routing: Protection against Attacks

    Obecne sieci są przeważnie chronione przed awariami losowymi, a topologie sieci są w większości uznawane za regularne. Znane mechanizmy ochrony dotyczą typowo transmisji unicast (jeden-do-jednego). Jednakże w związku z obserwowaną konwergencją technologii/usług, inne odmiany transmisji (np. anycast - jeden-do-jednego-z-wielu) nabierają znaczenia. Co więcej, okazuje się, iż często awarie nie mają losowego charakteru, a topologie...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A New Critical Risk on the Block: Cyber Risks as an Example of Technical Knowledge Risks in Organizations

    Publikacja

    - Rok 2022

    The breakout of the COVID-19 pandemic has intensified the appearance of many additional technical knowledge risks in organizations. Cyber risks in particular are becoming a great challenge for organizations. At the same time, academic research on cyber risks, their costs, consequences and ability of overcoming them is still scarce and fragmented. In order to fill this gap, the paper is aimed to identify different types of cyber...

    Pełny tekst do pobrania w portalu

  • Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets

    Publikacja

    - Informatica - Rok 2021

    This paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...

    Pełny tekst do pobrania w portalu