computer network security-21





internet security research papers



Bootstrapping the Adoption of Internet Security Protocols.
free download

Abstract The deployment of network-wide security enhancements to the Internet has proven more difficult than many had initially anticipated. We leverage existing models of networks' value to model the problem of bootstrapping the adoption of security technologies. We

Cyberinsurance: A market solution to the internet security market failure
free download

The poor state of security on the Internet is the direct result of a market failure. Software companies have been able to institute a framework denying them liability for faulty products. In addition, time-to-market (Internet time) pressures compel software companies to release

Symantec internet security threat report trends for 2010
free download

Executive summary Symantec recorded over 3 billion malware attacks in 2010 and yet one stands out more than the rest Stuxnet. this attack captured the attention of many and led to target of the attacks and who was behind them. this is not

FPGA-based cryptography for internet security
free download

The enormous advances in network technology have resulted in an amazing potential for changing the way we communicate and do business over the Internet. However, for transmitting confidential data, the cost-effectiveness and globalism provided by the Some of the events were reported more than once in a single or in different newspapers. In such cases, we kept only the first announcement. We included only firms that were listed on the New York Stock Exchange (NYSE), NASDAQ, or American Stock Exchange (AMEX)

A runtime composite service creation and deployment infrastructure and its applications ininternet security, e-commerce, and software provisioning
free download

The creation of composite services from service compof nents at runtime can be achieved using several different techniques. In the first approach, a new common interface is constructed at runtime which allows the functionality of two or more components to be accessed from a single The effect of the internet on the financial services industry has helped companies get closer to their customers, increase their market audience, acquire an important distribution channel and offer convenience and accessibility to their clients. It has become an opportunity to

A forecasting model for internet security attacks
free download

ABSTRACT All sizes of enterprises and organizations in the Internet World face the plaguing problem of Internet Security. One of the biggest problems of Internet Security is getting personnel to report an attack or a suspected attack. Even large enterprises and

Internet firewalls and network security
free download



The application of face authentication system for internet security using object-oriented technology
free download

Abstract Although face recognition has been applied to a wide variety of problems, ranging from security to virtual reality systems; such as many researchers pay more attention in it; the complexity of the algorithm used in face verication is not often suitable for real-time face

New Internet Security and Privacy Models Enabled by IPv6.
free download

Page 1. New Internet Security Privacy Models Enabled by IPv6 Mat Ford matthew.ford@bt.com Page 2. SAINT2005 IPv6 Workshop 2005-01-31 2 AgendaWhat's different about IPv6 Enterprise security with IPsecAddressing privacySecure public access networks

Economics and Internet security: A survey of recent analytical, empirical and behavioral research
free download

An economic perspective has yielded invaluable insights into the analysis and design of information security mechanisms. Systems often fail because the organizations that defend them do not bear the full costs of failure. This simple insight has profound consequences

Internet security policy for organisations
free download

3.1 Introduction. 3.2 Background to existing Internet security policy guidelines for organisations .. 3.2. 1 Introduction to Internet security policy for organisations. 3.2. 2

An Examination of Individual's Perceived Security and Privacy of the Internet in Malaysia and the Influence of this on their Intention to Use E-commerce: Using
free download

Abstract This study explores the impact of perceived security and privacy on the intention to use Internet banking. An extended version of the technology acceptance model (TAM) is used to examine the above perception. A survey was distributed, the 187 responses

Application of string matching in Internet Security and Reliability
free download

Abstract: In this study the role of string matching algorithms in hardware/software applications in virus scanners or intrusion detection systems in improving data security over the internet is stressed. The author's contribution to an architectural design of a new string

The sad and increasingly deplorable state of internet security
free download

50 BUSINESS COMMUNICATIONS REVIEW/FEB 2003 of proprietary information in 2002, roughly consistent with prior-year percentages. However, the average losses reported by the respondents were more than $6.5 million, a nearly seven-fold increase from 1997. Better

2-3 A Development of Experimental Environ-ments" SIOS" and" VM Nebula" for ReproducingInternet Security Incidents
free download

Modern information and communications systems have developed centering on computers and computer networks. In particular, the Internet has grown into a widespread network connecting general users, private businesses, and even government agencies. The

Internet security visualization case study: Instrumenting a network for NetFlow securityvisualization tools
free download

Abstract With the development of the Internet and organizational intranets, it has become an increasingly critical and difficult task to monitor large and complex networks-indispensable to security risk management and network performance analysis. Monitoring for security

internet security 2014 papers



Exploring Internet Security Perceptions and Practices in Urban Ghana
free download

ABSTRACT Security is predicated, in part, upon the clear understanding of threats and the use of strategies to mitigate these threats. Internet landscapes and the use of the Internet in developing countries are vastly different compared to those in rich countries where

Network Working Group S. Hartman Internet-Draft Painless Security Intended status: Experimental D. Zhang Expires: July 28, 2014 Huawei
free download

Abstract The draft describes a list of essential requirements in order to benefit the design of NOV3 security solutions. In addition, this draft introduces the candidate techniques which

Internet of Things: Architectural Framework for eHealth Security
free download

Abstract The Internet of Things (IoT) holds big promises for Health Care, especially in Proactive Personal eHealth. To fulfil the promises major challenges must be overcome, particularly regarding privacy and security. This paper explores these issues, discusses

Managed Certificate Whitelisting–A Basis for Internet of Things Security in Industrial Automation Applications
free download

Abstract:Device authentication is a basic security feature for automation systems and for the future Internet of Things. The design, setup and operation of a practically usable security infrastructure for the management of required device credentials–as cryptographic device

An analysis of internet accounts' security threats by mobile phone password protection
free download

ABSTRACT With the development of mobile communication network and the popularity of smart phones, mobile phones are not just simple communication tools, but a protection tool which is used to authenticate the login or other sensitive operations for the Internet

Implementing voice over Internet protocol in mobile ad hoc network–analysing its features regarding efficiency, reliability and security
free download

Abstract: Providing secure and efficient real-time voice communication in mobile ad hoc network (MANET) environment is a challenging problem. Voice over Internet protocol (VoIP) has originally been developed over the past two decades for infrastructure-based

An Improved Wu-Manber Multiple Patterns Matching Algorithm for Mobile Internet ContentSecurity Audit in a Chinese Environment.
free download

Abstract The rapid progress of mobile Internet has brought about wide range of applications of security audit systems. As a part of security audit system, content security audit is crucial for ensuring the reliability and security for system applications. In this paper, we propose a

BlinkToSCoAP: An End-to-End Security Framework for the Internet of Things
free download

Abstract:The emergence of Internet of Things and the availability of inexpensive sensor devices and platforms capable of wireless communications enable a wide range of applications such as intelligent home and building automation, mobile healthcare, smart

Smart Security Solutions based on Internet of Things (IoT)
free download

Abstract With increasing popularity of the IoT (Internet of Things) and devices getting smarter day by day, this paper presents an idea to reform the existing access control systems. This approach of enhancing the access control system ensures that the system is wireless

Enhanced encapsulated security payload a new mechanism to secure internet protocol version 6 over internet protocol version 4
free download

ABSTRACT A considerable amount of time will be needed before each system in the Internet can convert from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). Three strategies have been proposed by the Internet Engineer Task Force (IETF) to

A Study of Developing Security Requirements for Internet of Things (IoT)
free download

Abstract. IoT service provides interconnection between 'Things' in many industry areas (home appliance, traffic, medical services, etc.). However, because of the IoT environment is consisted of various devices, network protocols, platforms, there are many security risks

V-MGSM: A Multi-Level and Grouping Security Virtualization Model for Mobile Internet Service
free download

Abstract With the pervasiveness of smart phones and the advance of Mobile Internet, more and more Mobile Internet services are migrated to the cloud service platform for better user experience. As one of the most indispensable components of the cloud computing

Network Working Group M. Wasserman Internet-Draft S. Hartman Intended status: Experimental Painless Security Expires: April 16, 2015 D. Zhang Huawei
free download

Abstract An IPv4 or IPv6 host can use the Port Control Protocol (PCP) to flexibly manage the IP address and port mapping information on Network Address Translators (NATs) or firewalls, to facilitate communication with remote hosts. However, the un-controlled

Research on the Information Security of Internet Bank
free download

Abstract. In this paper, we focus on the risks and management of the information security, such as computer technology uncertainty,internet viruses and the information security soft outsourcing, then analyze the problems in internet bank information security, we conclude

A Critical Analysis on the Security Concerns of Internet of Things (IoT)
free download

ABSTRACT Internet of Things (IoT) has been a major research topic for almost a decade now, where physical objects would be interconnected as a result of convergence of various existing technologies. IoT is rapidly developing; however there are uncertainties about its

Privacy Information Security Classification for Internet of Things Based on Internet Data
free download

A lot of privacy protection technologies have been proposed, but most of them are independent and aim at protecting some specific privacy. There is hardly enough deep study into the attributes of privacy. To minimize the damage and influence of the privacy

Security and Privacy Issues of Element Technologies on Internet of Things
free download

Abstract. The meaning of Internet of Things (IoT) refers to unique identified objects which can interact with other object through wireless and wired communication. The concept of Internet of Things (IoT) has been proposed and studied as a mean to provide

Privacy and Security Issues for Healthcare System with Embedded RFID System onInternet of Things
free download

Abstract. Today, RFID technologies are being applied in ubiquitous sensor network system to improve the quality of healthcare system. In this paper, we have investigated and surveyed on security and privacy issues in RFID systems and their applications related

Information Security Group, Korea Internet Security Agency, Seoul, South Korea {ysshin, khson, hrpark}@ kisa. or. kr
free download

Abstract: SDN (Software-Defined Networking) is a next-generation networking technology that enables network path setting and control by software programming and entails efficient operation and management by separating the control plane and data plane. Recently,

Integrating Wireless Sensor Networks into Internet Of Things For Security
free download

Abstract: A secure channel between a sensor node and internet host is created, hence new security challenges arises and wireless sensor networks is integrated into internet of things. We use heterogeneous online/offline signcryption scheme so that secure communication

Technological Security Aspects for Internet Banking
free download

ABSTRACT The present day banking business is, to a great extent, dependent on 'Electronic Banking'. The term 'Electronic Banking'means banking through internet ie Internet Banking where the physical presence of the consumers in the bank is not mandatory. Electronic

Network Working Group P. Vixie Internet-Draft Farsight Security, Inc. Intended status: Informational A. Kato Expires: August 17, 2014 Keio University/WIDE
free download

Abstract With a mandated default minimum maximum UDP message size of 512 octets, the DNS protocol presents some special problems for zones wishing to expose a moderate or high number of authority servers (NS resource records). This document explains the

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things
free download

Abstract The TWINE is a new Generalized Feistel Structure (GFS) lightweight cryptosystem in the Internet of Things. It has 36 rounds and the key lengths support 80 bits and 128 bits, which are flexible to provide security for the RFID, smart cards and other highly-

IMPROVED INTERNET SECURITY PROTOCOLS USING CRYPTOGRAPHIC ONE-WAY HASH CHAINS
free download

ABSTRACT In this dissertation, new approaches that utilize the one-way cryptographic hash functions in designing improved network security protocols are investigated. The proposed approaches are designed to be scalable and easy to implement in modern technology.

Local Area Network Information Security and Virus Countermeasures of the Internet
free download



Research on Security Issues of the Internet of Things
free download



Cyber-Security: The Threat of the Internet.
free download

Abstract The security of America's infrastructure has been identified as one of the Nation's most urgent and complex challenges. This paper addresses the growing importance of cybercrime and cybersecurity within the United States as advancements of the Internet

Research of RFID Security Based on Internet of Things
free download

Abstract: As RFID system applies in an increasingly larger range, its security and privacy problems emerge day by day. Based on analyzing the security threats faced by RFID technology, detailed introduces the existing security strategies and their good and bad. In

SECURITY FRAMEWORK AND JAMMING DETECTION FOR INTERNET OF THINGS
free download

Abstract The Internet of Things (IoT) consists of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security, trust and

Security in Internet of Things using Delegation of Trust to a Provisioning Server
free download

Abstract. This paper proposes an architecture for open networks, such as the Internet of Things, and describes an implemented solution that allows Things with limited or no user interfaces to provide a high level of data security, by delegating trust to a trusted third party

The Internet of Things: Perceived Risks and Security Implications
free download

Abstract-The digital environment which is dynamic, technology-rich and constantly evolving has been hit by another wave called the Internet of Things (IoT). With Gartner's prediction of over 30 billion connected devices by 2020, the Internet of Things will inevitably cut across

A NOVEL SURVEY ON INTERNET OF THINGS SECURITY AND ITS APPLICATION
free download

Abstract:The Internet of Things (IoT), is a vision of connectivity for anything, at anytime and anywhere, which defines the interconnection of objects (or Things) for various purposes including identification of objects, communication, sensing, and data collection. Internet of

Multi-Layered Security in the Internet of the Things
free download

Abstract It is well discussed and understood that there is still a need for suitable security for the Internet of Things. It is however still not clear how existing or emerging security paradigms can be effectively applied to a network of constrained nodes in a lossy

IP Security Maintenance and Extensions (ipsecme) D. Migault (Ed) Internet-Draft Orange Intended status: Standards Track T. Guggemos Expires: August 4,
free download

Orange / LMU Munich D. Palomares Orange / LIP6 January 31, 2014 Minimal ESP draft-mglt-lwig-minimal-esp-00.txt This document describes a minimal version of the IP Encapsulation

Internet-Draft Janet Intended status: Informational S. Hartman Expires: August 18, 2014 Painless Security February 14, 2014
free download

Abstract This document describes the use of the Security Assertion Mark-up Language (SAML) with RADIUS in the context of the ABFAB architecture. It defines two RADIUS attributes, a SAML binding, a SAML name identifier format, two SAML profiles, and two

Implementation Analysis Of Information Security Through Quality Standards ISO 27001 forInternet Services
free download

Abstract Nowadays industry focus about information security getting increased. One standard that is agreed is ISO 27001, a standard management information security is applied to the cross-industry and internationally recognized. ISO 27001 is not only

A design of the Security Evaluation System for decision support in the enterprise network securitymanagement
FREE DOWNLOAD uacm.edu.mx Security Evaluation System is a system that evaluates the security of the entire enterprise network domain consists of various components and that supports a security manager or a security management system in making decisions about security management of the

Using strategy objectives for network security analysis
FREE DOWNLOAD
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with the network. Like attack-graph-based model checking, the goal of an anticipation game is to

Model checking wireless sensor network security protocols: TinySec+ LEAP+ TinyPK
FREE DOWNLOAD
Abstract In this paper, a formal analysis of security protocols in the field of wireless sensor networks is presented. Three complementary protocols, TinySec, LEAP and TinyPK, are modelled using the high-level formal language HLPSL, and verified using the model

Network Security–Defense Against DoS/DDoS Attacks
FREE DOWNLOAD
ABSTRACT DoS/DDoS attacks are a virulent, relatively new type of Internet attacks, they have caused some biggest web sites on the world:owned by the most famous E-Commerce companies such as Yahoo, eBay, Amazon:became inaccessible to customers, partners,

Probabilistic bisimulation and equivalence for security analysis of network protocols
FREE DOWNLOAD
Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that justifies an equational proof system. This proof system is sufficiently powerful to derive the semantic

Improving a network security system by reconfigurable hardware
FREE DOWNLOAD
Abstract Improving network security systems by using reconfigurable hardware is an important research field since the speed of the Internet is increasing. In this work, we have implemented stateful TCP inspection in a Field Programmable Gate Array (FPGA) to help

Related


Request-paper A Scalable High-Performance Virus Detection Processor Against a Large Pattern Set for Embedded Network Security

A scalable high-performance virus detection processor against a large pattern set for embedded network security
FREE DOWNLOAD

ABSTRACT Contemporary network security applications gener-ally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hardware solutions are intended for firewall routers. However, the solutions in


- -

FREE IEEE PAPER