10,098 research outputs found

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges

    Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions

    Get PDF
    Phishing has grown significantly in volume over the time, becoming the most usual web threat today. The present economic crisis is an added argument for the great increase in number of attempts to cheat internet users, both businesses and private ones. The present research is aimed at helping the IT environment get a more precise view over the phishing attacks in Romania; in order to achieve this goal we have designed an application able to retrieve and interpret phishing related data from five other trusted web sources and compile them into a meaningful and more targeted report. As a conclusion, besides making available regular reports, we underline the need for a higher degree of awareness related to this issue.Security, Phishing, Ev-SSL, Security Solutions

    Network Access Control: Disruptive Technology?

    Get PDF
    Network Access Control (NAC) implements policy-based access control to the trusted network. It regulates entry to the network by the use of health verifiers and policy control points to mitigate the introduction of malicious software. However the current versions of NAC may not be the universal remedy to endpoint security that many vendors tout. Many organizations that are evaluating the technology, but that have not yet deployed a solution, believe that NAC presents an opportunity for severe disruption of their networks. A cursory examination of the technologies used and how they are deployed in the network appears to support this argument. The addition of NAC components can make the network architecture even more complex and subject to failure. However, one recent survey of organizations that have deployed a NAC solution indicates that the \u27common wisdom\u27 about NAC may not be correct

    PALANTIR: Zero-trust architecture for Managed Security Service Provider

    Get PDF
    The H2020 PALANTIR project aims at delivering a Security-as-a-Service solution to SMEs and microenterprises via the exploitation of containerised Network Functions. However, these functions are conceived by third-party developers and can also be deployed in untrustworthy virtualisation layers, depending on the subscribed delivery model. Therefore, they cannot be trusted and require a stringent monitoring to ensure their harmlessness, as well as adequate measures to remediate any nefarious activities. This paper justifies, details and evaluates a Zero-Trust architecture supporting PALANTIR’s solution. Specifically, PALANTIR periodically attests the service and infrastructure’s components for signs of compromise by implementing the Trusted Computing paradigm. Verification addresses the firmware, OS and software using UEFI measured boot and Linux Integrity Measurement Architecture, extended to support containerised application attestation. Mitigation actions are supervised by the Recovery Service and the Security Orchestrator based on OSM to, respectively, determine the adequate remediation actions from a recovery policy and enforce them down to the lower layers of the infrastructure through local authenticated enablers. We detail an implementation prototype serving a baseline for quantitative evaluation of our work

    A Framework for Establishing Restoration Goals for Contaminated Ecosystems

    Get PDF
    This article represents 1 of 6 articles in the special series “Restoration of Impaired Ecosystems: An Ounce of Prevention or a Pound of Cure?” The articles result from a Technical Workshop organized by SETAC and the Society for Ecological Restoration, held June 2014 in Jackson, Wyoming, that focused on advancing the practice of restoring ecosystems that have been contaminated or impaired from industrial activities.As natural resources become increasingly limited, the value of restoring contaminated sites, both terrestrial and aquatic, becomes increasingly apparent. Traditionally, goals for remediation have been set before any consideration of goals for ecological restoration. The goals for remediation have focused on removing or limiting contamination whereas restoration goals have targeted the ultimate end use. Here, we present a framework for developing a comprehensive set of achievable goals for ecological restoration of contaminated sites to be used in concert with determining goals for remediation. This framework was developed during a Society of Environmental Toxicology and Chemistry (SETAC) and Society of Ecological Restoration (SER) cosponsored workshop that brought together experts from multiple countries. Although most members were from North America, this framework is designed for use internationally. We discuss the integration of establishing goals for both contaminant remediation and overall restoration, and the need to include both the restoration of ecological and socio-cultural-economic value in the context of contaminated sites. Although recognizing that in some countries there may be regulatory issues associated with contaminants and clean up, landscape setting and social drivers can inform the restoration goals. We provide a decision tree support tool to guide the establishment of restoration goals for contaminated ecosystems. The overall intent of this decision tree is to provide a framework for goal setting and to identify outcomes achievable given the contamination present at a site. Integr Environ Assess Manag 2016;12:264–272. 2015 The Authors. Integrated Environmental Assessment and Management published by Wiley Periodicals, Inc. on behalf of Society of Environmental Toxicology & Chemistry (SETAC
    corecore