3,091 research outputs found

    From Map to Dist: the Evolution of a Large-Scale Wlan Monitoring System

    Get PDF
    The edge of the Internet is increasingly becoming wireless. Therefore, monitoring the wireless edge is important to understanding the security and performance aspects of the Internet experience. We have designed and implemented a large-scale WLAN monitoring system, the Distributed Internet Security Testbed (DIST), at Dartmouth College. It is equipped with distributed arrays of “sniffers” that cover 210 diverse campus locations and more than 5,000 users. In this paper, we describe our approach, designs and solutions for addressing the technical challenges that have resulted from efficiency, scalability, security, and management perspectives. We also present extensive evaluation results on a production network, and summarize the lessons learned

    Does your wireless LAN have criminal intent?

    Get PDF
    All of the literature relating to wireless network security has focused on the flaws, newer alternatives and suggestions for securing the network. There is much speculation and anecdotal statements in relation to what can happen if a breach occurs, but this is mostly from a computer security perspective, and mostly expressed in terms of potential for financial loss. This paper examines the potential legal ramifications of failing to properly secure a wireless network. Several scenarios are examined within based on usage of wireless on the various category of attack. Legal opinion, backed up with case law, is provided for each scenario. Several examples are given for unauthorised use, with other aspects having potential for prosecution. The conclusion is that no matter whether you are a home user of wireless, a small to medium business or a large enterprise, there a legal as well as financial reasons to properly secure your wireless network

    The Internet of Things: New Interoperability, Management and Security Challenges

    Full text link
    The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates opportunities in numerous domains. However, this increase in connectivity creates many prominent challenges. This paper provides a survey of some of the major issues challenging the widespread adoption of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security, management, and privacy.Comment: 18 pages, International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.2, March 201

    Implementation of message authentication code using DNA-LCG key and a novel hash algorithm

    Get PDF
    With the introduction of electronic form of data, the need for an automatic system of security to protect the integrity of data while being transferred from one place to another is required. This is especially the case for a network in which the systems are accessed over a public network or internet. Security mechanisms involve the use of more than one algorithm. They further require that the participants should possess a secret key, which raises issues about creation, distribution and proper usage of these keys. The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity. MAC involves the use of secret key along with a hash algorithm. In this paper, we present an implementation of MAC using a secret key created by Deoxyribonucleic Acid (DNA) and random output sequence of Linear Congruential Generator (LCG). The hash algorithm used is made more robust by adding complexity to the traditional SHA-160. The presented scheme RMAC (Robust Message Authentication Code) is tested on National Institute of Science and Technology (NIST) test suite for random numbers, avalanche criteria and resistance towards network attacks. The results reveal that the scheme is efficient and is applicable for a variety of security demanding environments

    Acquisition of evidence from network intrusion detection systems

    Get PDF
    The literature reviewed suggests that Network Intrusion Systems (NIDS) are valuable tools for the detection of malicious behaviour in network environments. NIDS provide alerts and the trigger for rapid responses to attacks. Our previous research had shown that NIDS performance in wireless networks had a wide variation under different workloads. In this research we chose wired networks and asked the question: What is the evidential value of NIDS? Three different NIDS were tested under two different attacks and with six different packet rates. The results were alarming. As the work loading increased the NIDS detection capability fell rapidly and as the complexity of attack increased the NIDS detection capability fell more quickly. We conclude that NIDS have weak evidential value for either system improvement or legal admissibility

    The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium

    Get PDF
    The automotive industry stands in front of a great challenge, to decrease its impact on the environment. One important part in succeeding with this is to decrease the structural weight of the body structure and by that the fuel consumption or the required battery power. Carbon fibre composites are by many seen as the only real option when traditional engineering materials are running out of potential for further weight reduction. However, the automotive industry lacks experience working with structural composites and the methods for high volume composite manufacturing are immature. The development of a composite automotive body structure, therefore, needs methods to support and guide the conceptual work to improve the financial and technical results. In this thesis a framework is presented which will provide guidelines for the conceptual phase of the development of an automotive body structure. The framework follows two main paths, one to strive for the ideal material diversity, which also defines an initial partition of the body structure based on the process and material selection. Secondly, a further analysis of the structures are made to evaluate if a more cost and weight efficient solution can be found by a more differential design and by that define the ideal part size. In the case and parameter studies performed, different carbon fibre composite material systems and processes are compared and evaluated. The results show that high performance material system with continuous fibres becomes both more cost and performance effective compared to industrialised discontinuous fibre composites. But also that cycle times, sometimes, are less important than a competitive feedstock cost for a manufacturing process. When further analysing the manufacturing design of the structures it is seen that further partition(s) can become cost effective if the size and complexity is large enough.      QC 20140527</p

    Systems architecture for the acquisition and preservation of wireless network traffic

    Get PDF
    Wireless networking provides a ready and cost effective solution for business applications. It has escalated in popularity mainly due to the ability to form computer networks without a wired based infrastructure. However, accompanying the widespread usage also comes the inherent prospect of criminal misuse, including unauthorized application and the launch of system attacks. This paper presents the testing of an innovative Wireless Forensic Model (WFM) system that provides capability for acquisition and preservation of wireless network traffic (802.11) frames by implementing a wireless drone architecture. It is thus a forensic readiness system providing available evidence for forensic investigation. The results show that the tested system has the ability to collect upwards of 90% of all frames, as well as evidence and detection of attacks conducted against the wireless network

    Intrusion Detection System (IDS) Techniques and Responses for Mobile Wireless Networks

    Get PDF
    In recent years, the rapidly expanding area of mobile and wireless computing applications was definitely redefined the concept of network security. Even though that wireless had opened a new and exiting world with its advancing technology it is no doubt that it is popularity is on the rise. However, the biggest concern with either wireless or mobile computing applications in security. It can no longer be effective in the traditional way of securing networks with the use of firewalls and even with the use of stronger encryption algorithm keys. The need to develop and research for new structures and methods to protect and define the wireless networks and the mobile computing applications is becoming more and more evident. In this report, we will conduct an in-depth analysis of the weaknesses of the wireless networks and hence proved why the use of an intrusion detection system is of great importance in securing the backbone of mobile computing field. This would also involve detecting anomalies in the mobile ad-hoc network including inconsistencies in the routing tables and activities on other layers

    Water treatment and distribution simulation for a SCADA security testbed.

    Get PDF
    Supervisory Control and Data Acquisition (SCADA) systems are used in almost all industrial processes including use in the nation\u27s critical infrastructure. The electric, water, and gas industries are merely a few that rely heavily on the use of SCADA systems in order to provide reliable service to the public. Any disruption in these systems would lead to major issues in day to day life and could produce a hazardous environment until the services are restored. SCADA equipment was first implemented decades ago, and in some cases the equipment deployed at that time is still in use today. As network technology emerged and advanced over the last several years, SCADA systems were adapted in order to provide network access and control from remote locations. This led to vulnerabilities in limiting access to the system and provided a means for hackers, hactavist, and nation-states to gain control of critical infrastructure SCADA systems in order to cause both physical and economical damage. New technologies and research areas have emerged in an effort to thwart these possible intrusions and attacks. However, there is a need to have adequate means of testing new security devices since it would be impractical to test on a functioning SCADA system. This leads to the development of simulations and testbeds that can provide a low-cost, easily configurable means of testing new cyber security devices. A water treatment and distribution simulation was developed in order to provide this means of testing. The simulation encompasses two components. The first is a software simulation that provides virtualized components typically found in water systems such as pumps, valves, and water tanks. The second is a hardware component that provides an interface from the software to actual SCADA equipment such as remote terminal units and human machine interfaces. The simulation was tested with a prototype cyber security device to ensure functionality. Attacks were carried out on the SCADA system with and without the security device in place. The simulation allowed for both a virtualized and physical response to the attacks. The simulation provided a robust, cost-effective testbed for verifying the functionality of the security device
    corecore