31,514 research outputs found
The ionosphere prediction service prototype for GNSS users
The effect of the Earth’s ionosphere represents the single largest contribution to the Global
Navigation Satellite System (GNSS) error budget and abnormal ionospheric conditions can impose serious
degradation on GNSS system functionality, including integrity, accuracy and availability. With the growing
reliance on GNSS for many modern life applications, actionable ionospheric forecasts can contribute to
the understanding and mitigation of the impact of the ionosphere on our technology based society. In this
context, the Ionosphere Prediction Service (IPS) project was set up to design and develop a prototype
platform to translate the forecast of the ionospheric effects into a service customized for specific GNSS
user communities. To achieve this overarching aim, four different product groups dealing with solar activity,
ionospheric activity, GNSS receiver performance and service performance have been developed and
integrated into a service chain, which is made available through a web based platform. This paper provides
an overview of the IPS project describing its overall architecture, products and web based platform.PublishedA412A. Fisica dell'alta atmosferaJCR Journa
Comparison of Intrusion Detection Systems/Intrusion Prevention Systems – A Selection Criterion
Most of the devices and systems nowadays are complex connected devices that perform critical functions. Security in these devices is a critical task and of the highest importance. The protection of the data is mandatory for any organization, so there is a demand for the security mechanism to protect the data. Security is a challenging issue that should be taken into consideration when designing and building business-based web applications, as well as during its maintenance stage. Security can be provided to a system in various ways at different layers. This can be done either by an Intrusion Prevent System (IPS) or Intrusion Detection Systems (IDS). Usually deployed in a network to monitor the traffic, these systems use their own methodology to prevent, mitigate, and arrive at conclusions.
The main objective of the paper is to discuss various kinds of IPS/IDS in detail, and their uniqueness which makes them stand out for various reasons. An additional discussion point will indicate which IDS/IPS can be used according to the security requirement, their functionality, and performances with their effectiveness to stop the malicious activity over a computer network. Reasons to choose a specific IDS/IPS will be listed. One of the high-level objectives of the paper is to create awareness about the availability of IDS/IPS and information on which one to choose for their requirements
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a
fundamental requirement to the adoption of P2P protocols for legal usage. In a
climate of cold war between these users and anti-piracy groups, more and more
users are moving to anonymizing networks in an attempt to hide their identity.
However, when not designed to protect users information, a P2P protocol would
leak information that may compromise the identity of its users. In this paper,
we first present three attacks targeting BitTorrent users on top of Tor that
reveal their real IP addresses. In a second step, we analyze the Tor usage by
BitTorrent users and compare it to its usage outside of Tor. Finally, we depict
the risks induced by this de-anonymization and show that users' privacy
violation goes beyond BitTorrent traffic and contaminates other protocols such
as HTTP
Recommended from our members
A survey of intrusion detection techniques in Cloud
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flexibility and lesser infrastructural investment. These services are provided over the Internet using known networking protocols, standards and formats under the supervision of different managements. Existing bugs and vulnerabilities in underlying technologies and legacy protocols tend to open doors for intrusion. This paper, surveys different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. It examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and discusses various types and techniques of IDS and Intrusion Prevention Systems (IPS), and recommends IDS/IPS positioning in Cloud architecture to achieve desired security in the next generation networks
- …