5,831 research outputs found

    Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Full text link
    In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.Comment: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other author

    JISC Preservation of Web Resources (PoWR) Handbook

    Get PDF
    Handbook of Web Preservation produced by the JISC-PoWR project which ran from April to November 2008. The handbook specifically addresses digital preservation issues that are relevant to the UK HE/FE web management community”. The project was undertaken jointly by UKOLN at the University of Bath and ULCC Digital Archives department

    Memories for Life: A Review of the Science and Technology

    No full text
    This paper discusses scientific, social and technological aspects of memory. Recent developments in our understanding of memory processes and mechanisms, and their digital implementation, have placed the encoding, storage, management and retrieval of information at the forefront of several fields of research. At the same time, the divisions between the biological, physical and the digital worlds seem to be dissolving. Hence opportunities for interdisciplinary research into memory are being created, between the life sciences, social sciences and physical sciences. Such research may benefit from immediate application into information management technology as a testbed. The paper describes one initiative, Memories for Life, as a potential common problem space for the various interested disciplines

    The ethics of forgetting in an age of pervasive computing

    Get PDF
    In this paper, we examine the potential of pervasive computing to create widespread sousveillance, that will complement surveillance, through the development of lifelogs; socio-spatial archives that document every action, every event, every conversation, and every material expression of an individual’s life. Examining lifelog projects and artistic critiques of sousveillance we detail the projected mechanics of life-logging and explore their potential implications. We suggest, given that lifelogs have the potential to convert exterior generated oligopticons to an interior panopticon, that an ethics of forgetting needs to be developed and built into the development of life-logging technologies. Rather than seeing forgetting as a weakness or a fallibility we argue that it is an emancipatory process that will free pervasive computing from burdensome and pernicious disciplinary effects

    Analog Solutions: E-discovery Spoliation Sanctions and the Proposed Amendments to FRCP 37(e)

    Get PDF
    The ever-increasing importance of digital technology in today’s commercial environment has created several serious problems for courts operating under the Federal Rules of Civil Procedure’s (FRCP) discovery regime. As the volume of discoverable information has grown exponentially, so too have the opportunities for abuse and misinterpretation of the FRCP’s outdated e-discovery rules. Federal courts are divided over the criteria for imposing the most severe discovery sanctions as well as the practical ramifications of the preservation duty as applied to electronically stored information. As a result, litigants routinely feel pressured to overpreserve potentially discoverable data, often at great expense. At a conference at the Duke University School of Law in 2010, experts from all sides of the civil-litigation system concluded that the e-discovery rules were in desperate need of updating. The subsequent four years saw a flurry of rulemaking efforts. In 2014, a package of proposed FRCP amendments included a complete overhaul of Rule 37(e), the provision governing spoliation sanctions for electronically stored information. This Note analyzes the proposed Rule and argues that the amendment will fail to accomplish the Advisory Committee’s goals because it focuses too heavily on preserving the trial court’s discretion in imposing sanctions and focuses too little on incentivizing efficient and cooperative pretrial discovery. The Note concludes by offering revisions and enforcement mechanisms that would allow the new Rule 37(e) to better address the e-discovery issues identified at the Duke Conference

    Cloud technology options towards Free Flow of Data

    Get PDF
    This whitepaper collects the technology solutions that the projects in the Data Protection, Security and Privacy Cluster propose to address the challenges raised by the working areas of the Free Flow of Data initiative. The document describes the technologies, methodologies, models, and tools researched and developed by the clustered projects mapped to the ten areas of work of the Free Flow of Data initiative. The aim is to facilitate the identification of the state-of-the-art of technology options towards solving the data security and privacy challenges posed by the Free Flow of Data initiative in Europe. The document gives reference to the Cluster, the individual projects and the technologies produced by them

    Video Surveillance and the GDPR

    Get PDF
    Purpose – to present some recommendations that would help organizations to compliance video surveillance under GDPR. Design/methodology/approach – analysis and synthesis of scientific literature and legal documents, generalization. Finding – after analyzing the theoretical aspects of video surveillance compliance under GDPR, there were introduced the main recommendations that would reduce the risk of GDPR noncompliance. Research limitations/implications – The main limitation of this study is that the research is based on scientific literature review. Practical implications – the present research allows to identify the challenges of GDPR implementation for video surveillance. Originality/Value – On May 25, 2018, the General Data Protection Regulation or GDPR officially took effect, requiring better protection of personal data across the EU region. In this regard, making video surveillance GDPR compliant has become critical

    Digital provenance - models, systems, and applications

    Get PDF
    Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this thesis, we propose a such a comprehensive provenance model and present an abstract schema of the model. ^ We further explore the secure provenance solutions for distributed systems, namely streaming data, wireless sensor networks (WSNs) and virtualized environments. We design a customizable file provenance system with an application to the provenance infrastructure for virtualized environments. The system supports automatic collection and management of file provenance metadata, characterized by our provenance model. Based on the proposed provenance framework, we devise a mechanism for detecting data exfiltration attack in a file system. We then move to the direction of secure provenance communication in streaming environment and propose two secure provenance schemes focusing on WSNs. The basic provenance scheme is extended in order to detect packet dropping adversaries on the data flow path over a period of time. We also consider the issue of attack recovery and present an extensive incident response and prevention system specifically designed for WSNs
    corecore