105,786 research outputs found
Cyber-crime Science = Crime Science + Information Security
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science. Information security research has developed techniques for protecting the confidentiality, integrity, and availability of information assets but is less strong on the empirical study of the effectiveness of these techniques. Crime Science studies the effect of crime prevention techniques empirically in the real world, and proposes improvements to these techniques based on this. Combining both approaches, Cyber-crime Science transfers and further develops Information Security techniques to prevent cyber-crime, and empirically studies the effectiveness of these techniques in the real world. In this paper we review the main contributions of Crime Science as of today, illustrate its application to a typical Information Security problem, namely phishing, explore the interdisciplinary structure of Cyber-crime Science, and present an agenda for research in Cyber-crime Science in the form of a set of suggested research questions
An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
In this paper, an analytical model for DDoS attacks detection is proposed, in
which propagation of abrupt traffic changes inside public domain is monitored
to detect a wide range of DDoS attacks. Although, various statistical measures
can be used to construct profile of the traffic normally seen in the network to
identify anomalies whenever traffic goes out of profile, we have selected
volume and flow measure. Consideration of varying tolerance factors make
proposed detection system scalable to the varying network conditions and attack
loads in real time. NS-2 network simulator on Linux platform is used as
simulation testbed. Simulation results show that our proposed solution gives a
drastic improvement in terms of detection rate and false positive rate.
However, the mammoth volume generated by DDoS attacks pose the biggest
challenge in terms of memory and computational overheads as far as monitoring
and analysis of traffic at single point connecting victim is concerned. To
address this problem, a distributed cooperative technique is proposed that
distributes memory and computational overheads to all edge routers for
detecting a wide range of DDoS attacks at early stage.Comment: arXiv admin note: substantial text overlap with arXiv:1203.240
A Distributed Sensor Data Search Platform for Internet of Things Environments
Recently, the number of devices has grown increasingly and it is hoped that,
between 2015 and 2016, 20 billion devices will be connected to the Internet and
this market will move around 91.5 billion dollars. The Internet of Things (IoT)
is composed of small sensors and actuators embedded in objects with Internet
access and will play a key role in solving many challenges faced in today's
society. However, the real capacity of IoT concepts is constrained as the
current sensor networks usually do not exchange information with other sources.
In this paper, we propose the Visual Search for Internet of Things (ViSIoT)
platform to help technical and non-technical users to discover and use sensors
as a service for different application purposes. As a proof of concept, a real
case study is used to generate weather condition reports to support rheumatism
patients. This case study was executed in a working prototype and a performance
evaluation is presented.Comment: International Journal of Services Computing (ISSN 2330-4472) Vol. 4,
No.1, January - March, 201
- …