220,606 research outputs found

    An overview to Software Architecture in Intrusion Detection System

    Full text link
    Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-based network intrusion detection systems are developed. However, the model has a problem with high speed traffic. This paper reviews of many type of software architecture in intrusion detection systems and describes the design and implementation of a high-performance network intrusion detection system that combines the use of software-based network intrusion detection sensors and a network processor board. The network processor which is a hardware-based model could acts as a customized load balancing splitter. This model cooperates with a set of modified content-based network intrusion detection sensors rather than IDS in processing network traffic and controls the high-speed.Comment: 8 Pages, International Journal of Soft Computing and Software Engineering [JSCSE]. arXiv admin note: text overlap with arXiv:1101.0241 by other author

    An overview of memristive cryptography

    Full text link
    Smaller, smarter and faster edge devices in the Internet of things era demands secure data analysis and transmission under resource constraints of hardware architecture. Lightweight cryptography on edge hardware is an emerging topic that is essential to ensure data security in near-sensor computing systems such as mobiles, drones, smart cameras, and wearables. In this article, the current state of memristive cryptography is placed in the context of lightweight hardware cryptography. The paper provides a brief overview of the traditional hardware lightweight cryptography and cryptanalysis approaches. The contrast for memristive cryptography with respect to traditional approaches is evident through this article, and need to develop a more concrete approach to developing memristive cryptanalysis to test memristive cryptographic approaches is highlighted.Comment: European Physical Journal: Special Topics, Special Issue on "Memristor-based systems: Nonlinearity, dynamics and applicatio

    A Cyber-HIL for Investigating Control Systems in Ship Cyber Physical Systems under Communication Issues and Cyber Attacks

    Full text link
    This paper presents a novel Cyber-Hardware-in-the-Loop (Cyber-HIL) platform for assessing control operation in ship cyber-physical systems. The proposed platform employs cutting-edge technologies, including Docker containers, real-time simulator OPAL−RTOPAL-RT, and network emulator ns3ns3, to create a secure and controlled testing and deployment environment for investigating the potential impact of cyber attack threats on ship control systems. Real-time experiments were conducted using an advanced load-shedding controller as a control object in both synchronous and asynchronous manners, showcasing the platform's versatility and effectiveness in identifying vulnerabilities and improving overall Ship Cyber Physical System (SCPS) security. Furthermore, the performance of the load-shedding controller under cyber attacks was evaluated by conducting tests with man-in-the-middle (MITM) and denial-of-service (DoS) attacks. These attacks were implemented on the communication channels between the controller and the simulated ship system, emulating real-world scenarios. The proposed Cyber-HIL platform provides a comprehensive and effective approach to test and validate the security of ship control systems in the face of cyber threats.Comment: 10 pages, 16 figures, journal under revie

    System Software Abstraction Layer - much more than Operating System Abstraction Layer

    Get PDF
    Current and future aircraft systems require real-time embedded software with greater flexibility compared to what was previously available due to the continuous advancements in the technology leading to large and complex systems. Portability of software as one of the aspects of this flexibility is a major concern in application development for avionics domain for fast development and integration of systems. Abstractions of the hardware platform which have been already introduced by the operating system community allow the software modules to be reused on different hardware and with different physical resources. Now operating system community has come up with an abstraction layer called operating system abstraction layer (OSAL) which along with the hardware abstraction unifies the OS architecture too. It provides a common set of primitives independent of the underlying operating system and its particular architecture. Factors such as reliability, scalability and determinism of any application largely depend on the design and architecture of the application. This is the most important and critical factor of real time systems such as mission computers of avionics systems, missile control system or control computers of space shuttle. It demands developer to perform feasibility of different software architecture to select the best alternative. Authors’ analysis shows that to make any real time application more secure, scalable, deterministic, and highly portable, OSAL has to be extended to more than just operating system abstraction. This new view of OSAL will be called as system software abstraction layer (SSAL). In this paper, authors attempt to highlight the efficiency of SSAL as well as detailed description of its main features and design considerations. Authors have implemented the SSAL on top of two well known OS (WinCE and Vxworks) and performed extensive evaluations, which shows that it effectively reduces portability efforts while achieving simplicity, predictability, security and determinism. This paper presents in brief, the API functionalities, its components, implementation, interfaces, advantages and overheads along with a case study.Defence Science Journal, 2013, 63(2), pp.214-222, DOI:http://dx.doi.org/10.14429/dsj.63.426
    • …
    corecore