60,728 research outputs found
An analytical model for Loc/ID mappings caches
Concerns regarding the scalability of the interdomain routing have encouraged researchers to start elaborating a more robust Internet architecture. While consensus on the exact form of the solution is yet to be found, the need for a semantic decoupling of a node's location and identity is generally accepted as a promising way forward. However, this typically requires the use of caches that store temporal bindings between the two namespaces, to avoid hampering router packet forwarding speeds. In this article, we propose a methodology for an analytical analysis of cache performance that relies on the working-set theory. We first identify the conditions that network traffic must comply with for the theory to be applicable and then develop a model that predicts average cache miss rates relying on easily measurable traffic parameters. We validate the result by emulation, using real packet traces collected at the egress points of a campus and an academic network. To prove its versatility, we extend the model to consider cache polluting user traffic and observe that simple, low intensity attacks drastically reduce performance, whereby manufacturers should either overprovision router memory or implement more complex cache eviction policies.Peer ReviewedPostprint (author's final draft
Cyber-Security in Smart Grid: Survey and Challenges
Smart grid uses the power of information technology to intelligently deliver
energy to customers by using a two-way communication, and wisely meet the
environmental requirements by facilitating the integration of green
technologies. Although smart grid addresses several problems of the traditional
grid, it faces a number of security challenges. Because communication has been
incorporated into the electrical power with its inherent weaknesses, it has
exposed the system to numerous risks. Several research papers have discussed
these problems. However, most of them classified attacks based on
confidentiality, integrity, and availability, and they excluded attacks which
compromise other security criteria such as accountability. In addition, the
existed security countermeasures focus on countering some specific attacks or
protecting some specific components, but there is no global approach which
combines these solutions to secure the entire system. The purpose of this paper
is to provide a comprehensive overview of the relevant published works. First,
we review the security requirements. Then, we investigate in depth a number of
important cyber-attacks in smart grid to diagnose the potential vulnerabilities
along with their impact. In addition, we proposed a cyber security strategy as
a solution to address breaches, counter attacks, and deploy appropriate
countermeasures. Finally, we provide some future research directions
DDoS-Capable IoT Malwares: comparative analysis and Mirai Investigation
The Internet of Things (IoT) revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far
Creation of backdoors in quantum communications via laser damage
Practical quantum communication (QC) protocols are assumed to be secure
provided implemented devices are properly characterized and all known side
channels are closed. We show that this is not always true. We demonstrate a
laser-damage attack capable of modifying device behaviour on-demand. We test it
on two practical QC systems for key distribution and coin-tossing, and show
that newly created deviations lead to side channels. This reveals that laser
damage is a potential security risk to existing QC systems, and necessitates
their testing to guarantee security.Comment: Changed the title to match the journal version. 9 pages, 5 figure
- …
