123,088 research outputs found
Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks
This thesis proposes a distributed approach to securing computer networks by delegating the role of a conventional firewall to a collection of nodes and controllers placed throughout the networks they are intended toprotect from attack. This distributed firewall system is a specific application of a generalized distriubted system framework that is also proposed in this thesis. The design and implementation of both the generalized framework and the application of the framework in creating a distributed firewall system for use on Ethernet-based networks that rely on the Internet Protocol are discussed. Conclusions based upon the preliminary implementation of the proposed systems are given along with future directions --Abstract, pageiii
Internet of Things security with machine learning techniques:a systematic literature review
Abstract. The Internet of Things (IoT) technologies are beneficial for both private and businesses. The growth of the technology and its rapid introduction to target fast-growing markets faces security challenges. Machine learning techniques have been recently used in research studies as a solution in securing IoT devices. These machine learning techniques have been implemented successfully in other fields. The objective of this thesis is to identify and analyze existing scientific literature published recently regarding the use of machine learning techniques in securing IoT devices.
In this thesis, a systematic literature review was conducted to explore the previous research on the use of machine learning in IoT security. The review was conducted by following a procedure developed in the review protocol. The data for the study was collected from three databases i.e. IEEE Xplore, Scopus and Web of Science. From a total of 855 identified papers, 20 relevant primary studies were selected to answer the research question. The study identified 7 machine learning techniques used in IoT security, additionally, several attack models were identified and classified into 5 categories.
The results show that the use of machine learning techniques in IoT security is a promising solution to the challenges facing security. Supervised machine learning techniques have better performance in comparison to unsupervised and reinforced learning. The findings also identified that data types and the learning method affects the performance of machine learning techniques. Furthermore, the results show that machine learning approach is mostly used in securing the network
Securing the RTP framework: why RTP does not mandate a single media security solution
This memo discusses the problem of securing real-time multimedia
sessions, and explains why the Real-time Transport Protocol (RTP),
and the associated RTP control protocol (RTCP), do not mandate a
single media security mechanism. Guidelines for designers and
reviewers of future RTP extensions are provided, to ensure that
appropriate security mechanisms are mandated, and that any such
mechanisms are specified in a manner that conforms with the RTP
architecture
Securing Our Future Homes: Smart Home Security Issues and Solutions
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a home that always operates in consideration of security, energy, efficiency and convenience, whether anyone is home or not
Securing the Internet of Things Infrastructure - Standards and Techniques
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
A Study On Data Security Issues In Public Cloud
Abstract: The cloud computing concept has been evolving for more than 40 years. Cloud computing is an on demand computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. The cloud computing services are delivered through software as service (SaaS), platform as service (PaaS) and Infrastructure as service (IaaS). Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services are provided by cloud service providers. The common data security concerns are securing data in transit and at rest, access control and data separation. In this survey paper, we review the data in public cloud, identify and discuss the security risks associated with it and analyze its solution strategies
How does intellectual capital align with cyber security?
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their responsibilities and accountabilities in this respect.Design/Methodology/Approach – The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual capital, and to outline actions to be taken by BoDs to do so.Findings – Intellectual capital, as a valuable business resource, is related to information, knowledge and cyber security. Hence, preservation thereof is also related to cyber security governance, and merits attention from boards of directors.Implications – This paper clarifies boards of directors’ intellectual capital governance responsibilities, which encompass information, knowledge and cyber security governance.Social Implications – If boards of directors know how to embrace their intellectual capital governance responsibilities, this will help to ensure that such intellectual capital is preserved and secured.Practical Implications – We hope that boards of directors will benefit from our clarifications, and especially from the positioning of intellectual capital in cyber space.Originality/Value – This paper extends a previous paper published by Von Solms and Von Solms (2018), which clarified the key terms of information and cyber security, and the governance thereof. The originality and value is the focus on the securing of intellectual capital, a topic that has not yet received a great deal of attention from cyber security researchers
Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec
With the inception of IPv6 it is possible to assign
a unique ID to each device on planet. Recently, wireless sensor
networks and traditional IP networks are more tightly integrated
using IPv6 and 6LoWPAN. Real-world deployments of WSN
demand secure communication. The receiver should be able to
verify that sensor data is generated by trusted nodes and/or
it may also be necessary to encrypt sensor data in transit.
Available IPv6 protocol stacks can use IPsec to secure data
exchanges. Thus, it is desirable to extend 6LoWPAN such that
IPsec communication with IPv6 nodes is possible. It is beneficial
to use IPsec because the existing end-points on the Internet do
not need to be modified to communicate securely with the WSN.
Moreover, using IPsec, true end-to-end security is implemented
and the need for a trustworthy gateway is removed.
In this demo we will show the usage of our implemented
lightweight IPsec. We will show how IPsec ensures end-to-end
security between an IP enabled sensor networks and the
traditional Internet. This is the first compressed lightweight
design, implementation, and evaluation of a 6LoWPAN extension
for IPsec. This demo complements the full paper that will appear
in the parent conference, DCOSS’11
- …