518,926 research outputs found
Innovative Technologies in Combating Cyber Crime
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space
Working towards an Improved Monitoring Infrastructure to support Disaster Management, Humanitarian Relief and Civil Security
Within this paper experiences and results from the work in the context of the European Initiative on Global Monitoring for Environment and Security (GMES) as they were gathered within the German Remote Sensing Data Center (DFD) are reported. It is described how data flows, analysis methods and information networks can be improved to allow better and faster access to remote sensing data and information in order to support the management of crisis situations. This refers to all phases of a crisis or disaster situation, including preparedness, response and recovery. Above the infrastructure and information flow elements, example cases of different crisis situations in the context of natural disasters, humanitarian relief activities and civil security are discussed. This builds on the experiences gained during the very active participation in the network of Excellence on Global Monitoring for Stability and Security (GMOSS), the GMES Service Element RESPOND, focussing on Humanitarian Relief Support and supporting the International Charter on Space and Major Disasters as well as while linking closely to national, European and international entities related to civil human security. It is suggested to further improve the network of national and regional centres of excellence in this context in order to improve local, regional and global monitoring capacities. Only when optimum interoperability and information flow can be achieved among systems and data providers on one hand side and the decision makers on the other, efficient monitoring and analysis capacities can be established successfully
Outsmarting Network Security with SDN Teleportation
Software-defined networking is considered a promising new paradigm, enabling
more reliable and formally verifiable communication networks. However, this
paper shows that the separation of the control plane from the data plane, which
lies at the heart of Software-Defined Networks (SDNs), introduces a new
vulnerability which we call \emph{teleportation}. An attacker (e.g., a
malicious switch in the data plane or a host connected to the network) can use
teleportation to transmit information via the control plane and bypass critical
network functions in the data plane (e.g., a firewall), and to violate security
policies as well as logical and even physical separations. This paper
characterizes the design space for teleportation attacks theoretically, and
then identifies four different teleportation techniques. We demonstrate and
discuss how these techniques can be exploited for different attacks (e.g.,
exfiltrating confidential data at high rates), and also initiate the discussion
of possible countermeasures. Generally, and given today's trend toward more
intent-based networking, we believe that our findings are relevant beyond the
use cases considered in this paper.Comment: Accepted in EuroSP'1
- …