518,926 research outputs found

    Innovative Technologies in Combating Cyber Crime

    Get PDF
    So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space

    Working towards an Improved Monitoring Infrastructure to support Disaster Management, Humanitarian Relief and Civil Security

    Get PDF
    Within this paper experiences and results from the work in the context of the European Initiative on Global Monitoring for Environment and Security (GMES) as they were gathered within the German Remote Sensing Data Center (DFD) are reported. It is described how data flows, analysis methods and information networks can be improved to allow better and faster access to remote sensing data and information in order to support the management of crisis situations. This refers to all phases of a crisis or disaster situation, including preparedness, response and recovery. Above the infrastructure and information flow elements, example cases of different crisis situations in the context of natural disasters, humanitarian relief activities and civil security are discussed. This builds on the experiences gained during the very active participation in the network of Excellence on Global Monitoring for Stability and Security (GMOSS), the GMES Service Element RESPOND, focussing on Humanitarian Relief Support and supporting the International Charter on Space and Major Disasters as well as while linking closely to national, European and international entities related to civil human security. It is suggested to further improve the network of national and regional centres of excellence in this context in order to improve local, regional and global monitoring capacities. Only when optimum interoperability and information flow can be achieved among systems and data providers on one hand side and the decision makers on the other, efficient monitoring and analysis capacities can be established successfully

    Outsmarting Network Security with SDN Teleportation

    Full text link
    Software-defined networking is considered a promising new paradigm, enabling more reliable and formally verifiable communication networks. However, this paper shows that the separation of the control plane from the data plane, which lies at the heart of Software-Defined Networks (SDNs), introduces a new vulnerability which we call \emph{teleportation}. An attacker (e.g., a malicious switch in the data plane or a host connected to the network) can use teleportation to transmit information via the control plane and bypass critical network functions in the data plane (e.g., a firewall), and to violate security policies as well as logical and even physical separations. This paper characterizes the design space for teleportation attacks theoretically, and then identifies four different teleportation techniques. We demonstrate and discuss how these techniques can be exploited for different attacks (e.g., exfiltrating confidential data at high rates), and also initiate the discussion of possible countermeasures. Generally, and given today's trend toward more intent-based networking, we believe that our findings are relevant beyond the use cases considered in this paper.Comment: Accepted in EuroSP'1
    • …
    corecore