110,435 research outputs found
Autonomic computing architecture for SCADA cyber security
Cognitive computing relates to intelligent computing platforms that are based on the disciplines of artificial intelligence, machine learning, and other innovative technologies. These technologies can be used to design systems that mimic the human brain to learn about their environment and can autonomously predict an impending anomalous situation. IBM first used the term âAutonomic Computingâ in 2001 to combat the looming complexity crisis (Ganek and Corbi, 2003). The concept has been inspired by the human biological autonomic system. An autonomic system is self-healing, self-regulating, self-optimising and self-protecting (Ganek and Corbi, 2003). Therefore, the system should be able to protect itself against both malicious attacks and unintended mistakes by the operator
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
Content-Centric Networking (CCN) is an emerging networking paradigm being
considered as a possible replacement for the current IP-based host-centric
Internet infrastructure. In CCN, named content becomes a first-class entity.
CCN focuses on content distribution, which dominates current Internet traffic
and is arguably not well served by IP. Named-Data Networking (NDN) is an
example of CCN. NDN is also an active research project under the NSF Future
Internet Architectures (FIA) program. FIA emphasizes security and privacy from
the outset and by design. To be a viable Internet architecture, NDN must be
resilient against current and emerging threats. This paper focuses on
distributed denial-of-service (DDoS) attacks; in particular we address interest
flooding, an attack that exploits key architectural features of NDN. We show
that an adversary with limited resources can implement such attack, having a
significant impact on network performance. We then introduce Poseidon: a
framework for detecting and mitigating interest flooding attacks. Finally, we
report on results of extensive simulations assessing proposed countermeasure.Comment: The IEEE Conference on Local Computer Networks (LCN 2013
Recommended from our members
Business model requirements and challenges in the mobile telecommunication sector
The telecommunications business is undergoing a critical revolution, driven by innovative technologies, globalization, and deregulation. Cellular networks and telecommunications bring radical changes to the way telecom businesses are conducted. Globalization, on the other hand, is tearing down legacy barriers and forcing monopolistic national carriers to compete internationally. Moreover, the noticeable progress of many countries towards deregulation coupled with liberalization is significantly increasing telecom market power and allowing severe competition. The implications of this transition have changed the business rules of the telecom industry. In addition, entrants into the cellular industry have had severe difficulties due to inexistent or weak Business Models (BMs). Designing a BM for a mobile network operator is complex and requires multiple actors to balance different and often conflicting design requirements. Hence, there is a need to enhance operatorsâ ability in determining what constitutes the most viable business model to meet their strategic objectives within this turbulent environment. In this paper, the authors identify the main mobile BM dimensions along with their interdependencies and further analysis provides mobile network operators with insights to improve their business models in this new âboundary-lessâ landscape
Approaches for Future Internet architecture design and Quality of Experience (QoE) Control
Researching a Future Internet capable of overcoming the current Internet limitations is a strategic
investment. In this respect, this paper presents some concepts that can contribute to provide some guidelines to
overcome the above-mentioned limitations. In the authors' vision, a key Future Internet target is to allow
applications to transparently, efficiently and flexibly exploit the available network resources with the aim to
match the users' expectations. Such expectations could be expressed in terms of a properly defined Quality of
Experience (QoE). In this respect, this paper provides some approaches for coping with the QoE provision
problem
- âŠ