93 research outputs found

    A Brief Review of Security in Emerging Programmable Computer Networking Technologies

    Get PDF
    Recent programmable networking paradigms, such as cloud computing, fog computing, software- defined networks, and network function virtualization gain significant traction in industry and academia. While these newly developed networking technologies open a pathway to new architectures and enable a faster innovation cycle, there exist many problems in this area. In this article, we provide a review of these programmable networking architectures for comparison. Second, we provide a survey of security attacks and defense mechanisms in these emerging programmable networking technologies

    Reliability analysis of SCADA systems used in the offshore oil and gas industry

    No full text
    “Reliability studies of systems have been an important area of research within electrical engineering for over a quarter of a century. In this thesis, the reliability analysis of the Supervisory Control And Data Acquisition (SCADA) systems used in offshore petroleum facilities was examined. This thesis presents fault trees for the platform production facilities, subsea control systems, a typical SCADA system, and the human induced fault tree. Software reliability was also studied. The fault trees were developed based on a safety flow chart and Process and Instrumentation Diagrams (P&ED). This work was conducted as a subcontract to the United States Department of the Interior, Mineral Management Service, Technology Assessment & Research Program, Program SOL 1435-01-99-RP-3995 (project no 356) to the University of Missouri-Rolla. Based on the fault tree diagrams and fault rates, the reliability of the SCADA system used in the offshore facilities was assessed. The failure availability of the SCADA system used in offshore platforms was also found”--Abstract, page iii

    Variations in Graph Energy: A Measure for Network Resilience

    No full text
    There are many models and metrics developed to study the resilience of networks. Eigenvalues are the roots of the characteristic polynomial for a given graph and are mathematically rigorous compared to a statistical measure such as degree distribution. The graph energy is the sum of absolute values of eigenvalues; there is a subtle difference between the adjacency, Laplacian, and normalized Laplacian graph energy calculations. Our primary objective in this paper is to understand what different graph energy mean from a network resilience point of view. We calculate the adjacency, Laplacian, and normalized Laplacian graph energies on four backbone networks under targeted node and link attack scenarios. While adjacency and Laplacian graph energy decrease with node and link attacks, the normalized Laplacian energy increases with link attacks converging to a maximum value equal to the network order. The structural similarities of physical-level topologies is revealed by the close values of adjacency and Laplacian energies

    Towards Cloud Security Improvement with Encryption Intensity Selection

    No full text
    The emergence of cloud computing has enabled users to store and manage data at a low cost and high availability, which made outsourcing data become appealing to its customers. Since the inception of cloud computing, efforts have been dedicated to improve the security and performance of cloudbased backup services. However, there is yet to be implemented a complete scheme that provides security, utility, and performance. Existing schemes focus on one aspect of the backup service; security of data, functionality of the scheme (e.g. searching data for a keyword), or performance. In this paper, we introduce a cloud backup system aiming to balance all three aspects of the service. The scheme utilizes encryption intensity selection, which allows users to select the encryption intensity of their files, secure deduplication, and querying on encrypted data. The performance of our cloud backup system is measured over an OpenStack cloud installed on CloudLab resources. Results demonstrate that our scheme can improve backup service security and performance while providing more functionality of the encrypted data
    • …
    corecore