14 research outputs found

    Towards Building National Cybersecurity Awareness

    Get PDF
    The paper depicts a complex, distributed information system aimed at promoting cybersecurity awareness at the national level. The system, that is built in accordance with the Act on National Cybersecurity, passed by the Polish Parliament, enables collecting and processing in near-real time available information on the security status of essential services and digital services and, also, provides for assessment of negative impact of the identified threats concerned with the provision of those services. Advanced access control and dissemination mechanisms, for secure information sharing within the system, are provided in order to aggregate distributed knowledge and use this information for on-line security risk analysis and for generation and distribution  of early warnings

    On Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networks

    Get PDF
    We propose a concept of using Software Defined Network (SDN) technology and machine learning algorithms for monitoring and detection of malicious activities in the SDN data plane. The statistics and features of network traffic are generated by the native mechanisms of SDN technology. In order to conduct tests and a verification of the concept, it was necessary to obtain a set of network workload test data. We present virtual environment which enables generation of the SDN network traffic. The article examines the efficiency of selected  machine learning methods: Self Organizing Maps and Learning Vector Quantization and their enhanced versions. The results are compared with other SDN-based IDS

    A Shared Cybersecurity Awareness Platform, Journal of Telecommunications and Information Technology, 2021, nr 3

    Get PDF
    Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities. Technical infrastructure enabling safe and reliable online collaboration between all teams responsible for security is an important element of the system as well. With the above taken into consideration, the paper presents a comprehensive distributed solution for continuous monitoring and detection of threats that may affect services that provision is essential to security and broadly understood the state’s economic interests. The said solution allows to collect, process and share distributed knowledge on hazard events. The partnership-based model of cooperation between the system’s users allows the teams to undertake specific activities at the central level, facilitates global cyber threat awareness, and enhances the process of predicting and assessing cyber risks in order to ensure a near-realtime response. The paper presents an overview of the system’s architecture, its main components, features, and threat intelligence tools supporting the safe sharing of information concerning specific events. It also offers a brief overview of the system’s deployment and its testing in an operational environment of NASK’s Computer Security Incident Response Team (CSIRT) and Security Operation Center (SOC) of essential services operator

    Intrusion Detection in Software De ned Networks with Self-organized Maps, Journal of Telecommunications and Information Technology, 2015, nr 4

    Get PDF
    The Software Defined Network (SDN) architecture provides new opportunities to implement security mechanisms in terms of unauthorized activities detection. At the same time, there are certain risks associated with this technology. The presented approach covers a conception of the measurement method, virtual testbed and classification mechanism for SDNs. The paper presents a measurement method which allows collecting network traffic flow parameters, generated by a virtual SDN environment. The collected dataset can be used in machine learning methods to detect unauthorized activities

    Success Factors for SOA Implementation in Network Centric Environment, Journal of Telecommunications and Information Technology, 2011, nr 1

    Get PDF
    This paper discusses challenges and success factors for service oriented architecture (SOA) implementation in network centric environment. The authors identify 9 fundamental challenges for the SOA approach in order to make the biggest benefit for the NATO NEC (NNEC) and increase the mission effectiveness to the highest extent. They cover the areas of applicability to existing military communications and the ability to reflect military processes. Their range is quite broad, pointing out technological as well as SOA governmental problems. The authors emphasize that any COTS solution available on the market today is able to overcome all of them at once. However, they propose solutions to some of the problems and present quick wins that can speed up the process of achieving capabilities in a heterogeneous multinational NEC environment

    Adaptation of the Kademila Routing for Tactical Networks, Journal of Telecommunications and Information Technology, 2011, nr 1

    Get PDF
    In this paper a modification of the widely used Kademlia peer-to-peer system to tactical networks is proposed. We first take a look at the available systems today to cover the range of possibilities peer-to-peer systems offer. We identify candidates for use in military networks. Then we compare two candidate systems in an environment with highly dynamic participants. The considered environment is focused on the special conditions in tactical networks. Then we give rationale for choosing Kademlia as a suitable system for tactical environments. Since Kademlia is not adapted to military networks, a modification to this system is proposed to adapt it to the special conditions encountered in this environment. We show that optimizations in the routing may lead to faster lookups by measuring the modified algorithm in a simulation of the target environment. We show also that the proposed modification can be used to extend the battery lifetime of mobile peer-to-peer nodes. Our results show that peer-to-peer systems can be used in military networks to increase their robustness. The modifications proposed to Kademlia adapt the system to the special challenges of military tactical networks

    Selected Issues of QoS Provision in Heterogenous Military Networks

    Get PDF
    Tactical ad-hoc networks are evolving today towards complex heterogeneous networks in terms of architecture, protocols and security. Due to the difference in network resources and reliability, end-to-end quality of service provisioning becomes very challenging. If we also take into account communication issues such as unpredictable connectivity, preferential forwarding for special traffic classes, intermittency due to node or communication link failure, the problem is further aggravated.In this article, we examine the major challenges that must be solved in order to provide efficient QoS provisioning in the heterogeneous network. Finally we describe QoS-aware mechanisms for inter-domain and intra-domain heterogeneous networks, also including real-time services provision in highly mobile environments.

    An effective method of channels assignment for third generation cellular system, Journal of Telecommunications and Information Technology, 2003, nr 4

    Get PDF
    An original hybrid method of channels assignment for DS-CDMA system is discussed in the paper. This method combines standard PN codes assignment policy and dynamic channel assignment procedure that minimise the cost of channel assignment. OPNET simulation model DS-CDMA system was used for assessment of the hybrid method. The results of simulation presented in the paper confirmed that the proposed method importantly improves the quality of services in the third generation cellular system

    Web Services Efficiency in Disadvantaged Environment, Journal of Telecommunications and Information Technology, 2011, nr 1

    Get PDF
    The article presents results of web services (WSs) efficiency tests carried out in the testbed emulating disadvantaged network environment. The authors discuss the advantage of different WS adaptation techniques that allow to minimize the XML message size (i.e. compression, filtering and binary coding) and the size of JPEG image attachment (i.e., resolution reduction, decreasing colour depth, JPEG compression). The presented results show the efficiency of selected methods that adapt the web services realization to the possibilities of the network. The article is summarized by conclusions and recommendations in terms of sending XML SOAP messages in disadvantaged networks

    On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks

    No full text
    In this paper, the applicability of the network coding technique in 6LoWPAN-based sensor multihop networks is examined. The 6LoWPAN is one of the standards proposed for the Internet of Things architecture. Thus, we can expect the significant growth of traffic in such networks, which can lead to overload and decrease in the sensor network lifetime. The authors propose the inter-session network coding mechanism that can be implemented in resource-limited sensor motes. The solution reduces the overall traffic in the network, and in consequence, the energy consumption is decreased. Used procedures take into account deep header compressions of the native 6LoWPAN packets and the hop-by-hop changes of the header structure. Applied simplifications reduce signaling traffic that is typically occurring in network coding deployments, keeping the solution usefulness for the wireless sensor networks with limited resources. The authors validate the proposed procedures in terms of end-to-end packet delay, packet loss ratio, traffic in the air, total energy consumption, and network lifetime. The solution has been tested in a real wireless sensor network. The results confirm the efficiency of the proposed technique, mostly in delay-tolerant sensor networks
    corecore