5 research outputs found

    Security Automation using Traffic Flow Modeling

    Get PDF
    The growing trend towards network “softwarization” allows the creation and deployment of even complex network environments in a few minutes or seconds, rather than days or weeks as required by traditional methods. This revolutionary approach made it necessary to seek automatic processes to solve network security problems. One of the main issues in the automation of network security concerns the proper and efficient modeling of network traffic. In this paper, we describe two optimized Traffic Flows representation models, called Atomic Flows and Maximal Flows. In addition to the description, we have validated and evaluated the proposed models to solve two key network security problems - security verification and automatic configuration - showing the advantages and limitations of each solution

    Formal Verification of a V2X Privacy Preserving Scheme Using Proverif

    No full text
    V2X communications will be an integral part of all vehicles in the future, broadcasting information such as the vehicle's speed and position to all surrounding neighbors. Being sensitive, a compromise of this data may expose the vehicle to cyberattacks. In this paper, we focus on a particular issue, which is the privacy of vehicles and their drivers. Specifically, we consider a scheme that has been proposed in the literature for ensuring privacy in v2x communications, we build a formal model of it and we analyze its security properties through formal verification. Our analysis conducted using Proverif revealed some issues that could impact the privacy and safety of the vehicle. Some of them are well-known in the literature and could be common to other existing schemes; other ones are specific to the modeled protocol

    Formal verification of the FDO protocol

    No full text

    Zero touch privacy preserving provisioning in an Edge-, Fog, and Cloud environment

    No full text
    IoT device onboarding, especially in the context of an edge-fog-cloud architecture, still has many challenges to solve. FIDO has already specified a zero-touch onboarding process called FIDO Device Onboarding (FDO) specification. In this paper, we present improvements to the FDO specification regarding performance and privacy. For privacy and security reasons, we show how the URL of the Owner Fog can be hidden from the Rendezvous Server. Further, we replaced the EPID protocol with a promising privacy-preserving protocol called AACKA. We also modified the last phase in the FDO protocol to create a performance improvement

    Increased polymorphonuclear leukocyte Fc gamma-dependent chemiluminescence in active psoriasis is not related to FcRIII (CD16) receptor expression

    No full text
    The role of the two main serum opsonins (IgG and C3b) in the induction of polymorphonuclear leukocyte chemiluminescence was studied in a group of psoriatic patients. Chemiluminescence was stimulated with zymosan opsonized by fresh plasma (IgG- and C3b-dependent chemiluminescence) or by complement-depleted plasma (IgG-dependent chemiluminescence). While C3b-dependent chemiluminescence was similar in patients with chronic or active forms of psoriasis, IgG-dependent chemiluminescence was significantly increased in patients with active disease. However, FcR-III expression, evaluated by means of flow cytofluorimetry, was similar in the different groups of patients studied. The discrepancy between Fc-receptor (CD16) expression and IgG-dependent chemiluminescence is, therefore, indicative of modifications that occur in psoriatic neutrophils that do not involve FcIII-receptor expression
    corecore