133 research outputs found

    Do we have the time for IRM? : Service denial attacks and SDN-based defences

    Get PDF
    Distributed sensor networks such as IoT deployments generate large quantities of measurement data. Often, the analytics that runs on this data is available as a web service which can be purchased for a fee. A major concern in the analytics ecosystem is ensuring the security of the data. Often, companies offer Information Rights Management (IRM) as a solution to the problem of managing usage and access rights of the data that transits administrative boundaries. IRM enables individuals and corporations to create restricted IoT data, which can have its flow from organisation to individual control - disabling copying, forwarding, and allowing timed expiry. We describe our investigations into this functionality and uncover a weak-spot in the architecture - its dependence upon the accurate global availability of time. We present an amplified denial-of-service attack which attacks time synchronisation and could prevent all the users in an organisation from reading any sort of restricted data until their software has been re-installed and re-configured. We argue that IRM systems built on current technology will be too fragile for businesses to risk widespread use. We also present defences that leverage the capabilities of Software-Defined Networks to apply a simple filter-based approach to detect and isolate attack traffic

    Microbial carcinogenic toxins and dietary anti-cancer protectants

    Get PDF

    Organic–Inorganic Surface Modifications for Titanium Implant Surfaces

    Full text link

    Alley coppice—a new system with ancient roots

    Get PDF

    High Enthalpy Wind Tunnel Tests of Three-Dimensional Section Controllable Internal Waverider Hypersonic Inlet

    No full text
    • …
    corecore