Tài liệu miễn phí An ninh - Bảo mật

Download Tài liệu học tập miễn phí An ninh - Bảo mật

Home security robot

The project is aimed at creating a simple humanoid for multiple purposes although, mainly concentrating on surveillance. It can move, talk, answer questions and recognize faces. It uses a raspberry pi for its working. Using its camera it can capture pictures and record videos.

4/25/2019 7:32:43 AM +00:00

Study of emerging trends of cyber attacks in Indian cyber space & their countermeasures

As a result, targeted attacks have become a priority threat. In this paper we examine the different stages that are involved in a targeted attack from the reconnaissance phase through to the data exfiltration phase and will explore trends in the tools, tactics and procedures used in such attacks and will conclude with a high-level examination of mitigation strategies.

4/25/2019 7:29:21 AM +00:00

A survey on malicious nodes in mobile ad hoc network

The existing intrusion detection system has gives more network overhead to MANET. Here, we analyze and find a new efficient intrusion detection system Hybrid Cryptography Technique (BECDH) for reducing network overhead and enhance the security level of MANET.

4/25/2019 7:29:07 AM +00:00

Improving security for smart grid with multilayer consensus ECC based pake protocol (SGMCEP)

The paper aims in providing a securely communicating of data between the devices which are nothing but appliance of Home Area Network (HAN) by a set of controller outside the HAN. The packets generated by the controller should be delivered fast without any interruption. The role of an HAN controller is like a gateway, whose role is to filter the incoming packet. Due to this HAN controller, the data in the packets should not be modified & it should not cause any delay in encryption & decryption of the packets.

4/25/2019 7:28:53 AM +00:00

Agent based intrusion detection technique for wireless network

An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. (IDS), as a new defensive-security layer to the WSNs' security infrastructure; which it can detects unsafe activities and unauthorized access.

4/25/2019 7:27:24 AM +00:00

Effective relative position detection for multicasting of alert messages

This information can be shared with other nodes in the network and is central requirement for VANET application like navigation, intelligent transportation, collision avoidance and location based services. In case of emergency all the vehicles in the network are not affected so broadcasting of alert packet is not feasible rather multicasting of alert packet should be done, but defining the list of node to be considered for multicasting is a challenging task as every vehicle cannot hold the location information of all the vehicles in the network.

4/25/2019 7:27:09 AM +00:00

UEBSK: Unique energy-based stability andkeying for instant warning systems

The UEBSK framework consists of two efficient methods (UEBSK-I and UEBSK-II), each of which is highest possible for different conditions. We also show that our framework performs better than other identical schemes in the fictional performs with an overall 60%−100% improvement in energy advantages without the rumours of a effective medium access management (MAC) aspect.

4/25/2019 7:26:34 AM +00:00

A survey paper on detection of gray - hole attack in manet

Denial–Of-Service (DOS) attacks are detected on network layer which are namely as gray hole attack, black hole attack and worm hole attack. We have surveyed research papers based on detection of gray hole attack in MANET. This survey paper analyze the gray hole attack detection technique on AODV routing protocol.

4/25/2019 7:25:42 AM +00:00

Đề xuất một số biện pháp phòng chống phương thức tấn công Clickjacking

Bài viết đề xuất một số biện pháp phòng chống phương thức lừa đảo trực tuyến (phishing) rất phổ biến, đó là phương thức tấn công Clickjacking. Đây là dạng tấn công mà khi sử dụng trình duyệt để truy cập các ứng dụng, nạn nhân bị lừa truy cập và thao tác trên các trang web giả mạo do hacker tạo ra. Những trang web này thường được núp dưới vỏ bọc của một trang web an toàn.

4/25/2019 7:21:23 AM +00:00

Securing the sip communications with XML security mechanisms in VoIP application awareness

The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality.

4/3/2019 6:00:23 AM +00:00

Hybrid invasive weed optimization algorithm with chicken swarm optimization algorithm to solve global optimization problems

In this paper, a new hybrid algorithm was proposed to solve the global optimization problems that combine the invasive weed optimization algorithm with the chicken swarm optimization algorithm. The invasive weed optimization (IWO) algorithm is a stochastic algorithm inspired by the colonial behavior of weeds that was first proposed in 2006 by Mehrabian and Lucas.

4/3/2019 5:59:38 AM +00:00

Security issues in protocols of TCP/IP model at layers level

The paper defines the functionality of each layer in TCP/IP model within the popular protocol for each. Then it investigates each protocol attack by covering their purposes and how they work. Overall, the objective of this research is to conclude which layer and protocol have become the biggest issues in TCP/IP layers.

4/3/2019 5:57:38 AM +00:00

Proposing a new model to improve alert detection in intrusion detection systems

In this article, a method has been presented in which the above mentioned shortcoming will be reduced by semantic expansion of alerts’ information. We will show that semantic expansion of alerts’ information based on background knowledge before clustering step leads to a much better clustering. DARPA dataset is used to evaluate the proposed method. Alerts’ detection rate will be more than 96%, which is better than similar approaches.

4/3/2019 5:57:24 AM +00:00

A-multi perspective and multi level analysis framework in network security situational awareness

Network Security Situation Awareness (NSSA) knowledge has been comprehensively studied in multi-data analyzing research these years. NSSA is a conception pertinent to assessing and showing the global and comprehensive situation of network security, so it requires people to collect all kinds of data and analysis for as many dimensions as possible in order to reflect the macroscopic pictures.

4/3/2019 5:53:34 AM +00:00

A prototype multiview approach for reduction of false alarm rate in network intrusion detection system

This system clearly analyzed both destination feature data set and source data set. After so many experiments, we are able to achieve 97% reduction of false alarm rate which significantly improves the efficiency.

4/3/2019 5:53:18 AM +00:00

Cần thay đổi giải pháp bảo mật thông tin trong kỷ nguyên số

Trong kỷ nguyên Internet kết nối vạn vật (IoT), tình hình an ninh thông tin có nhiều diễn biến phức tạp, với nhiều cuộc tấn công mạng quy mô lớn. Vấn đề an toàn, an ninh mạng đang dần mang thêm màu sắc chính trị, với sự gia tăng theo cấp số nhân của các mối đe dọa về mất an toàn thông tin, khiến các hệ thống bảo mật truyền thống không thể đáp ứng kịp. Vì vậy, sự thay đổi về giải pháp bảo mật thông tin trong tương lai là hết sức cần thiết.

4/3/2019 1:42:32 AM +00:00

Giáo trình An toàn bảo mật dữ liệu: Phần 2

Nối tiếp phần 1 của giáo trình An toàn bảo mật dữ liệu phần 2 tiếp tục trình bày các nội dung chính sau: Các thuật toán cơ bản trong mật mã khóa công khai bao gồm các các hệ mật RSA, MerkleHellman, Rabin, ElGamal, hệ mật trên đường cong Elliptic và hệ mật McEliece, hàm băm và chữ ký số, các ứng dụng trong việc xác thực và đảm bảo tính toàn vẹn của dữ liệu. Mời các bạn cùng tham khảo.

4/2/2019 11:32:11 PM +00:00

Giáo trình An toàn bảo mật dữ liệu: Phần 1

Giáo trình An toàn bảo mật dữ liệu: Phần 1 trình bày một số khái niệm, định nghĩa cơ bản và cơ sở lý thuyết thông tin áp dụng cho các hệ mật mã khóa bí mật, các thuật toán mật mã khóa bí mật bao gồm các thuật toán hoán vị, thay thế và các thuật toán kết hợp mà chủ yếu là DES và AES. Mời các bạn cùng tham khảo.

4/2/2019 11:31:17 PM +00:00

Simplified tcp based communication approach towards domain name system for improving security

By exploiting this vulnerability the attacker can launch different types of attacks like Cache Poisoning, DNS Spoofing, Protocol corruption, Zone corruptions, Session Hijacking, etc. Although the use of UDP makes the system faster, ye, it is suggested that all DNS based communications should be TCP based rather than UDP.

4/2/2019 11:26:24 PM +00:00

Based on HDFS safety measures construction of secret storage cloud

In this paper, we propose an architecture of enforcing security services on the layer of HDFS, including Data Isolation Service, Secure IntraCloud Data Migration Service, and Secure Inter-Cloud Data Migration Service. Finally, a prototype has been implemented based on HDFS by our three custom security policies, and the time cost is given and evaluated.

4/2/2019 11:25:18 PM +00:00

Key frame extraction from videos - a survey

This paper carries out an extensive survey of different key frame extraction techniques along with their merits and demerits used in current video retrieval application.

4/2/2019 11:22:29 PM +00:00

Event correlation in network security to reduce false positive

This paper gives an overview of data mining field & security information event management system. We will see how various data mining techniques can be used in security information and event management system to enhance the capabilities of the system.

4/2/2019 11:22:07 PM +00:00

Private vs public cloud

The main objective of the Private Cloud Hosting platforms is to optimize IT resources involved in the cycle of corporate provisioning, delivery, monitoring and control of business-critical applications: the elasticity of supply storage, processing and networking, on-demand access to systems, self-provisioning by the user or workgroup, through a centralized management dashboard unified system administrators, workgroup managers and end users.

4/2/2019 11:20:17 PM +00:00

An overview of acoustic side channel attack

This paper focuses on acoustic side-channel attack and surveys the methods and techniques employed in the attack; we will also see some of the different devices which can be under the threat of such attack and finally countermeasures against this attack, which helps in reducing the risk.

4/2/2019 11:18:47 PM +00:00

A study on author identification through stylometry

Stylometry is not only identifying a writing pattern but we can also identify the gender of the human. So this document discussed about identification of author, authentication through stylometry technique. In this paper different stylometric techniques are discussed.

4/2/2019 11:18:14 PM +00:00

Classification of ddos attacks and their defense techniques using intrusion prevention system

This paper examines how the Network Management Systems could aid in the detection of the DDoS attacks so that the losses from these could be minimized. The classifications of DDoS Attacks and their Defense Techniques have been classified in this paper to have a close look at the DDoS Problem and its severity.

4/2/2019 11:17:06 PM +00:00

Design of intrusion detection system based on artificial neural network and application of rough set

Selection of the most relevant features is very important for this and concept of Rough Set has been applied for selection of the most relevant features. Effects of minimization of input features for the signatures, through use of Rough Set for Detection of Intrusions in a network, have been studied in this research paper.

4/2/2019 11:15:35 PM +00:00

Examining a pipelined approach for information extraction with respect to machine learning

In this paper we discuss an active learning strategy for pipelining of an important natural language processing task i.e. information extraction.

4/2/2019 11:13:37 PM +00:00

Hacking of passwords in windows environment

This paper presents in depth research of the password storage mechanisms implemented in various versions of Windows and various application software and can be exploited by hackers.

4/2/2019 11:12:25 PM +00:00

A review of DNA based block cipher

To counteract the advantages and the weaknesses of DNA-Based cryptographic, we are to discuss and provide a thorough description of the cryptography algorithm of DNA-Based cryptographic, the uniqueness of the algorithm, the safety of algorithms and also a review of analysis on the performance of DNA-based algorithms with DNA characteristics.

4/2/2019 11:05:12 PM +00:00