Tài liệu miễn phí An ninh - Bảo mật

Download Tài liệu học tập miễn phí An ninh - Bảo mật

Infrared sensor and FBUS technology for house security system based on mobile phone

This security system work based on the ability to receive signal from port LPT1 of printer and the ability to use modem as comunication device. Port LPT1 will detect the signal that sent from infrared receptor through status register. If computer detect any signal then computer will send short messages to the recipient, police or user by phone number that the data taken from data base, so police can immediately come and secure the place.

4/2/2019 11:04:38 PM +00:00

Evaluation of security function of flipora plug-in on browsers

In this research, Flipora plug-in was installed on different browsers. Security evaluation and analysis were performed on the function performance of this plug-in in upon. User traffics that were sent from the browser when during visiting and opening various web pages were evaluated and analyzed. In our simulation, we show that what confidential information will be sent to the intended destination by Flipora plug-in that which was installed on Firefox browser.

4/2/2019 11:04:12 PM +00:00

An enhanced data security with compression for manets

In this paper, we propose a novel secured compression algorithm for an ad hoc network in which the packets are encrypted and compressed. The decompression and decryption using the same algorithm happens by a perfect synchronization between the sender and the receiver. It is observed that the proposed security concept may increase the level of confidence in this network.

4/2/2019 10:59:20 PM +00:00

Wireless local area network security enhancement through penetration testing

This paper presents a security solution for WLANs to achieve the standard network security requirements while combines the stability and low cost. The proposed solution works in two levels, namely, the frame security and the Radio Frequency (RF) security.

4/2/2019 10:57:58 PM +00:00

A comprehensive approach to security requirements engineering

This research aims to define an approach as comprehensive as possible, incorporating the strengths and best practices found in existing approaches, and filling the gaps between them. To achieve that, relevant literature reviews were studied and primary approaches were compared to find their common and divergent traits. To guarantee comprehensiveness, a documented comparison process was followed.

4/2/2019 10:54:10 PM +00:00

Segmentation and classification customer payment behavior at multimedia service provider company with K-Means and C4.5 algorithm

This research use model with join k-means segmentation and C4.5 classification algorithm because C4.5 weaknesses in difficulty to choose attributes. Be proven that extract customer potential attributes with k-means can help to increase C4.5 classification algorithm’s accuracy. This thing proved from the model accuracy increment from 59.02% to 77.31% and AUC from 0.537 to 0.836. Customer potential level can also be the reference in promotion, retention, and prevention of insolvency customer.

4/2/2019 10:53:57 PM +00:00

Secured and centralized identification system of subscribers with mobile networks: The case of senegal

In Senegal, the identification is a matter of national security. For the best regulation of subscribers, we suggest a platform of secured and centralized identification integrating advanced technologies which will on the run put an end to the unregulated sale of chips.

4/2/2019 10:52:52 PM +00:00

Expand the quantum cipher-text space by using a superposition key

In this paper an improvement of quantum encryption algorithm based on superposition state is proposed. The whole process including the encryption algorithm where the superposition state and bit-swapping are introduced, makes the quantum ciphertext space to expand broadly and allows the transmission of the necessary information and the decryption that is illustrated here.

4/2/2019 10:51:23 PM +00:00

A new approach for healthcare information and communication systems

Details about the implementation and analysis of our solution are also presented. Our approach takes the purpose of use into consideration, guarantees the citizen’s consent, resists dictionary attacks, respects the least privilege principle and thus fulfills the European legislation requirements. Even if our approach is applied in this paper to healthcare examples, it could also be suitable to every system with security and privacy needs.

4/2/2019 10:50:59 PM +00:00

Monitoring and analyzing system activities using high interaction honeypot

This is what distinguishes it from traditional intrusion detection systems. Still Denial of Service (DoS) attacks pose a major challenge in the online world to this day. DoS attacks characterized by many features such as easy to launch, and a large-scale, used by novices to the presence of tools based attacks .Therefore, most of the research’s concerned with disclosure of denial of service attacks. In this work a high interaction honeypot is designed to detect Denial of Service attacks by analyzing packets and extracting their features, by applying one of decision tree algorithm (C4.5) to detect attacks.

3/24/2019 11:53:31 PM +00:00

Eloba chaotic keystream cipher: implementation, analysis and performance

In our paper, we describe eLoBa architecture, based on Lorenz chaotic system. We also analyze one important security issue of keystream cryptographic systems, the cycle length. Finally, we compare eLoBa against several cryptographic systems, for its performance on a authentication service implementation on a resource constraint smart-card.

3/24/2019 11:52:39 PM +00:00

A fuzzy model for network intrusion detection

The network intrusion becomes ever growing problem. The complexity present in the collected network data set is absence of clear boundary between anomaly connection and normal connection. However fuzzy logic can well address this problem. In earlier works, combining fuzzy logic and data mining to develop fuzzy rules are explored to address this problem. In this paper, a new fuzzy model is developed to detect anomaly connections. The developed model is tested with NSLKDD data set. The model gives better result.

3/24/2019 11:51:55 PM +00:00

Secure mutual authentication protocol

In this paper, we have proposed a Secured password based mutual authentication protocol for client-sever computing using elliptic curve cryptography. The proposed framework provides mutual authentication and session key agreement in client-sever environment. It provides secure communication between client and server with help of user email-id and mobile phone as authentication device for mobile hand held device.

3/24/2019 11:51:45 PM +00:00

Hybrid approach using intrusion detection system

In this research article, we have proposed a new technique that will tackle with all these different intrusion attacks. We propose a hybrid kind of approach that might be useful while facing these vicious network intrusion attacks.

3/24/2019 11:51:18 PM +00:00

Securing patient privacy in e health cloud using homomorphic encryption and access control

In this paper, a Secured e-Health System called SECHA is proposed. SECHA comprises of five basic component namely; patient, PHR/object, Access Control Module, User/Subject and Cloud. This proposed system ensure the security of electronic health records stored in the cloud using Homomorphic Encryption to secure patients medical records and Bilayer Access Control to gives access right to the records.

3/24/2019 11:49:35 PM +00:00

Management of confidentiality of cryptosystems using linear codes a bird’s eye view

In this paper, we investigate the management of confidentiality in terms of security notions of McEliece cryptosystem, the first encryption scheme using linear codes, proposed on the basis of the hard problems in coding theory and its variants in the provably secure approach. The original McEliece is only a one way function. Therefore to obtain the higher notions of security, modifications on the original scheme are proposed.

3/24/2019 11:48:07 PM +00:00

Use of decision trees and attributional rules in incremental learning of an intrusion detection model

In this paper, we propose a Learnable Model for Anomaly Detection (LMAD), as an ensemble real-time intrusion detection model using incremental supervised machine learning techniques. Such techniques are utilized to detect new attacks. The proposed model is based on making use of two different machine learning techniques, namely, decision trees and attributional rules classifiers.

3/24/2019 11:47:53 PM +00:00

Advanced entry level protection system for theft

In this project, the microcontroller used is PIC 16, where it sends data to the computer to activate the camera when the microcontroller receives signals from PIR. MAX232 is used as an interface circuit connecting the microcontroller to the computer. To develop software for the control circuits, software MATLAB is used because the software supports microcontroller PIC 16.

3/24/2019 11:47:19 PM +00:00

Vehicle classification using novel edge detection technique

In this paper we classify the vehicles into three main broad categories: A) Light vehicle B) Medium Vehicle C) Heavy Vehicle. Firstly, the image pre-processing is done with the gray-scale conversion and filtering of the image. Then with the help of fuzzy logic based novel edge detection technique we detect the edges to get the shape and size of the vehicle and classify the vehicle.

3/24/2019 11:43:54 PM +00:00

Perfection of recent attacks using IP

In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code), to targeted networks. Mời các bạn tham khảo!

3/24/2019 11:43:32 PM +00:00

Ebook Hướng dẫn cách phòng thủ và khắc phục sự cố khi máy vi tính bị tấn công: Phần 2 - NXB Hồng Đức

Kết nối phần 1, phần 2 sách trình bày về: Tấn công và phòng thủ với máy tính chạy Linux. Bạn cần phải học cách phòng thủ và khắc phục sự cố khi máy vi tính bị tấn công bởi vì kể từ thời điểm chiếc máy tính của bạn bắt đầu khởi động cho tới khi bạn tắt máy đi, nó sẽ là một mục tiêu có thể bị tấn công. Các con virus, keystroke logger, phần mềm do thám, những chương trình bẻ khóa và các script (kịch bản) có hại đang chực sẵn bên ngoài chỉ trực chờ một kẽ hở để tiến đến.

3/24/2019 10:35:34 PM +00:00

Ebook Hướng dẫn cách phòng thủ và khắc phục sự cố khi máy vi tính bị tấn công: Phần 1 - NXB Hồng Đức

Tác giả Hà Thành đã biên soạn cuốn sách tin học Hướng dẫn cách phòng thủ và khắc phục sự cố khi máy vi tính bị tấn công một cách tỉ mỉ về các trường hợp gây hại, cách phòng thủ và tấn công với hình ảnh minh họa cụ thể, ví dụ trực quan cùng nội dung súc tích, dễ hiểu, cho bạn đọc dễ dàng thực hành. Phần 1 sách với nội dung: Tự học cách tấn công và phòng thủ với máy vi tính chạy windows, mời các bạn cùng tìm hiểu.

3/24/2019 10:34:45 PM +00:00

The security of information in financial transactions via mobile: Algorithms

Toolkit SIM applications are identified and described in this article based on a systematic review. In addition, there are some recommendations regarding to suit different situations to implement a particular algorithm for this issue. More results are subsequently explained in this paper.

3/14/2019 10:56:10 PM +00:00

An advance security technique challenges to government in wireless sensor network for health

In this paper, we outline prototype systems spanning application domains from physiological and activity monitoring the urban and rural hospitals and behavioral works and emphasize ongoing treatment challenges to the patient day to day and that information will be available in centrally. Then any moments the higher authorities can able to verify.

3/14/2019 10:55:09 PM +00:00

Cryptosystem an implementation of RSA using verilog

In this paper, we present a new structure to develop 64-bit RSA encryption engine on FPGA that can be used as a standard device in the secured communication system. The RSA algorithm has three parts i.e. key generation, encryption and decryption. The algorithm also requires random prime numbers so a primality tester is also design to meet the needs of the algorithm. We use right-to-left-binary method for the exponent calculation.

3/14/2019 10:53:54 PM +00:00

DOS attacks on TCP/IP layers in WSN

In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of the major threats against WSN security. Further, various DoS attacks on different layers of OSI are proposed.

3/14/2019 10:46:16 PM +00:00

Various authentication tecniques for security enhancement

Keeping in the view, the importance of the authentication systems, we analyze various authentication techniques in our paper. And try to find out various advantages and disadvantages of various authentication systems. This paper gives the emphasis on the various issues involved in the various authentication techniques.

3/14/2019 10:45:10 PM +00:00

Intrusion detection system based on 802.11 specific attacks

The resulting detectors were efficient and accurate in detecting network attacks at the network and transport layers, but unfortunately, not capable of detecting 802.11-specific attacks such as deauthentication attacks or MAC layer DoS attacks.

3/14/2019 10:44:43 PM +00:00

Intelligent public transport system with information forensics and security

In this System passenger can get information about all buses, routes, timings of buses and all stops in any particular route. This system includes two phases. One is for user and other for administrator. At user side, user can request for information about all buses, routes, timings of buses and all stops in any particular route using Wi-Fi or GPRS technology from his mobile or PDA.

3/14/2019 10:40:54 PM +00:00

A practical and extendible vanets privacypreserving system

In this paper, we introduce a practical VANETs Privacy-Preserving System which aims to the prior location and identity privacy protecting. We propose the architecture and do some close analysis about that.

3/14/2019 9:54:56 PM +00:00