Search results for "Computer security"

showing 10 items of 433 documents

Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context

2021

Machine Learning (ML) has been taking significant evolutionary steps and provided sophisticated means in developing novel and smart, up-to-date applications. However, the development has also brought new types of hazards into the daylight that can have even destructive consequences required to be addressed. Evasion attacks are among the most utilized attacks that can be generated in adversarial settings during the system operation. In assumption, ML environment is benign, but in reality, perpetrators may exploit vulnerabilities to conduct these gradient-free or gradient-based malicious adversarial inference attacks towards cyber-physical systems (CPS), such as smart buildings. Evasion attac…

ExploitComputer sciencebusiness.industryCyber-physical systemevasion attacksEvasion (network security)Context (language use)Adversarial machine learningComputer securitycomputer.software_genreadversarial machine learningdefensive mechanismscyber-physical systemAdversarial systemSmart lockkoneoppiminenälytekniikkabusinesskyberturvallisuuscomputerverkkohyökkäyksetBuilding automation
researchProduct

Eliciting Information on the Vulnerability Black Market from Interviews

2010

Threats to computing prompted by software vulnerabilities are abundant and costly for those affected. Adding to this problem is the emerging vulnerability black markets (VBMs), since they become places to trade malware and exploits. VBMs are discussed based on information derived from interviews with security researchers. The effort is enriched by further examination of documents surrounding the disclosure of four selected vulnerabilities cases. The result suggests that the VBMs is bifurcated into two distinct parts; the skilled-hacker and the script-kiddie VBMs with a possible link between them, where the latter become places to sell malware or exploit kits after the zero day vulnerability…

ExploitComputer sciencebusiness.industryInternet privacycomputer.software_genreComputer securitySoftware qualityElectronic mailComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSMalwareBlack marketbusinesscomputerZero-day attackVulnerability (computing)2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

A Study of a Social Behavior inside the Online Black Markets

2010

Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …

Exploitbusiness.industryComputer scienceInternet privacycomputer.software_genreComputer securitySoftwareMalwareThe InternetBlack marketbusinessCyberspacecomputerCyber threats2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

NATO Advanced Research Workshop on Explosives Detection

2019

As of 2017, there are an estimated 100 million abandoned land mines littered across 61 countries. Following the wars in Afghanistan, Libya, Syria, Yemen, and Ukraine, there has been a rise in casualties due to the triggering of previously-abandoned explosive devices. The above institutions combined specialties to develop a remotely-operable, multisensor, robotic device for the detection of land mines, UXO (1), and IEDs (2). The robotic detection device uses novel subsurface radar with imaging and target classification to differentiate between threatening landmines and innocuous clutter. The expected outcome of this research is the creation of a multi-sensor system on a semi-autonomous vehic…

Explosive materialComputer sciencelawExplosive detectionClutterRadarAutonomous system (mathematics)Computer securitycomputer.software_genrecomputerlaw.invention
researchProduct

Active and inactive quarantine in epidemic spreading on adaptive activity-driven networks

2020

We consider an epidemic process on adaptive activity-driven temporal networks, with adaptive behaviour modelled as a change in activity and attractiveness due to infection. By using a mean-field approach, we derive an analytical estimate of the epidemic threshold for SIS and SIR epidemic models for a general adaptive strategy, which strongly depends on the correlations between activity and attractiveness in the susceptible and infected states. We focus on strong social distancing, implementing two types of quarantine inspired by recent real case studies: an active quarantine, in which the population compensates the loss of links rewiring the ineffective connections towards non-quarantining …

FOS: Computer and information sciences2019-20 coronavirus outbreakAdaptive strategiesPhysics - Physics and SocietyComputer scienceSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)PopulationFOS: Physical sciencesPhysics and Society (physics.soc-ph)Computer securitycomputer.software_genre01 natural sciences010305 fluids & plasmaslaw.inventionlawActive phase0103 physical sciencesQuarantinesusceptible-infected-recovered (SIR)010306 general physicseducationCondensed Matter - Statistical MechanicsAdaptive behaviorSocial and Information Networks (cs.SI)education.field_of_studyStatistical Mechanics (cond-mat.stat-mech)Computer Science - Social and Information Networksepidemic modelsusceptible-infected-susceptible (SIS)Epidemic modelcomputer
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

Disrupting resilient criminal networks through data analysis: The case of Sicilian Mafia

2020

Compared to other types of social networks, criminal networks present hard challenges, due to their strong resilience to disruption, which poses severe hurdles to law-enforcement agencies. Herein, we borrow methods and tools from Social Network Analysis to (i) unveil the structure of Sicilian Mafia gangs, based on two real-world datasets, and (ii) gain insights as to how to efficiently disrupt them. Mafia networks have peculiar features, due to the links distribution and strength, which makes them very different from other social networks, and extremely robust to exogenous perturbations. Analysts are also faced with the difficulty in collecting reliable datasets that accurately describe the…

FOS: Computer and information sciencesEconomicsComputer science0211 other engineering and technologiesSocial SciencesCriminology02 engineering and technologycomputer.software_genreSocial NetworkingSociologyStatistics - Machine LearningCentralityCriminals; Humans; Sicily; Social NetworkingSicilySocial network analysisHuman CapitalMultidisciplinarySettore INF/01 - InformaticaQ05 social sciencesRComputer Science - Social and Information NetworksPoliceProfessionsSocial NetworksMedicineCrimeNetwork AnalysisResearch ArticleNetwork analysisComputer and Information SciencesScienceMachine Learning (stat.ML)Computer securityNetwork ResilienceHuman capitalBetweenness centralityHumansResilience (network)0505 lawBlock (data storage)Social and Information Networks (cs.SI)021110 strategic defence & security studiesSocial networkbusiness.industryNode (networking)CriminalsCommunicationsPeople and Places050501 criminologyPopulation GroupingsCentralitybusinesscomputer
researchProduct

Blockchain-Based Proof of Location

2016

Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.

FOS: Computer and information sciencesScheme (programming language)Computer Science - Cryptography and SecurityBlockchainbusiness.industryComputer science020206 networking & telecommunicationsCryptographyContext (language use)02 engineering and technologyComputer securitycomputer.software_genreUser privacyTrustworthinessComputer Science - Distributed Parallel and Cluster Computing020204 information systemsServerC.2.40202 electrical engineering electronic engineering information engineeringPeer to peer computingDistributed Parallel and Cluster Computing (cs.DC)businessCryptography and Security (cs.CR)computercomputer.programming_language2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
researchProduct

Design of a virtual instrument for water quality monitoring across the Internet

2001

Abstract This article presents the design of a new distributed and multi-platform system for water quality monitoring, enhanced with powerful Internet capabilities. The measured variables are temperature, turbidity, pH, dissolved oxygen, and electrical conductivity. The signal-conditioning block has been simplified through the use of software routines for thermal compensation, hence, reducing the cost and dimensions. The system offers a wide variety of Internet capabilities, like e-mail alarm notifications, automatic storage of measured data in a remote machine via the FTP protocol, dynamic generation of HTML reports, real time graphs, and indicators visible from a remote web browser, etc. …

File Transfer ProtocolVirtual instrumentationbusiness.industryComputer scienceReal-time computingPrincipal (computer security)Metals and AlloysProcess (computing)Condensed Matter PhysicsClasses of computersSurfaces Coatings and FilmsElectronic Optical and Magnetic MaterialsSoftwareMaterials ChemistryThe InternetElectrical and Electronic EngineeringbusinessInstrumentationBlock (data storage)Sensors and Actuators B: Chemical
researchProduct