Search results for "Cyber security"
showing 10 items of 30 documents
Knowledge Discovery from Network Logs
2015
Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. peerReviewed
Towards better privacy preservation by detecting personal events in photos shared within online social networks
2015
Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…
Cyber Security for Wireless Semantic (SCADA/DCS) Systems
2016
International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …
Strategic leadership in cyber security, case Finland
2020
Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…
Kiberdrošības politiku salīdzinājums Baltijas valstīs
2017
Darbā tiek aplūkota un salīdzināta Latvijas, Lietuvas un Igaunijas situācija kiberdrošības jomā, lai noskaidrotu, vai un cik lielā mērā starp trim Baltijas valstīm pastāv atšķirības kiberdrošības politikas instrumentu attīstībā. Drošībošanas koncepta ietvaros tiek pārbaudīts, vai 2007. gada kiberuzbrukumus Igaunijai var uzskatīt par sekmīgi veiktu drošībošanas procesu. Izanalizējot pieejamo informāciju, tiek secināts, ka Igaunijas gadījums nav attiecināms uz drošībošanas teorijas ietvaru. Tomēr kiberuzbrukumi Igaunijā ir veicinājuši kiberdrošības koncepta attīstību Igaunijā. Darba nobeigumā tiek secināts, ka nav pamata apgalvot, ka Igaunijā šobrīd ir sasniegts ievērojami lielāks progress ki…
SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications
2020
Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…
A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks
2020
Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…
Digital Technologies for Transport and Mobility: Challenges, Trends and Perspectives
2020
This white paper aims at presenting the ideas emerging from the different fields pertaining to transport and mobility, to describe the capacities of current state-of-the-art digital technologies and the perspectives that are expected to shape the future of transport and mobility.
Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127
2014
International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…
Avoimen lähdekoodin alustojen sopivuus älykotiin
2017
Internet of Things kasvaa jatkuvasti ja sen eräs suurimmista sovelluskohteista on älykoti. IoT:n ongelmana on kuitenkin ollut keskimäärin erittäin huono tietoturva ja tämä on heijastunut myös älykoteihin esimerkiksi hakkeroituina kameroina ja itkuhälyttiminä. Toinen, älykodissa erityisen suuri ongelma on kerätyn tiedon yksityisyys. Tässä tutkielmassa kartoitetaan, kuinka hyvin avoimen lähdekoodin ohjelmistot soveltuvat toimivan ja turvallisen älykodin toteuttamiseen. Turvallisuuden osalta painopisteenä on erityisesti etäyhteys. Tutkimus toteutettiin konstruktiivisena tutkimuksena. Se ei käsittele yksittäisiä ohjelmistoja kovin syvällisesti, vaan sen tarkoituksena oli saada kattavahko yleisk…