Search results for "Cyber security"

showing 10 items of 30 documents

Knowledge Discovery from Network Logs

2015

Modern communications networks are complex systems, which facilitates malicious behavior. Dynamic web services are vulnerable to unknown intrusions, but traditional cyber security measures are based on fingerprinting. Anomaly detection differs from fingerprinting in that it finds events that differ from the baseline traffic. The anomaly detection methodology can be modelled with the knowledge discovery process. Knowledge discovery is a high-level term for the whole process of deriving actionable knowledge from databases. This article presents the theory behind this approach, and showcases research that has produced network log analysis tools and methods. peerReviewed

Actionable knowledgeKnowledge extractionComputer scienceProcess (engineering)cyber securityComplex systemAnomaly detectionDynamic web pageBaseline (configuration management)kyberturvallisuusData scienceTerm (time)
researchProduct

Towards better privacy preservation by detecting personal events in photos shared within online social networks

2015

Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…

CybersecurityDétection d’évènements[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Cyber SecurityEvent relationsData analysisRéseaux sociauxAnonymization[INFO] Computer Science [cs]Regroupement d’imagesRelations entre les évènementsCyber sécuritéPrivacy protection[INFO]Computer Science [cs]Protection de la vie privéeOnline social networksDétection d'évènementsMetadataAnonymisationIdentité numériqueAnalyse de donnéesOnline identityImage clustering[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]MétadonnéesSocial Networks[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]Event detection
researchProduct

Cyber Security for Wireless Semantic (SCADA/DCS) Systems

2016

International audience; Supervisory Control and Data Acquisition and Distributed Control Systems named (SCADA/DCS) have played a key role in the design of modern power smart applications, particularly in the automatic management of real time energetic platforms. In this work, we present a semantic cyber security vulnerabilities add to classic one, with the use of semantic embedded application in smart devices in semantic wireless (SCADA/DCS) systems, focusing on the semantic attacks. In this work, we present a new security semantic wireless protocol as a secure communication support for these modern semantic wireless systems named (ZIGBEE/SOAP/SECURITY), obtained by the combination between …

Engineeringcomputer.internet_protocolSOAP0211 other engineering and technologies[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Supervisory controlSecure communicationSCADAWireless Application ProtocolSemantic Wireless (SCADA/DCS)Wireless Security ProtocolProtocol (object-oriented programming)Semantic Cyber Security[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]021110 strategic defence & security studiesbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS021001 nanoscience & nanotechnology(ZIGBEE/SOAP/SECURITY) ProtocolControl and Systems EngineeringKey (cryptography)0210 nano-technologyDistributed control systembusinessSmart Energetic PlatformcomputerComputer network
researchProduct

Strategic leadership in cyber security, case Finland

2020

Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…

Information Systems and ManagementNational securitybusiness.industrystrateginen johtaminenComputer securitycomputer.software_genreCyber securityComputer Science ApplicationsStrategic leadershipKey (cryptography)strategic leadershiptietoturvakansallinen turvallisuusnational securitykyberturvallisuusbusinesscomputerComputingMilieux_MISCELLANEOUSSoftware
researchProduct

Kiberdrošības politiku salīdzinājums Baltijas valstīs

2017

Darbā tiek aplūkota un salīdzināta Latvijas, Lietuvas un Igaunijas situācija kiberdrošības jomā, lai noskaidrotu, vai un cik lielā mērā starp trim Baltijas valstīm pastāv atšķirības kiberdrošības politikas instrumentu attīstībā. Drošībošanas koncepta ietvaros tiek pārbaudīts, vai 2007. gada kiberuzbrukumus Igaunijai var uzskatīt par sekmīgi veiktu drošībošanas procesu. Izanalizējot pieejamo informāciju, tiek secināts, ka Igaunijas gadījums nav attiecināms uz drošībošanas teorijas ietvaru. Tomēr kiberuzbrukumi Igaunijā ir veicinājuši kiberdrošības koncepta attīstību Igaunijā. Darba nobeigumā tiek secināts, ka nav pamata apgalvot, ka Igaunijā šobrīd ir sasniegts ievērojami lielāks progress ki…

Politikas zinātne (politoloģija)securitizationcyber securitykibertelpakiberdrošībadrošībošana
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

Digital Technologies for Transport and Mobility: Challenges, Trends and Perspectives

2020

This white paper aims at presenting the ideas emerging from the different fields pertaining to transport and mobility, to describe the capacities of current state-of-the-art digital technologies and the perspectives that are expected to shape the future of transport and mobility.

White paperComputer sciencebusiness.industryLogisticSurface transportLogisticsAeronautics and aviationCurrent (fluid)Cyber securityTelecommunicationsbusinessAeronautics and aviation; Cyber security; Logistics; Surface transport
researchProduct

Ontology and protocol secure for SCADA: Int. J. of Metadata, Semantics and Ontologies, 2014 Vol.9, No.2, pp.114 - 127

2014

International audience; In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems. The proposed solution aims at protecting critical semantic SCADA processes from the effects of major failures and semantic vulnerabilities in the modern IT-SCADA network. We used a security block in the global network access point, security protocols deployed in different network (OSI) levels and security ontologies deployed in security devices. We used our mixed coordinates (ECC) cryptography solution, th…

[ INFO ] Computer Science [cs]security protocolsComputer sciencedata acquisition[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]020209 energy[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]Cryptography02 engineering and technologysemantic security blockLibrary and Information SciencesComputer securitycomputer.software_genreSOAP protocolSecurity information and event management[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI][INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]SCADAModbus protocolECC cryptography0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]SCADAcontrol systemsCloud computing securityvulnerabilitiesTOMSONbusiness.industryencryption technologyembedded applicationscyber securitysupervisory controlsemantic attacksCryptographic protocolComputer security modelsecurity ontologyComputer Science ApplicationsOSI modellow latencySecurity service020201 artificial intelligence & image processingbusinesscomputerInformation SystemsComputer network
researchProduct

Avoimen lähdekoodin alustojen sopivuus älykotiin

2017

Internet of Things kasvaa jatkuvasti ja sen eräs suurimmista sovelluskohteista on älykoti. IoT:n ongelmana on kuitenkin ollut keskimäärin erittäin huono tietoturva ja tämä on heijastunut myös älykoteihin esimerkiksi hakkeroituina kameroina ja itkuhälyttiminä. Toinen, älykodissa erityisen suuri ongelma on kerätyn tiedon yksityisyys. Tässä tutkielmassa kartoitetaan, kuinka hyvin avoimen lähdekoodin ohjelmistot soveltuvat toimivan ja turvallisen älykodin toteuttamiseen. Turvallisuuden osalta painopisteenä on erityisesti etäyhteys. Tutkimus toteutettiin konstruktiivisena tutkimuksena. Se ei käsittele yksittäisiä ohjelmistoja kovin syvällisesti, vaan sen tarkoituksena oli saada kattavahko yleisk…

avoin lähdekoodismart homecyber securitykodintekniikkaälytekniikkaesineiden internetkyberturvallisuusinternet of thingsKonstruktiivinen tutkimus
researchProduct