Search results for "Security"
showing 10 items of 1693 documents
Towards Modelling Information Security with Key-Challenge Petri Nets
2009
Our global information society is based on distributed wide-area networks. Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network-accessible resources from unauthorized access, as well as continuous monitoring and measurement of the network security's effectiveness. In this paper, we describe the use of Petri nets in modelling network security. We propose a new hierarchical method for modelling network attacks and evaluating effectiveness of the corresponding defences. Our model is called Key-Challenge Petri Net (KCPN).
Towards a relation oriented service architecture
2010
Over the past three decades, the Internet has evolved from a point to point, open, academic network to an applications and services oriented critical infrastructure. The Internet has become a vital component of society today, from its simple origin as an academic research project. During this transition, numerous applications and usages of the network emerged that cannot be efficiently implemented by adhering to the original design tenets of the Internet. Some of the tenets have been broken, others diluted and new ones are emerging to accommodate new paradigms. Moreover, applications and services have been moving slowly but consistently towards a uniform model based on Service Oriented Appr…
Two tiered privacy enhanced intrusion detection system architecture
2009
The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.
A trust-based security enforcement in disruption-tolerant networks
2017
We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.
Feasibility of FPGA accelerated IPsec on cloud
2018
Abstract Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurre…
Learning Temporal Regularities of User Behavior for Anomaly Detection
2001
Fast expansion of inexpensive computers and computer networks has dramatically increased number of computer security incidents during last years. While quite many computer systems are still vulnerable to numerous attacks, intrusion detection has become vitally important as a response to constantly increasing number of threats. In this paper we discuss an approach to discover temporal and sequential regularities in user behavior. We present an algorithm that allows creating and maintaining user profiles relying not only on sequential information but taking into account temporal features, such as events' lengths and possible temporal relations between them. The constructed profiles represent …
β-delayed neutron emission of r-process nuclei at the N = 82 shell closure
2021
This experiment was performed at RI Beam Factory operated by RIKEN Nishina Center and CNS, University of Tokyo. O.H, T.D, P.J.W, C.G.B, C.J.G and D.K would like to thank STFC, UK for support. This research was sponsored in part by the Office of Nuclear Physics, U.S. Department of Energy under Award No. DE-FG02-96ER40983 (UTK) and DEAC05-00OR22725 (ORNL), and by the National Nuclear Security Administration under the Stewardship Science Academic Alliances program through DOE Award No. DENA0002132. This work was supported by National Science Foundation under Grants No. PHY-1430152 (JINA Center for the Evolution of the Elements), No. PHY-1565546 (NSCL), and No. PHY-1714153 (Central Michigan Uni…
Numerical modelling of out-of-plane response of infilled frames: State of the art and future challenges for the equivalent strut macromodels
2017
Abstract Infill-frame interaction constitutes a still open question both in research and in practicing engineering. Computational models used to predict this interaction are, in most cases, addressing the estimation of the response of the infilled frames when subjected to actions parallel to their plane. However, the observation of the post-earthquake damage has demonstrated that infills, weakened by the in-plane actions, may fail out-of-plane increasing the risks associated to the earthquake scenarios. In spite of this, different studies have shown that infills, if properly designed and supported by the frame, exhibit a significant strength and displacement capacity when called to resist t…
Food insecurity and physical multimorbidity among adults aged ≥ 50 years from six low- and middle-income countries
2022
Abstract Purpose Food insecurity and multimoribidity (i.e., ≥ 2 chronic conditions) may be linked bidirectionally, but there are no studies on this topic from LMICs. Therefore, the aim of the present study was to examine the association between food insecurity and physical multimorbidity in a large representative sample of older adults from six LMICs. Methods Cross-sectional, community-based data on adults aged ≥ 50 years from the World Health Organization’s Study on Global AGEing and Adult Health (SAGE) conducted in China, Ghana, India, Mexico, Russia, and South Africa were analyzed. A total of 11 chronic physical conditions were assessed. Past 12 month food insecurity was assessed with tw…
Mobile agents principles of operation
2004
Publisher Summary This chapter discusses the mobile agent technology and summarizes their features, principles of operation and implementation elements. Some development tools are also discussed. The chapter provides general description of mobile agents as an advanced software paradigm, which extends object oriented programming. Then it discusses principles of operation starting from agent intelligent behavior and continuing with mobility, communication, coordination, and fault tolerance. Finally, as for related topics, monitoring, performances, and security issues are discussed in the chapter. Agent monitoring techniques are very useful because they allow users to know which agents are run…