2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.4 No.4 2010.11 pp.1-16
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The development of next generation protocols, such as UDT (UDP-based data transfer), promptly addresses various infrastructure requirements for transmitting data in high speed networks. However, this development creates new vulnerabilities when these protocols are designed to solely rely on existing security solutions of existing protocols such as TCP and UDP. It is clear that not all security protocols (such as TLS) can be used to protect UDT, just as security solutions devised for wired networks cannot be used to protect the unwired ones. The development of UDT, similarly in the development of TCP/UDP many years ago, lacked a well-thought security architecture to address the problems that networks are presently experiencing. This paper proposes and analyses practical security mechanisms for UDT.
Evaluation of Interference in Inter-working Multi-hop Wireless Networks
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.4 No.4 2010.11 pp.27-42
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The consequence of simultaneous transmissions by nodes in inter-working multi-hop wireless networks is inter-node interference. Inter-node interference is a metric that is important for the performance evaluation of inter-working wireless networks. Several interference models exist in literature, however, these models are for specific wireless networks and MAC protocols. Due to the heterogeneity of link-level technologies in interworking multi-hop wireless networks, it is desirable to have generic models for the evaluation of interference on links in such networks. A generic model can provide information about the interference level on a link irrespective of the MAC protocol in use. This paper presents a generic interference model. The model evaluates the probability of interference and uses the negative second moment of the distance between a receiver-node and interfering-nodes to evaluate the interference power on a link in an inter-working multi-hop wireless network. Numerical results of the performance of the model are presented.
A Novel approach for Evil Twin or Rogue AP mitigation in wireless environment
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.4 No.4 2010.11 pp.33-38
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Evil Twin is a term for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up by a hacker to eavesdrop on wireless communications among Internet surfers.[1] The phony Access point, with suspicious intentions broadcasts the Service Set IDentifier (SSID) the same as the legitimate network or Access Point, which diverts the network traffic indented for the real AP towards the phony AP, which in turn can steal sensitive information from the client side. Here in this paper, a simple approach is introduced which uses, Wireless Connection Session DataBase, where a system database file can be configured on the client and server side (gateway of real AP), to maintain a track record of successful sessions between trusted systems to identify the credentials of the AP and hence makes it possible to identify the fake Access point, with a very simple approach, without any modifications at the infrastructure or the hardware.
Online Self-Diagnosis Self-Recovery Infrastructure for Embedded Systems
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.4 No.4 2010.11 pp.39-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Complexity of monolithic kernel of existing operating systems results in security exploits inevitably. When it is compromised, manual recovery from kernel-level attacks is usually time-consuming. The whole process is expected to be automatic and supported in system level. The requirement becomes more necessary for modern embedded systems, which lack such administrative and recovery tools for end users comparing with PC. We implement a prototype system called OSKROD to support system automatic recovery. OSKROD can take a collection of actions to recover infected kernel, after detecting kernel-level attacks infections based on system virtualization technique. Moreover, it can operate in two working modes : periodic mode and request-service mode, which can be fit in various application scenarios. Its recovery has been proved effective in fault injection experiments against real world attacks. The results indicate that it can correctly detect several kernel-level security attacks and recover the system with acceptable penalty to system performance.
Secure RGB Image Steganography from Pixel Indicator to Triple Algorithm-An Incremental Growth
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.4 No.4 2010.11 pp.53-62
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper we have investigate two methods of RGB image steganography one is pixel indicator technique and other is triple-A algorithem. They uses the same principle of LSB, where the secret is hidden in the least significant bits of the pixels, with more randomization in selection of the number of bits used and the color channels that are used. This randomization is expected to increase the security of the system and also increase the capacity. These techniques can be applied to RGB images where each pixel is represented by three bytes to indicate the intensity of red, green, and blue in that pixel. This work showed attractive results especially in the capacity of the data-bits to be hidden with relation to the RGB image pixels.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.