Research Article Worms Propagation Modeling and Analysis in Big Data Environment
|
|
- Abel Goodwin
- 8 years ago
- Views:
Transcription
1 Distributed Sensor Networks Volume 2015, Article ID , 8 pages Research Article Worms Propagation Modeling and Analysis in Big Data Environment Song He, 1 Can Zhang, 2,3 Wei Guo, 3 and Li-Dong Zhai 3 1 School of Management and Economics, Beijing Institute of Technology, Beijing , China 2 North China Electric Power University, Baoding , China 3 Institute of Information Engineering, Chinese Academy of Sciences, Beijing , China Correspondence should be addressed to Li-Dong Zhai; zhailidong@iieaccn Received 5 August 2014; Accepted 16 November 2014 Academic Editor: Qingquan Zhang Copyright 2015 Song He et al This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited The integration of the Internet and Mobile networks results in huge amount of data, as well as security threat With the fragile capacity of security protection, worms can propagate in the integration network and undermine the stability and integrity of data ThepropagationofwormisagreatsecurityrisktomassiveamountsofdataintheintegrationnetworkWeproposeakindofworm propagating in big data environment named BD-Worm BD-Worm consumes computing resources and gets privacy information of users, which causes huge losses to our working and living This paper constructs an integration network topology model and designs the BD-Worm propagating in the big data environment To analyze the propagation of BD-Worm, we conduct a simulation and provide some recommendations to contain the widespread of BD-Worm according to the simulation results 1 Introduction The popularity of mobile intelligent terminal brings great convenience to people s lives Mobile shopping, mobile banking, mobile social network, mobile maps, and other applications provide users with a variety of services However, the convenience also brings up a security risk Mobile phones store a lot of privacy information including contacts, SMS, bank accounts, social network accounts, and geographic information Network attackers steal the user s private information to make correlation analysis and engage in illegal activities, which violates user s privacy The integration of the Internet and Mobile networks has brought great convenience for us The increasing number of mobile devices causes explosive growth of the amount of data in integration network While the high-speed development of the integration network brings people into the era of big data, it also brings some data security problems, such as theft and leakage of privacy data and sensitive data [1] As a kind of malicious program that can infect large amount of hosts in short time, worm is exploited by network attacker We name the worms destroying data security in integration network as BD-Worm, which takes advantage of the weak security protection ability, propagates in a large area in the network, and destroys the stability and security of data Here, BD-Worm constitutes one of the major network data security problems because of the integration of the Internet and Mobile network In order to ensure the massive data are much safer, we should analyze the propagation mechanism of BD-Worm firstly and then provide effective protection strategies against its propagation characteristics This paper constructs an integrated network topology and simulates the propagation of BD-Worm The worm propagates by files attached with malicious code Considering the differences between computerandmobileintelligentterminaloperatingsystem, worm propagation in different operation system needs cross different protocol The paper chooses files supported by a variety of operating systems as virus vector The formats of suchfilesincludetxtandmp3onceuseropensthefile attached with worm code, the worm will be activated, will copy itself, and will attach other files with BD-Worm
2 2 Distributed Sensor Networks The remaining sections of the paper are organized as follows Section 2 introduces related work Modeling of BD-Worm will be presented in Section 3 InSection 4, we simulate the BD-Worm in integration network and study the BD-Worm spreading in the different network topology and defense Finally, Section5 concludes this paper 2 Related Work In this section, we first introduce the effect of integration network on data Then, we introduce the security risk of big data and several related improvements At last, we explore the work related to worm theory and new generation worm in different scenarios Here, the integration of the Internet and Mobile network is the integration of fixed node and Mobile network, which has greatly expanded the network s flexibility [2] The popularity of smart phones and tablets spawned a large number of network applications, such as social network, online shopping, and games It is much more convenient for people s lives by using those applications The integrated network produces a variety of data formats In addition, much data such as communications and online transaction need real-time analysis and process It presents a great challenge to integrated network s data processing capability [3] More and more privacy leak events raise people s awareness about importance of personal information With the integration of Mobile network and Internet, the storage, management, and use of huge amount of data are faced with serious security challenges The protection of mobile phone and Internet users privacy information has become a major research question in integration network Considering the security risks of distributed data storage in big data environment, Zhao [4] takes data access patterns and query into consideration and designed a distributed platform, to ensure the integrity and security of data Data encryption and privacy protection technologies and management modes cannot meet the requirements in capacity, performance, storage, and security of big data Data security and privacy protection of users are faced with huge impact and challenges Wang [5] provides a kind of big data encryption algorithm based on data deduplication technology The studies have shown that the security of the algorithm is reliable and the algorithm improves the speed of large data encryption processing effectively The research on worms over the past few years has focused on future worms and those future worms may propagate in specific complex environment or be designed with new function For example, Su [6] designs a new kind of network worm that propagates in IPv6 and IPv4-IPv6 transition environment, and the new worm is named NHIW, New Hybrid Internet Worm Based on the analysis of network worm scanning strategy, Xu et al [7] design a new kind of network worm-dnsworm-v6, which can propagate rapidly in IPv6 network by scanning the whole network applying two layers different scanning strategy Wang [8] analysesthe propagation characteristics of worms propagate in Internet of Vehicles and proposes a kind of benign worm defensing maliciouswormininternetofvehicles The study of worms mainly focuses on function structure, scan strategy, and propagation models [9] Function structure of the worm consists of two parts: the main function structure and the auxiliary function structure The main function structure controls the basic characteristics of worms, and the auxiliary function is designed for enhancing the properties of worms Worms scan the whole network to find next attack target There are many kinds of scan strategies and different strategy will achieve different effects [10] The research of worms propagation model is based on the spread of epidemic in biology [11] The classic worm propagation models include SIR/SIS model [12], two-factor model [13], and WOW model [14] Allofthesestudiesasmentionedabovefocusonthetraditional worm; however, our paper focuses on constructing apropagationmodelofbd-wormthesecurityofbigdata has attracted the attention of mobile phone and computer users Once the BD-Worm is released into the integrated network by attacker, it will steal huge privacy data Attacker can control the whole data in infected host through the backdoor reserved by worms 3 Modeling of BD-Worm In this section, we provide the big data structure of integrated network and model the BD-Worm The integration of Internet and Mobile network makes many data services shared in the mobile terminals and computers Users can access the Internet anytime and anywhere Mobileoffice,remoteoffice,andreal-timeofficearethemarks of big data era The data in Internet and Mobile network are collected into the cloud platform for further storage and management The structure of big data environment is showed in Figure 1 The model of BD-Worm can be modeled in five aspects: the infecting process of BD-Worm, the connection probability among each node, the defense capability of mobile nodes and fixed nodes, the opening probability of each suspicious fileafterbeingreceived,and,thelastpart,computingresource controlling 31 Infection Process of BD-Worm The integrated network produced variety of data formats, such as gif, doc, mp3, and rmvb [15] BD-Worm propagates in integrated network by embedding in the document BD-Worm spreading in a large scale occupies amounts of data storage space For the reason that BD-Worm runs on various operating systems, the malicious software programs attached by the document must contain most of the major operating systems both for computer and smart phone, such as windows, Mac, and Android TheprocessofworminfectionisshowninFigure 2 As the figure shows, when user received a file attached worm, the file should be scanned by antivirus software to detect whether there are any abnormalities or not If the file is abnormal, it will be deleted If the file is opened by user, it will copy itself and infect other files, which will consume large amount of computing resources That means the abnormal computing
3 Distributed Sensor Networks 3 Data center Cloud platform Remote office ISDN WAN Services Internet ISDN WiFi 3G WiFi Remote office Airport Figure 1: The big data environment structure Coffee shop Home Receive a file Antivirus software Abnormal No Open the file Memory consuming abnormal No Normal file Yes Delete the file Yes Delete the process 32 Connection Probability of Nodes In big data environment,thetopologyoftheintegratednetworkplaysacritical role in determining the propagation speed of BD-Worm In this paper, the topology of the integrated network is determined by connection probability of nodes All notations used in our paper are shown in Abbreviations Section To analyse the topology of integrated network, G = (V, E) stands for the network There are N nodes and m edges in the network V = {V 1, V 2,,V N } is the set of nodes, while E={e 1,e 2,,e M } is the set of edges The nodes in the integrated network are classified into two categories: fixed nodes and mobile nodes Let VM denote the mobile nodes and VF denote the fixed nodes: V={V 1, V 2,,V N }, VM = {Vm 1, Vm 2,,Vm m }, VF = {Vf 1, Vf 2,,Vf n }, (1) Figure 2: The process of worm infecting resource consuming will cause user s awareness The user will adjudge the memory consuming If he or she finds that the computed resource controlling is abnormal, the progress of the worm will be killed directly Otherwise, we consider that the file is benign If the file is a normal one, it will continue receiving the file The BD-Worm which runs with infected file will begin to control the computing resources Finally, it continues to receive the file This process will be repeated in the whole network unless all BD-Worms are removed m+n=n, where Vm i, i [1,m],standsforamobilenode,Vf j, j [1,n], stands for a fixed node, and the total number of mobile nodes and fixed nodes is N In the integration network, we define P F =m/nas the proportion of the fixed nodes in the network On the other hand, we define P M astheproportionofmobilenodesinthe network: P M =1 P F (2) When P F =1, the integrated network is the Internet in fact As P F decreases, there will be more mobile devices added in the integrated network while less computers are added as
4 4 Distributed Sensor Networks well When P F =0, the integrated network changes to be a Mobile network Therefore, in order to generate the integrated network, we need to analyze the degree distribution P(k) of the Internet and Mobile network, respectively, and integrate them to be the integrated network In the Internet, recently Faloutsos et al [16] showed empirically that certain properties of the AS-level Internet topology are well-described power laws The most interesting of these regards the degree of a node If we let P(k) be the fraction of nodes with degree k, then it is demonstrated that P(k) k α The exponent α is obtained by performing a linear regression on P(k) whenplottedon2002as-leveltopology; here α = 218 To keep it simple, the Internet in this paper is defined as a scale-free network with the degree distribution P(k) k 2 [17] Inthemobilenetwork,Lambiotteetal[18] analyzed statistical properties of a Mobile network constructed from the records of a mobile phone company The network consists of 25 million customers that have placed 810 million communications (phone calls and text messages) over a period of 6 months It is shown that the degree distribution in themobilenetworkhasapower-lawdegreedistribution P(k) k 5 In this paper, although worm spreads in Mobile network only through SMS, MMS, and GPRS, which do not contain phone calls, this spreading still mainly follows the relationship between the mobile users Therefore, the Mobile network is also defined as a scale-free network with powerlaw exponent α= 5 According to the above analysis, the power-law exponent of the integrated network degree distribution can be written as 5 α 2,andα changed with proportion of the fixed node (mobile node) in integration network P F (P M ) We denote that α= 2 3ρis the power-law exponent of integrated network Recently, a power-law topology generator is the best candidate to generate the integrated network, although the degree of a real integrated network may not be strictly power-law distributed when the integrated Internet and Mobile network are the heterogeneous network In this paper, we use the generalized linear preference (GLP) power-law generator [19] There are two important reasons Firstly, it presents a generalized linear preference model that, coupled with the incremental algorithm of [20], generates topologies that more closely model the Internet Secondly, we choose the GLP power-law network generator instead of other generators because it also has an adjustable power-law exponent η The following is the formula of η: 2m β(1 p) (1 + p) m =η, (3) where m isthenumberofinitialedgesofanewnode,p [0, 1] is the probability that adds m new links, and β (, 1) is a tunable parameter that indicates the preference for a new node (edge) connecting to more popular nodes The bigger the value of β is, the more preference is given to high degree nodes There are no self-loops and merge duplicate edges in the GLP Then [19] demonstrated that η= α+1approximately According to the α, η can be derived as η= 1 3ρ In the GLP generator, m and p always change little in different network and are less effective in ηthenwe assume that m and p have a constant value observed from empirical data and only adjust β to match η In the integrated network, infected nodes will transfer files with other connected nodes Among the large number of connected nodes, which node the infected node would like to choose is a significant problem Then, we will calculate the node connecting probability If there is an edge between node i and node j, wenote that b ij =1;otherwiseb ij =0Thus,thewholenetworkcan be defined as correlation matrix A: b 11 b 12 b 1n b 21 b 22 b 2n A=( ) (4) b n1 b n2 b nn According to the matrix, we can find that the nodes directly connected with node i canbedefinedasa i = (b i1 b i2 b in ) k i is the degree of node i, anditcanbe derived from k i = n j=1 b ij K is all the degrees of the network: k K=( 0 d 0 ) (5) 0 0 k n The total degree of all nodes connected to node i is k D si =a i K=(b i1 b i2 b in ) ( 0 d 0 ) (6) 0 0 k n We consider a node only transferring files to the other node that is connected It sounds more reasonable than transferring files to all the nodes no matter whether it is connected or not cp is the connected probability Therefore, the probability of node i being connected to node j is as follows: cp = k i D si = n j=1 b ij (b i1 b i2 b in ) ( k d k n ) 33 Opening Probability One of the most significant studies of modeling the worm propagation model is qualifying the user awareness The user security consciousness determines whether the worm can be activated successfully User awareness is too complex to be modeled well, for the reason that it may be affected by everything around the user Based on the BD-Worm malicious acts to the system and the common characters of the computer and smartphone, we can study the computing resource consuming acting on the user awareness Because worm copies itself and infects other files, it will cause CPU hogs and rewrite hard-disk driver frequently and that will reduce the system operability sharply (7)
5 Distributed Sensor Networks 5 In particular, when the computing resource consuming is at a very high level, the obvious abnormal lag of opening files or software will easily draw the user s attention and replace his normal work (such as opening received files from ) with checking his system When the amount of computing resource consumption increases at a high level, we can notice the abnormity Also, we can conclude that the opening probability equals 100 percent with no computing resource consuming and zero percent with full use of computing resource consumption Therefore, we should simulate the opening probability with an equation like circle x 2 +y 2 = 1, x > 0, y > 0 While the circle equation with radio equals one did not work well in simulating user awareness, to keep simple, let opp n (t) be the opening probability of node n at time t Consider opp n (t) = 1 crc n (t), wherecrc n (t) is computing resource consuming and crc n (t) [0, 1) OPP(t) is the opening probability of wholenetwork,forcalculatinginthewormpropagation model OPP i,t (t) = OPP 1 (t) is the opening probability of node 1: OPP (t) =( opp 1 (t) opp n (t) d opp 1 (t) opp n (t) ) (8) 34 Computing Resource Controlling In big data environment, when a host is infected by worm, it will consume many computing resources The high computing resource consuming will result in users security consciousness and will kill the worms The computing resource controlling is a complex factor that affects the worm propagation speed There are two reasons One is the higher computing resource consuming intending to increase user awareness which will reduce the opening probability The other is the higher computing resource consuming and longer infected time which will increase abnormal files among the transferring files which will increase the propagation speed Let diagonal matrix CRC(t) be the abnormal files probability of the whole network CRC i,i (t) [0, 1] is the sum of crc t (t) from time one to time t divide a constant CWhen t i=1 crc 1(i) equals C,we think that all of the certain files have already been infected Then, we can draw the conclusion that computing resource consuming affecting worm propagation speed in reason one is opposite to reason two In practice, forever propagation might not be possible because the worm will ultimately be detected by host-/software-based detection methods and the vulnerability exploited by the worm will be fixed through software updates within a certain amount of time [21] Hence, how to get a high propagation speed is a necessary and significant work in this paper: t i=1 crc 1 (i) 0 0 C CRC (t) =( 0 d t i=1 crc n (i) C ) (9) To control the worms resource consuming, we provide a greedy method In the greedy method, the BD-Worm is always greedy on the computing resource consuming since it infects a node successfully In the greedy method, the BD- Worm will firstly infect a target node with a low computing resource consuming to avoid abnormality After the BD- Worm infects the node, it will increase the consuming in order to copy itself and infect other nodes It is a serious problem when and how much should the BD-Worm increase theconsumingitishardtomakeastandardthatfitsforall nodes, for the reason that user awareness is different with anybody and unfit increasing lead the progress to be killed by user One standard only fits for one node Therefore, we make a rule that will test the user awareness to solve the problem As we know, an infected node still receives abnormal files frequently when the worm outbreaks The rule is to control the new progress consuming created by the new abnormal files which is equal to the consuming which the BD-Worm will increase If the increasing draws user attention, only the new progress will be killed Otherwise, the increase of consuming can be trusted Let crc n (t) = μ+cou n (t) φ where μ is the initial computing resource consuming, cou n (t) is the time of an infected opening the abnormal files, and φ is the increasing computing resource consuming It is a linear equation and ranges from zero to one 35 Defense Capability of Nodes Because of difference of defense capability of mobile nodes and fixed nodes, the probability of worm nodes being detected is different In this paper, we define defense capability of nodes as the probability of worm nodes being detected Defense strategy can be generally classified into two categories: active defense strategy and passive defense strategy Active defense refers to those strategies aiming at enhancing the defense capability of the system actively For example, abnormal detection can reduce the possibility of worm to attack system successfully Active defense strategy is deployed not for a particular worm, while passive defense strategy is deployed after detecting worms on the Internet There are many passive strategies, such as system patch and blacklist of malicious address [22] Actually, whether it is active defense strategy or passive defense strategy, the defense capability of mobile nodes is weaker than fixed nodes We introduce a parameter DC(n) denoting the defense capability of node n, which represents the undetected probability of the integrated network Compared with the computer, mobile phone is weaker in some aspects, such as its limited computing resources and its limited battery life In the big data environment constituted by mobile nodes and fixed nodes, the abnormalities caused by worms in mobile nodes are more obvious, which means the capability of mobile nodes is weaker than fixed nodes We introduce α m,α f denoting the undetected probability of mobile nodes and fixed nodes, respectively The bigger the undetected probability is, the stronger the defense capability will be
6 6 Distributed Sensor Networks Table 1: Default simulation parameters list Parameter Value N P F 50% β 35 m 1 p 05 μ 01 φ 005 α m 01 α f 01 That is to say, α m α f DC(n) istheundetectedprobability of the whole network: DC (n) = { α m if M n,n =1 { α { f if F n,n =1 4 BD-Worm Simulation (10) To study the characteristics of BD-Worm propagation in integrated network, we simulate the propagation on OMNet First, we generate several GLP topological networks by BriteSecond,wesimulatethespreadingprocessofBD- Worm by sending message Lastly, we compare the BD-Worm spreading simulation results with different parameters There is a parameters list of integrated network which is shown in Table 1 41 The Influence of Network Topology The network topology hasagreatimpactonwormpropagation We know the amount of mobile phones and computers in the integrated network will affect the propagation of worms obviously Therefore, we try to find the character of worm propagation on the topology we proposed by simulating worm propagation on the network topology of Internet, Mobile network, and integrated network In the simulation, the integrated network consists of nodes of Internet and nodes of Mobile network, and the total number of the nodes in integrated network is Unlike the traditional worm, BD-Worm could spread on both the Internet and Mobile network The network proportion is 05 We generate the topology by Brite and the average degree in Internet degree is 40196, in Mobile network the degree is 39794, and in the integrated network the degree is So, the average degree of the network topology is 4 From the worm propagation in the complex network, we know the degree of the first infected node makes a big differenceonwormpropagationinthispaper,wechoosea high degree node instead of the average degree for the reason that a node with high degree has a more stable spreading From the result showed in Figure 3, worm propagation in Mobile network is a little faster than in Internet Worm propagatesthefastestintheintegratednetworkwhenp F = 50%orP M =50%, that is to say, there are fixed nodes Number of nodes Propagation speed Time fixed nodes mobile nodes heterogeneous nodes fixed nodes in heterogeneous network mobile nodes in heterogeneous network Figure 3: BD-Worm propagation in integrated network compared with traditional worm spreading in single network or mobile nodes in the integrated network, the two propagation curves are nearly the same We can draw a conclusion from the simulation results that BD-Worm spreads fast at the beginning of the propagation and spreads faster in integrated network than in Internet or Mobile network Once worm outbreaks in integrated network, its high propagation speed will lead the existing defense to be useless and the loss will be catastrophic Therefore, we need to improve the capability of anomaly detection and early warning in both Internet and Mobile network to contain the spread of worms 42 The Influence of Defense Capability Because of the limited computing resources of mobile intelligent terminals, the defense in the Mobile network is absolutely not as good as in the Internet In this simulation, we increase the defense capability of Mobile network α m from 01 to 03 and compare it with the default parameter 01 As showed in Figure 4, first, the propagation speed with α m = 03 has remarkable increasing compared with α m = 01 Second,notonlydoes the BD-Worm propagation speed in Mobile network gain a lotofspeed,buttheinternetwiththeunchangedα f =01 also accelerates the BD-Worm spreading speed Furthermore, BD-Worm propagation in Mobile network is faster than in Internet As we all know, the replacement of smartphones is very fast The security technology for smartphones is not keeping up with the development of phones, leading to the weak defense capability to virus and worm Our personal information is stored in smartphone; the security capability is a serious problem
7 Distributed Sensor Networks 7 Number of node 10 4 Propagation speed Time nodes mix 01, fixed nodes mobile nodes mix nodes 01, fixed nodes mobile nodes 03 Figure 4: BD-Worm spreading with different defense Therefore, we can draw the conclusion that the weakness of host detection in Mobile network increases the BD-Worm propagation sharply and causes the defense in Internet to be not useful as before On the other hand, if we could reduce the undetected probability α m, which means enhancing the defense capability of mobile nodes, it will protect the worm spreading not only in Mobile network, but also in the Internet Also, unlike the case in the Internet, the defense in the mobile network still has a lot of room to develop Hence, we should put more resources into developing the defense in Mobile network 5 Conclusion In this paper, we first propose a BD-Worm, worm propagating in big data environment caused by integration of Internet and Mobile network Then we model the BD-Worm with its infection process, connection probability opening probability and computing resource consuming in theory Finally, we simulate the propagation of BD-Worm From the simulation result, we draw the conclusions First, worms in big data environment which are integrated by mobile nodes and fixed nodes propagate faster than worms in traditional Internet and they will cause more serious damage than traditional ones Second, if we put more resources into developing the defense on Mobile network node, it also protects the Internet nodes BD-Worm provided in this paper is just one classic security problem under the big data field The privacy protection is a serious problem in big data environment Enhancing security and defense capability should improve our technology both in smartphones and computers Abbreviations P(k): Heterogeneous network degree distribution VM: Mobilenode VF: Fixednode P F : Proportion of the fixed node in integration network P M : Proportion of the mobile node in integration network ρ: Proportion of computer in heterogeneous network α: Exponent in scale-free network η: Exponent in GLP generator p: Probability that adds m new links β: Tunable parameter that indicates the preference for a new node K: All the degrees of the network Np: Network proportion cp: Network connected probability DC(n): Noden having a probability of undetected worm α m : Undetected probability on Mobile network α f : Undetected probability on Internet opp n (t): Openingprobabilityofnoden at time t crc n (t): Computing resource consuming OPP(t): Opening probability of whole network CRC(t): Diagonal matrix, abnormal files probability of the whole network μ: Initialcomputingresourceconsuming φ: Increasing computing resource consuming λ: Infected probability Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper Acknowledgment This work is partially supported by 863 National Hi-Tech Research and Development Program (2011AA01A103) References [1] J Manyika, M Chui, B Brown et al, Big Data: The Next Frontier for Innovation, Competition, and Productivity, 2011 [2] W Guo, L Zhai, Y Ren, and L Guo, Intelligent heterogeneous network worms propagation modeling and analysis, in Computer Science and Its Applications, vol 203, pp , Springer,Amsterdam,TheNetherlands,2012 [3]JKLaurila,DGatica-Perez,IAadetal, Themobiledata challenge: big data for mobile computing research, in Proceedings of the International Conference on Pervasive Computing, (EPFL-CONF ), 2012 [4] S N Zhao, The Research on Big Data s Distributed Storage and Secure Protection, Shan Dong University, 2014 [5] M M Wang, BigDataEncryptionAlgorithmBasedonData Deduplication Technology, North China University of Water Resources and Electric Power, 2013
8 8 Distributed Sensor Networks [6] F Su, Research on Worm Propagation Modeling and Defense Strategies in the Next Generation Internet, Beijing University of Posts and Telecommunications, 2011 [7] Y G Xu, H T Qian, and K Zhang, Research of DNS worm in IPv6 networks, Computer Science, vol36,no12,pp32 36, 2009 [8] Z Wang, Research on Worm Propagation and Prevention-Cure in Internet of Vehicles, Nanjing University of Science & Technology, 2013 [9] A Wagner, T Dübendorfer, B Plattner et al, Experiences with worm propagation simulations, in Proceedings of the ACM workshop on Rapid Malcode, pp 34 41, ACM, 2003 [10] C C Zou, D Towsley, and W Gong, On the performance of internet worm scanning strategies, Performance Evaluation, vol63,no7,pp ,2006 [11] Y Wang, D Chakrabarti, C Wang, and C Faloutsos, Epidemic spreading in real networks: an eigenvalue viewpoint, in Proceedings of the 22nd International Symposium on Reliable Distributed Systems (SRDS 03), pp 25 34, October 2003 [12] C C Zou, D Towsley, and W Gong, On the performance of Internet worm scanning strategies, Performance Evaluation, vol63,no7,pp ,2006 [13] R Pastor-Satorras and A Vespignani, Epidemic dynamics and endemic states in complex networks, Physical Review E,vol63, Article ID , 2001 [14] Z Chen, L Gao, and K Kwiat, Modeling the spread of active worms, in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 03),vol3,pp ,April2003 [15] P Zikopoulos and C Eaton, Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data, McGraw-Hill Osborne Media, 2011 [16] M Faloutsos, P Faloutsos, and C Faloutsos, On power-law relationships of the internet topology, in Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM 99), pp ,September1999 [17] A-L Barabási and R Albert, Emergence of scaling in random networks, Science,vol286,no 5439,pp , 1999 [18] R Lambiotte, V D Blondel, C de Kerchove et al, Geographical dispersal of mobile communication networks, PhysicaA:Statistical Mechanics and Its Applications,vol387,no21,pp , 2008 [19] T Bu and D Towsley, On distinguishing between Internet power law topology generators, in Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (Infocom 02),vol2,pp ,June2002 [20] R Albert and A-L Barabási, Topology of evolving networks: local events and universality, Physical Review Letters, vol 85, no24,pp ,2000 [21]MChristodorescu,SJha,SASeshia,DSong,andRE Bryant, Semantics-aware malware detection, in Proceedings of theieeesymposiumonsecurityandprivacy,pp32 46,May 2005 [22]DBrumley,L-HLiu,PPoosankam,andDSong, Design space and analysis of worm defense strategies, in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 06), pp , ACM, March 2006
9 Rotating Machinery Engineering The Scientific World Journal Distributed Sensor Networks Sensors Control Science and Engineering Advances in Civil Engineering Submit your manuscripts at Electrical and Computer Engineering Robotics VLSI Design Advances in OptoElectronics Navigation and Observation Chemical Engineering Active and Passive Electronic Components Antennas and Propagation Aerospace Engineering Modelling & Simulation in Engineering Shock and Vibration Advances in Acoustics and Vibration
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
More informationResearch Article Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security
International Distributed Sensor Networks Volume 2015, Article ID 581563, 5 pages http://dx.doi.org/10.1155/2015/581563 Research Article Decision Making for the Adoption of Cloud Computing for Sensor Data:
More informationResearch Article Average Bandwidth Allocation Model of WFQ
Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute
More informationOpen Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
More informationResearch Article Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design
VLSI Design, rticle ID 698041, 5 pages http://dx.doi.org/10.1155/2014/698041 Research rticle Engineering Change Orders Design Using Multiple Variables Linear Programming for VLSI Design Yu-Cheng Fan, Chih-Kang
More information86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
More informationA RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
More informationAre free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
More informationSecurity in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
More informationCryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
More informationIntegration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
More informationCollapse by Cascading Failures in Hybrid Attacked Regional Internet
Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract
More informationChapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
More informationQoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP
QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP Mingzhe Wang School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: mingzhew@gmail.com Yu Liu School
More informationAnalysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
More informationFault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
More informationBotnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
More information(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
More informationINCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
More informationCyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
More informationOpen Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
More informationResearch Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining
Electrical and Computer Engineering Volume 25, Article ID 357378, 7 pages http://dx.doi.org/.55/25/357378 Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application
More informationAnalysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
More informationResearch on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
More informationChapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks
Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks Imre Varga Abstract In this paper I propose a novel method to model real online social networks where the growing
More informationExploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
More informationRunning Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
More informationUPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
More informationHow To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
More informationSpecial Properties of Ad-hoc Wireless Network and Security Models
Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of
More informationIDS or IPS? Pocket E-Guide
Pocket E-Guide IDS or IPS? Differences and benefits of intrusion detection and prevention systems Deciding between intrusion detection systems (IDS) and intrusion prevention systems (IPS) is a particularly
More informationResearch Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography
Distributed Sensor Networks Volume 2015, Article ID 512463, 6 pages http://dx.doi.org/10.1155/2015/512463 Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Xiaojin
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationResearch of Smart Distribution Network Big Data Model
Research of Smart Distribution Network Big Data Model Guangyi LIU Yang YU Feng GAO Wendong ZHU China Electric Power Stanford Smart Grid Research Institute Smart Grid Research Institute Research Institute
More informationAnalysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
More informationDETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES
IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department
More informationMitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme
Mitigation of Malware Proliferation in P2P Networks using Double-Layer Dynamic Trust (DDT) Management Scheme Lin Cai and Roberto Rojas-Cessa Abstract Peer-to-peer (P2P) networking is used by users with
More informationNetwork Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model
More informationResearch and Application of Redundant Data Deleting Algorithm Based on the Cloud Storage Platform
Send Orders for Reprints to reprints@benthamscience.ae 50 The Open Cybernetics & Systemics Journal, 2015, 9, 50-54 Open Access Research and Application of Redundant Data Deleting Algorithm Based on the
More informationMOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
More informationSymantec Endpoint Protection 12.1.6
Data Sheet: Endpoint Security Overview Last year, we saw 317 million new malware variants, while targeted attacks and zero-day threats were at an all-time high 1. The threat environment is evolving quickly
More informationDeuceScan: Deuce-Based Fast Handoff Scheme in IEEE 802.11 Wireless Networks
: Deuce-Based Fast Handoff Scheme in IEEE 82.11 Wireless Networks Yuh-Shyan Chen, Chung-Kai Chen, and Ming-Chin Chuang Department of Computer Science and Information Engineering National Chung Cheng University,
More informationSecuring mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
More informationBig Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network
, pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationMalicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationAn Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationCisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
More informationUSING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS
USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS Natarajan Meghanathan Jackson State University, 1400 Lynch St, Jackson, MS, USA natarajan.meghanathan@jsums.edu
More informationQ. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, 100876 Email: yq_10@sohu.
JOURNAL OF NETWORKS, VOL. 3, NO. 7, JULY 28 1 fuser Behavior and Topology Analysis Q. Yan, X. Huang School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China,
More informationThe Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
More informationIntrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
More informationNew possibilities in latest OfficeScan and OfficeScan plug-in architecture
New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping
More informationALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS)
ALGORITHM FOR DISTRIBUTED AGENT BASED NETWORK INTRUSION DETECTION SYSTEM (NIDS) Aleksandar Sokolovski Faculty Of Informatics, European University Skopje, Macedonia Saso Gelev Faculty Of Informatics, European
More informationA Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
More informationBotnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
More informationEnd-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
More informationWHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
More informationSECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
More informationChapter 2: Transparent Computing and Cloud Computing. Contents of the lecture
Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture
More informationAttacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
More informationResearch Article BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks
International Journal of Distributed Sensor Networks Volume, Article ID 74, 9 pages http://dx.doi.org/.55//74 Research Article BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks
More informationHigh Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
More informationMOBILE MALWARE REPORT
TRUST IN MOBILE MALWARE REPORT THREAT REPORT: H2/2014 CONTENTS At a Glance 03-03 Forecasts and trends 04-04 Current situation: 4.500 new Android malware instances every day 05-05 Third-party App-Stores
More informationComplex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics
Complex Network Visualization based on Voronoi Diagram and Smoothed-particle Hydrodynamics Zhao Wenbin 1, Zhao Zhengxu 2 1 School of Instrument Science and Engineering, Southeast University, Nanjing, Jiangsu
More informationHow To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationAddressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
More informationSecond-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationSpread of Viruses on a Computer Network
Spread of Viruses on a Computer Network New Mexico Supercomputing Challenge Final Report March 31, 2015 Team Number: 63 Los Alamos Middle School Team: Christie Djidjev Teacher: Project Mentors: Hristo
More informationEndpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
More informationCloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationDetecting Computer Worms in the Cloud
Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de
More informationTowards Better Definitions and Measures of Internet Security (Position Paper)
Towards Better Definitions and Measures of Internet Security (Position Paper) J. Aspnes and J. Feigenbaum Yale University {aspnes,feigenbaum}@cs.yale.edu M. Mitzenmacher and D. Parkes Harvard University
More informationHome Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
More informationTechnology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
More information10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
More informationCAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY
CAS : A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY ABHILASH SREERAMANENI DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING SEOUL NATIONAL UNIVERSITY OF SCIENCE AND TECHNOLOGY
More informationTUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
More informationThe Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
More informationThe assignment of chunk size according to the target data characteristics in deduplication backup system
The assignment of chunk size according to the target data characteristics in deduplication backup system Mikito Ogata Norihisa Komoda Hitachi Information and Telecommunication Engineering, Ltd. 781 Sakai,
More informationTowards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks
Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu
More informationResearch Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments
International Distributed Sensor Networks, Article ID 828092, 7 pages http://dx.doi.org/10.1155/2014/828092 Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More informationIntroducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
More informationComprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
More informationThe Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationStudent Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
More informationA Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
More informationHow To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
More informationResearch Article Hadoop-Based Distributed Sensor Node Management System
Distributed Networks, Article ID 61868, 7 pages http://dx.doi.org/1.1155/214/61868 Research Article Hadoop-Based Distributed Node Management System In-Yong Jung, Ki-Hyun Kim, Byong-John Han, and Chang-Sung
More informationProblems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
More informationWhite Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
More informationWorkshop on Infrastructure Security and Operational Challenges of Service Provider Networks
Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the
More information