Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Encryption of Data to Prevent Jamming Attacks  [PDF]
N. Abirami,R. Jeeva,L. Revathi,U. Safiya
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: In this paper, we address the problem of selective jamming attacks in wireless networks. In theseattacks, the adversary is active only for a short period of time, selectively targeting messages of highimportance. We illustrate the advantages of selective jamming in terms of network performance degradationand adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We showthat selective jamming attacks can be launched by performing real-time packet classification at the physicallayer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification bycombining cryptographic primitives with physical-layer attributes. We analyze the security of our methodsand evaluate their computational and communication overhead.
Coalesce Model to Prevent Format String Attacks
Jayant Shekhar,Seema Yadav,Khaleel Ahmad
International Journal of Computer Science Issues , 2011,
Abstract: Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we have proposed eight novel approaches to prevent format string attacks and combination of these approaches named as Coalesce Model. With the help of this model we check our coding in such a manner that no any type of format string attacks occurs. We check the system implementation of any applications with the help of coalesce model against corruption of application states, and giving the control to attacker. Our work addresses Format String vulnerabilities related to ANSI C library. The result indicates that the proposed model is effective to testing of Format String Vulnerability.
Web Client and Web Server approaches to Prevent XSS Attacks  [cached]
Jyoti Snehi,Dr. Renu Dhir
International Journal of Computers & Technology , 2013,
Abstract: Websites rely completely on complex web applications to deliver content to all users according to set preferences and specific needs. In this manner organizations provide better value to their customers and prospects. Dynamic websites suffer from various vulnerabilities rendering organizations helpless and prone to cross site scripting attacks. Cross Site Scripting attacks are difficult to detect because they are executed as a background process. Cross Site Scripting is the most common web vulnerabilities in existence today which is most exploited issue .In this paper we have presented various approaches used by clients and Server to prevent XSS attacks
Secure SAML validation to prevent XML signature wrapping attacks  [PDF]
Pawel Krawczyk
Computer Science , 2014,
Abstract: SAML assertions are becoming popular method for passing authentication and authorisation information between identity providers and consumers using various single sign-on protocols. However their practical security strongly depends on correct implementation, especially on the consumer side. Somorovsky and others have demonstrated a number of XML signature related vulnerabilities in SAML assertion validation frameworks. This article demonstrates how bad library documentation and examples can lead to vulnerable consumer code and how this can be avoided.
A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS  [PDF]
G.S. Mamatha & S.C. Sharma
International Journal of Computer Science and Security , 2010,
Abstract: A dynamic wireless network that is formed without any pre-existing infrastructure,in which every node can act as a router is called a mobile ad hoc network(MANET). Since MANETS has not got clear cut security provisions, it isaccessible to any of the authorized network users and malicious attackers. Thegreatest challenge for the MANETS is to come with a robust security solutioneven in the presence of malicious nodes, so that MANET can be protected fromvarious routing attacks. Several countermeasures have been proposed for theserouting attacks in MANETS using various cryptographic techniques. But most ofthese mechanisms are not considerably suitable for the resource constraints, i.e.,bandwidth limitation and battery power, since they results in heavy traffic load forexchanging and verification of keys. In this paper, a new semantic securitysolution is provided, which suits for the different MANET constraints and also isrobust in nature, since it is able to identify and prevent four routing attacksparallelly. The experimental analysis shows the identification and prevention ofthe four attacks parallelly I.e., packet dropping, message tampering, black holeattack and gray hole attack.
Efficient Computations of a Security Index for False Data Attacks in Power Networks  [PDF]
Julien M. Hendrickx,Karl Henrik Johansson,Raphael M. Jungers,Henrik Sandberg,Kin Cheong Sou
Mathematics , 2012,
Abstract: The resilience of Supervisory Control and Data Acquisition (SCADA) systems for electric power networks for certain cyber-attacks is considered. We analyze the vulnerability of the measurement system to false data attack on communicated measurements. The vulnerability analysis problem is shown to be NP-hard, meaning that unless $P = NP$ there is no polynomial time algorithm to analyze the vulnerability of the system. Nevertheless, we identify situations, such as the full measurement case, where it can be solved efficiently. In such cases, we show indeed that the problem can be cast as a generalization of the minimum cut problem involving costly nodes. We further show that it can be reformulated as a standard minimum cut problem (without costly nodes) on a modified graph of proportional size. An important consequence of this result is that our approach provides the first exact efficient algorithm for the vulnerability analysis problem under the full measurement assumption. Furthermore, our approach also provides an efficient heuristic algorithm for the general NP-hard problem. Our results are illustrated by numerical studies on benchmark systems including the IEEE 118-bus system.
Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes  [PDF]
Zorana Bankovi?,David Fraga,José M. Moya,Juan Carlos Vallejo
Sensors , 2012, DOI: 10.3390/s120810834
Abstract: As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.
Entropy based Anomaly Detection System to Prevent DDoS Attacks in Cloud  [PDF]
A. S. Syed Navaz,V. Sangeetha,C. Prabhadevi
Computer Science , 2013,
Abstract: Cloud Computing is a recent computing model provides consistent access to wide area distributed resources. It revolutionized the IT world with its services provision infrastructure, less maintenance cost, data and service availability assurance, rapid accessibility and scalability. Grid and Cloud Computing Intrusion Detection System detects encrypted node communication and find the hidden attack trial which inspects and detects those attacks that network based and host based cant identify. It incorporates Knowledge and behavior analysis to identify specific intrusions. Signature based IDS monitor the packets in the network and identifies those threats by matching with database but It fails to detect those attacks that are not included in database. Signature based IDS will perform poor capturing in large volume of anomalies. Another problem is that Cloud Service Provider hides the attack that is caused by intruder, due to distributed nature cloud environment has high possibility for vulnerable resources. By impersonating legitimate users, the intruders can use a services abundant resources maliciously. In Proposed System we combine few concepts which are available with new intrusion detection techniques. Here to merge Entropy based System with Anomaly detection System for providing multilevel Distributed Denial of Service. This is done in two steps: First, Users are allowed to pass through router in network site in that it incorporates Detection Algorithm and detects for legitimate user. Second, again it pass through router placed in cloud site in that it incorporates confirmation Algorithm and checks for threshold value, if its beyond the threshold value it considered as legitimate user, else its an intruder found in environment.
Key Management Scheme for Preventing False Data in Wireless Sensor Network
Bharathidasan. D,Murugesan. S,Ezhilvendan. M,Mano Sharmi. K
International Journal of Electronics Communication and Computer Technology , 2013,
Abstract: Injecting false data attack is a well known serious threat to wireless sensor network, for which an adversary reports bogus information to sink causing error decision at upper level and energy waste in en-route nodes. In this paper, we propose a novel bandwidth-efficient cooperative authentication (BECAN) scheme for filtering injected false data. Based on the random graph characteristics of sensor node deployment and the cooperative bit-compressed authentication technique, the proposed BECAN scheme can save energy by early detecting and filtering the majority of injected false data with minor extra overheads at the en-route nodes. In addition, only a very small fraction of injected false data needs to be checked by the sink, which thus largely reduces the burden of the sink. Both theoretical and simulation results are given to demonstrate the effectiveness of the proposed scheme in terms of high filtering probability and energy saving.
An Effective Control Report Based Security Countermeasure against the Joint Attacks of False Report Injection Attack and Selective Forwarding Attack  [PDF]
Hyun Woo Lee, Tae Ho Cho
Wireless Sensor Network (WSN) , 2012, DOI: 10.4236/wsn.2012.48027
Abstract: Sensor networks are vulnerable to many attacks because the sensor networks operate in open environments. It is easy to incur one or more attacks such as a selective forwarding attack, a false report injection attack. It is hard to defend the sensor network from the multiple attacks through existing security methods. Thus, we suggest an energy-efficient security method in order to detect the multiple attacks. This paper presents a security method to detect the false report injection attack and the selective forwarding attack in the sensor network using a new message type. The message type is a filtering message. The filtering message prevents from generating and forwarding false alert messages. We evaluated performance of our proposed method through a simulation in comparison with an application of SEF (statistical enroute filtering scheme) and CHEMAS (Check point-based Multi-hop Acknowledgement Scheme). The simulation results represent that the proposed method is 10% more energy-efficient than the application when the number of false reports is great while retaining the detection performance.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.