Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Security Risks in IP Telephony  [cached]
Filip Rezac,Miroslav Voznak
Advances in Electrical and Electronic Engineering , 2010,
Abstract: This paper deals with VoIP communication security and various techniques of VoIP attacks. We divided these threats in several categories according to their specific behaviour and their impact on the affected system. We also tried to find effective methods to prevent or mitigate these attacks. We focused our work on Spam over Internet Telephony (SPIT) as a real threat for the future. We have developed both a tool generating SPIT attacks and AntiSPIT tool defending communication systems against SPIT attacks. AntiSPIT represents an effective protection based on statistical blacklist and works without participation of the called party which is a significant advantage.
Security Patterns for Voice over IP Networks  [cached]
Eduardo B. Fernandez,Juan C. Pelaez,Maria M. Larrondo-Petrie
Journal of Software , 2007, DOI: 10.4304/jsw.2.2.19-29
Abstract: Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. We give an overview of VoIP and provide UML models of some aspects of its infrastructure, including architectures and basic use cases. We present some security patterns that describe mechanisms that can control many of the possible attacks and which could be used to design secure systems.
Security in Carrier Class Server Applications for All-IP Networks  [PDF]
Marc Chatel,Michel Dagenais,Charles Levert,Makan Pourzandi
Computer Science , 2004,
Abstract: A revolution is taking place in telecommunication networks. New services are appearing on platforms such as third generation cellular phones (3G) and broadband Internet access. This motivates the transition from mostly switched to all-IP networks. The replacement of the traditional shallow and well-defined interface to telephony networks brings accrued flexibility, but also makes the network accordingly difficult to properly secure. This paper surveys the implications of this transition on security issues in telecom applications. It does not give an exhaustive list of security tools or security protocols. Its goal is rather to initiate the reader to the security issues brought to carrier class servers by this revolution.
Security Risks and Modern Cyber Security Technologies for Corporate Networks  [PDF]
Wajeb Gharibi,Abdulrahman Mirza
Computer Science , 2011,
Abstract: This article aims to highlight current trends on the market of corporate antivirus solutions. Brief overview of modern security threats that can destroy IT environment is provided as well as a typical structure and features of antivirus suits for corporate users presented on the market. The general requirements for corporate products are determined according to the last report from av-comparatives.org [1]. The detailed analysis of new features is provided based on an overview of products available on the market nowadays. At the end, an enumeration of modern trends in antivirus industry for corporate users completes this article. Finally, the main goal of this article is to stress an attention about new trends suggested by AV vendors in their solutions in order to protect customers against newest security threats.
A New Verification Method to Prevent Security Threads of Unsolicited Message in IP Over Ethernet Networks  [PDF]
Waleed Kh. Alzubaidi,Longzheng Cai,Shaymaa A. Alyawer
International Journal of Computer Networks & Communications , 2012,
Abstract: Internet is widely depends on the IP over Ethernet networks architecture. IP and Ethernet protocols uses in each Local Area Network LAN, wire and wireless. Due to the rapid expansion of the technology field this architecture reveals many shortcomings. TCP/IP suite protocols are consists from layers, each layer accomplish its jobs separately. However, these layers susceptible to different attacks. Data link layer one of the most layers targeted by the attackers. Attack at lower layer may lead to more sophisticated attacks to upper layers, like Man-in-The-Middle (MiTM), DNS spoofing and Denial of Service (DoS). These attacks applicable even with encrypted protocols such as HTTPS and SSL. In this paper we discuss the security in the Data Link Layer in IP over Ethernet networks and the attacks depend on the Address resolution protocol (ARP). Moreover, explain our proposed method to prevent address resolution protocol attacks.
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks  [PDF]
HyungJun Kim
International Journal of Distributed Sensor Networks , 2012, DOI: 10.1155/2012/268478
Abstract: An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from corporate IT, in addition to excellent management practices in managing IP-based networks. We give an overall explanation of SCADA systems along with their security concerns and vulnerability. In the case of legacy SCADA systems, the concerns regarding security were minimal since it used proprietary networks; however, since the move of SCADA systems to the Internet, security problems have become an imperative issue, especially problems regarding IP-based systems. We also discuss various forms of threats and vulnerabilities on future SCADA systems applied with IPv6 over low-power, wireless personal area networks (6LoWPANs) and suggest security management methods to overcome these concerns. In order to identify and remove various vulnerabilities and threats to SCADA systems over IP-based wireless sensor networks, especially for 6LoWPAN applications, we examine possible threats and propose proper and precise security management methods. 1. Introduction A supervisory control and data acquisition (SCADA) system refers to an industrial control system (ICS); it is a common process automation system which is used to gather data from sensors and instruments located at remote sites and to transmit data at a central site for either controlling or monitoring purposes [1]. The collected data is usually viewed on one or more SCADA host computers located at a central or master site. Based on information received from remote stations, automated or operator-driven supervisory commands can be transmitted to remote station control devices, which are often referred to as field devices. SCADA systems are used to monitor and control industrial, infrastructure, or facility-based processes such as telecommunications, water control, oil and gas refining, and transportation. SCADA systems can be relatively simple, such as the one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant. Generally, a SCADA system consists of the following components. First, analytical instruments that sense process variables and operating equipment connected to instruments. Second, one or more field data interface devices, usually remote terminal units (RTUs), or programmable logic controllers (PLCs). RTUs connect to sensors in the process,
Misben: Reliable and Risk Free Approach of Blocking Misbehaving Users in Anonymizing Networks
Ms. Nikita L.Vikhar,,Dr. G.R. Bamnote
International Journal of Innovative Technology and Exploring Engineering , 2013,
Abstract: As we studied in our literature, the recent method was presented for blocking of misbehaving user in the Tor networks called as Nymble. However the limitation which we identified for Nymble is that if the Nymble manager fails, then whole security system is fails. And hence this approach is heavily vulnerable for failure risks. Thus in this paper we are presenting the new extended method for overcoming above said problems. In this paper we propose a secure Misben system, where users acquire an ordered collection of Misbens, a special type of pseudonym, to connect to Websites. Without additional information, these Misbens are computationally hard to link and hence, using the stream of Misbens simulates anonymous access to services. Web sites, however, can blacklist users by obtaining a seed for a particular Misben, allowing them to link future Misbens from the same user. Servers can therefore blacklist anonymous users without knowledge of their IP addresses while allowing behaving users to connect anonymously. Our system ensures that users are aware of their blacklist status before they present a Misben, and disconnect immediately if they a0072e blacklisted. For the risk free and reliability of proposed approach we also proposed architecture with details that if first misben manager failed to generate seed when it get complaint from server, in previous systems in that condition system get collide and then anonymizing network in trouble ,so provide solution to this problem we introduced new 2nd misben manager.
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)  [cached]
Muhammad Sher,Thomas Magedanz
Journal of Networks , 2006, DOI: 10.4304/jnw.1.6.10-17
Abstract: In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standardized by 3GPP (Third Generation Partnership Project) and 3GPP2 as next generation service delivery platform developed for IP technology on top of all access networks including mobile and fixed networks. The architecture of IMS-NDS is based on Network Domain Security/Internet Protocol (NDS/IP) which is deployed by Domain Security Gateways (SEGs). NDS/IP utilizes IP Security (IPSec) to implement security domain services. 3GPP Authentication Framework is introduced to authenticate the Security Gateways using NDS/IP that utilizes cryptographic security mechanisms and security protocols provided by the IP Security (IPSec) protocol. PKI is used to generate, manage and distribute digital certificates and keys in NDS/IP environment.
Active Network Supports for Mobile IP
Lu Yueming,QIAN Depei,XU Bin,WANG Lei,

计算机科学技术学报 , 2001,
Abstract: The basic mobile IP protocol is difficult to implement on the traditional IP network and not flexible and efficient under certain conditions. For example, firewalls or bound- ary routers may drop packets sent by mobile nodes for security reasons. Traditional networking devices such as routers cannot dynamically load and unload extended services to achieve differ- ent qualities of services. In this paper, a new scheme of using the active network to support the mobile IP is presented. The Softnet, a prototype of active networks based on mobile agents, is introduced. The active network is characterized by the programmability of its intermediate nodes and therefore presents dynamic and flexible behaviors. Special services can be dynam- ically deployed onto the active nodes in the Softnet. This property is definitely required in implementing the mobile IP protocols. The Softnet supports not only the basic mobile IP pro- tocol but also other extended mobiIe IP protocols. Virtual networks for mobile IP services are dynamically formed by mobile agents in the Softnet to provide different qualities of services.
Security Problems and Their Defenses in TCP/IP Protocol Suite  [PDF]
Rajanala. Manasa Valli,,Parvathaneni.Tejaswini,Prof.A.Rama Krishna
International Journal of Innovative Technology and Exploring Engineering , 2012,
Abstract: The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some of these are protocol design weaknesses, where as rest are defects in the software that implements the protocols. In this paper, I focused mainly on protocol level issues, rather than implementation flaws. In this paper, we discuss about the security issues related to the some of the protocols in the TCP/IP suite.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.