The effective method of database server forensics on the enterprise environment
When a forensic investigation is carried out in the enterprise environment, most of the important data are stored in database servers, and data stored in them are very important elements for a forensic investigation. As for database servers with such ...
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware
As botnets have become the primary means for cyber attacks, how to detect botnets becomes an important issue for researchers and practitioners. In this study, we introduce a system that is designed to detect botnets prior to their activation. Pre-...
Adaptive scheduling strategies for cloud-based resource infrastructures
This paper proposes to employ linear programming algorithms for global resource scheduling to reduce the extra cost, including power consumption as well as operation expenditures, for remote resource access in a cloud-based resource pool. Unlike ...
Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications
Trusted quality of Web service (QoWS) issue is critical for e-commerce applications. However, many existing studies have little work in situations that have insufficient or no historical information regarding QoWS data. In this study, we propose a ...
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks
With the rapid development of computer networks, wireless technologies find important applications in roaming communication. In this scenario, practical needs initiate the demand for a secure and efficient handoff authentication scheme. To the best of ...
Detecting SYN flooding attacks based on traffic prediction
SYN flooding attacks are a common type of distributed denial-of-service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are ...
Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED
In this paper, we analyze the block cipher SEED-192, which is an extended version of the ISO/IEC block cipher SEED. According to the result of this paper, there exist weak keys in 8 out of the 20 rounds of SEED-192 against related-key differential ...
Self-organizing life cycle management of mobile ad hoc networks
A mobile ad hoc network (MANET) is a type of wireless network without any infrastructure, where nodes must adapt to the changing dynamic situations that result from their mobility. Because of the decentralization of nodes and the security needs of ...
On the security of PPPoE network
Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames. It is widely used by commercial Internet service providers to provide Internet surfing for customers who pay bills. In this paper, ...
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas
Proactive recovery mechanism has been widely used in building intrusion-tolerant systems that are able to tolerate an arbitrary number of faults. However, previous proactive recovery methods seldom consider the dynamic in attacking power that may cause ...
A quantitative approach to estimate a website security risk using whitelist
Despite much research on defense against phishing attacks, incidents continue to occur where sensitive (e.g., personal or financial) information is stolen using social engineering and technical spoofing techniques. Most approaches use the notions of ...
A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition
The essence of this paper is to illustrate live data acquisition within the random access memory of a notebook trying to utilize the collected digital evidences in order to partially reconstruct previous Gmail session, which could be probative digital ...
Quantitative intrusion intensity assessment for intrusion detection systems
One of the main problems of existing approaches in anomaly detection in intrusion detection system (IDS) is that IDSs provide only binary detection result: intrusion (attack) or normal. If some attack data or normal data is belonged to boundary, they ...
Simple SMS spam filtering on independent mobile phone
The amount of Short Message Service (SMS) spam is increasing. Various solutions to filter SMS spam on mobile phones have been proposed. Most of these use Text Classification techniques that consist of training, filtering, and updating processes. However,...