432 resultados para format-compliant
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
Resumo:
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.
Resumo:
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently there is little understanding of how to best protect SCADA systems from malicious attacks. We review the constraints and requirements for SCADA security and propose a suitable architecture (SKMA) for secure SCADA communications. The architecture includes a proposed key management protocol (SKMP). We compare the architecture with a previous proposal from Sandia Labs.
Resumo:
Whisper Our Futures was an invited design proposal to produce a major public artwork for the State of Queensland’s 150th Anniversary Celebrations. It involved a network of 100 individual scrolling digital text boxes each with individual audio systems arranged together in a tessellated format. This form (specified by the originating brief) both mimicked the soaring gothic arches typical of Queensland cathedrals and was also suggestive of their stained glass windows. Each text module presented a message in both visual and audible forms for Queenslanders living 150 years hence - spoken both by the general public aw well as prominent figures. In this way the work was designed as a focus of future hope, historical reflection and inspiration to visitors to Queensland cathedrals throughout the entire year of celebrations (2009). The work was planned to premiere at Brisbane’s main Anglican Cathedral and then tour to nine other state cathedrals throughout 2009.---- Two staged proposals and budgets were invited throughout 2007. After the second successful proposal stage the State Premier and cabinet changed, ultimately leading the public art components to be dropped from the program. The proposal currently remains on file at the Queensland Premiers Office.