979 resultados para Intrusion Detection, Computer Security, Misuse


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Miguel Ángel Amutio, Jefe de Área de la Dirección General para la Promoción y Desarrollo de la e-Administración del Ministerio de la Presidencia, presenta el esquema nacional de seguridad desde el punto de vista de la administración estatal

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Josué Sallent, Director del Centre de Seguretat de la Informació de Catalunya, CESICAT, parla de la seguretat des del punt de vista de l'administració autonòmica

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Lluís Ariño, miembro del Grupo de Administración Electrònica de la Conferencia de Rectores de las Universidades Españolas (CRUE), presenta la seguridad desde el punto de vista de la administración universitaria

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Distributed defense is a promising way to neutralize the distributed Denial-of-Service attacks by detecting and responding the attacking sources widespread around the Internet. Components of the distributed defense system will cooperate with each other to combat the attacks. Compared with the centralized defense systems, distributed defense systems can discover the attacks more timely from both source end and victim end, fight the attacks with more resources and take advantage of more flexible strategies. This paper investigates 7 distributed defense systems which make use of various strategies to mitigate the DDoS attacks. Different architectures are designed in these 7 systems to provide distributed DDoS defense solutions. We evaluate these systems in terms of deployment, detection, response, security, robustness and implementation. For each criteria, we give a recommendation on which technologies are best suitable for a successful distributed defense system based on the analysis result. Finally we propose our idea on the design of an effective distributed defense system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Examines the attitudes of Australian IS/IT managers to the concept of cyber-vigilantism. Also, it explores the policies and procedures which have been set in place by various organisations to cope with concerted attacks on their systems. It finds that although a majority of managers do approve of the concept of “striking back”, only a minority are prepared for this eventuality. There appears to be complacency about the threats posed by organised, offensive attackers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There are two statistical decision making questions regarding statistically detecting sings of denial-of-service flooding attacks. One is how to represent the distributions of detection probability, false alarm probability and miss probability. The other is how to quantitatively express a decision region within which one may make a decision that has high detection probability, low false alarm probability and low miss probability. This paper gives the answers to the above questions. In addition, a case study is demonstrated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This text introduces the concepts of information warfare from a non-military, organizational perspective. It is designed to stimulate managers to develop policies, strategies, and tactics for the aggressive use and defence of their data and knowledge base. The book covers the full gambit of information warfare subjects from the direct attack on computer systems to the more subtle psychological technique of perception management. It provides the framework needed to build management strategies in this area. The topics covered include the basics of information warfare, corporate intelligence systems, the use of deception, security of systems, modes of attack, a methodology to develop defensive measures, plus specific issues associated with information warfare.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In many places the expansion of urban areas has brought recreationists into close proximity to nature conservation areas, sometimes leading to conflict where recreation and sensitive environmental or natural values are incompatible. An important first step in managing these conflicts is to assess the degree and nature of the problem. We describe the application, and methodological considerations, associated with the use of an innovative, low-cost, practical technique to monitor human intrusions into a wetland reserve which has been designated as ‘off-limits’ to the general public. The use of seven frequently monitored sand pads over 13 weeks enabled us to determine that intrusions occurred in every week (3–14 per sand pad), deep inside the reserve during most weeks, and also identified the key access points. Most intrusions occurred during holiday periods and were by walkers or cyclists. We also conducted a series of simple experiments to examine the utility of sand pads. Our sand pads maintained their shape well and held footprints for over 1 month, they were rarely avoided by people and provided reliable indices of the level of human activity. Sand hardness varied with rainfall, and hardened sand was frequent (53.8% of 26 days) and potentially prevented detection of people. We conclude that the sand pad technique is an effective and efficient tool to measure recreational use of off-limits areas and other conservation and recreation areas, provided human traffic is not too intense, and that checks are made reasonably frequently.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The outcome of the research was the development of three network defence systems to protect corporate network infrastructure. The results showed that these defences were able to detect and filter around 94% of the DDoS attack traffic within a matter of seconds.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis surveys the latest development of digital forensic tools designed for anti-cybercrime purposes. It discusses the necessity of testing the digital forensics tools, and presents a novel testing framework. This new testing framework takes the viewpoint of software vendors rather than traditional software engineering approaches.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis analyses authentication in public key encryption and makes contributions in two areas. Firstly, Compressed Nested PKI is proposed which improves the certificate validation process. Then an implicitly certified encryption scheme, Authenticated Public Key Encryption, which makes keys easier to manage, is introduced.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper.