• Title/Summary/Keyword: Network Security Monitoring

Search Result 367, Processing Time 0.028 seconds

Modified PSO Based Reactive Routing for Improved Network Lifetime in WBAN

  • Sathya, G.;Evanjaline, D.J.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.139-144
    • /
    • 2022
  • Technological advancements taken the health care industry by a storm by embedding sensors in human body to measure their vitals. These smart solutions provide better and flexible health care to patients, and also easy monitoring for the medical practitioners. However, these innovative solutions provide their own set of challenges. The major challenge faced by embedding sensors in body is the issue of lack of infinite energy source. This work presents a meta-heuristic based routing model using modified PSO, and adopts an energy harvesting scheme to improve the network lifetime. The routing process is governed by modifying the fitness function of PSO to include charge, temperature and other vital factors required for node selection. A reactive routing model is adopted to ensure reliable packet delivery. Experiments have been performed and comparisons indicate that the proposed Energy Harvesting and Modified PSO (EHMP) model demonstrates low overhead, higher network lifetime and better network stability.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control (CCTV 보안관제 취약성 및 성능 분석)

  • Seo, Tae-Woong;Lee, Sung-Ryoul;Bae, Byung-Chul;Yoon, E-Joong;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.1
    • /
    • pp.93-100
    • /
    • 2012
  • Recently, the security monitoring and control systems based on spatial information in various field are operated and being developed according to evolve the spatial information technology. Especially, the CCTV monitoring and control system can be used in various field as a typical system. However, the security vulnerability problems have become an issue because the system connected by computer network and getting bigger than before. Therefore we studied security vulnerabilities of CCTV monitoring and control system which is being developed and operated. In addition, it is important to consider disaster and terrorism with unauthorized changes on location information. Therefore we analyzed the performance of observation when the cameras are break down as a result by hacking to CCTV monitoring and control system.

Enhancing Security Gaps in Smart Grid Communication

  • Lee, Sang-Hyun;Jeong, Heon;Moon, Kyung-Il
    • International Journal of Advanced Culture Technology
    • /
    • v.2 no.2
    • /
    • pp.7-10
    • /
    • 2014
  • In order to develop smart grid communications infrastructure, a high level of interconnectivity and reliability among its nodes is required. Sensors, advanced metering devices, electrical appliances, and monitoring devices, just to mention a few, will be highly interconnected allowing for the seamless flow of data. Reliability and security in this flow of data between nodes is crucial due to the low latency and cyber-attacks resilience requirements of the Smart Grid. In particular, Artificial Intelligence techniques such as Fuzzy Logic, Bayesian Inference, Neural Networks, and other methods can be employed to enhance the security gaps in conventional IDSs. A distributed FPGA-based network with adaptive and cooperative capabilities can be used to study several security and communication aspects of the smart grid infrastructure both from the attackers and defensive point of view. In this paper, the vital issue of security in the smart grid is discussed, along with a possible approach to achieve this by employing FPGA based Radial Basis Function (RBF) network intrusion.

Efficiency of Innovative Development Management: Interstate Assessment of the Economic Competitiveness in the Context of European Integration and Economic Security

  • Khodakivska, Olga;Ramos, Olena Ribeiro;Nechyporenko, Oleksandr;Tsiutsiupa, Svitlana;Krasnoshtan, Olexander;Mayovets, Yaryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.67-72
    • /
    • 2021
  • The article identifies areas for effective management of innovative development. The competitiveness of the economy in the context of European integration and economic security is assessed. The level of innovative economy of some countries of the world is analyzed. The issue of attracting foreign investors to stimulate innovative production in Ukraine is raised. It is identified the need for the formation of an updated state policy capable of providing innovative development and improving the competitive position of the state in international rankings. Emphasis is placed on the need to form a critical mass of managers-civil servants capable of developing, implementing and monitoring the policy of innovative development of entrepreneurship.

FLORA: Fuzzy Logic - Objective Risk Analysis for Intrusion Detection and Prevention

  • Alwi M Bamhdi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.179-192
    • /
    • 2023
  • The widespread use of Cloud Computing, Internet of Things (IoT), and social media in the Information Communication Technology (ICT) field has resulted in continuous and unavoidable cyber-attacks on users and critical infrastructures worldwide. Traditional security measures such as firewalls and encryption systems are not effective in countering these sophisticated cyber-attacks. Therefore, Intrusion Detection and Prevention Systems (IDPS) are necessary to reduce the risk to an absolute minimum. Although IDPSs can detect various types of cyber-attacks with high accuracy, their performance is limited by a high false alarm rate. This study proposes a new technique called Fuzzy Logic - Objective Risk Analysis (FLORA) that can significantly reduce false positive alarm rates and maintain a high level of security against serious cyber-attacks. The FLORA model has a high fuzzy accuracy rate of 90.11% and can predict vulnerabilities with a high level of certainty. It also has a mechanism for monitoring and recording digital forensic evidence which can be used in legal prosecution proceedings in different jurisdictions.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

Indoor Gas Monitoring System Using Smart Phone Application (스마트폰 어플리케이션을 이용한 실내 가스 모니터링 시스템)

  • Choi, Sung-Yeol;Choi, Jang-Sik;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.49-54
    • /
    • 2012
  • Special applications designed for smart phone, so called "Apps" are rapidly emerging as unique and effective sources of environmental monitoring tools. Using the advantages of Information and Communication Technology (ICT), this paper propose an application that provides Indoor Gas Monitoring System. In this paper, use four wireless gas sensor modules to acquire sensors data wirelessly coupled with the advantages of existing portable smart device based on Android platform to display the real-time data from the sensor modules. Additionally, this paper adapts a simple gas classification algorithm to inform in-door Gas for users real-time based.

A Study on the Combination of the Existing Monitoring System with the Safety Management Network System (기구축 계측시스템의 안전관리 네트워크 시스템 연계 방안에 관한 연구)

  • Lee, Chin-Hyung;Park, Ki-Tae;You, Young-Jun;Joo, Bong-Chul;Hwang, Yoon-Koog;Bae, In-Hwan
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.3
    • /
    • pp.47-53
    • /
    • 2009
  • This study performed the construction of test bed for the combination of the health monitoring system In Yongjong grand bridge with the safety management network system in order to explore the feasibility of combining the existing monitoring system with the safety management network system. For this purpose, connection program which consists of DAQ sender server program and DAQ receiver server program has been developed. DAQ sender server program installed in the connection server, which is located on the DMZ zone of the existing monitoring system, plays the role of communicating with the monitoring system. On the other hand, DAQ receiver server program installed in the connection server, which is located on the integrated operation center of the safety management network system, plays the part of gathering real time and tim history data of the existing monitoring system and storing them in the integrated operation server through the communication with the DAQ sender. Test bed demonstrated the feasibility of combining the existing monitoring system with the safety management network system.

  • PDF