Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li
Protecting Controllers Against Denial-Of-Service Attacks In Software-Defined Networks, Jingrui Li
Masters Theses
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers defense mechanism based on a proof-of-work protocol. This thesis proposes a new protocol to protect controllers against such attacks, shows implementation of the system and analyze the its performance. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of work, its adjustable difficulty, its ability to work withmultiple network providers, and its use of existing TCP/IP header fields, ensure that this approach can be used in practice.
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris
Journal of International Technology and Information Management
The explosive growth and rapid proliferation of smartphones and other mobile
devices that access data over communication networks has necessitated advocating
and implementing security constraints for the purpose of abetting safe computing.
Remote data access using mobile devices is particularly popular among students at
institutions of higher education. To ensure safe harbor for constituents, it is
imperative for colleges and universities to establish, disseminate, and enforce
mobile device security artifacts, where artifacts is defined as policies, procedures,
guidelines or other documented or undocumented protocols. The purpose of this
study is to explore the existence of, specific content of, and the …
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Improving The Security Of Wireless Sensor Networks, Mauricio Tellez Nava
Masters Theses, 2010-2019
With the rapid technological advancements of sensors, Wireless Sensor Networks (WSNs) have become the main technology for the Internet of Things (IoT). We investigated the security of WSNs in an environmental monitoring system with the goal to improve the overall security. We implemented a Secure Temperature Monitoring System (STMS), which served as our investigational environment. Our results revealed a security flaw found in the bootstrap loader (BSL) password used to protect firmware in the MSP430 MCU chips. We demonstrated how the BSL password could be brute forced in a matter of days. Furthermore, we illustrate how an attacker can reverse …
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Optical Fiber Sensors In Physical Intrusion Detection Systems: A Review, Gary Andrew Allwood, Graham Wild, Steven Hinkley
Research outputs 2014 to 2021
Fiber optic sensors have become a mainstream sensing technology within a large array of applications due to their inherent benefits. They are now used significantly in structural health monitoring, and are an essential solution for monitoring harsh environments. Since their first development over 30 years ago, they have also found promise in security applications. This paper reviews all of the optical fiber-based techniques used in physical intrusion detection systems. It details the different approaches used for sensing, interrogation, and networking, by research groups, attempting to secure both commercial and residential premises from physical security breaches. The advantages and the disadvantages …
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Determining Unique Agents By Evaluating Web Form Interaction, Ben Cooley
Electronic Theses and Dissertations
Because of the inherent risks in today’s online activities, it becomes imperative to identify a malicious user masquerading as someone else. Incorporating biometric analysis enhances the confidence of authenticating valid users over the Internet while providing additional layers of security with no hindrance to the end user. Through the analysis of traffic patterns and HTTP Header analysis, the detection and early refusal of robot agents plays a great role in reducing fraudulent login attempts.