Security

The network attacks are increasing both in frequency and intensity with the rapid growth of internet of things (IoT) devices. Recently, denial of service (DoS) and distributed denial of service (DDoS) attacks are reported as the most frequent attacks in IoT networks. The traditional security solutions like firewalls, intrusion detection systems, etc., are unable to detect the complex DoS and DDoS attacks since most of them filter the normal and attack traffic based upon the static predefined rules.

Categories:
7104 Views

Industrial Internet of Things (IIoTs) are high-value cyber targets due to the nature of the devices and connectivity protocols they deploy. They are easy to compromise and, as they are connected on a large scale with high-value data content, the compromise of any single device can extend to the whole system and disrupt critical functions. There are various security solutions that detect and mitigate intrusions.

Categories:
4035 Views

The OFMC back-end in AVISPA is used to carry out security verification experiments in our scheme for the login and authentication phase,  Case1 in the password and biometric renewal phase, and Case2 in the password and biometric renewal phase, respectively.

Here's the experimental result for the login and authentication phase as a show.

Categories:
121 Views

This is a dataset is an example of a distribution of 20 correlated Bernoulli random variables.

Categories:
307 Views

This dataset is a hand noted dataset that consists of two categories, evasion and normal methods. By evasion methods we mean the methods that are used by Android malware to hide their malicious payload, and hinder the dynamic analysis. Normal methods are any other methods that cannot be used as evasion techniques. Also, the evasion methods are categorized into six categories: File access, Integrity check, Location, SMS, Time, Anti-emulation. This dataset can be used by any ML or DL approaches to predict new evasion techniques that can be used by malware to hinder the dynamic analysis.

Categories:
413 Views

Cyber-physical systems (CPS) have been increasingly attacked by hackers. Recent studies have shown that CPS are especially vulnerable to insider attacks, in which case the attacker has full knowledge of the systems configuration. To better prevent such types of attacks, we need to understand how insider attacks are generated. Typically, there are three critical aspects for a successful insider attack: (i) Maximize damage, (ii) Avoid detection and (iii) Minimize the attack cost.

Categories:
286 Views

Communication of selected devices captured on LAN. The communication is stored in pcapng format. Files captures device's communication such as: connection to a network, configuration and other activities specific to each device.

Selected devices are:

- TP-LINK LB110

- TP-LINK HS100

- NETATMO smart radiators valves

- BML smart IP camera

Categories:
501 Views

  Physical layer secret key generation is a promising candidate to achieve one-time-pad encryption approach for the wireless communication system. However, in a static environment, the secret key rate is low due to the lack of channel time-variation. To solve this problem, this paper proposes a novel secret key generation scheme assisted by an intelligent reflecting surface with discrete phase shifts. In the scheme, legitimate nodes construct the dynamic time-varying channel by rapidly and randomly switching the phase of IRS elements.

Categories:
240 Views

Pages