Privacy and security, particularly maintaining confidentiality of data, have become a challenging issue with advances in information and communication technology. The ability to communicate and share data has many benefits, and the idea of an omniscient data source carries great value to research and building accurate data analysis models. For credit card companies to build […]
METRIC AND MATHEMEDICAL FOR EVALUATING NAVIGATION EFFECTIVENES
The advent of the Internet has provided an unprecedented platform for people to acquire knowledge and explore information. There are 1.73 billion Internet users worldwide as of September 2009, an increase of 18 percent since 2008 .The fast-growing number of Internet users also presents huge business opportunities to firms. the increasing demands from online customers, […]
A fuzzy logic-based node localization Framework for mobile Sensor Network
Fuzzy logic offers an inexpensive and robust way to deal with highly complex and variable models of noisy, uncertain environments. It provides a mechanism to learn about an environment in a way that treats variability consistently FUZLOC, a fuzzy logic-based localization method suitable for wireless sensor nodes that are mobile in noisy, harsh environments. We […]
Decentralized, Key-Based Caching And Checking System To Catch Cloned Nodes
In this paper, we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. The protocol performance on efficient storage consumption and […]
To detect and mitigate collaborative attacks in the cloud Virtual networking environment
NICE utilizes the attack graph model to conduct attack detection and prediction. The proposed solution investigates how to use the programmability of software switches based solutions to improve the detection accuracy and defeat victim exploitation phases of collaborative attacksCloud security is one of most important issues that has attracted a lot of research and development […]
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
A Stochastic Model to Investigate Data Center Performance and QoS in IaaS Cloud Computing Systems
Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement to the federation with other clouds. Performance evaluation of Cloud Computing infrastructures is required to predict and quantify the cost-benefit of a strategy portfolio and the corresponding Quality of Service (QoS) […]
ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high […]
Facilitates systematic detection and resolution of XACML policy anomalies
In this paper, we represent an innovative policy anomaly analysis approach for Web access control policies, focusing on XACML (eXtensible Access Control Markup Language) policy.We introduce a policy based segmentation technique to accurately identify policy anomalies and derive effective anomaly resolutions, along with an intuitive visualization representation of analysis results. We also discuss a proof-of-concept […]
Authorization Security model conceived to secure access to Semantic repositories
Most semantic repositories are designed to manage semantic models but do not deal with access rights. As in the case of databases that are traditional, data stored inside a semantic database should be protected. by granting access to authorized users only. Semantic models help in achieving semantic interoperability among sources of data and applications. The […]