Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "attacks" wg kryterium: Temat


Tytuł:
A Study on Denial of Service Attacks in Cluster Based Web Servers
Autorzy:
Poornima, A.
Maheshwari, D.
Powiązania:
https://bibliotekanauki.pl/articles/1193575.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DoS attacks
Flooding
Protocol
Opis:
In today’s computing world Network Security became vulnerable. As many types of attacks makes the system unsecure and reduces the performance of servers. One such attack is - Denial of Service (DoS) attacks. The drawbacks of this attacks end user application accessibility will be diminishing and the request handling capacity of the application server will drastically subsides.
Źródło:
World Scientific News; 2016, 41; 222-229
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an algorithm for detecting attacks in sensor wireless systems
Autorzy:
Belej, Olexander
Bokla, Natalia
Więckowski, Tadeusz
Powiązania:
https://bibliotekanauki.pl/chapters/32083874.pdf
Data publikacji:
2021
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
wireless networks
attacks
attack detection system
Opis:
Wireless networks have gained immense popularity. Their widespread distribution is due to undeniable advantages over traditional cable networks: ease of deployment, user mobility in the network coverage area, easy connection of new users. On the other hand, the security of such networks often limits their application. If an attacker needs to have a physical connection to the network when attacking a wired network, then in the case of wireless networks, he can be anywhere in the network coverage area. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed below. On the other hand, the low level of security of such networks often limits their application. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed.
Źródło:
Methods and tools in CAD – selected issues; 51-62
9788366391871
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards an Evaluation Model of Trust and Reputation Management Systems
Autorzy:
Janiszewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/226314.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
trust
reputation
attacks
trust and reputation management system
TRM
attacks on trust and reputation management systems
Opis:
The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 4; 411-416
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks
Autorzy:
Gharib, H
Belloulata, K
Powiązania:
https://bibliotekanauki.pl/articles/103196.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
authentication
attacks
Kerberos
MANET
threshold cryptography
Opis:
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 12-18
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Counter Terrorist Solutions in the Polish Police versus Contemporary Forms and Methods of Terrorist Organizations Activities
Autorzy:
Liedel, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2055861.pdf
Data publikacji:
2018-12-21
Wydawca:
Collegium Civitas
Tematy:
police
combating terrorism
counterterrorist sub-units
anti-terrorism system
terrorist attacks
forms and methods of attacks
Opis:
The security environment in the 21st century is dynamic. The tools that the state uses to ensure its own security, its and citizens’ interests must be adapted to the current challenges. Preparation of counter-terroristic sub-units of the Police, both in terms of their organization, their place in the wider structure of security and public order services, as well as and legal basis for action, is one of the most important among these tools. The article is devoted to the analysis of the preparation of counterterrorism subunits of the Polish Police to the challenges posed by tactics used by terrorist organizations, posing a threat to national and international security.
Źródło:
Securitologia; 2018, 1 (27); 94-106
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges for Ukraine’s cyber security: National dimensions
Autorzy:
Katerynchuk, Pavlo
Powiązania:
https://bibliotekanauki.pl/articles/1041594.pdf
Data publikacji:
2019-12-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
cyberspace
cyber security
hacker attacks
information security
Opis:
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
Źródło:
Eastern Review; 2019, 8; 137-147
1427-9657
2451-2567
Pojawia się w:
Eastern Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Women of Palestine Fighting for Independence
Autorzy:
Deja, Elżbieta
Powiązania:
https://bibliotekanauki.pl/articles/2053964.pdf
Data publikacji:
2017
Wydawca:
Collegium Civitas
Tematy:
female bombers
IDF
suicide attacks
suicide bombers
Opis:
The article is going to present the main reasons for which Palestinian women decide to take part in suicide bombing. The brief characteristic of Palestinian female bombers will allow answering the following questions: What makes women to conduct suicide attacks? Is this a kind of fight for emancipation or gender equality? To what extend participating in a terrorist attack is a sovereign decision of a woman and to what extent are they used as a new type of weapon and treated just like a tool?
Artykuł ma na celu przedstawienie powodów, dla których kobiety palestyńskie decydują się na udział w bombowych atakach samobójczych. Krótka charakterystyka palestyńskich kobiet-bomb pozwoli odpowiedzieć na pytania: Co popycha kobiety do przeprowadzenia ataków terrorystycznych? Czy to swoista walka o emancypację lub równość płci? Na ile udział w zamachu jest suwerenną decyzją samych kobiet, a na ile stanowią one nowy rodzaj broni i są traktowane instrumentalnie?
Źródło:
Securitologia; 2017, 1 (25); 109-118
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ataki z wykorzystaniem serwera DNS (Domain Name System)
Attacks with the use of DNS servers (Domain Name System)
Autorzy:
Antkowiak, Magdalena
Engler, Maria
Kośmider, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/41205526.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
zagrożenia bezpieczeństwa
atak
DNS
security threats
attacks
Opis:
Serwery DNS (Domain Name System) to pewnego rodzaju książka telefoniczna Internetu. Bez nich nie byłoby możliwe wywołanie żadnej strony internetowej, nasz komputer nie widziałby, jak przyporządkować adres internetowy konkretnemu serwerowi. Obecnie hakerzy potrafią uzyskać dostęp do serwerów DNS, a następnie przekierować przepływ informacji na własne komputery. Ataki z wykorzystaniem serwera DNS są bardzo niebezpieczne, głównym celem jest wyszpiegowanie poufnych informacji, takich jak: hasła czy kody PIN umożliwiających dostęp do internetowych banków. W niniejszym artykule zostaną przedstawione zagrożenia usługi DNS.
DNS Servers are kind of the internet's phone book. Without DNS, there wouldn't be possible to open a website and our computer wouldn't know how to assign an internet address to a particular server. Currently, hackers are able to get an access to DNS servers and then transfer the information to their computers. The attacks with the use of DNS servers are very dangerous, as the main purpose of them is to spy sensitive information, such as passwords or PINs which allow the access to the online banks. In this article, there will be presented the danger of DNS service.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2015, 18; 7-10
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Overview of round one power attacks on SHA-3 Based MAC
Autorzy:
Millar, Kevin
Chu, Chun-Yi
Łukowiak, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/397819.pdf
Data publikacji:
2018
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
SHA-3
power attacks
FPGA
atak energetyczny
Opis:
Digital signatures and message authentication codes are the two most common applications of cryptographic hash functions. Others range from ensuring data integrity to randomization functions and key derivation. Because of there cent break of the SHA-1 hash function, it is expected that in the nearest future there will be an increasing interest in the new SHA-3 algorithm. SHA-3 implements a subset of the Keccak family and was released as the NIST standard in 2015.SHA-3 based MAC is a keyed-hash message authentication function, which can be used to verify both the data integrity of a message and its source. Though Keccak is cryptographically secure, implementations of the algorithm may be susceptible to power analysis attacks if not sufficiently protected. This work implements and analyzes two correlation power analysis (CPA)attacks targeting the round one operations of a SHA-3 based MAC implementation on an FPGA.
Źródło:
International Journal of Microelectronics and Computer Science; 2018, 9, 3; 114-122
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ontology of input validation attack patterns on web applications
Autorzy:
Akinwale, Adio
Shonubi, Joseph
Adekoya, Adebayo
Sodiya, Adesina
Mewomo, Tosin
Powiązania:
https://bibliotekanauki.pl/articles/432359.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
input validation attacks
patterns
ontology
web application
Opis:
Web applications have been the main intrusion target, and input errors from the web users lead to serious security vulnerabilities. Many web applications contain such errors, making them vulnerable to remotely exploitable input validation attacks such as SQL Injection, Command Injection, Meta-Characters, Formatting String, Path Traversal and Cross Site scripting. In this paper, we present ontology to represent patterns of input validation attacks on web applications. More specifically, our ontology is based on individual subclasses, properties and inverse functional properties, domain and range of input validation attack patterns. The ontology is implemented and interpreted with the web application development language OWL (Ontology Web Language).
Źródło:
Informatyka Ekonomiczna; 2013, 4(30); 11-23
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Autorzy:
Motupalli, Ravi Kanth
Prasad, Krishna K.
Powiązania:
https://bibliotekanauki.pl/articles/2086214.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
Hadoop network
data security
cyber attacks
Salsa20
Opis:
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 140--144
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
MISJA WOJSK ISAF W AFGANISTANIE – ZAGROŻENIA TYPU „GREEN ON BLUE”
THE ISAF MISSION IN AFGHANISTAN – THE DANGER OF ‘GREEN ON BLUE’ ATTACKS
Autorzy:
MACHNIAK, ARKADIUSZ
Powiązania:
https://bibliotekanauki.pl/articles/513256.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
green on blue attacks
Taliban
ISAF
coalitions
Afghanistan
Opis:
The terrorist attacks in New York on 11th September 2001 resulted in a new method of armed conflict which was asymmetric in character, on this occasion in Afghanistan. The ISAF faced the Taliban – a rival who had an advantage because of local knowledge and help from some of the neighbouring countries, such as Pakistan, and international terrorist organizations such as Al-Qaeda. The Taliban maintained surveillance on the ANSF which supported ISAF. As a result, attacks described as green on blue happened which were caused also by a conflict of a cultural and religious basis between Afghan soldiers and ISAF soldiers. Due to its unpre-dictability and the impossibility of stating its area and time, they became one of the biggest dangers for ISAF soldiers during that difficult mission.
Źródło:
Polityka i Społeczeństwo; 2014, 12, 4; 24-34 (11)
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Life-threatening laryngeal attacks in hereditary angioedema patients
Autorzy:
Piotrowicz-Wójcik, Katarzyna
Porebski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1397492.pdf
Data publikacji:
2020
Wydawca:
Index Copernicus International
Tematy:
C1 inhibitor
hereditary angioedema
icatibant
laryngeal attacks
Opis:
Background: Hereditary angioedema due to C1-inhibitor deficiency (HAE-C1INH) is a rare genetic disease that runs in the family. As a result of the disease, acute swellings of the subcutaneous tissue and mucous membranes of the digestive and respiratory systems, including the larynx, occur. Any attack of the disease involving the throat and larynx is particularly dangerous and requires knowledge of clinical determinants of the disease and its proper management.Materials and methods: The study included adult consecutive HAE-C1INH patients having follow-up visits in our centre. The group was examined with a structured clinical questionnaire, concerning the last 6 months and focusing particularly on laryngeal swelling attacks. Results: 55 subjects (F/M – 35/20, age range – 18–76) were included in the study. Laryngeal attacks occurred in 19 individuals (34.5%): 1–3, 4–6, and ≥7 attacks in 9, 8 and 2 patients, respectively, two of whom required intubation. In comparison to other patients, subjects with laryngeal attacks were characterised by significantly more frequent: (1) facial attacks, (2) severe disease activity, (3) the occurrence of female patients, (4) mental stress as a trigger of attacks. All patients with laryngeal attacks had a rescue medication at home and 15/19 (78%) patients could use it at home. Most of them used plasma-derived C1-inhibitor 17/19 (89.5%) and icatibant, 8/19 (42.1%). Discussion: HAE-C1INH patients with laryngeal attacks require particular attention. Proper training regarding the identifica-tion of these patients, adequate management, access to emergency services and emergency drugs are essential to ensure the safety of subjects with this localization of HAE-C1INH attacks
Źródło:
Polish Journal of Otolaryngology; 2020, 74, 2; 42-46
0030-6657
2300-8423
Pojawia się w:
Polish Journal of Otolaryngology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sieci Wi-Fi – zabezpieczenia i metody ataków
Wi-Fi network - security and methods of attacks
Autorzy:
Nitka, Ewelina
Kawalec, Klaudia
Karpowicz, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/41205533.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
Wi-Fi
WEP
WPA/WPA 2
SSID
metody ataku
atak pasywny
atak aktywny
methods of attack
passive attacks
active attacks
Opis:
Sieci Wi-Fi są systemem komunikacji zaprojektowanym jako alternatywa lub uzupełnienie sieci tradycyjnej kablowej. Sieci bezprzewodowe mają bardzo szerokie zastosowanie. Wykorzystuje się je m.in. do projektowania sieci domowych oraz firmowych. Najprostszą i najczęściej stosowaną metodą zabezpieczenia sieci jest protokół WPA 2 Personal. Od początku istnienia sieci bezprzewodowych trwa prawdziwy wyścig zbrojeń. Nowe opracowania protokołów szybko stają się nieaktualne. Hakerzy odkrywają kolejne metody ataków i wskazują wady istniejących rozwiązań. Przeprowadzenie ataku na sieć na ogół poprzedzone jest zbadaniem środowiska obranego celu. Nie wszystkie ataki jednak związane są z wykorzystaniem sprzętu komputerowego, w niektórych przypadkach łatwiejszym celem są użytkownicy sieci.
Wi-Fi is a system of communication designed with an alternative or a complement for traditional cable network. Wireless networks are very common in use. They are used for example to project a home network or a business network. The easiest and the most popular method of network security is a WPA 2 Personal protocol. From the very beginning, there have been a real arms race. New coverages of the protocols are getting very quickly not actual. Hackers discover new methods of an attack and they show disadvantages of existing solutions. Performing an attack against some network is in general preceded by studying an environment of the aim. Not all attacks are connected with using a hardware. In some cases, users of a network are the easier aim.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2015, 18; 15-19
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies