Explore chapters and articles related to this topic
Laboratory Exercises to Accompany Industrial Control and Embedded Systems Security Curriculum Modules
Published in Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq, Cybersecurity and Privacy in Cyber-Physical Systems, 2019
Guillermo A. Francia, Jay Snellen, Gretchen Richards
The concept of a firewall originated from the wall that separates sections of a building having the purpose of preventing fire from spreading from one section to another. In network security, a firewall is a device that determines whether to allow or discard a packet that goes through it, depending on certain preset policies.
Application of Cryptography and Network Security in the Internet of Things (IoT)
Published in Rajdeep Chowdhury, S. K. Niranjan, Advances in Applications of Computational Intelligence and the Internet of Things, 2022
Network security is a process of protection for the access to files and directories in the computer network against any unauthorized access, misuse, hacking, modification, destruction, malfunction, etc. so that it provides a highly secured platform and environment for the computer users.
Isolated toughness and fractional (a,b,n)-critical graphs
Published in Connection Science, 2023
Wei Gao, Weifan Wang, Yaojun Chen
In this paper, we determine the sharp isolated toughness bound for a graph to be fractional -critical. Since fractional -factor is a specific case of the more general fractional factors. n the stage of computer network topology design, it needs to make a balance between network security and network construction cost. The denser the network, the greater the isolated toughness, the stronger the corresponding network's ability to resist attacks, and the stronger the network. However, such a high-density network requires high construction costs, which greatly increases the network construction and maintenance costs. The tight bound of the isolated toughness parameter of the fractional critical graph provides engineers an important reference index. The network constructed according to the tight bound can theoretically guarantee that data transmission can still be maintained when the network suffers certain damages, and at the same time ensure the minimum cost of network construction, thus cut the budget.
TCN enhanced novel malicious traffic detection for IoT devices
Published in Connection Science, 2022
Liu Xin, Liu Ziang, Zhang Yingli, Zhang Wenqiang, Lv Dong, Zhou Qingguo
Researchers actively explore and continuously improve network traffic detection technologies to improve network security and network service quality (Cai et al., 2022; Liu et al., 2019; Ning et al., 2021). The early network traffic detection mainly depended on the port allocation of the transport layer. The feature extraction was to obtain the port number of the transport layer. Because the detection accuracy decreased with reducing the proportion of traffic with fixed ports (Madhukar & Williamson, 2006), this method is not applicable in today's network environment. Deep Packet Inspection (DPI) is a common-used method in traffic detection. The DPI method based on fingerprint matching is still widely used in nowadays network security (Xu et al., 2016). In particular, the conventional matching method is used to represent the traffic features like regular expressions and then match them through the regular matching algorithm, which significantly improves the detection efficiency.
Software-Defined Networking Techniques to Improve Mobile Network Connectivity: Technical Review
Published in IETE Technical Review, 2018
Other than the above, another research from Moser and Jaramillo [16] has taken into consideration a scenario where an attacker succeeds to connect to the SDN network, for which, they have proposed mobile SDN architecture to improve security. The architecture guards against eavesdropping happening along the network path. For example, an enterprise video calling application will block all other applications’ communication on the calling party device or reserve device bandwidth solely to be used by the video application for better security. As well, independent virtual networks can be defined to suit individual's needs. This is crucial especially in providing network security without using external firewall. If the attacker successfully compromises the SDN network, monitoring of virtualization requests for aberrant behavior can be made by analyzing SDN controller logs through the security application. Abusive network connections can be torn down upon alerts triggered by the security application. Other than tearing down the compromised connection, SDN policy engine can be consulted by SDN controller optionally to learn new rules and policies for discovering malware on device according to network usage patterns. Furthermore, an isolated virtualized network can also be set up to reroute the communications for capture and security analysis and quarantine aberrant device actor.