Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7 Hits in 6.9 sec

Know Your Enemy: Stealth Configuration-Information Gathering in SDN [article]

Mauro Conti, Fabio De Gaspari, Luigi V. Mancini
2016 arXiv   pre-print
In particular, we introduce a novel attack, named Know Your Enemy (KYE), by means of which an attacker can gather vital information about the configuration of the network.  ...  This information ranges from the configuration of security tools, such as attack detection thresholds for network scanning, to general network policies like QoS and network virtualization.  ...  To summarize, our contribution in this paper is as follows: • We propose a novel, attack, the Know Your Enemy (KYE) attack, that allows stealth intelligence gathering about the configuration of a target  ... 
arXiv:1608.04766v1 fatcat:fqjk7j3w6bcrviwvhh7qsqktcy

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
Public-key cryptography has two implications: if I know your public key and want to send you a secret message, I can encrypt it with your public key, and, since only you know your private key, only you  ...  Discussions of this sort are real enough and genuinely high-tech, but in a sense unimaginative. The heart of information warfare today is the notion of attacking the enemy with information alone.  ...  Notes Chapter 1: Introduction 379 Brooks, Clinton, 78, 83, 205, 231, 348 Brooks, Jack, 346 and in 1940s, 156-158 in 1950s, 159 in 1960s, 159-165 in 1970s and 1980s, 165-167 in 1990s, 169 in American  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2017 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair Of Network Architectures
2017
With this basic information plus perhaps additional auxiliary tools, it is possible to dig deeper and gather even more information. • Another approach on getting to know more about the target system is  ...  Attacks are aimed to cause immediate damage or disruption to vital points within the enemies area of operation while espionage is a used to gaining an advantage by knowing more about the enemy than vice  ... 
doi:10.2313/net-2017-09-1 fatcat:qtxz2tweurbszpmvspmsek3bsq

Protecting a Corporate Network from Insider, Outsider and Collaborative Attacks

Dalal Hanna
2022
A thesis submitted in total fulfilment for the degree of Doctor of Philosophy to the School of Computing, Engineering and Mathematical Sciences, La Trobe University, Victoria, Australia.  ...  Information gathered through LLDP are stored in the device's Management Information Database (MIB). The join message from S contains the switches public identify.  ...  It can easily be implemented in a Software-Defined Networking (SDN) environment.  ... 
doi:10.26181/21671909.v1 fatcat:d3f52fpztbbebavqpj2hcngnkq

CYBER 2016 The First International Conference on Cyber-Technologies and Cyber-Systems CYBER 2016 Committee CYBER Advisory Committee CYBER 2016 Technical Program Committee

Thomas Klemas, Rainer Falk, Syed Naqvi, Thomas Klemas, Rainer Falk, A Siemens, Germany Yao, Yiping, Steve Chan, Jiankun Hu, Carla Westphall, Syed Naqvi (+55 others)
2016 The First International Conference on Advances in Cyber-Technologies and Cyber-Systems (CYBER 2016), held between October 9 and 13   unpublished
Mobility, anonymity, counterfeiting, are characteristics that add more complexity in Internet of Things and Cloud-based solutions.  ...  The event was very competitive in its selection process and very well perceived by the international scientific and industrial communities.  ...  Finally, the authors are very grateful to Greg Gimler, John Nelson, David Carpman and David Oyer for discussions and technical contributions related to the topics in this paper.  ... 
fatcat:du4jikwafzf4fnvx2stgp44oxa

Cyber-Enabled Economic Warfare: An Evolving Challenge A Research Report Edited by CHAPTER 4 The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response

Samantha Ravich, Juan Zarate
unpublished
Visit www.hudson.org for more information.  ...  Founded in 1961 by strategist Herman Kahn, Hudson Institute challenges conventional thinking and helps manage strategic transitions to the future through interdisciplinary studies in defense, international  ...  Western states' interest in Lebanon's private sector has traditionally focused on "know your customer" and transaction data rules.  ... 
fatcat:yuotu7v3pjceln3iju5offafyy

Dagstuhl Reports, Volume 6, Issue 11, November 2016, Complete Issue [article]

2017
summarized the development of kernel methods for machine learning, focusing on the main ideas and some future possibilities: introduction of p.d. kernels within the theory of integral equations, their use in  ...  potential functions methods, in SVM, the general "kernel trick", the observation that kernels can be defined on arbitrary sets of objects, the link to GPs, and finally the idea to represent distributions  ...  Once everything is online and hackable, your car will need monthly software updates just like your laptop and your phone.  ... 
doi:10.4230/dagrep.6.11 fatcat:tfkdfittpjdydfv7ejvk4bvnh4