intrusion protection systems

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3435 Experts worldwide ranked by ideXlab platform

Joseph G Tront - One of the best experts on this subject based on the ideXlab platform.

  • simulating the deployment of battery sensing intrusion protection systems
    Hawaii International Conference on System Sciences, 2009
    Co-Authors: Theresa M Nelson, T K Buennemeyer, Randy Marchany, Joseph G Tront
    Abstract:

    This paper extends Battery-Sensing intrusion protection System (B-SIPS) research by utilizing network simulations for deployment validation and optimization. The primary simulation goal is to ensure that B-SIPS does not negatively affect external applications in the network, as any drastic throughput degradation would severely lower the probability of successful B-SIPS deployments. The research goal is accomplished goal by modeling the Virginia Tech wireless-cum-wired network and simulating various network sizes, external network loads, and B-SIPS application transmission settings. This research demonstrates that under reasonable network loads the B-SIPS application had little to no effect on the throughput of external applications. Additionally, the 1 second default transmission rate for B-SIPS was determined to cause the least application degradation for external applications and ensured B-SIPS reports were successfully transmitted in a saturated network environment. Next, the detection capabilities of B-SIPS are examined by conducting Bluetooth, Wi-Fi, and blended attacks against mobile devices. The ability of B-SIPS to detect multi-vector attacks provides application users with the ability to conserve battery charge life and retain device service significantly longer than devices undergoing similar attacks and not utilizing B-SIPS. The attacks used in this portion of the research should be applied to future network simulations of B-SIPS. These simulations will quantify network throughput and device battery usage in large scale network deployments that are, and are not, using B-SIPS.

  • Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
    Conference Proceedings - IEEE SOUTHEASTCON, 2007
    Co-Authors: Timothy K. Buennemeyer, Theresa M Nelson, Randy C. Marchany, Joseph G Tront
    Abstract:

    This paper introduces a supporting model for a unique Battery-Sensing intrusion protection System (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-SIPS. Battery-based attack detections can be significantly increased by investigating variable smart battery polling rates, system management bus speeds, and attack execution times. This research explores the modification of smart battery polling rates in conjunction with the variance of malicious network activity. An optimum static polling rate for each of the selected illicit network attack densities was determined by altering these two parameters. These optimum static polling rates introduce minimum and maximum thresholds for the various scenarios mobile devices encounter on a daily basis. Future work will investigate dynamic solutions to optimize battery lifetime under a range of circumstances by encompassing the data results found in this study. © 2007 IEEE.

Theresa M Nelson - One of the best experts on this subject based on the ideXlab platform.

  • simulating the deployment of battery sensing intrusion protection systems
    Hawaii International Conference on System Sciences, 2009
    Co-Authors: Theresa M Nelson, T K Buennemeyer, Randy Marchany, Joseph G Tront
    Abstract:

    This paper extends Battery-Sensing intrusion protection System (B-SIPS) research by utilizing network simulations for deployment validation and optimization. The primary simulation goal is to ensure that B-SIPS does not negatively affect external applications in the network, as any drastic throughput degradation would severely lower the probability of successful B-SIPS deployments. The research goal is accomplished goal by modeling the Virginia Tech wireless-cum-wired network and simulating various network sizes, external network loads, and B-SIPS application transmission settings. This research demonstrates that under reasonable network loads the B-SIPS application had little to no effect on the throughput of external applications. Additionally, the 1 second default transmission rate for B-SIPS was determined to cause the least application degradation for external applications and ensured B-SIPS reports were successfully transmitted in a saturated network environment. Next, the detection capabilities of B-SIPS are examined by conducting Bluetooth, Wi-Fi, and blended attacks against mobile devices. The ability of B-SIPS to detect multi-vector attacks provides application users with the ability to conserve battery charge life and retain device service significantly longer than devices undergoing similar attacks and not utilizing B-SIPS. The attacks used in this portion of the research should be applied to future network simulations of B-SIPS. These simulations will quantify network throughput and device battery usage in large scale network deployments that are, and are not, using B-SIPS.

  • Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
    Conference Proceedings - IEEE SOUTHEASTCON, 2007
    Co-Authors: Timothy K. Buennemeyer, Theresa M Nelson, Randy C. Marchany, Joseph G Tront
    Abstract:

    This paper introduces a supporting model for a unique Battery-Sensing intrusion protection System (B-SIPS) for mobile computers, which alerts when power changes are detected on small wireless devices. An analytical model is employed to examine smart battery characteristics to support the theoretical intrusion detection limits and capabilities of B-SIPS. Battery-based attack detections can be significantly increased by investigating variable smart battery polling rates, system management bus speeds, and attack execution times. This research explores the modification of smart battery polling rates in conjunction with the variance of malicious network activity. An optimum static polling rate for each of the selected illicit network attack densities was determined by altering these two parameters. These optimum static polling rates introduce minimum and maximum thresholds for the various scenarios mobile devices encounter on a daily basis. Future work will investigate dynamic solutions to optimize battery lifetime under a range of circumstances by encompassing the data results found in this study. © 2007 IEEE.

Randy Marchany - One of the best experts on this subject based on the ideXlab platform.

  • simulating the deployment of battery sensing intrusion protection systems
    Hawaii International Conference on System Sciences, 2009
    Co-Authors: Theresa M Nelson, T K Buennemeyer, Randy Marchany, Joseph G Tront
    Abstract:

    This paper extends Battery-Sensing intrusion protection System (B-SIPS) research by utilizing network simulations for deployment validation and optimization. The primary simulation goal is to ensure that B-SIPS does not negatively affect external applications in the network, as any drastic throughput degradation would severely lower the probability of successful B-SIPS deployments. The research goal is accomplished goal by modeling the Virginia Tech wireless-cum-wired network and simulating various network sizes, external network loads, and B-SIPS application transmission settings. This research demonstrates that under reasonable network loads the B-SIPS application had little to no effect on the throughput of external applications. Additionally, the 1 second default transmission rate for B-SIPS was determined to cause the least application degradation for external applications and ensured B-SIPS reports were successfully transmitted in a saturated network environment. Next, the detection capabilities of B-SIPS are examined by conducting Bluetooth, Wi-Fi, and blended attacks against mobile devices. The ability of B-SIPS to detect multi-vector attacks provides application users with the ability to conserve battery charge life and retain device service significantly longer than devices undergoing similar attacks and not utilizing B-SIPS. The attacks used in this portion of the research should be applied to future network simulations of B-SIPS. These simulations will quantify network throughput and device battery usage in large scale network deployments that are, and are not, using B-SIPS.

T K Buennemeyer - One of the best experts on this subject based on the ideXlab platform.

  • simulating the deployment of battery sensing intrusion protection systems
    Hawaii International Conference on System Sciences, 2009
    Co-Authors: Theresa M Nelson, T K Buennemeyer, Randy Marchany, Joseph G Tront
    Abstract:

    This paper extends Battery-Sensing intrusion protection System (B-SIPS) research by utilizing network simulations for deployment validation and optimization. The primary simulation goal is to ensure that B-SIPS does not negatively affect external applications in the network, as any drastic throughput degradation would severely lower the probability of successful B-SIPS deployments. The research goal is accomplished goal by modeling the Virginia Tech wireless-cum-wired network and simulating various network sizes, external network loads, and B-SIPS application transmission settings. This research demonstrates that under reasonable network loads the B-SIPS application had little to no effect on the throughput of external applications. Additionally, the 1 second default transmission rate for B-SIPS was determined to cause the least application degradation for external applications and ensured B-SIPS reports were successfully transmitted in a saturated network environment. Next, the detection capabilities of B-SIPS are examined by conducting Bluetooth, Wi-Fi, and blended attacks against mobile devices. The ability of B-SIPS to detect multi-vector attacks provides application users with the ability to conserve battery charge life and retain device service significantly longer than devices undergoing similar attacks and not utilizing B-SIPS. The attacks used in this portion of the research should be applied to future network simulations of B-SIPS. These simulations will quantify network throughput and device battery usage in large scale network deployments that are, and are not, using B-SIPS.

Sanjeev Kumar - One of the best experts on this subject based on the ideXlab platform.

  • Experimental Evaluation of Juniper Network's Netscreen-5GT Security Device against Layer4 Flood Attacks
    Journal of Information Security, 2011
    Co-Authors: Sanjeev Kumar, Raja Sekhar Reddy Gade
    Abstract:

    Cyber attacks are continuing to hamper working of Internet services despite increased use of network secu-rity systems such as firewalls and intrusion protection systems (IPS). Recent Distributed Denial of Service (DDoS) attacks on Dec 8th, 2010 by Wikileak supporters on Visa and Master Card websites made headlines on prime news channels all over the world. Another famous DDoS attacks on Independence Day weekend, on July 4th, 2009 were launched to debilitate the US and South Korean governments’ websites. These attacks raised questions about the capabilities of the security systems that were used in the network to counteract such attacks. Firewall and IPS security systems are commonly used today as a front line defense mechanism to defend against DDoS attacks. In many deployments, performances of these security devices are seldom evaluated for their effectiveness. Different security devices perform differently in stopping DDoS attacks. In this paper, we intend to drive the point that it is important to evaluate the capability of Firewall or IPS secu-rity devices before they are deployed to protect a network or a server against DDoS attacks. In this paper, we evaluate the effectiveness of a security device called Netscreen 5GT (or NS-5GT) from Juniper Networks under Layer-4 flood attacks at different attack loads. This security device NS-5GT comes with a feature called TCP-SYN proxy protection to protect against TCP-SYN based DDoS attacks, and UDP protection feature to protect against UDP flood attacks. By looking at these security features from the equipments data sheet, one might assume the device to protect the network against such DDoS attacks. In this paper, we con-ducted real experiments to measure the performance of this security device NS-5GT under the TCP SYN and UDP flood attacks and test the performance of these protection features. It was found that the Juniper’s NS-5GT mitigated the effect of DDoS traffic to some extent especially when the attack of lower intensity. However, the device was unable to provide any protection against Layer4 flood attacks when the load ex-ceeded 40Mbps. In order to guarantee a measured level of security, it is important for the network managers to measure the actual capabilities of a security device, using real attack traffic, before they are deployed to protect a critical information infrastructure.

  • Experimental Evaluation of Juniper Network’s Netscreen-5GT Security Device against Layer4 Flood Attacks
    2011
    Co-Authors: Sanjeev Kumar, Raja Sekhar, Reddy Gade
    Abstract:

    Cyber attacks are continuing to hamper working of Internet services despite increased use of network secu-rity systems such as firewalls and intrusion protection systems (IPS). Recent Distributed Denial of Service (DDoS) attacks on Dec 8th, 2010 by Wikileak supporters on Visa and Master Card websites made headlines on prime news channels all over the world. Another famous DDoS attacks on Independence Day weekend, on July 4th, 2009 were launched to debilitate the US and South Korean governments ’ websites. These attacks raised questions about the capabilities of the security systems that were used in the network to counteract such attacks. Firewall and IPS security systems are commonly used today as a front line defense mechanism to defend against DDoS attacks. In many deployments, performances of these security devices are seldom evaluated for their effectiveness. Different security devices perform differently in stopping DDoS attacks. In this paper, we intend to drive the point that it is important to evaluate the capability of Firewall or IPS secu-rity devices before they are deployed to protect a network or a server against DDoS attacks. In this paper, we evaluate the effectiveness of a security device called Netscreen 5GT (or NS-5GT) from Juniper Networks under Layer-4 flood attacks at different attack loads. This security device NS-5GT comes with a feature called TCP-SYN proxy protection to protect against TCP-SYN based DDoS attacks, and UDP protectio