• ,

    Cyber War Versus Cyber Realities: Cyber Conflict in the International System

    Сети и безопасность, История, Военное дело, оружие, спецслужбы, Публицистика
    In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism.

  • Компьютерная информация под защитой. Правовое и криминалистическое обеспечение безопасности компьютерной информации

    Сети и безопасность
    Работа посвящена исследованию компьютерной информации и компьютерной техники с точки зрения ее правового статуса и правовой защиты. Раскрывается само понятие информации и тот эффект, который оказало на развитие человечества изобретение средств ее автоматической обработки. Особое внимание уделено правовому регулированию статуса компьютерной информации и информационных сетей, включая глобальную сеть "Интернет". Отдельная глава посвящена правовому регулированию вопросов информационной безопасности и защиты информации. Также в книге исследованы вопросы уголовной ответственности за киберпреступления, их расследования и использования компьютерной информации в качестве доказательств.

  • , ,

    Заметки по теории кодирования

    Сети и безопасность
    В этих заметках, написанных по материалам лекций М.Судана в Массачусетском технологическом институте (с его любезного разрешения), излагаются базовые результаты теории кодирования, а также некоторые более новые ек достижения, представляющие интерес для computer science. Книга рассчитана на математиков и программистов (начиная со студентов младших курсов), впервые знакомящихся с теорией кодирования.

  • Интернет вещей с ESP8266

    Сети и безопасность
    Описан процесс разработки недорогих, но эффективных устройств для Интернета вещей на основе популярного микроконтроллера с функцией Wi-Fi ESP8266. Проекты доступны для повторения новичкам в области Интернета вещей, имеющим начальный опыт работы с платформой Arduino. Рассказано, как считывать, отправлять и отслеживать данные через облачные сервисы и дистанционно управлять устройствами откуда угодно, применять ESP8266 для взаимодействия с социальными сетями Twitter и Facebook, отправлять пользователям ESP8266 сообщения по email, SMS и push-каналам, организовывать межмашинное взаимодействие без участия человека, в том числе через облако. На практических примерах показано построение простой системы домашней автоматики с управлением через облако, а также развертывание собственной облачной платформы. Описано, как сделать дверной замок с управлением через облако, физический индикатор курса цифровой валюты, беспроводное садовое оборудование и многие другие устройства на основе ESP8266.

  • The Problems of Spam and the Mechanisms to Prevent it

    Бизнес литература, Сети и безопасность
    This book summarizes several researches and reports about spam. Many users underestimate the losses caused by spam and assume the severity of the problem by the amount of spam they receive in their inbox. However, the total worldwide financial losses caused by spam are estimated at several billion USD per year. The problems of spam include impacts on businesses, stress, phishing, loss of corporate assets, inconvenience for the individual users, contribution to the carbon foot print of IT (or global warming), legal issues and exposure to viruses, spyware and Adware to name a few. Research shows that spam contributes more than 80% of e-mails with an increase in its growth rate every year. Spam is not limited to emails. It has started affecting other popular applications like VoIP, cellular telephony, traditional telephony, and instant messaging services. Spam in VoIP is more severe to spam in emails. This book also presents the various anti-spam approaches and discusses the advantages and the drawbacks of these approaches. Fighting spam with a combination of different anti-spam technological approaches gives better results.

  • ,

    Основы SNMP

    Сети и безопасность
    Второе издание книги "Основы SNMP" - это практическое руководство для системных и сетевых администраторов, которые пользуются протоколом SNMP для управления своими серверами и маршрутизаторами. Книга начинается с объяснения основных принципов SNMP и его работы и охватывает такие технические элементы, как идентификаторы объектов (OID), базы MIB, строки сообщества и ловушки. Что более важно, эта книга показывает вам, как пользоваться SNMP для получения полной информации о функционировании вашей сети. Внимание авторов сосредоточено на практическом системном и сетевом администрировании, конфигурации SNMP-агентов и станций управления сетью, использовании SNMP для получения и изменения переменных на сетевых устройствах и конфигурации программ управления для реагирования на ловушки, отправляемые устройствами. Главы второго издания были тщательно переработаны и дополнены, и теперь книга содержит ряд Perl-сценариев, которые помогут вам автоматизировать большее число задач по управлению. Вы найдете сценарии для мониторинга служб SMTP, РОРЗ, HTTP и DNS, SNMP-агента на Perl, управления портами коммутатора, использования MIB Cisco Ping, а также раздел по мониторингу беспроводных точек доступа (WAP) и новую главу по Java и SNMP. Книга полна практических примеров использования различных инструментов, от популярных коммерческих продуктов, таких как HP OpenView и Castle Rock SNMPc, до разнообразного ПО с открытым исходным кодом.

  • ,

    Выжить в цифровом мире для родителей. Иллюстрированные советы от «Лаборатории Касперского»

    Книги для родителей, Сети и безопасность
    Дорогие дети, родители, бабушки, дедушки, братья, сестры, тети и дяди. Если вы держите эту книгу, вам по какой-то причине небезынтересна тема онлайн-жизни детей и подростков и их защищенности в Сети (ну или вам просто очень понравились картинки, это мы тоже одобряем). На сегодня технологии настолько тесно сплелись с реальностью, что защита и воспитание ребенка в информационной среде должны стать неотъемлемой частью воспитания ребенка как такового. Эта книга легко и понятно расскажет о тех опасностях, которые подстерегают в интернете детей и подростков, и объяснит, как их избежать. Кроме того, родителям станет ясно, о чем и в каком ключе стоит поговорить с детьми, о каких рисках им рассказать. Смело отправляйтесь в путешествие в Сеть, вооружившись знаниями и защитившись специальным ПО, и вам будут не страшны никакие вирусы, мошенники, тролли и онлайн-груммеры!

  • ,

    Самоучитель системного администратора

    Сети и безопасность
    Изложены основные задачи системного администрирования, описаны базовые протоколы, даны рекомендации по выбору оборудования и проведению ежедневных рутинных операций. Подробно раскрыты технологии, используемые при построении информационных систем, описаны средства мониторинга и обслуживания как малых, так и распределенных сетей. Рассмотрены методы централизованного управления, основы создания безопасной среды. Даны рекомендации по поиску неисправностей, обеспечению защиты данных. Параллельно рассмотрены решения на основе операционных систем Windows (в том числе Windows 7/8 и Windows Server 2012) и Linux с использованием как проприетарных, так и открытых технологий. Книга написана на основе многолетнего опыта разработки и практического администрирования информационных систем. Из четвертого издания удален весь неактуальный материал, связанный со старыми технологиями, версиями Windows, старым программным обеспечением. Рассмотрены новейшие технологии, в том числе облачные, существенно возросло количество практических советов, инструкций и рекомендаций. 

  • Computer Networks from Scratch

    Сети и безопасность
    In the world of technology, computer networks became a medium for communication between people and machines. Internet runs on the top of the computer networks.In this field, security become more necessary because most of the money transactions are happening through Internet.we have covered from basic ideas of the computer networks to modern technology exist in the field. This book will be more useful for the student community.

  • Security and Privacy in Vehicular Ad hoc Networks

    Сети и безопасность
    Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants. In this dissertation, we address security, anonymity, and privacy challenges of VANETs in the light of the IEEE standards for vehicular communications. VANET provides a variety of road-safety and other applications through wireless devices installed in vehicles and roadside infrastructure. However, a vehicle must not be able to take advantage of its anonymity for any misbehavior like sending false messages or malicious updates to other vehicles or a roadside infrastructure. We use proxy signature, identity-based signature, and elliptic curve cryptosystems to provide authentication for infrastructure generated messages, and anonymous authentication for vehicle originated messages. Also, we investigate how some of the MAC-layer weaknesses may impair the security of a VANET. Our solutions are lightweight, bandwidth friendly and compatible to the current standards of vehicular communications.

  • ,

    Intrusion Detection Engine for Adhoc Environment

    Сети и безопасность
    Most existent protocols, applications and services for mobile Adhoc networks (MANETs) assume a cooperative and friendly network environment and do not accommodate security. In MANETs, intrusion prevention (IPS) and intrusion detection (IDS) techniques need to complement each other to guarantee a highly secure environment. The IPS and IDS play different roles in different states of the network. Intrusion prevention measures, such as encryption and authentication, are more useful in preventing outside attacks. Once the node is compromised, intrusion prevention measures will have a little effect in protecting the network. Therefore, an intrusion detection system is serving as the second line of defense in Adhoc network. This Book used the incremental approach to designing the detection engine for Adhoc network environments.

  • Towards Ultra-High Speed Online Network Traffic Classification

    Сети и безопасность
    Ultra-high speed networks require real-time traffic classification in order to identify the presence of certain network applications and utilize network resources to ensure these applications run smoothly. Machine learning provides a promising alternative for traffic classification based on statistical flow features, avoiding raising privacy and security concerns. Accurate traffic classification, however, is an expensive procedure that can increase networking latency and decrease bandwidth. As an open specification, the OpenFlow protocol provides the flexibility of programmable flow processing to perform more complicated statistical analysis. So, enhanced with machine learning algorithms and OpenFlow extensions, my research focuses on the design and implementation of traffic classification system that accurately classifies traffic without affecting the latency or bandwidth of network.

  • On Designing Energy Conserving WSN

    Сети и безопасность
    Sensors are low cost tiny devices with limited storage, computational capability and power. They can be deployed in large scale for performing both military and civilian tasks. The main concern in Wireless Sensor Networks is how to utilize the limited energy resources. The performance of Wireless Sensor Networks strongly depends on their lifetime. As a result, Dynamic Power Management approaches with the purpose of reduction of energy consumption in sensor nodes, after deployment and designing of the network, have drawn attentions of many research studies. The neural-networks algorithms can lead to lower communication costs and energy conservation. All these characteristics show great analogy and compatibility between wireless sensor networks and neural networks. This book main focus is to present the most important possible application of neural networks in reduction of energy consumption.

  • Time Variable PDF Presented by Neural Network for data Compression

    Сети и безопасность
    In this book, first, we introduce Huffman coding and present some examples for more clarification. We then present Huffman problems in form of some examples. Next, we explain Probability Density Function (PDF) for a stream. Our aim in this chapter is to fit a function on probability density curve representing an information stream using artificial Neural Network (NN). This methodology results in a specific function which represents a memorize able probability density curve. We then use the resulting function for information compression by Huffman algorithm. For this aim, first we introduce the basis of neural network with some examples and then we show popular transfer function using in NN. Also, we represent neural network structure which is applied in this chapter. We next propose two different algorithms for information encoding and decoding using time variable estimation of probability density function. In order to evaluate the proposed algorithm, the percentage of compression resulting from the proposed method has been compared with two popular methods named FDR code and Golomb at the end.

  • Environmental Monitoring

    Сети и безопасность
    Environmental monitoring devices are essential for all data or server rooms whether large or small. These devices are only being manufactured by international vendors and are very costly. The large data centers and organizations that can afford these devices use them for their data centers but small universities and schools, although in need, do not opt for these devices and compromise. Our aim was to make an indigenous cost effective solution that can solve this issue. Our device is cheap, less complex and provide basic services that can save any server room or IT facility from going down. Our device might not have all those features offered by the international vendors but can surely serve the objective.

  • Warning Alert for Disaster & Its Management

    Сети и безопасность
    Disaster is the activity that occurs anytime, anywhere without prior information. It is very harmful and dangerous even a small one can affect the people’s life, prosperity and their wealth. Disaster occurrence affects the whole mankind, human beings, animals and their prosperity. So we need alert system that we can acknowledge their occurrence before its happening. Disaster Management using WSN (wireless sensor network) that helps to the sense the environment factors and on the behalf of the factors use Leach (Low Energy Adaptive Clustering Hierarchy) algorithm that is hierarchical in nature and provide connection and communication between the nodes to prevent from snow avalanche and forest fire. To prevent the pilgrims or local people before falling of landslides we create an alert system for it by using modified particle filtering algorithm.in this we detect the change in position and velocity in the video image of rocks of mountain using modified particle filtering algorithm by tracking the movement of particles by using its likelihoods. To communicate between the nodes or sending the information form one node to another, we use Leach (Low Energy Adaptive Clustering Hierarchy)

  • An Energy-Efficient Routing Protocol for Homogeneous WSN

    Сети и безопасность
    Wireless sensor network is composed of large number of sensor nodes (SNs) and one or more sink nodes also called as base stations (BS) to which data is to be transmitted. These sensor nodes are associated with limited battery power and wireless communication which are deployed to collect useful information from the field. Gathering this sensed information in cost effective manner at base station is task of research.Earliest proposed techniques were directly transmitting data to base station which was further improved by collecting and aggregating the data in sensor network which increased network lifetime by a factor of 8, that is further improved by different proposed protocols.In this book a routing technique to collect and aggregate the data of sensor network and then to transmit it to base station is proposed which is based on MST generation among sensor nodes and partitioning the network into 3 areas (named tiers) based on the distance from base station and is implemented in c++, this proposed protocol is named as MSMTP (Minimum Spanning Multi Tier Protocol).The results obtained in this approach are about 1.4x improved as compared to PEGASIS protocol.

  • Characterizing User Mobility In Wireless Networks

    Сети и безопасность
    Node mobility is a key factor in the design and performance evaluation of mobile networks and their protocols and mobility characterization has attracted considerable attention from the networking research community. In this work we have explored the spatial behavior of human mobility through through the analysis of a variety of mobility traces collected in different network environments. As a result, we identify characteristics exhibited by human mobility that, to the best of our knowledge, have not yet been revealed in previous studies. We used a number of real traces that record user mobility in wireless LANs as well as GPS traces.

  • Performance Evaluation of MANET (Mobile Ad-hoc Network) Metrics

    Сети и безопасность
    A mobile ad hoc network (MANET) incorporate mobile wireless nodes, the communication between these is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes as a router receive and forward packets. Routing is a critical issue in MANET and hence the focus of this work along with the performance analysis of routing protocols. In this work, the evaluation and study of four routing protocols i.e. AODV, DSR, OLSR and TORA is done on the basis of the mobile node mobility factors, traffic sources and traffic loads. The simulation tool used is OPNET modeler version 14.0. The performance of these routing protocols is analyzed using three metrics: packet end to end delay, routing overhead and throughput. All the four routing protocols are compared, analyzed and explained in a detailed manner with metrics.

  • Development of a Long Range Wireless Sensor Node

    Сети и безопасность
    Wireless Sensor Networks have the potential to revolutionize our society. They provide a low cost and accurate means of capturing information about our surrounding environment. Wireless sensor networks have already been utilized extensively in military and biomedical industries and they are slowly finding their way in other applications. Most of the existing sensor nodes in market have limited communication range and therefore cannot be used in environmental monitoring applications. This book takes a practical approach to the development of long range wireless sensor platform which can be used in environmental monitoring applications. This sensor node is capable of covering hundreds of kilometers by utilizing a proprietary mesh protocol .The art of sensor node development is investigated from both hardware and software perspectives.

Фильтр