Could Network View Inconsistency Affect Virtualized Network Security Functions?

Software Defined Networks (SDN) are becoming more commonly used in the cloud. This virtualizes network functions as software instances in the cloud. Mohamad Aslan amd Ashraf Matrawy at Carelton University look at how this characteristics of SDN could affect the performance of Intrusion Detection Systems(IDS) on SDN. Network controllers collect information from other controllers and …

Neural Networks for Securing Vehicles

Probing the limits of anomaly detectors for automobiles with a cyber attack framework Adrian Taylor (Defence R&D Canada), Sylvain Leblanc (Royal Military College of Canada), and Nathalie Japkowicz (American University, USA) Modern vehicles are increasingly governed and controlled by a network of computers.  Automobile security requires that these networks are secure.  Detecting malicious traffic on …

Military CyberSec Logistics,Playing to Win

Power Projection in the Digital Age: The Only Winning Move is to Play General Darren W. McDew, USAF, is the Commander of U.S. Transportation Command (USTRANSCOM), the Command responsible for the transportation for the US Department of Defence. He provides an interesting insight into the importance of cybersecurity to the capabilities of the modern military. Information …

Trends in Privacy and Security research on the Semantic Web

Privacy, security and policies: A review of problems and solutions with semantic web technologies Sabrina Kirrane from The Vienna University of Economics,  Serena Villata from Université Côte d’Azur, and Mathieu d’Acquin from the National University of Ireland Galway provide a look at how Semantic Web technologies research is progressing with relation to privacy and security concerns. They …

2FA, I like it but I hate it.

When Pennsylviania State University decided to change their two factor authentication system Jake Weidman and Jens Grossklags took advantage of the situation to look at the transition from an organisational perspective. Their paper “I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication” provides some interesting insights. They …