Entity

Time filter

Source Type

Poznań, Poland

Maszewski M.,University of Technology and Life Sciences in Bydgoszcz | Wachowiak M.,ITTI Ltd. | Taberski G.,Adam Mickiewicz University
Advances in Intelligent Systems and Computing | Year: 2014

A background subtraction and movement detection is a very popular subject of investigation in the video processing domain. Despite number of already proposed algorithms and methods the question of suitability of such algorithms in dynamically changing, realistic environment holds (e.g. parking lots). In this paper authors compare three different implementations of the saliency-based algorithms and Gaussian Mixture Model algorithm for different cameras on a parking lot. Authors show that matching algorithms to the scene can be improved by managing semantic knowledge about the scene. © Springer International Publishing Switzerland 2014.


Choras M.,University of Technology and Life Sciences in Bydgoszcz | Choras M.,ITTI Ltd.
Cybernetics and Systems | Year: 2013

In this article, a comprehensive approach to information sharing framework aimed at increasing network security and survivability is presented. Currently, in order to defend complex cyber-attacks and sophisticated cybercrime, comprehensive means of ensuring network security and survivability are highly demanded. Comprehensive is understood as (at least) technical, human, organizational, and regulatory dimensions, whereas technical means that both on-line and off-line aspects should be carefully taken into account. The focus of this article is on the technical dimension and, in particular, on information exchange mechanisms for on-line and off-line dimension. Firstly, the on-line information exchange mechanism dedicated for interconnected federated networks is described. Then, a proposition of the off-line network information sharing approach regarding results of the risk assessment, cybersecurity audits, threat ranking, etc., is discussed. Developments and results of information sharing mechanisms in both on-line and off-line network security dimensions are also described. Copyright © 2013 Taylor & Francis Group, LLC.


Choras M.,ITTI Ltd. | Choras M.,Institute of Telecommunications | Kozik R.,Institute of Telecommunications
Advances in Intelligent Systems and Computing | Year: 2013

The network technology has evolved significantly recently. The growing use of cloud services, increased number of users, novel mobile operating systems and changes in network infrastructures that connect devices make novel challenges for cyber security. In order to counter arising threats, network security mechanisms and protection schemes also evolve and use sophisticated sensors and methods. In our previous work [27] we have introduced an innovative evolutionary algorithm for modeling genuine SQL queries generated by web-application. In [28] we have investigated how the proposed algorithm can be combined together with other Off-The-Shelf solutions (like SNORT and SCALP tools) in order to increase the detection ratio of injection attacks. In this paper we have significantly extended our test suite. First of all, we have compared our method with new efficient solutions for injection attack detection. We have also deeply discussed the drawbacks and benefits of these solutions. We have also explained how the correlation techniques can be adapted in order to overcome these drawbacks without loosing high effectiveness. © Springer International Publishing Switzerland 2013.


Kozik R.,Institute of Telecommunications | Choras M.,Institute of Telecommunications | Choras M.,ITTI Ltd.
Advances in Intelligent Systems and Computing | Year: 2014

The increased usage of cloud services, growing number of users, changes in network infrastructure that connect devices running mobile operating systems, and constantly evolving network technology cause novel challenges for cyber security that have never been foreseen before. As a result, to counter arising threats, network security mechanisms, sensors and protection schemes have also to evolve in order to address the needs and problems of nowadays users. © Springer International Publishing Switzerland 2014.


Choras M.,ITTI Ltd. | Choras M.,Institute of Telecommunications | Kozik R.,Institute of Telecommunications
Advances in Intelligent Systems and Computing | Year: 2014

The growing use of cloud services, increased number of users, novel mobile operating systems and changes in network infrastructures that connect devices create novel challenges for cyber security. In order to counter arising threats, network security mechanisms and protection schemes also evolve and use sophisticated sensors and methods. The drawback is that the more sensors (probes) are applied and the more information they acquire, the volume of data to process grows significantly. In this paper, we present real-time network data analysis mechanism. We also show the results for SQL Injection Attacks detection. © Springer International Publishing Switzerland 2014.

Discover hidden collaborations