Journal articles on the topic 'Computer networks – security measures. Computer hackers'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks – security measures. Computer hackers.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
APA, Harvard, Vancouver, ISO, and other styles
2

Rai, Ankush, and Jagadeesh Kannan R. "MICROTUBULE BASED NEURO-FUZZY NESTED FRAMEWORK FOR SECURITY OF CYBER PHYSICAL SYSTEM." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 230. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19646.

Full text
Abstract:
Network and system security of cyber physical system is of vital significance in the present information correspondence environment. Hackers and network intruders can make numerous fruitful endeavors to bring crashing of the networks and web services by unapproved interruption. Computing systems connected to the Internet are stood up to with a plenty of security threats, running from exemplary computer worms to impart drive by downloads and bot networks. In the most recent years these threats have achieved another nature of automation and sophistication, rendering most defenses inadequate. Ordinary security measures that depend on the manual investigation of security incidents and attack advancement intrinsically neglect to give an assurance from these threats. As an outcome, computer systems regularly stay unprotected over longer time frames. This study presents a network intrusion detection based on machine learning as a perfect match for this issue, as learning strategies give the capacity to naturally dissect data and backing early detection of threats. The results from the study have created practical results so far and there is eminent wariness in the community about learning based defenses. Machine learning based Intrusion Detection and Network Security Systems are one of these solutions. It dissects and predicts the practices of clients, and after that these practices will be viewed as an attack or a typical conduct.
APA, Harvard, Vancouver, ISO, and other styles
3

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also contributes the aspect of incorporation of anti-forensic techniques in attack graph which will help in analysis of the diverse possibilities of attack path deviations and thus aids in recommendation of various defense strategies for better security. To the best of our knowledge, this is the first time network anti-forensics has been fully discussed and the attack graphs are employed to analyze the network attacks. The experimental analysis of anti-forensic techniques using attack graphs were conducted in the proposed test-bed which helped to evaluate the model proposed and suggests preventive measures for the improvement of security of the networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Banghua, Shah Nazir, and Neelam Mukhtar. "Identification of Attack on Data Packets Using Rough Set Approach to Secure End to End Communication." Complexity 2020 (November 12, 2020): 1–12. http://dx.doi.org/10.1155/2020/6690569.

Full text
Abstract:
Security has become one of the important factors for any network communication and transmission of data packets. An organization with an optimal security system can lead to a successful business and can earn huge profit on the business they are doing. Different network devices are linked to route, compute, monitor, and communicate various real-time developments. The hackers are trying to attack the network and want to draw the organization’s significant information for its own profits. During the communication, if an intrusion or eavesdropping occurs, it will lead to a severe disfigurement of the whole communication network, and the data will be controlled by wrong malicious users. Identification of attack is a way to identify the security violations and analyze the measures in a computer network. An identification system, which is effective and accurate, can add security to the existing system for secure and smooth communication among end to end nodes and can work efficiently in the identification of attack on data packets. The role of information security is to design and protect the entire data of networks and maintain its confidentiality, integrity, and availability for their right users. Therefore, there is a need for end to end security management, which will ensure the security and privacy of the network and will save the data inside networks from malicious users. As the network devices are growing, so the level of threats is also increasing for these devices. The proposed research is an endeavor toward the detection of data packets attack by using the rough set theory for a secure end to end communication. The experimental work was performed by the RSES tool. The accuracy of the K-NN was 88% for the total objects of 8459. For cross validation purposes, the decision rules and decomposition tree algorithms were used. The DR algorithm showed accuracy of 59.1%, while the DT showed accuracy of 61.5%. The experimental results of the proposed study show that the research is capable of detecting data packets attack.
APA, Harvard, Vancouver, ISO, and other styles
6

Vasilenko, M., O. Kozin, M. Kozina, and V. Rachuk. "CYBER RISKS IN THE MUNICIPAL ECONOMY DURING THE PANDEMIC: DAMAGES AND THE STRUGGLE FOR CYBER SECURITY." Municipal economy of cities 3, no. 156 (2020): 80–87. http://dx.doi.org/10.33042/2522-1809-2020-3-156-80-87.

Full text
Abstract:
As a result of remote control and automation, the urban infrastructure becomes extremely vulnerable to intrusions, attacks, human errors, accidents that are growing. Due to the concentration of local and global computer networks, systems and software, the “cyber risk” of the municipal economy is multiplicative, which makes it systemic and international. Its essence is manifested both at the national and global levels through the impact on business, municipal and state authorities. Today, the existing pandemic contributes to an increase in the number of cyberattacks, which indicates an even greater cyber vulnerability of municipal administrations and public authorities. Coronavirus COVID-19 has become a tool for hacker attacks on users and enterprises. The purpose of the article is to determine, based on a systematic analysis of the new cyber risks of the municipal economy that arose during the pandemic, to formulate our own views on the classification and methods of counteracting municipal organizations and enterprises. According to experts, since the beginning of this year, thousands of domains associated with coronavirus have been registered in the world. This number also includes sites of various hacker groups that offer information about coronavirus, masks, or quick treatment methods. In fact, these phishing sites are used by hackers to extort money or steal confidential, as well as commercial information. The main types of attacks that increase the threat and actually create a "cyber infection" are noted. Based on the material of this article and the experience of the authors, measures are proposed that ensure the safety of municipal enterprises, which should be carried out in the first place. Strict measures in IT management during a crisis are also recognized as undeniable and necessary. Such as help from cyber experts and help for cyber experts; preservation of evidence of intrusion, staff training, accumulation of experience to accelerate progress in work. Remote work during a pandemic can make it difficult for IT staff to monitor cyber risks, since many of these risks go beyond the financial or technical capabilities of municipalities. Therefore, based on these proposals for the safety of municipal enterprises, an integrated approach to cyber risks is proposed, including an emergency response plan. Based on international experience, the possibility of insuring municipal enterprises and organizations against potential losses associated with cyber attacks by hackers, as well as to eliminate the consequences of these attacks, is also noted. Keywords: cyber-security, cyber-risk, municipal economy, “phishing”, pandemic, Covid-19
APA, Harvard, Vancouver, ISO, and other styles
7

Khaleel, Amal Hameed, and Iman Qays Abduljaleel. "Secure image hiding in speech signal by steganography-mining and encryption." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (2021): 1692. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1692-1703.

Full text
Abstract:
<span>Information hiding techniques are constantly evolving due to the increased need for security and confidentiality. This paper proposes a working mechanism in three phases. The first phase includes scrambling the values of the gray image depending on a series of keys that are generated using a quantum chaotic map. The second phase generates hybrid keys by mixing a Zaslavsky and a 3D Hanon map that are used to encrypt the gray image values produced after the scramble. Finally, in the third phase, a new algorithm is suggested to hide the encrypted gray image at random locations within a speech file. This algorithm includes the LSB algorithm to determine the hidden bits and the zero-crossing K-means algorithm in selecting locations mining in a scattered manner so that hackers cannot easily retrieve the hidden data of any hacked person. Also used a fractional fourier transform to choose magnitude value as specific data to hide encoded image data. The measures MSE, PSNR, NSCR, and UACI are using to measure the work efficiency in the encryption algorithm, and in measuring the efficiency of the hidden algorithm, use the measures SNR, PSNR, and MSE. The results of the paper are encouraging and efficient compared to other algorithms that performed the same work. Hence our results show the larger the image dimensions used, the better the values.</span>
APA, Harvard, Vancouver, ISO, and other styles
8

Hei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.

Full text
Abstract:
Android system has been one of the main targets of hacker attacks for a long time. At present, it is faced with security risks such as privilege escalation attacks, image tampering, and malicious programs. In view of the above risks, the current detection of the application layer can no longer guarantee the security of the Android system. The security of mobile terminals needs to be fully protected from the bottom to the top, and the consistency test of the hardware system is realized from the hardware layer of the terminal. However, there is not a complete set of security measures to ensure the reliability and integrity of the Android system at present. Therefore, from the perspective of trusted computing, this paper proposes and implements a trusted static measurement method of the Android system based on TrustZone to protect the integrity of the system layer and provide a trusted underlying environment for the detection of the Android application layer. This paper analyzes from two aspects of security and efficiency. The experimental results show that this method can detect the Android system layer privilege escalation attack and discover the rootkit that breaks the integrity of the Android kernel in time during the startup process, and the performance loss of this method is within the acceptable range.
APA, Harvard, Vancouver, ISO, and other styles
9

Chan, Siew H., and Suparak Janjarasjit. "Insight into hackers’ reaction toward information security breach." International Journal of Information Management 49 (December 2019): 388–96. http://dx.doi.org/10.1016/j.ijinfomgt.2019.07.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”).
 Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided.
 The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described.
 General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided.
 The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles
11

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kaneshige, Thomas. "Full service security shop to ward off hackers." Network Security 1995, no. 8 (1995): 6. http://dx.doi.org/10.1016/1353-4858(96)89737-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Jupin, John Arthur, Tole Sutikno, Mohd Arfian Ismail, Mohd Saberi Mohamad, Shahreen Kasim, and Deris Stiawan. "Review of the machine learning methods in the classification of phishing attack." Bulletin of Electrical Engineering and Informatics 8, no. 4 (2019): 1545–55. http://dx.doi.org/10.11591/eei.v8i4.1344.

Full text
Abstract:
The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. This shows that the use of Internet networks is very important, whether for work purposes or access to social media accounts. However, in widely using this computer network, the privacy of computer users is in danger, especially for computer users who do not install security systems in their computer. This problem will allow hackers to hack and commit network attacks. This is very dangerous, especially for Internet users because hackers can steal confidential information such as bank login account or social media login account. The attacks that can be made include phishing attacks. The goal of this study is to review the types of phishing attacks and current methods used in preventing them. Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.
APA, Harvard, Vancouver, ISO, and other styles
14

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
15

Iwendi, Celestine, Saif Ur Rehman, Abdul Rehman Javed, Suleman Khan, and Gautam Srivastava. "Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures." ACM Transactions on Internet Technology 21, no. 3 (2021): 1–22. http://dx.doi.org/10.1145/3448614.

Full text
Abstract:
In this digital age, human dependency on technology in various fields has been increasing tremendously. Torrential amounts of different electronic products are being manufactured daily for everyday use. With this advancement in the world of Internet technology, cybersecurity of software and hardware systems are now prerequisites for major business’ operations. Every technology on the market has multiple vulnerabilities that are exploited by hackers and cyber-criminals daily to manipulate data sometimes for malicious purposes. In any system, the Intrusion Detection System (IDS) is a fundamental component for ensuring the security of devices from digital attacks. Recognition of new developing digital threats is getting harder for existing IDS. Furthermore, advanced frameworks are required for IDS to function both efficiently and effectively. The commonly observed cyber-attacks in the business domain include minor attacks used for stealing private data. This article presents a deep learning methodology for detecting cyber-attacks on the Internet of Things using a Long Short Term Networks classifier. Our extensive experimental testing show an Accuracy of 99.09%, F1-score of 99.46%, and Recall of 99.51%, respectively. A detailed metric representing our results in tabular form was used to compare how our model was better than other state-of-the-art models in detecting cyber-attacks with proficiency.
APA, Harvard, Vancouver, ISO, and other styles
16

Buduri, Reddaiah, SrinivasaRao Kanusu, Swetha Chinthakunta, Amruthavani Godina, and Sivajyothi Siddavatam. "Linear Congruential Pseudorandom Numbered Hybrid Crypto-System with Genetic Algorithms." International Journal of Engineering and Advanced Technology 10, no. 2 (2020): 159–63. http://dx.doi.org/10.35940/ijeat.b2092.1210220.

Full text
Abstract:
While using networks that may be in any form more and more problems related to securityrises within the network as well as outside the network. To resolve the security problems network security is the science that facilitatesto safeguard the resources and the quality of the network and data. At different workstations filters and firewalls are used in protecting the resources. But while the data is in transmission security services are needed to protect. These services are to be altered frequently to prevent from attacks. In developing such system, this work uses linear congruential pseudorandom number with multiple genetic algorithms. In small business applications these types of hybrid systems can be used to prevent from hackers.
APA, Harvard, Vancouver, ISO, and other styles
17

Smith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
20

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Shekhtman, Louis, and Erez Waisbard. "EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System." Future Internet 13, no. 6 (2021): 143. http://dx.doi.org/10.3390/fi13060143.

Full text
Abstract:
A reliable log system is a prerequisite for many applications. Financial systems need to have transactions logged in a precise manner, medical systems rely on having trusted medical records and security logs record system access requests in order to trace malicious attempts. Keeping multiple copies helps to achieve availability and reliability against such hackers. Unfortunately, maintaining redundant copies in a distributed manner in a byzantine setting has always been a challenging task, however it has recently become simpler given advances in blockchain technologies. In this work, we present a tamper-resistant log system through the use of a blockchain. We leverage the immutable write action and distributed storage provided by the blockchain as a basis to develop a secure log system, but we also add a privacy preserving layer that is essential for many applications. We detail the security and privacy aspects of our solution, as well as how they relate to performance needs in relevant settings. Finally, we implement our system over Hyperledger Fabric and demonstrate the system’s value for several use cases. In addition, we provide a scalability analysis for applying our solution in a large-scale system.
APA, Harvard, Vancouver, ISO, and other styles
22

Wang, Zhiqiang, Yuheng Lin, Zihan Zhuo, Jieming Gu, and Tao Yang. "GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing." Security and Communication Networks 2021 (June 28, 2021): 1–14. http://dx.doi.org/10.1155/2021/9946022.

Full text
Abstract:
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices. Its security and reliability are welcomed by mobile terminal manufactures, banks, telecom operators, and third-party payment platforms. Simultaneously, it has also drawn more and more attention from hackers and attackers, and NFC-enabled devices are facing increasing threats. To improve the security of the NFC technology, the paper studied the technology of discovering security vulnerabilities of NFC Data Exchange Format (NDEF), the most important data transmission protocol. In the paper, we proposed an algorithm, GTCT (General Test Case Construction and Test), based on fuzzing to construct test cases and test the NDEF protocol. GTCT adopts four strategies to construct test cases, manual, generation, mutation, and “reverse analysis,” which can detect logic vulnerabilities that fuzzing cannot find and improve the detection rate. Based on GTCT, we designed an NDEF vulnerability discovering framework and developed a tool named “GNFCVulFinder” (General NFC Vulnerability Finder). By testing 33 NFC system services and applications on Android and Windows Phones, we found eight vulnerabilities, including DoS vulnerabilities of NFC service, logic vulnerabilities about opening Bluetooth/Wi-Fi/torch, design flaws about the black screen, and DoS of NFC applications. Finally, we give some security suggestions for the developer to enhance the security of NFC.
APA, Harvard, Vancouver, ISO, and other styles
23

Selvi, M., and B. Ramakrishnan. "Secured Message Broadcasting in VANET using Blowfish Algorithm with Oppositional Deer Hunting Optimization." International Journal of Computer Network and Information Security 13, no. 2 (2021): 39–52. http://dx.doi.org/10.5815/ijcnis.2021.02.04.

Full text
Abstract:
Emergency Message broadcasting is an important process in VANET. Security and reliable transmission are the two major concerns in message broadcasting. VANET is open to unauthorized nodes, hackers, misbehaving vehicles, malicious attackers etc without security. Without valid confirmation of authorized vehicles, these types of attacks may occur. To enhance the reliability in message broadcasting, some existing techniques are used. They transmit the data without much delay but they didn’t provide any trusted authentication. So hackers, malicious nodes, unauthorized vehicles may easily interrupt the emergency messages. Also Brute force attack, Man in Middle attack are not identified and eliminated. In this research, a trust based secured broadcasting mechanism is developed which ensures the metrics such as security, privacy, integrity, trust etc. The major intension of this research is to reduce latency and provide high reliable, secure and efficient communication over the vehicles. The data such as vehicle position, location, speed, and other traffic information’s are generated and stored in a separate table. A network is created with varying densities. A path is generated for message broadcasting between source and destination based on the specific gateway estimated. Here, Optimal Wireless Access in Vanet (OWAV) Protocol is employed to gather vehicle related information to reduce the delay. Blowfish encryption algorithm along with Oppositional Deer Hunting Optimization (ODHO) is used to store the trusted vehicles location to avoid unauthorized tracking. The performance of the proposed research is analyzed with various metrics such as Packet delivery ratio (PDR), transmission delay, encryption time, throughput, computational overhead etc. The efficiency of the research is compared with other existing methods.
APA, Harvard, Vancouver, ISO, and other styles
24

Khatri, Narayan, Rakesh Shrestha, and Seung Yeob Nam. "Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain." Electronics 10, no. 8 (2021): 893. http://dx.doi.org/10.3390/electronics10080893.

Full text
Abstract:
Modern vehicles are no longer simply mechanical devices. Connectivity between the vehicular network and the outside world has widened the security holes that hackers can use to exploit a vehicular network. Controller Area Network (CAN), FlexRay, and automotive Ethernet are popular protocols for in-vehicle networks (IVNs) and will stay in the industry for many more years. However, these protocols were not designed with security in mind. They have several vulnerabilities, such as lack of message authentication, lack of message encryption, and an ID-based arbitration mechanism for contention resolution. Adversaries can use these vulnerabilities to launch sophisticated attacks that may lead to loss of life and damage to property. Thus, the security of the vehicles should be handled carefully. In this paper, we investigate the security vulnerabilities with in-vehicle network protocols such as CAN, automotive Ethernet, and FlexRay. A comprehensive survey on security attacks launched against in-vehicle networks is presented along with countermeasures adopted by various researchers. Various algorithms have been proposed in the past for intrusion detection in IVNs. However, those approaches have several limitations that need special attention from the research community. Blockchain is a good approach to solving the existing security issues in IVNs, and we suggest a way to improve IVN security based on a hybrid blockchain.
APA, Harvard, Vancouver, ISO, and other styles
25

Du, Yi-Hong, and Shi-Hua Liu. "Epidemic Model of Algorithm-Enhanced Dedicated Virus through Networks." Security and Communication Networks 2018 (June 7, 2018): 1–7. http://dx.doi.org/10.1155/2018/4691203.

Full text
Abstract:
Wi-Fi networks almost cover all active areas around us and, especially in some densely populated regions, Wi-Fi signals are strongly overlapped. The broad and overlapped coverage brings much convenience at the cost of great security risks. Conventionally, a worm virus can infect a router and then attack other routers within its signal coverage. Nowadays, artificial intelligence enables us to solve problems efficiently from available data via computer algorithm. In this paper, we endow the virus with some abilities and present a dedicated worm virus which can pick susceptible routers with kernel density estimation (KDE) algorithm as the attacking tasks automatically. This virus can also attack lower-encryption-level routers first and acquire fast-growing numbers of infected routers on the initial stage. We simulate an epidemic behavior in the collected spatial coordinate of routers in a typical area in Beijing City, where 56.0% routers are infected in 18 hours. This dramatical defeat benefits from the correct infection seed selection and a low-encryption-level priority. This work provides a framework for a computer-algorithm-enhanced virus exploration and gives some insights on offence and defence to both hackers and computer users.
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
27

Obiniyi, Afolayan A., Ezugwu E. Absalom, and Mohammed Dikko. "Network Security and Firewall Technology." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (2011): 40–60. http://dx.doi.org/10.4018/jdtis.2011040103.

Full text
Abstract:
With the explosion of the public Internet, corporate networks connected to the Internet, if not adequately secured, are vulnerable to damaging attacks. Hackers, viruses, worms, Trojan horses, and spyware try to invade privacy. This research examines how these threats affect the corporate network and ways to reduce them. MikroTik routerOS was configured as the router to examine these threats. Network Address Translation and packet filtering where the key features configured to make the network hidden for unauthorized users and filter unwanted traffics that might reflect malicious acts. The configuration and test were carried out at Iya Abubakar Computer Center, Ahamdu Bello University, Zaria, Nigeria. At the onset, the targeted network was full of virus, worms, Trojan horses, spyware, and vulnerable to unauthorized users. The signal strength of the network was usually very poor due to the effect from the threats affecting the bandwidth. The firewall was configured to filter out inherently dangerous services, exposing the network to fewer risks. After the research, the performance and efficiency of the network was improved tremendously.
APA, Harvard, Vancouver, ISO, and other styles
28

Acemyan, Claudia Ziegler, Philip Kortum, Jeffrey Xiong, and Dan S. Wallach. "2FA Might Be Secure, But It’s Not Usable: A Summative Usability Assessment of Google’s Two-factor Authentication (2FA) Methods." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (2018): 1141–45. http://dx.doi.org/10.1177/1541931218621262.

Full text
Abstract:
Computer security experts recommend that people use two-factor authentication (2FA) on password protected systems to help keep hackers out. Providing two pieces of information to verify a person’s identity adds extra security to an account. However, it is not clear if the added security and procedures impact system usability. This paper aims to answer this question by assessing per ISO 9241-11’s suggested measurements the usability of Google’s optional 2FA methods. We found few differences across four different 2FA methods when comparing efficiency, effectiveness and satisfaction measures—illustrating that one method is not necessarily more or less usable then another. Overall, the measures indicated that the systems’ usability needed to be improved, especially with regard to the initial setup of 2FA. In conclusion, developers need to focus more attention on making 2FA easier and faster to use, especially since it is often optional for password users, yet makes accounts significantly more secure.
APA, Harvard, Vancouver, ISO, and other styles
29

Kounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zhao, Jinxiong, Xun Zhang, Fuqiang Di, et al. "Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective." Security and Communication Networks 2021 (February 12, 2021): 1–14. http://dx.doi.org/10.1155/2021/6699108.

Full text
Abstract:
Proactive defense is one of the most promising approaches to enhance cyber-security in the power systems, while how to balance its costs and benefits has not been fully studied. This paper proposes a novel method to model cyber adversarial behaviors as attackers contending for the defenders’ benefit based on the game theory. We firstly calculate the final benefit of the hackers and defenders in different states on the basis of the constructed models and then predict the possible attack behavior and evaluate the best defense strategy for the power systems. Based on a real power system subnet, we analyze 27 attack models with our method, and the result shows that the optimal strategy of the attacker is to launch a small-scale attack. Correspondingly, the optimal strategy of the defender is to conduct partial-defense.
APA, Harvard, Vancouver, ISO, and other styles
31

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
32

Mookerjee, Vijay, Radha Mookerjee, Alain Bensoussan, and Wei T. Yue. "When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination." Information Systems Research 22, no. 3 (2011): 606–23. http://dx.doi.org/10.1287/isre.1100.0341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
34

Peng, Yu, Xinrong Liu, Ming Li, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
36

Cuinas, Inigo. "An Introduction to Cybersecurity at Physical Layer: Obstacles at Radio Channel to Mitigate Hackers’ Chance." Elektronika ir Elektrotechnika 26, no. 6 (2020): 58–65. http://dx.doi.org/10.5755/j01.eie.26.6.28006.

Full text
Abstract:
Cybersecurity commonly focuses on higher layers of Open Systems Interconnection (OSI) model, as it is a discipline associated to Computer Science. However, physical layer is the front line of the defence of a system against external attacks, and Electrical Engineering, concretely Radiofrequency Engineering, can provide tools to reinforce radio networks also in terms of information security. This paper analyses different techniques related to site shielding. From hard traditional shielding, similar to Faraday cages, to different soft shielding solutions as vegetation fences and frequency selective surfaces (FSS), the variety of solutions is broad and would be useful in actual deployments. Finally, Building Information Modelling (BIM) appears as an interesting tool that could be incorporated along the design and construction of an office building to improve the electromagnetic behaviour, and subsequently the cybersecurity issues of the communication networks hosted by the building itself.
APA, Harvard, Vancouver, ISO, and other styles
37

Sable, Piyush. "Designing Image Based Captcha using Machine Learning." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 3678–82. http://dx.doi.org/10.22214/ijraset.2021.35532.

Full text
Abstract:
Captchas, or Completely Automated Public Turing Tests to Tell Computers and Humans Apart, were created in response to programmers' ability to breach computer networks via computer attack programmes and bots. Because of its ease of development and use, the Text Captcha is the most well-known Captcha scheme. Hackers and programmers, on the other hand, have weakened the assumed security of Captchas, leaving websites vulnerable to assault. Text Captchas are still widely used since it is assumed that the attack speeds are moderate, typically two to five seconds for each image, and that this is not considered a significant concern. Style Area Captcha (SACaptcha) is a revolutionary image-based Captcha suggested in this paper, which relies on semantic data comprehension, pixel-level segmentation, and deep learning approaches. The suggested SACaptcha highlights the creation of image-based Captchas utilising deep learning techniques for boosting the security purpose, demonstrating that text Captchas are no longer secure.
APA, Harvard, Vancouver, ISO, and other styles
38

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
39

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
40

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
41

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Full text
Abstract:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control strategies are theoretically investigated by Pontryagin’s maximum principle and the Hamiltonian function. Finally, through numerical simulations, effective measures for controlling virus spread in point-to-group information networks are proposed.
APA, Harvard, Vancouver, ISO, and other styles
42

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.
APA, Harvard, Vancouver, ISO, and other styles
43

Bilal, Muhammad, Muhammad Asif, and Abid Bashir. "Assessment of Secure OpenID-Based DAAA Protocol for Avoiding Session Hijacking in Web Applications." Security and Communication Networks 2018 (November 1, 2018): 1–10. http://dx.doi.org/10.1155/2018/6315039.

Full text
Abstract:
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session hijacking situation because in other existing OpenID communication methods such double factor authentication has more chances of valid user session hijacked. The proposed communication protocol secures the OpenID URL with the help of additional innovative parameters such as Special Alphanumeric String (SAS) and Special Security PIN (SSP). The anticipated triple authentication protocol authenticated client unique OpenID URL at OpenID Provider (OP) side once and SAS and SSP field at Relying Party (RP) side. The anticipated protocol provides unique Single-Sign-On (SSO) services to OpenID users. The experimental website is tested by experts of web developers for avoiding session hijacking situation in the presence of hackers. The findings demonstrated that Dense Authentication Authorization and Accounting (DAAA) protocol minimizes the risk of a session hijacking in OpenID communication environment.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Binjie, Fushan Wei, and Chunxiang Gu. "Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms." Security and Communication Networks 2021 (February 25, 2021): 1–10. http://dx.doi.org/10.1155/2021/6643763.

Full text
Abstract:
Since its inception, Bitcoin has been subject to numerous thefts due to its enormous economic value. Hackers steal Bitcoin wallet keys to transfer Bitcoin from compromised users, causing huge economic losses to victims. To address the security threat of Bitcoin theft, supervised learning methods were used in this study to detect and provide warnings about Bitcoin theft events. To overcome the shortcomings of the existing work, more comprehensive features of Bitcoin transaction data were extracted, the unbalanced dataset was equalized, and five supervised methods—the k-nearest neighbor (KNN), support vector machine (SVM), random forest (RF), adaptive boosting (AdaBoost), and multi-layer perceptron (MLP) techniques—as well as three unsupervised methods—the local outlier factor (LOF), one-class support vector machine (OCSVM), and Mahalanobis distance-based approach (MDB)—were used for detection. The best performer among these algorithms was the RF algorithm, which achieved recall, precision, and F1 values of 95.9%. The experimental results showed that the designed features are more effective than the currently used ones. The results of the supervised methods were significantly better than those of the unsupervised methods, and the results of the supervised methods could be further improved after equalizing the training set.
APA, Harvard, Vancouver, ISO, and other styles
45

Lee, Yousik, Samuel Woo, Jungho Lee, Yunkeun Song, Heeseok Moon, and Dong Hoon Lee. "Enhanced Android App-Repackaging Attack on In-Vehicle Network." Wireless Communications and Mobile Computing 2019 (February 3, 2019): 1–13. http://dx.doi.org/10.1155/2019/5650245.

Full text
Abstract:
The convergence of automobiles and ICT (information and communication technology) has become a new paradigm for the development of next-generation vehicles. In particular, connected cars represent the most in-demand automobile-ICT convergence technology. With the development of 5G technology, communication between vehicle and external device using autonomous driving and Internet of things (IoT) technology has been remarkably developed. Control of vehicles using smart phones has become a routine feature, and over 200 Android apps are in use. However, Android apps are easy to tamper by repackaging and allowing hackers to attack vehicles with using this vulnerability, which can lead to life-critical accidents. In this study, we analyze the vulnerabilities of connected car environments when connecting with IoT technologies and demonstrate the possibility of cyberattack by performing attack experiments using real cars and repackaging for commercial apps. Furthermore, we propose a realistic security technology as a countermeasure to attain safety against cyberattacks. To evaluate the safety of the proposed method, a security module is developed and a performance evaluation is conducted on an actual vehicle.
APA, Harvard, Vancouver, ISO, and other styles
46

Samreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.

Full text
Abstract:
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.
APA, Harvard, Vancouver, ISO, and other styles
47

Ouyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.

Full text
Abstract:
Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.
APA, Harvard, Vancouver, ISO, and other styles
48

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Full text
Abstract:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.
APA, Harvard, Vancouver, ISO, and other styles
49

Liu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Lu, Yi, Menghan Liu, Jie Zhou, and Zhigang Li. "Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network." Security and Communication Networks 2021 (July 13, 2021): 1–12. http://dx.doi.org/10.1155/2021/9938586.

Full text
Abstract:
Intrusion Detection System (IDS) is an important part of ensuring network security. When the system faces network attacks, it can identify the source of threats in a timely and accurate manner and adjust strategies to prevent hackers from intruding. Efficient IDS can identify external threats well, but traditional IDS has poor performance and low recognition accuracy. To improve the detection rate and accuracy of IDS, this paper proposes a novel ACGA-BPNN method based on adaptive clonal genetic algorithm (ACGA) and backpropagation neural network (BPNN). ACGA-BPNN is simulated on the KDD-CUP’99 and UNSW-NB15 data sets. The simulation results indicate that, in contrast to the methods based on simulated annealing (SA) and genetic algorithm (GA), the detection rate and accuracy of ACGA-BPNN are much higher than of GA-BPNN and SA-BPNN. In the classification results of KDD-CUP’99, the classification accuracy of ACGA-BPNN is 11% higher than GA-BPNN and 24.2% higher than SA-BPNN, and F-score reaches 99.0%. In addition, ACGA-BPNN has good global searchability and its convergence speed is higher than that of GA-BPNN and SA-BPNN. Furthermore, ACGA-BPNN significantly improves the overall detection performance of IDS.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography