Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Computer attack.

Статті в журналах з теми "Computer attack"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Computer attack".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Sukma Aji, Davito Rasendriya Rizqullah Putra, Imam Riadi, Abdul Fadlil, and Muhammad Nur Faiz. "A Classification Data Packets Using the Threshold Method for Detection of DDoS." Journal of Innovation Information Technology and Application (JINITA) 6, no. 1 (June 28, 2024): 28–36. http://dx.doi.org/10.35970/jinita.v6i1.2224.

Повний текст джерела
Анотація:
Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

van Heerden, R. P., B. Irwin, I. D. Burke, and L. Leenen. "A Computer Network Attack Taxonomy and Ontology." International Journal of Cyber Warfare and Terrorism 2, no. 3 (July 2012): 12–25. http://dx.doi.org/10.4018/ijcwt.2012070102.

Повний текст джерела
Анотація:
Computer network attacks differ in the motivation of the entity behind the attack, the execution and the end result. The diversity of attacks has the consequence that no standard classification exists. The benefit of automated classification of attacks, means that an attack could be mitigated accordingly. The authors extend a previous, initial taxonomy of computer network attacks which forms the basis of a proposed network attack ontology in this paper. The objective of this ontology is to automate the classification of a network attack during its early stages. Most published taxonomies present an attack from either the attacker's or defender's point of view. The authors’ taxonomy presents both these points of view. The framework for an ontology was developed using a core class, the “Attack Scenario”, which can be used to characterize and classify computer network attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Paradise, Paradise, Wahyu Adi Prabowo, and Teguh Rijanandi. "Analysis of Distributed Denial of Service Attacks Using Support Vector Machine and Fuzzy Tsukamoto." JURNAL MEDIA INFORMATIKA BUDIDARMA 7, no. 1 (January 28, 2023): 66. http://dx.doi.org/10.30865/mib.v7i1.5199.

Повний текст джерела
Анотація:
Advances in technology in the field of information technology services allow hackers to attack internet systems, one of which is the DDOS attack, more specifically, the smurf attack, which involves multiple computers attacking database server systems and File Transfer Protocol (FTP). The DDOS smurf attack significantly affects computer network traffic. This research will analyze the classification of machine learning Support Vector Machine (SVM) and Fuzzy Tsukamoto in detecting DDOS attacks using intensive simulations in analyzing computer networks. Classification techniques in machine learning, such as SVM and fuzzy Tsukamoto, can make it easier to distinguish computer network traffic when detecting DDOS attacks on servers. Three variables are used in this classification: the length of the packet, the number of packets, and the number of packet senders. By testing 51 times, 50 times is the DDOS attack trial dataset performed in a computer laboratory, and one dataset derived from DDOS attack data is CAIDA 2007 data. From this study, we obtained an analysis of the accuracy level of the classification of machine learning SVM and fuzzy Tsukamoto, each at 100%.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ramli, Hartini, and Maharaja Yasin Alifsyah. "Analisis Keamanan Komputer Terhadap Serangan Distributed Denial of Service (DDOS)." Journal of Renewable Energy and Smart Device 1, no. 1 (October 17, 2023): 25–30. http://dx.doi.org/10.61220/joresd.v1i1.235.

Повний текст джерела
Анотація:
Distributed Denial of Service (DDoS) is a type of active attack, an attack that can overwhelm a system by flooding a computer or server with network traffic, disrupting user services. The goal of this attack is usually to disable services and disconnect from the compromised­­­­­­­­ computer or network. The impact is very large for companies or agencies that offer services. Victims of these attacks are unable to provide the services they are supposed to. Due to a bug or constraint on the server you are trying to use and one of the ways to deal with these attacks is to use a computer network firewall, which is useful for protecting computers from various outer space attacks. If the computer has a firewall security system, it is likely that no one on the Internet can access the data on the connected computer or web server. Firewall, works like a partition or wall that blocks the computer from the Internet. This "firewall" allows you to control what data, information, and activity can be transferred from the Internet to your computer and vice versa. With better data security and can avoid DDOS attacks that want to be carried out by irresponsible parties.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gunawan, Teddy Surya, Muhammad Kasim Lim, Mira Kartiwi, Noreha Abdul Malik, and Nanang Ismail. "Penetration Testing using Kali Linux: SQL Injection, XSS, Wordpres, and WPA2 Attacks." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 2 (November 1, 2018): 729. http://dx.doi.org/10.11591/ijeecs.v12.i2.pp729-737.

Повний текст джерела
Анотація:
Nowadays, computers, smart phones, smart watches, printers, projectors, washing machines, fridges, and other mobile devices connected to Internet are exposed to various threats and exploits. Of the various attacks, SQL injection, cross site scripting, Wordpress, and WPA2 attack were the most popular security attacks and will be further investigated in this paper. Kali Linux provides a great platform and medium in learning various types of exploits and peneteration testing. All the simulated attack will be conducted using Kali Linux installed on virtual machine in a compuer with Intel Core i5 and 8 GB RAM, while the victim’s machine is the host computer which run Windows 10 version 1709. Results showed that the attacks launched both on web and firewall were conducted successfully.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Widodo, Tri, and Adam Sekti Aji. "Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (January 25, 2022): 46–55. http://dx.doi.org/10.14421/jiska.2022.7.1.46-55.

Повний текст джерела
Анотація:
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sun, Fei Xian. "Danger Theory Based Risk Evaluation Model for Smurf Attacks." Key Engineering Materials 467-469 (February 2011): 515–21. http://dx.doi.org/10.4028/www.scientific.net/kem.467-469.515.

Повний текст джерела
Анотація:
Smurf attack belongs to popular Denial-of-Service (DoS) attack, and they can cause devastating impact on computer systems. Inspired by the principles of immune danger theory, a novel risk evaluation model, referred to as DTRESA, for smurf attacks is proposed in this paper. Within the presented model, dangerous smurf attacks are compared to bacterium (or virus) of the immune danger theory, which induce danger signal by simulating cellular distress or cell unnatural death; through immune recognition of artificial lymphocytes, the attacks are detected, and the attack risk is evaluated by calculating the danger signal of host computers. Simulation results and theoretical analysis show that the proposed model is feasible. Thus, it provides a novel solution to DoS detection and computer network security risk assessment.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Khaliq, Abdul, and Sri Novida Sari. "PEMANFAATAN KERANGKA KERJA INVESTIGASI FORENSIK JARINGAN UNTUK IDENTIFIKASI SERANGAN JARINGAN MENGGUNAKAN SISTEM DETEKSI INTRUSI (IDS)." Jurnal Nasional Teknologi Komputer 2, no. 3 (August 18, 2022): 150–58. http://dx.doi.org/10.61306/jnastek.v2i3.52.

Повний текст джерела
Анотація:
One of the media to secure computers is to apply Intrusion Detection System (IDS) technology. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the types and types of computer network attacks. Logs on the IDS will be analyzed in depth to be used as an effort to improve computer network security. The research method that will be used is applied research. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS provides alerts to administrators because there are activities that violate the rules on the IDS.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Li, Biao. "Research on Computer Network Security and Prevention Strategy." Applied Mechanics and Materials 608-609 (October 2014): 526–30. http://dx.doi.org/10.4028/www.scientific.net/amm.608-609.526.

Повний текст джерела
Анотація:
With the development and popularization of the computer network, the security problem has increasingly become the focus of common concern. The computer network safety problems mainly include: protocol design issues, awareness, management system and technical operation. Hackers on the computer network attack techniques: Deceptive attack, masquerade attacks, vulnerability attack, covert attack and technical attack. Accordingly, we should take the corresponding safety countermeasures: strengthen network security education, using the network protection technology, detection technology and anti-virus technology. This paper mainly analyzes the defects and the security problems of computer network, discusses about the maintenance of computer network security and the way for computer network attack technology defense strategy.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Miao, Yuantian, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, and Yang Xiang. "Machine Learning–based Cyber Attacks Targeting on Controlled Information." ACM Computing Surveys 54, no. 7 (July 2021): 1–36. http://dx.doi.org/10.1145/3465171.

Повний текст джерела
Анотація:
Stealing attack against controlled information, along with the increasing number of information leakage incidents, has become an emerging cyber security threat in recent years. Due to the booming development and deployment of advanced analytics solutions, novel stealing attacks utilize machine learning (ML) algorithms to achieve high success rate and cause a lot of damage. Detecting and defending against such attacks is challenging and urgent so governments, organizations, and individuals should attach great importance to the ML-based stealing attacks. This survey presents the recent advances in this new type of attack and corresponding countermeasures. The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled authentication information. Recent publications are summarized to generalize an overarching attack methodology and to derive the limitations and future directions of ML-based stealing attacks. Furthermore, countermeasures are proposed towards developing effective protections from three aspects—detection, disruption, and isolation.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Glīzds, Lauris, and Artis Teilāns. "COMPUTER SECURITY." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 21 (April 19, 2017): 101–8. http://dx.doi.org/10.17770/het2017.21.3588.

Повний текст джерела
Анотація:
The paper contains information about hacking types and systems which they are suffered the most cyber attack. The main goal is to introduce people how to protect your systems from several cyber attacks following by special guidelines.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Jain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (May 16, 2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.

Повний текст джерела
Анотація:
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Glăvan, Dragoș. "Sniffing attacks on computer networks." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 202–7. http://dx.doi.org/10.21279/1454-864x-20-i1-027.

Повний текст джерела
Анотація:
The sniffing attack or sniffer attack, in the context of network security, corresponds to data theft or interception by capturing network traffic using a sniffer (an application that aims to capture network packets). When data is transmitted over networks, if data packets are not encrypted, data in the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and obtain information so that it can eventually crash or corrupt the network or read the communications that occur in the network. Sniffing attacks can be compared to touching wires and getting to know the conversation, and for this reason it is also called "wiretapping" applied to computer networks. In this paper, a sniffing attack is shared which can significantly damage the computer networks as well as methods of combating such attacks. Sniffing is usually performed to analyze network usage, troubleshoot network problems, monitor session for development and testing purposes.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Quroturohman, Denis. "PENETRATION TESTING DALAM FORENSIK DIGITAL PADA JARINGAN FAKULTAS TEKNIK UNIVERSITAS IBN KHALDUN BOGOR DENGAN PING OF DEATH." Jurnal Inovatif : Inovasi Teknologi Informasi dan Informatika 4, no. 2 (November 3, 2021): 81. http://dx.doi.org/10.32832/inova-tif.v4i2.5812.

Повний текст джерела
Анотація:
<p><em>Network forensics is a computer security investigation to find sources of the attack s on the network by examining data log evidence, identifying, analyzing, and reconstructing the incidents. Types of attack s againist a computer or server on the network by spending resources that are owned by the computer until computer is not able to function properly, thus indirectly preventing other users to obtain access to network services that were attack ed is Distributed Denial of Service attack (DDoS). Network Forensics Research conducted in Research Laboratory of Information Engineering Master of Ahmad Dahlan University Yogyak arta. Detection of attacks carried out by Winbox RouterOS v3,6 where the software shows resources, attack er (IP Address), data pack ets, and when attack doing. Simulated attack s carried out by LOIC software to determine performance of safety system in computer network . To anticipate DDoS attack s,then developed a computer network security system.</em></p>
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Paul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Повний текст джерела
Анотація:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Maulana, Muhamad, Ahmad Luthfi, and Dwi Kurnia Wibowo. "Network Attacks Classification for Network Forensics Investigation: Literature Reviews." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 5 (October 1, 2023): 1132–39. http://dx.doi.org/10.29207/resti.v7i5.5153.

Повний текст джерела
Анотація:
Computer Network plays an important role to support various jobs and other activities in the cyber world. Various kinds of crimes committed on computer networks have often occurred. It is very demanding to build a computer network architecture that is safe from attacks to protect the transacted data. If there has been an attack on the computer network, of course, further investigation must be carried out for the needs of identifying the attacker and the motive for the attack. A further need is to evaluate the security of the network. This paper reports a systematic literature review that aims to map the classification of attacks on computer networks and map future research. Based on the exploration, 30 key studies were selected that reveal the mapping of attack classifications on computer networks. The results of the literature review show that attacks on computer networks vary widely. Based on the results of the literature review conducted, it produces a road map for future research, which is to classify attacks on computer networks using a machine learning approach. The use of machine learning serves to help classify and investigate the needs of attacks on computer networks. The SVM method in this case was chosen based on previous research that was widely used for data-based classification.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Richo Muhhamad Farhan and Gregorius Hendita Artha Kusuma. "Teknik Sniffing Jaringan Menggunakan Wireshark." Journal of Informatics and Advanced Computing (JIAC) 4, no. 1 (May 1, 2023): 87–93. https://doi.org/10.35814/jiac.v4i1.5503.

Повний текст джерела
Анотація:
Computer network security factor is an absolute thing in building a network. Basically, the security system owned by the operating system is not enough to secure computer networks. Therefore, to get a computer network security, we need a tool that can detect the existence of an attack mechanism from the network. Where the purpose of this attack is to make the computer that accesses it unable to run normally on a computer network. Wireshark is software that can analyze computer network activity so that it can help detect imminent attacks so users don't have to worry about these attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Wahyu Wijaya Widiyanto and Rizka Licia. "Detection of Attacks in Computer Networks Using C4.5 Decision Tree Algorithm: An Approach to Network Security." International Journal of Information Engineering and Science 1, no. 4 (October 15, 2024): 01–12. http://dx.doi.org/10.62951/ijies.v1i4.48.

Повний текст джерела
Анотація:
The detection of computer network attacks is becoming increasingly important as the complexity of cyber-attacks threatening information systems and infrastructure continues to rise. To address these threats, artificial intelligence techniques have become a primary focus in the development of more effective attack detection systems. One algorithm that has proven reliable in this context is the C4.5 decision tree. This study aims to apply the C4.5 algorithm in network attack detection using a dataset that includes various types of attacks and network activities. The process includes data preprocessing, decision tree model building, and model performance evaluation. The results show that the C4.5 decision tree algorithm is effective in classifying network activities into attacks and normal activities with a satisfactory level of accuracy. The model successfully recognizes attack-related patterns, and further analysis identifies key factors influencing attack detection. This research provides a significant contribution to the development of reliable and efficient attack detection systems in computer networks. By applying the C4.5 decision tree algorithm, it is expected to help enhance information security and protect network infrastructure from increasingly complex cyber threats
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Mohammed, Moona Olakara. "Automatic Port Scanner." Volume 5 - 2020, Issue 9 - September 5, no. 9 (September 29, 2020): 711–17. http://dx.doi.org/10.38124/ijisrt20sep503.

Повний текст джерела
Анотація:
In a computer network, an attack is an attempt to destroy or steal unauthorized information or make use of information as an asset. One of the attacks is a reconnaissance attack considered as the first step of a computer attack. This type of attack is mostly done by a black hat, an expert in the programmer, by scanning the internal network devices and gather vulnerability information. In this paper, shows the identification of open ports and services through the network and available IP on the network are possible to attack.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Lee, Se-Yul, and Yong-Soo Kim. "Design and Analysis of Probe Detection Systems for TCP Networks." Journal of Advanced Computational Intelligence and Intelligent Informatics 8, no. 4 (July 20, 2004): 369–72. http://dx.doi.org/10.20965/jaciii.2004.p0369.

Повний текст джерела
Анотація:
Advanced computer network technology enables the connectivity of computers in an open network environment. Despite the growing numbers of security threats to networks, most intrusion detection identifies security attacks mainly by detecting misuse using a set of rules based on past hacking patterns. This pattern matching has a high rate of false positives and cannot detect new hacking patterns, making it vulnerable to previously unidentified attack patterns and variations in attack and increasing false negatives. Intrusion detection and prevention technologies are thus required. We propose a network-based intrusion detection model using fuzzy cognitive maps (FCM) that detects intrusion by Denial of Service (DoS) attack detection using packet analysis. A DoS attack typically appears as a Probe and Syn Flooding attack. Syn Flooding Preventer using Fuzzy cognitive maps (SPuF) model captures and analyzes packet information to detect Syn flooding attacks. Using the result of decision module analysis, which used FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulation using the "KDD’99 Competition Data Set" for the SPuF model shows that Probe detection exceeded 97%.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Sun, Fei Xian, and Zhi Gang Wu. "Immune Danger Theory Based Model for SYN Flooding Attack Situation Awareness." Advanced Materials Research 181-182 (January 2011): 66–71. http://dx.doi.org/10.4028/www.scientific.net/amr.181-182.66.

Повний текст джерела
Анотація:
This paper explores a novel danger theory based model to aware the situation for TCP SYN flooding attacks. Within in the presented model, the TCP SYN flooding attacks are looked as dangerous exogenous patterns, and induce danger signals to aware the situation of host computers, which is realized by hosted-based artificial immune detectors. After summarizing the danger theory, the model framework, correlative concepts, TCP SYN flooding attack detection, danger signal computation and attack situation awareness methods are described. Following that, the interrelated techniques are compared. Theoretical analysis results show that the proposed model is valid. Thus, it provides a good solution to computer network security.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Кобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, В. Г. Юрасов, and Д. С. Печкин. "NETWORK ATTACKS BY COMPUTER VIRUSES: RISK LANDSCAPE." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (March 29, 2024): 55–66. http://dx.doi.org/10.36622/1682-7813.2024.27.1.003.

Повний текст джерела
Анотація:
Данная научная статья посвящена исследованию сетевых атак, осуществляемых компьютерными вирусами на корпоративные сети, в частности – комплексному риск-анализу соответствующих сценариев атак. В ходе исследования были проанализированы различные сценарии атак и уязвимости, используемые для их реализации. Особое внимание уделено статистической оценке частоты и ущербности таких атак. На основе полученных результатов был построен риск-ландшафт, а также выявлены наиболее опасные сочетания сценариев (векторов) атак и уязвимостей. Полученный результат может служить основой для дальнейшей разработки как организационно-правовых, так и технических мер по защите корпоративных сетей от сетевых атак компьютерными вирусами. This scientific article is dedicated to the study of network attacks carried out by computer viruses on corporate networks, specifically focusing on a comprehensive risk analysis of corresponding attack scenarios. Various attack scenarios and vulnerabilities used for their implementation were analyzed during the research. Special attention was paid to the statistical assessment of the frequency and severity of such attacks. Based on the results obtained, a risk landscape was constructed, and the most dangerous combinations of attack scenarios (vectors) and vulnerabilities were identified. The obtained result can serve as a basis for further development of both organizational and legal, as well as technical measures to protect corporate networks from network attacks by computer viruses.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Повний текст джерела
Анотація:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Djanie, Tutu, and Dzisi. "A Proposed DoS Detection Scheme for Mitigating DoS Attack Using Data Mining Techniques." Computers 8, no. 4 (November 26, 2019): 85. http://dx.doi.org/10.3390/computers8040085.

Повний текст джерела
Анотація:
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 per hour. Development of easily-accessible, simple DoS tools has increased the frequency and reduced the level of expertise needed to launch an attack. Though these attack tools have been available for years, there has been no proposed defense mechanism targeted specifically at them. Most defense mechanisms in literature are designed to defend attacks captured in datasets like the KDD Cup 99 dataset from 20 years ago and from tools no longer in use in modern attacks. In this paper, we capture and analyze traffic generated by some of these DoS attack tools using Wireshark Network Analyzer and propose a signature-based DoS detection mechanism based on SVM classifier to defend against attacks launched by these attack tools. Our proposed detection mechanism was tested with Snort IDS and compared with some already existing defense mechanisms in literature and had a high detection accuracy, low positive rate and fast detection time.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Petrov, M., and R. Fatkieva. "Model of Synthesis of Distributed Attacking Elements in a Computer Network." Proceedings of Telecommunication Universities 6, no. 2 (2020): 113–20. http://dx.doi.org/10.31854/1813-324x-2020-6-2-113-120.

Повний текст джерела
Анотація:
An approach to predicting the development of attacks on network resources using distributed attacking tools is presented. Distinctive features of attack scenarios are shown. A model of the functioning of a network with distributed attacking elements is described. It is shown that dynamics modeling using the entropy approach to stability assessment does not make it possible to identify the presence of an attack. A method for detecting a focal point carrying out an attack is proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Wijayanto, Agus, Imam Riadi, Yudi Prayudi, and Tri Sudinugraha. "Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method." Register: Jurnal Ilmiah Teknologi Sistem Informasi 8, no. 2 (January 7, 2023): 156–69. http://dx.doi.org/10.26594/register.v8i2.2953.

Повний текст джерела
Анотація:
This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by building a firewall to generate log files and uses the Tazmen Sniffer Protocol, which is sent to a syslog-ng computer in a different virtual domain in a local area network. The Trigger, Acquire, Analysis, Report, Action method is used in network forensic investigations by utilising Wireshark and network miners to analyze network traffic during attacks. The results of this network forensics obtain evidence that there have been eight attacks with detailed information on when there was an attack on the media access control address and internet protocol address, both from the attacker and the victim. However, attacks carried out with the KickThemOut tool can provide further information about the attacker’s details through a number of settings, in particular using the Gratuitous ARP and ICMP protocols.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Angelakis, Dimitris, Errikos Ventouras, Spyros Kostopoulos, and Pantelis Asvestas. "Cybersecurity Issues in Brain-Computer Interfaces: Analysis of Existing Bluetooth Vulnerabilities." Digital Technologies Research and Applications 3, no. 2 (July 10, 2024): 115–39. http://dx.doi.org/10.54963/dtra.v3i2.286.

Повний текст джерела
Анотація:
Brain-computer interfaces (BCIs) hold immense promise for human benefits, enabling communication between the brain and computer-controlled devices. Despite their potential, BCIs face significant cybersecurity risks, particularly from Bluetooth vulnerabilities. This study investigates Bluetooth vulnerabilities in BCIs, analysing potential risks and proposing mitigation measures. Various Bluetooth attacks such as Bluebugging, Bluejacking, Bluesnarfing, BlueBorne, Location Tracking, Man-in-the-Middle Attack, KNOB, BLESA and Reflection Attack are explored, along with their potential consequences on commercial BCI systems. Each attack is examined in terms of its modus operandi and effective mitigation strategies.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Devi, Savita, and Taran Singh Bharti. "A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud." International Journal of Cloud Applications and Computing 12, no. 1 (January 1, 2022): 1–21. http://dx.doi.org/10.4018/ijcac.311036.

Повний текст джерела
Анотація:
To save money on maintenance and administrative costs, cloud computing aims to move high-end computer equipment to the internet and put it online. Both victims and attackers may reap the advantages of cloud computing. On the other side, attacks on cloud components might lead to massive losses for cloud service providers and users. Numerous cyber-attacks have been launched as a consequence of this readily available resource. One of the most significant hazards to communication networks and applications has long been DoS and DDoS attacks. Operations, availability, and security for companies are becoming a nightmare because of these attacks. Since cloud computing resources are scalable, these resources may be dynamically scaled to recognise the attack components and immediately withstand the attack. For this cyber-attack against cloud computing, fast exploitation of the attack data is necessary. This article addresses the majority of the previously published strategies for DDoS attack avoidance, early identification, and remediation.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Rao, Yerra Shankar, Aswin Kumar Rauta, Satya Narayan Kund, Bhagirathi Sethi, and Jangyadatta Behera. "Mathematical Model on Distributed Denial of Service Attack in the Computer Network." WSEAS TRANSACTIONS ON COMMUNICATIONS 22 (December 31, 2023): 183–91. http://dx.doi.org/10.37394/23204.2023.22.18.

Повний текст джерела
Анотація:
In this paper, an electronic- epidemic two-folded mathematical model is formulated with help of non-linear ordinary differential equations. Distributed Denial of Service (DDoS) attacks in the computer network are studied. The modeling of both attacking nodes and targeting nodes is performed. Botnet based malicious devices and their threats on computer networks are addressed using appropriate parameters. The basic reproduction numbers for both the attacking and the targeting population are calculated and interpreted. Local and global stability analysis is carried out for the infection-free and endemic equilibrium points. Differential equations are solved with the help of the Runge-Kutta 4th order numerical method and graphs are analyzed using MATLAB software. Simulation shows that the success or failure depends on the number of initially infected computers in the attacking group. The proposed model exhibits the phenomenon of backward bifurcation for different values of transmission parameters. This model gives the theoretical base for controlling and predicting the DDoS attack. This shows the way to minimize the attack in the network. This study will be helpful to identify the botnet devices and run the latest version of antivirus in the network to protect against DDoS attacks from attacking sources. The application of this study is to ascertain online crime and locate the attacking nodes in the field of online transactions of real-life problems that involve the internet and computer networking systems. Moreover, our model can play an important role in policy-making against the distributed attack.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Erata, Ferhat, Chuanqi Xu, Ruzica Piskac, and Jakub Szefer. "Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers." IACR Transactions on Cryptographic Hardware and Embedded Systems 2024, no. 2 (March 12, 2024): 735–68. http://dx.doi.org/10.46586/tches.v2024.i2.735-768.

Повний текст джерела
Анотація:
The interest in quantum computing has grown rapidly in recent years, and with it grows the importance of securing quantum circuits. A novel type of threat to quantum circuits that dedicated attackers could launch are power trace attacks. To address this threat, this paper presents first formalization and demonstration of using power traces to unlock and steal quantum circuit secrets. With access to power traces, attackers can recover information about the control pulses sent to quantum computers. From the control pulses, the gate level description of the circuits, and eventually the secret algorithms can be reverse engineered. This work demonstrates how and what information could be recovered. This work uses algebraic reconstruction from power traces to realize two new types of single trace attacks: per-channel and total power attacks. The former attack relies on per-channel measurements to perform a brute-force attack to reconstruct the quantum circuits. The latter attack performs a single-trace attack using Mixed-Integer Linear Programming optimization. Through the use of algebraic reconstruction, this work demonstrates that quantum circuit secrets can be stolen with high accuracy. Evaluation on 32 real benchmark quantum circuits shows that our technique is highly effective at reconstructing quantum circuits. The findings not only show the veracity of the potential attacks, but also the need to develop new means to protect quantum circuits from power trace attacks. Throughout this work real control pulse information from real quantum computers is used to demonstrate potential attacks based on simulation of collection of power traces.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

UNDERCOFFER, JEFFREY, ANUPAM JOSHI, TIM FININ, and JOHN PINKSTON. "Using DAML+OIL to classify intrusive behaviours." Knowledge Engineering Review 18, no. 3 (September 2003): 221–41. http://dx.doi.org/10.1017/s0269888904000049.

Повний текст джерела
Анотація:
We have produced an ontology specifying a model of computer attack. Our ontology is based upon an analysis of over 4000 classes of computer intrusions and their corresponding attack strategies and is categorised according to system component targeted, means of attack, consequence of attack and location of attacker. We argue that any taxonomic characteristics used to define a computer attack be limited in scope to those features that are observable and measurable at the target of the attack. We present our model as a target-centric ontology that is to be refined and expanded over time. We state the benefits of forgoing dependence upon taxonomies in favour of ontologies for the classification of computer attacks and intrusions. We have specified our ontology using the DARPA Agent Markup Language+Ontology Inference Layer and have prototyped it using DAMLJessKB. We present our model as a target-centric ontology and illustrate the benefits of utilising an ontology in lieu of a taxonomy, by presenting a use-case scenario of a distributed intrusion detection system.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Shan, Chun, Benfu Jiang, Jingfeng Xue, Fang Guan, and Na Xiao. "An Approach for Internal Network Security Metric Based on Attack Probability." Security and Communication Networks 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/3652170.

Повний текст джерела
Анотація:
A network security metric may provide quantifiable evidence to assist security practitioners in securing computer networks. However, research on security metrics based on attack graph is not applicable to the characteristics of internal attack; therefore we propose an internal network security metric method based on attack probability. Our approach has the following benefits: it provides the method of attack graph simplification with monitoring event node which could solve the attack graph exponential growth with the network size, while undermining the disguise of internal attacks and improving the efficiency of the entire method; the method of attack probability calculation based on simplified attack graph can simplify the complexity of internal attacks and improve the accuracy of the approach.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Li, Feng, and Hai Ying Wang. "Design on DDoS Attack Detection and Prevention Systems." Applied Mechanics and Materials 530-531 (February 2014): 798–801. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.798.

Повний текст джерела
Анотація:
For DDoS attacks, it must be sniffing this step, the attacker to be able to successfully launch the final realization of the invasion and attack, we must find a suitable host computer and can be used as hosts puppet machine. In this thesis, a DDoS attack detection technologies, and further proposed based DDoS attack defense system design, the results show that our design can effectively prevent DDoS network attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Shang, Yilun. "Optimal Control Strategies for Virus Spreading in Inhomogeneous Epidemic Dynamics." Canadian Mathematical Bulletin 56, no. 3 (September 1, 2013): 621–29. http://dx.doi.org/10.4153/cmb-2012-007-2.

Повний текст джерела
Анотація:
Abstract.In this paper, we study the spread of virus/worm in computer networks with a view to addressing cyber security problems. Epidemic models have been applied extensively to model the propagation of computer viruses, which characterize the fact that infected machines may spread malware to other hosts connected to the network. In our framework, the dynamics of hosts evolves according to a modified inhomogeneous Susceptible-Infectious-Susceptible (SIS) epidemic model with time-varying transmission rate and recovery rate. The infection of computers is subject to direct attack as well as propagation among hosts. Based on optimal control theory, optimal attack strategies are provided by minimizing the cost (equivalently maximizing the profit) of the attacker. We present a threshold function of the fraction of infectious hosts, which captures the dynamically evolving strategies of the attacker and reflects the persistence of virus spreading. Moreover, our results indicate that if the infectivity of a computer worm is low and the computers are installed with antivirus software with high reliability, the intensity of attacks incurred will likely be low. This agrees with our intuition.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Barik, Mridul Sankar, Anirban Sengupta, and Chandan Mazumdar. "Attack Graph Generation and Analysis Techniques." Defence Science Journal 66, no. 6 (October 31, 2016): 559. http://dx.doi.org/10.14429/dsj.66.10795.

Повний текст джерела
Анотація:
As computer networks are emerging in everyday life, network security has become an important issue. Simultaneously, attacks are becoming more sophisticated, making the defense of computer networks increasingly difficult. Attack graph is a modeling tool used in the assessment of security of enterprise networks. Since its introduction a considerable amount of research effort has been spent in the development of theory and practices around the idea of attack graph. This paper presents a consolidated view of major attack graph generation and analysis techniques.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Sharma, Vijay Prakash, Narendra Singh Yadav, Sundar Suhrith Adavi, D. Sikha Datta Reddy, and Brij B. Gupta. "A two stage hybrid intrusion detection using genetic algorithm in IoT networks." Journal of Discrete Mathematical Sciences & Cryptography 26, no. 3 (2023): 667–76. http://dx.doi.org/10.47974/jdmsc-1737.

Повний текст джерела
Анотація:
Today, almost 90% of the technology in usage is linked with IoT (Internet of Things). which brings the question, what is IoT? Internet of things is a system of co-related computers, electronic devices, and objects. IoT essentially controls almost every online service which we avail without human -to-human interaction. An IDS is a hardware or software system that automatically monitors, identifies, and alerts a computer or network against attacks and intrusions. The proposed hybrid model makes use of genetic algorithm with UNSW NB-15 dataset which contains multiple classes of attack to provide a huge variety of attacks which will help to simulate different kinds of attack which will help train the model better. We have used CNN and LSTM model for extracting features. By detecting the attacks quickly, we can identify potential intruders and limit the damage. Feature selection and classification have been performed using Generic algorithm. This hybrid model helps to check whether the alert is an attack or not, if yes what kind of attack is it. the proposed Hybrid model works better than a conventional intrusion detection system, we got 99.38% accuracy from this model.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Wang, Rui, Yingxian Chang, Lei Ma, Hao Zhang, Xin Liu, Jianfei Chen, Donglan Liu, Yong Zhang, and Bing Su. "The Border Attack Defense System is Software-Based." Journal of Physics: Conference Series 2074, no. 1 (November 1, 2021): 012041. http://dx.doi.org/10.1088/1742-6596/2074/1/012041.

Повний текст джерела
Анотація:
Abstract Now the computer has been completely towards the public, the network in daily life is more and more widely used, but at the same time, the potential network security problems are also more and more serious. Some sophisticated computer people in order to make money, crack other personal users or company information, a variety of network attacks one after another. Cyber attack has become an extremely feared existence for ordinary people because of its wide range of attacks, strong attack force and obvious hiding effect, which seriously threatens the security of personal information network. If attacked by this kind of attack, the loss borne by each person or company is immeasurable. In order to maintain network security, the defense system is also improving day by day, and finally presents software. This paper mainly makes a detailed understanding of the border attack and defense system, and analyzes the main reasons and inevitability of the software of the border attack and defense system.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Yudhana, Anton, Imam Riadi, and Sri Suharti. "Distributed Denial of Service (DDoS) Analysis on Virtual Network and Real Network Traffic." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 5, no. 1 (July 16, 2021): 112–21. http://dx.doi.org/10.31289/jite.v5i1.5344.

Повний текст джерела
Анотація:
Data communication, computers and computer networks increase the needs and facilitation offered by a variety of server services that are owned by individuals and companies. Servers are the core of continuous communication on the internet and the main factor in the life, development and death of individual businesses or companies that rely on the internet. The other side is also developing rapidly targeting server attacks from starting to weaken performance to crippled, the most popular in the hacker world, namely attacks by bombarding servers with many requests from one computer or more, with one machine to thousands of machines. This study implements several DDoS attack techniques targeted at virtual servers and real servers to determine the type of protocol used and its accuracy and reliability. The research method uses the concept of Robert Maribe Branch (2009) or ADDIE which consists of Analysis, Design, Development, Implementation and Evaluation with the results of successful attacks on the HTTP header on the virtual network and on the real network 85.68%, while the TCP has an accuracy value. 87.75% and the real network produces 90.02%. In addition, the attack using the ping of death on the virtual server was successfully carried out and the real server had an accuracy value of 41.45% so that the attack on the TCP protocol was declared very effective in crippling the target PC or server. Â
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Qin, Yuan. "Computer Network Attack Modeling and Network Attack Graph Study." Advanced Materials Research 1079-1080 (December 2014): 816–19. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.816.

Повний текст джерела
Анотація:
With the development of computer network and rapid popularity of Internet, network information security has become the focus of safeguarding national security and social stability. In the network security event, the hacker often can’t successfully intrude into the network by means of a single host / services hacker. With the help of various kinds of "vulnerability" generated bydifferent relationship existing in multiple point multiple host, the hacker can achieve the purpose of network intrusion. Therefore one important aspect of network security is after obtaining the vulnerability of the network information, considering a combination of multiple exploits and analyzing the attack path of network penetration attacks that the attacker may take.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Zhao, Min, Danyang Qin, Ruolin Guo, and Guangchao Xu. "Efficient Protection Mechanism Based on Self-Adaptive Decision for Communication Networks of Autonomous Vehicles." Mobile Information Systems 2020 (June 10, 2020): 1–9. http://dx.doi.org/10.1155/2020/2168086.

Повний текст джерела
Анотація:
The communication network of autonomous vehicles is composed of multiple sensors working together, and its dynamic topology makes it vulnerable to common attacks such as black hole attack, gray hole attack, rushing attack, and flooding attack, which pose a threat to the safety of passengers and vehicles; most of the existing safety detection mechanisms for a vehicle can only detect attacks but cannot intelligently defend against attacks. To this end, an efficient protection mechanism based on self-adaptive decision (SD-EPM) is proposed, which is divided into the offline phase and the online phase. The online phase consists of two parts: intrusion detection and efficient response. Attack detection and defense in the vehicular ad hoc networks (VANETs) are performed in terms of the attack credibility value (AC), the network performance attenuation value (NPA), and the list of self-adaptive decision. The simulation results show that the proposed mechanism can correctly identify the attack and respond effectively to different attack types. And, the negative impact on VANETs is small.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Kondakov, Sergey, and Ilya Rud. "Model of the Process of Conducting Computer Attacks Using Special Information Influences." Voprosy kiberbezopasnosti, no. 5(45) (2021): 12–20. http://dx.doi.org/10.21681/2311-3456-2021-5-12-20.

Повний текст джерела
Анотація:
Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

FRĂȚILĂ, Andreea-Ioana. "Analysis of Computer Malware and Common Attacks." International Journal of Information Security and Cybercrime 9, no. 2 (December 30, 2020): 38–45. http://dx.doi.org/10.19107/ijisc.2020.02.06.

Повний текст джерела
Анотація:
Technological evolution comes the progress of cybercrime, which continually develops new attack types, tools and techniques that allow attackers to penetrate more complex or well-controlled environments and produce increased damage and even remain untraceable. This paper provides in two different chapters an overview of techniques for analyzing, classifying the malware and different attack types and presents measures that each company must implement in order to ensure security. Organizations need to understand and protect themselves from many different types of threat actors, so it is valuable to know a little about them, their attributes, and the types of attacks they are likely to launch.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Lazarov, Andon D. "Mathematical Modelling of Malware Intrusion in Computer Networks." Cybernetics and Information Technologies 22, no. 3 (September 1, 2022): 29–47. http://dx.doi.org/10.2478/cait-2022-0026.

Повний текст джерела
Анотація:
Abstract Malware attacks cause great harms in the contemporary information systems and that requires analysis of computer networks reaction in case of malware impact. The focus of the present study is on the analysis of the computer network’s states and reactions in case of malware attacks defined by the susceptibility, exposition, infection and recoverability of computer nodes. Two scenarios are considered – equilibrium without secure software and not equilibrium with secure software in the computer network. The behavior of the computer network under a malware attack is described by a system of nonhomogeneous differential equations. The system of the nonhomogeneous differential equations is solved, and analytical expressions are derived to analyze network characteristics in case of susceptibility, exposition, infection and recoverability of computer nodes during malware attack. The analytical expressions derived are illustrated with results of numerical experiments. The conception developed in this work can be applied to control, prevent and protect computer networks from malware intrusions.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Raj Panakadan, Rusheel, Chitluri Dhanush, and Dr Carmel Mary Belinda. "An effective solution for DDOS attack." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 194. http://dx.doi.org/10.14419/ijet.v7i1.7.10650.

Повний текст джерела
Анотація:
Distributed Denial of Service (DDoS) attacks constitute one of the major threats and among the hardest security problems in today’s internet. Defense against these attacks is complicated by spoofed source IP addresses, which gives us a tough task to find out the packets origin. So this paper represents a solution for a DDoS attack. We’ll be using wireshark tool to analyze the network traffic of any interface and find malicious activity by hackers. An algorithm is written at the server side so that if any malicious user sends asynchronous requests at a rate of (>=30 requests per second) then a Visual Basic script is sent to the malicious user. The Visual basic script consists of code encapsulated, allowing system administrators to generate and manage computers with error handling, sub routines etc. This .vbs scripts are made to auto run on the computer, thus making a particular service unavailable to the malicious user. Hereby, stopping the server from partial shutdown or preventing it from DDoS attack.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Silalahi, Putri Rosayanti, and Sunarsan Sitohang. "ANALISIS KEAMANAN JARINGAN PADA FASILITAS WIFI TERHADAP SERANGAN SNIFFING DI PT DUTA COMPUTER." Computer and Science Industrial Engineering (COMASIE) 9, no. 8 (October 9, 2023): 30. http://dx.doi.org/10.33884/comasiejournal.v9i8.7954.

Повний текст джерела
Анотація:
Technological developments and dependence on WiFi networks have brought many benefits in the business world, including at PT Duta Computer. However, network security is becoming a critical issue as cyber attacks become increasingly complex and sophisticated. One potential attack is a sniffing attack, in which the attacker tries to steal sensitive data that is sent over a WiFi network. This study aims to conduct an in-depth analysis of network security on WiFi facilities at PT Duta Computer against sniffing attacks. The results of this study are expected to provide deeper insight into the level of security of the WiFi network at PT Duta Computer and help companies to identify and address potential security vulnerabilities. By enhancing network security, PT Duta Computer can ensure that sensitive customer data and corporate information remain safe from sniffing attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Adhar, Sandi, and Usep Saprudin. "Implementasi Cloudflare Zero Trust Dalam Mendeteksi Aktivitas Cryptojcking Pada Jaringan Komputer." JTKSI (Jurnal Teknologi Komputer dan Sistem Informasi) 6, no. 1 (January 20, 2023): 23. http://dx.doi.org/10.56327/jtksi.v6i1.1388.

Повний текст джерела
Анотація:
With the increasing popularity of cryptocurrency (cryptocurrency) causing high crypto mining activity, crypto mining requires large resources so that many cybercriminals carry out illegal activities by stealing access to other people's computers to be used to mine cryptocurrencies (cryptojacking), this can interfere with the performance of a computer if the computer is used illegally without the knowledge of the computer owner, apart from that crypto mining also runs by utilizing the internet network, CPU usage and the power source from the victim's computer, for this reason this research will implement software as service (Saas) services from Cloudflare zero trust that can detect and anticipate cryptojacking activities on the internet network in order to anticipate attacks, Cloudflare zero trust will be installed on the network using the MikroTik routerboard intermediary, besides that the author will conduct an attack trial (penetrator si testing) by carrying out crypto mining activities on computers in a network and analyzing whether Cloudflare Zero Trust is able to detect and anticipate these attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Kurniawan, Andre Arta, Jusak, and Musayyanah. "Intrusion Detection System Using Deep Learning for DoS Attack Detection." JEECS (Journal of Electrical Engineering and Computer Sciences) 6, no. 2 (December 31, 2021): 1087–98. http://dx.doi.org/10.54732/jeecs.v6i2.203.

Повний текст джерела
Анотація:
Various attacks on a computer network or the internet have generated many incidents and cases, this makes security threats in using the internet or computer networks a major focus. Denial of Service attack or often referred to as DoS attack is one of the attack techniques that carry out flooding packets or requests to the target computer until the target computer is down. Prevention is needed in order to minimize existing attacks. IDS can be used as a detector in network traffic, but because IDS has its limitations, an IDS system is built using Deep Learning to detect DoS attacks. By using the data from the wireshark log as a dataset, it is necessary to do data normalization which will then be inputted into CNN VGG-19. The test results that have been carried out with variations in the data inputted into the CNN VGG- 19 produce an average accuracy of 99.32% with an average loss of 4.08%, and by varying the iteration of the training process the resulting accuracy is 99.17% with an average loss - an average of 4.46%. And the ROC Curve value for the True Positive Rate and the False Positive Rate is 1.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Goparaju, Bhargavi, and Dr Bandla Srinivasa Rao. "A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1s (January 8, 2023): 01–08. http://dx.doi.org/10.17762/ijcnis.v14i1s.5586.

Повний текст джерела
Анотація:
Distributed denial-of-service attack (DDoS) is one of the most frequently occurring network attacks. Because of rapid growth in the communication and computer technology, the DDoS attacks became severe. So, it is essential to research the detection of a DDoS attack. There are different modes of DDoS attacks because of which a single method cannot provide good security. To overcome this, a DDoS attack detection technique is presented in this paper using machine learning algorithm. The proposed method has two phases, dimensionality reduction and model training for attack detection. The first phase identifies important components from the large proportion of the internet data. These extracted components are used as machine learning’s input features in the phase of model detection. Support Vector Machine (SVM) algorithm is used to train the features and learn the model. The experimental results shows that the proposed method detects DDoS attacks with good accuracy.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Salih, Azar Abid, and Maiwan Bahjat Abdulrazzaq. "Cyber security: performance analysis and challenges for cyber attacks detection." Indonesian Journal of Electrical Engineering and Computer Science 31, no. 3 (September 1, 2023): 1763. http://dx.doi.org/10.11591/ijeecs.v31.i3.pp1763-1775.

Повний текст джерела
Анотація:
Nowadays, with the occurrence of new attacks and raised challenges have been facing the security of computer systems. Cyber security techniques have become essential for information technology services to detect and react against cyber-attacks. The strategy of cyber security enables visibility of various types of attacks and vulnerabilities throughout computer networks, whilst also provides detecting cyber-attacks and effective ways of identifying and preventing them. This study mainly focuses on the performance analysis and challenges faced by cyber security using the latest techniques. It also provides a review of the attack detection process including the robust effectiveness of intelligent techniques. Finally, summarize and discuss some methods to increase attack detection performance utilizing deep learning (DL) architectures.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Sharma, Kavita, and B. B. Gupta. "Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices." International Journal of E-Services and Mobile Applications 10, no. 2 (April 2018): 58–74. http://dx.doi.org/10.4018/ijesma.2018040104.

Повний текст джерела
Анотація:
This article describes how in the summer of 1999, the Computer Incident Advisory Capability first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of Denial of Service (DoS) attacks in a distributed environment that eliminates the availability of resources or data on a computer network. DDoS attack exhausts the network resources and disturbs the legitimate user. This article provides an explanation on DDoS attacks and nature of these attacks against Smartphones and Wi-Fi Technology and presents a taxonomy of various defense mechanisms. The smartphone is chosen for this study, as they have now become a necessity rather than a luxury item for the common people.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії