Current Issue : January - March Volume : 2019 Issue Number : 1 Articles : 5 Articles
Distributed Denial of Service (DDoS) attacks are performed from multiple\nagents towards a single victim. Essentially, all attacking agents generate multiple\npackets towards the victim to overwhelm it with requests, thereby overloading\nthe resources of the victim. Since it is very complex and expensive to\nconduct a real DDoS attack, most organizations and researchers result in using\nsimulations to mimic an actual attack. The researchers come up with diverse\nalgorithms and mechanisms for attack detection and prevention. Further,\nsimulation is good practice for determining the efficacy of an intrusive\ndetective measure against DDoS attacks. However, some mechanisms are ineffective\nand thus not applied in real life attacks. Nowadays, DDoS attack has\nbecome more complex and modern for most IDS to detect. Adjustable and\nconfigurable traffic generator is becoming more and more important. This\npaper first details the available datasets that scholars use for DDoS attack detection.\nThe paper further depicts the a few tools that exist freely and commercially\nfor use in the simulation programs of DDoS attacks. In addition, a\ntraffic generator for normal and different types of DDoS attack has been developed.\nThe aim of the paper is to simulate a cloud environment by\nOMNET++ simulation tool, with different DDoS attack types. Generation\nnormal and attack traffic can be useful to evaluate developing IDS for DDoS\nattacks detection. Moreover, the result traffic can be useful to test an effective\nalgorithm, techniques and procedures of DDoS attacks....
Cryptography as a service is becoming extremely popular. It eases the way\ncompanies deal with securing their information without having to worry\nabout their customerâ??s information being accessed by someone who should\nnot have access to it. In this overview, we will be taking a closer look at Cryptography\nas a Service. The ground we will be examining is the effectiveness of\nit for mobile/wireless and desktop computing. Since we will be looking at\nsomething that operates as a service, we will need to first cover the application\nprogram interface (API) basics [1] or standard software as a service\n(SaaS) [2]. Next, what exactly cryptography as a service means for each of the\naforementioned platforms. Lastly, other possible solutions and how they\ncompare to CaaS. For the purpose of this review, we will be looking at CaaS in\na cloud environment since typical SaaS is used that way. Subsequently most\ncloud environments utilize a UNIX based operating system or similar solution,\nwhich will be the target environment for the purpose of this paper. Popular\nalgorithms that are used in CaaS will be the final part that will be examined\non the grounds of how they perform, level of security offered, and\nusability in CaaS. Upon reading this paper the reader will have a better understanding\nof how exactly CaaS operates and what it has to offer for mobile,\ndesktop, and wireless users in the present and future....
IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the\nweapon systemâ??s connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity\nthreats to weapon systems intensify along with the growing of IoTâ??s benefits. Coping with these cybersecurity threats nowadays, we\nrequire the implementation of â??security by designâ? concept during weapon system development throughout the system lifecycle,\nbut not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt\nâ??security by designâ? when developing new weapon systems; another approach to acquire weapon systems is through import if a\ncountry cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework\nthat could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security\nevaluation framework that could be used to integrate IoT devices and components into the weapon system and a method to address\ncyber security requirements using international standard security control....
This study designed and fabricated a frequency-selective structure-based security paper for the electromagnetic detection system of\na security gate, which aims to prevent leakage of confidential documents. When a functional paper embedded with a frequencyselective\npattern that selectively reflects a specific frequency is being leaked out of a security zone, the electromagnetic detection\nsystem receives and detects the intensity of the electromagnetic wave reflected from the security paper passing through an\nantenna gate, which transmits/receives RF signals. A stable detection performance of the security paper can be ensured by\nimproving the incidence angle stability for incident waves and reducing the reflection loss. This study designed a frequencyselective\nstructure with stable frequency reflection properties at the X-band by utilizing a Jerusalem cross structure. The\nproposed design was realized using the screen printing technique, which could implement a circuit, to print silver ink on a plain\npaper. To verify the applicability of the frequency-selective structure-based security paper, an RF detection system with a\nmultiple antenna array was constructed and the intensity of the received signals was measured. The measurement was\nperformed for various scenarios, and the result showed that the proposed security paper was well detected....
This article surveys the literature on social engineering. There are lots of security\napplication and hardware in market; still there are several methods that\ncan be used to breach the information security defenses of an organization\nor individual. Social engineering attacks are interested in gaining information\nthat may be used to carry out actions such as identity theft, stealing password\nor gaining information for another type of attack. The threat lies with the\ncombinations of social engineering with another type of attacks like Phishing\nand Watering hole attack which make it hard to defense against. This research\naims to investigate the impact of modern Social Engineering on the\norganization or individual. It describes the categories of Social Engineering,\nand how the attacker takes advantage of human behavior. At the same time, I\nalso discuss the direct and indirect attack of social engineering and the defense\nmechanism against this attack....
Loading....