Current Issue : April - June Volume : 2019 Issue Number : 2 Articles : 5 Articles
In Industrial Control Systems (ICS), security issues are getting more and\nmore attention. The number of hacking attacks per year is endless, and the\nattacks on industrial control systems are numerous. Programmable Logic\nController (PLC) is one of the main controllers of industrial processes. Since\nthe industrial control system network is isolated from the external network,\nmany people think that PLC is a safety device. However, virus attacks in recent\nyears, such as Stuxnet, have confirmed the erroneousness of this idea. In\nthis paper, we use the vulnerability of Siemens PLC to carry out a series of attacks,\nsuch as S7-200, S7-300, S7-400, S7-1200 and so on. We read the data\nfrom the PLC output and then rewrite the data and write it to the PLC. We\ntamper with the writing of data to achieve communication chaos. When we\nattack the primary station, all slave devices connected to the primary station\nwill be in a state of communication confusion. The attack methods of us can\ncause delay or even loss of data in the communications from the Phasor Data\nConcentrator (PMU) to the data concentrator. The most important thing is\nthat our attack method generates small traffic and short attack time, which is\ndifficult to be identified by traditional detection methods....
While various ransomware defense systems have been proposed to deal with traditional randomly-spread ransomware attacks\n(based on their unique high-noisy behaviors at hosts and on networks), none of them considered ransomware attacks precisely\naiming at specific hosts, e.g., using the common Remote Desktop Protocol (RDP). To address this problem, we propose a systematic\nmethod to fight such specifically targeted ransomware by trapping attackers via a network deception environment and then\nusing traceback techniques to identify attack sources. In particular, we developed various monitors in the proposed deception\nenvironment to gather traceable clues about attackers, and we further design an analysis system that automatically extracts and\nanalyze the collected clues. Our evaluations show that the proposed method can trap the adversary in the deception environment\nand significantly improve the efficiency of clue analysis. Furthermore, it also helps us trace back RDP-based ransomware attackers\nand ransomware makers in the practical applications....
Sound Recognition becomes an important tool for intrusion detection or for\nthe monitoring of public premises exposed to personal hostility. It could further\nidentify different sounds. The main idea of the sound recognition\nprocess in a security system is to store samples of different sound signals in\nthe memory of the computer as references, and to be analyzed with respect to\ntheir frequencies components. In this paper, the sound signal of an unknown\nsource would be analyzed and compared with all the available reference samples,\nand then recognition is made according to the closest sample. The developed\nsecurity system consists of two main parts: the spectrum analyzer\nthat converts the sound signal to spectrograms. It is designed based on the\nreal-time analyzes, and the recognizer which compares the spectrograms and\ngives the decision of the recognition by using a special criterion. Experimental\nresults prove that the accuracy of the proposed system can be 98.33% for\nthe selected sample of signals....
--NA--...
This research aims to study various Symmetrical Algorithms, while the main\nobjective of this study is to find out a suitable algorithm for the encryption of\nany specific size of text file where the experiment of each algorithm is based on\nencryption of different sizes of the text files, which are in â??10 KB to 5 MBâ?,\nand also to calculate the time duration that each algorithm takes to encrypt or\nto decrypt the particular size of each text file. There are many types of encryption\nalgorithm, which can be used to encrypt the computerized information in\ndifferent Organizations, whose all algorithms can encrypt and decrypt any size\nof text file, but the time duration of each Algorithm during the encryption or\ndecryption process of specific file size is not fixed. Some of the algorithms are\nsuitable for encryption of specific ranges of the file size, or some of algorithms\nare functional while encryption small size of files, and others algorithms are\nfunctional for encryption of big size of text files, based on the time duration\ndisparity among symmetric algorithms during encryption of text files. In this\nstudy five symmetrical algorithms are merged in one program using classes\nand concept of inheritance in the form that if encryption is needed, the program\nwill select the file and it checks the size of the text file. After this process\nthe program automatically will select the suitable encryption algorithm to encrypt\nthe specific text file according to the range of the file size. Knowing that\nthe file size before or after encryption will not change or is stable, in this case\nof the decryption algorithm will apply the same process of encryption while\ndecrypting files, the program of encryption and decryption code will write using\nvisual Studio 2013. The result will be analyzed with R program (R software),\nthe cipher text will appear in the format of UTF8 which means Unicode\nTransformation Format, â??8â? Means â??8â? bits to represent a character, the size\nformat that will apply in the program will be in format of KB (kilo Byte)....
Loading....