Network Intrusion Tracking for DoS Attacks

Author(s):  
Mahbubur R. Syed ◽  
Mohammad M. Nur ◽  
Robert J. Bignall

In recent years the Internet has become the most popular and useful medium for information interchange due to its wide availability, flexibility, universal standards, and distributed architecture. As an outcome of increased dependency on the Internet and networked systems, intrusions have become a major threat to Internet users. Network intrusions may be categorized into the following major types: • Stealing valuable and sensitive information • Destroying or altering information • Obstructing the availability of information by destroying the service-providing ability of a victim’s server

Computers ◽  
2019 ◽  
Vol 8 (4) ◽  
pp. 86 ◽  
Author(s):  
Azeez ◽  
Ayemobola ◽  
Misra ◽  
Maskeliūnas ◽  
Damaševičius

Ubiquitous nature of Internet services across the globe has undoubtedly expanded the strategies and operational mode being used by cybercriminals to perpetrate their unlawful activities through intrusion on various networks. Network intrusion has led to many global financial loses and privacy problems for Internet users across the globe. In order to safeguard the network and to prevent Internet users from being the regular victims of cyber-criminal activities, new solutions are needed. This research proposes solution for intrusion detection by using the improved hashing-based Apriori algorithm implemented on Hadoop MapReduce framework; capable of using association rules in mining algorithm for identifying and detecting network intrusions. We used the KDD dataset to evaluate the effectiveness and reliability of the solution. Our results obtained show that this approach provides a reliable and effective means of detecting network intrusion.


2019 ◽  
Vol 68 ◽  
pp. 01010
Author(s):  
Andrejs Vilks

Among various types of threats to urban and rural security, there has been an increase in cybercrime in recent years, an increase in criminal offenses in the e-environment. This also applies to the sexual exploitation of children in the e-environment. Sexual violence against children in cyberspace is linked to objectively determined factors, such as the development of Internet technologies and their wide availability. The active efforts of children to learn and use the new technologies, the attractiveness of the virtual environment in contrast to the real situation and the ambiguous and in many cases incomprehensible nature, as well as the saturation of pornographic material in the Internet, the weak control of their distribution, should be noted. Due to the increasing availability of the Internet, the expansion of e-services in cities and rural areas is relatively balanced. An Internet user may be at risk in both big cities and in a less populated rural area. Among Internet users the proportion of young people and children is relatively high, which objectively determines their increased victimization potential. Among threats to children related to the e-environment, multiple forms of child sexual abuse, including cyberbullying, sextings, sextorings, cyberstalkings, are increasing.


Author(s):  
Sonali Kadam

In today’s world, one of the most vulnerable security threat which poses a problem to the internet users is phishing. Phishing is an attack made to steal the sensitive information of the users such as password, PIN, card details etc., In a phishing attack, the attacker creates a fake website to make the users click it and steal the sensitive information of users. . In this paper, we propose a feature-based phishing detection technique that uses uniform resource locator (URL) features. This paper focuses on the extracting the features which are then classified based on their effect within a website. The feature groups include address- bar related features, abnormal- based features, HTML – JavaScript based features and domain based features. We plan to use machine learning and implement some classification algorithms and compare the performance of these algorithms on our dataset.


Cyber attacks are on the rise every day and pose a major threat to the Internet users. Cyber attackers are constantly capable of gaining hidden exposure at the moment and keeping a low profile. There is a need to carry out analyses on cyber attacks for educational purposes. In this paper we analyze four types of most famous cyber-attacks for financial gains: phishing attack, salami slice attack, ransomware attack, and cryptojacking attack. General Terms: Cyber attacks


Crisis ◽  
2013 ◽  
Vol 34 (5) ◽  
pp. 348-353 ◽  
Author(s):  
Hajime Sueki

Background: Previous studies have shown that suicide-related Internet use can have both negative and positive psychological effects. Aims: This study examined the effect of suicide-related Internet use on users’ suicidal ideation, depression/anxiety tendency, and loneliness. Method: A two-wave panel study of 850 Internet users was conducted via the Internet. Results: Suicide-related Internet use (e.g., browsing websites about suicide methods) had negative effects on suicidal ideation and depression/anxiety tendency. No forms of suicide-related Internet use, even those that would generally be considered positive, were found to decrease users’ suicidal ideation. In addition, our results suggest that the greater the suicidal ideation and feelings of depression and loneliness of Internet users, the more they used the Internet. Conclusion: Since suicide-related Internet use can adversely influence the mental health of young adults, it is necessary to take measures to reduce their exposure to such information.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


Think India ◽  
2019 ◽  
Vol 22 (2) ◽  
pp. 315-328
Author(s):  
Vishal Patel ◽  
Pravin H. Bhathawala

Anti Virus are nasty software’s. It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on Anti Virus analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most Anti Virus programs are large and complex and one can’t possibly understand every detail. Educating the internet users about Anti Virus attack, as well as the implementation and proper application of anti-Anti Virus tools, are critical steps in protecting the identities of online consumers against Anti Virus attacks.


2019 ◽  
Author(s):  
Dijana Kovacevic ◽  
Ljiljana Kascelan

<p> </p> <p>the present study deals with a more detailed, and updated, modified model that allows for the identification of internet usage patterns by gender. The model was modified due to the development of the internet and new access models, on the one hand, and to the fact that previous studies mainly focuses on various individual (non-interactive) influences of certain factors, on the other.</p> <i></i><u></u><sub></sub><sup></sup> <p>The Decision Tree (DT) method, which is used in our study, does not require a pre-defined underlying relationship. In addition, the method allows a great many explanatory variables to be processed and the most important variables are easy to identify. </p><p>Obtained results can serve as to web developers and designers, since by indicating the differences between male and female internet users in terms of their behaviour on the internet it can help in deciding when, where and how to address and appeal to which section of the user base. It is especially important to know their online preferences in order to enable the adequate and targeted placement of information, actions or products and services for the intended target groups.</p><p> <b></b><i></i><u></u><sub></sub><sup></sup><br></p>


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Mike Francoeur

There is a tendency, particularly among Western pundits and technologists, to examine the Internet in almost universally positive terms; this is most evident in any discussion of the medium’s capacity for democratization. While the Internet has produced many great things for society in terms of cultural and economic production, some consideration must be given to the implications that such a revolutionary medium holds for the public sphere. By creating a communicative space that essentially grants everyone his or her own microphone, the Internet is fragmenting public discourse due to the proliferation of opinions and messages and the removal of traditional gatekeepers of information. More significantly, because of the structural qualities of the Internet, users no longer have to expose themselves to opinions and viewpoints that fall outside their own preconceived notions. This limits the robustness of the public sphere by limiting the healthy debate that can only occur when exposed to multiple viewpoints. Ultimately, the Internet is not going anywhere, so it is important to equip the public with the tools and knowledge to be able to navigate the digital space. 


2018 ◽  
Vol 6 (1) ◽  
pp. 60
Author(s):  
Ranny Rastati

In 2017 the majority of internet users are 19-34 years old or 49.52% (APJI, 2017). Almost half of the internet users in Indonesia are digital natives who were born after 1980: Generation Y (1980-1995) and Generation Z (1996-2009). This research will be focused on Generation Z as the true generation of the internet. Generation Z was born when the internet is available, a contrast to Generation Y who is still experiencing the transition of the internet. The purpose of this research is to find an effective way of providing information about media literacy to Generation Z. Through descriptive qualitative, the study was conducted with in-depth interview and observation toward 12 university students in Jakarta. The results showed that there are four effective ways of providing information about media literacy which is i) videos distributed to social media such as Youtube and Instagram, ii) interesting memes in communicative style, iii) through selebgram or micro-celebrity in Instagram who is consider as a role model and have a positive image, and iv) roadside billboards. Another interesting finding is that male informants tend to like media literacy information through videos and memes, while female informants prefer campaigns conducted by positive image selebgram and billboard. AbstrakPada tahun 2017 pengguna internet di Indonesia mayoritas berusia 19-34 tahun yaitu sebanyak 49,52% (APJI, 2017). Dari data tersebut terlihat bahwa hampir sebagian pengguna internet di Indonesia adalah digital natives atau penutur asli teknologi digital yaitu orang-orang yang lahir setelah tahun 1980: Generasi Y (1980-1995) dan Generasi Z (1996-2009). Penelitian ini akan difokuskan kepada Generasi Z karena mereka dianggap sebagai sebenar-benarnya generasi internet. Generasi Z lahir saat teknologi tersebut sudah tersedia, berbeda dengan Generasi Y yang masih mengalami transisi teknologi hingga menuju internet. Tujuan penelitian ini adalah mencari tahu cara yang efektif dalam memberikan informasi mengenai media literasi kepada generasi Z. Metode yang digunakan adalah deskriptif kualitatif dengan observasi dan wawancara mendalam. Informan berjumlah 12 orang mahasiswa di Jakarta. Hasil penelitian menunjukkan bahwa ada empat cara yang efektif dalam memberikan informasi mengenai media literasi yaitu i) video yang disebarkan ke media sosial seperti Youtube dan Instagram, ii) meme menarik dengan bahasa yang mudah dimengerti, iii) melalui selebgram yang menjadi panutan dan berimage positif, dan iv) papan iklan di pinggir jalan. Temuan menarik lainnya adalah informan laki-laki cenderung menyukai informasi media literasi melalui video dan meme yang disebarkan ke media sosial, sementara perempuan lebih menyukai kampanye yang dilakukan oleh selebgram berimage positif dan papan iklan.


Sign in / Sign up

Export Citation Format

Share Document