Docker Security: A Threat Model, Attack Taxonomy and Real-Time Attack Scenario of DoS

Author(s):  
Aparna Tomar ◽  
Diksha Jeena ◽  
Preeti Mishra ◽  
Rahul Bisht
Author(s):  
Estefano Soria ◽  
Justin E. Jackson ◽  
Hamdi Albunashee ◽  
Chris Farnell ◽  
H. Alan Mantooth

2020 ◽  
Vol 2020 ◽  
pp. 1-16 ◽  
Author(s):  
Jing Liu ◽  
Changbo Yuan ◽  
Yingxu Lai ◽  
Hua Qin

Industrial Internet technology has developed rapidly, and the security of industrial data has received much attention. At present, industrial enterprises lack a safe and professional data security system. Thus, industries urgently need a complete and effective data protection scheme. This study develops a three-layer framework with local/fog/cloud storage for protecting sensitive industrial data and defines a threat model. For real-time sensitive industrial data, we use the improved local differential privacy algorithm M-RAPPOR to perturb sensitive information. We encode the desensitized data using Reed–Solomon (RS) encoding and then store them in local equipment to realize low cost, high efficiency, and intelligent data protection. For non-real-time sensitive industrial data, we adopt a cloud-fog collaborative storage scheme based on AES-RS encoding to invisibly provide multilayer protection. We adopt the optimal solution of distributed storage in local equipment and the cloud-fog collaborative storage scheme in fog nodes and cloud nodes to alleviate the storage pressure on local equipment and to improve security and recoverability. According to the defined threat model, we conduct a security analysis and prove that the proposed scheme can provide stronger data protection for sensitive data. Compared with traditional methods, this approach strengthens the protection of sensitive information and ensures real-time continuity of open data sharing. Finally, the feasibility of our scheme is validated through experimental evaluation.


2014 ◽  
Vol 513-517 ◽  
pp. 408-411
Author(s):  
Li Juan Zhang

In order to find more efficient and handle the internal network threat with the LAN network threat warning and real-time processing, remote process monitoring and management of computer systems is used in this paper. By getting the system process handle on the local computer, realizes the acquisition of the threat source information of the system. By customization of the application layer protocol AMCP, realizes the efficient information transmission between server and client. In order to enhance the reliability of the system security threat model, the System security threat information is analysised with the anomaly detection algorithm based on statistics. Analysis of the test data shows that: through getting the system process handle on the local computer, the system treating information can be obtained. Through the security threat model based the anomaly detection algorithm based on statistics, network threat is dealed efficiently and real time.


2020 ◽  
pp. 97-101
Author(s):  
Dian Kurnia ◽  
Juliandri

A monitoring system is needed to monitor a network topology from attacks that might occur at that time. A realtime monitoring system is needed to find out the attack. Therefore, in this study, an attack scenario on a proxy router was carried out using a brute force technique. The brute force technique is an efficient method that tries every possible login password character that the network administrator might use. This brute force technique already exists in the application used, namely Brutus. Brutus is executed by focusing the attack on port 23 telnet on the proxy router. The system log listed as a login failure caused by a brute attack on the proxy router will be forwarded by a script that is running to a notification with a network administrator telegram bot. From the results of research that has been carried out on the monitoring system on the proxy running in real time to notify the login failure message via telegram. The telegram notification will stop if the password has been found by Brutus or the Brutus dictionary does not find the password on the designed Mikrotik router network. Prevention is done by disabling open ports and activating the drop firewall menu if it finds a possible attacker's ip address on the mikrotik router to reduce attacks from the attacker.


Author(s):  
Charu Negi ◽  
Preeti Mishra ◽  
Pooja Chaudhary ◽  
Harsh Vardhan

As android devices have increased in number in the past few years, the android operating system has started dominating the smartphone market. The vast spread of android across all the devices has made security an important issue as the android users continue to grow exponentially. The security of android platform has become the need of the hour in view of increase in the number of malicious apps and thus several studies have emerged to present the detection approaches. In this paper, we review the android components to propose a threat model that illustrates the possible threats that are present in the android. We also present the attack taxonomy to illustrate the possible attacks at various layers of the android architecture. Experiments demonstrating the feature extraction and classification using machine earning algorithms have also been performed.


1979 ◽  
Vol 44 ◽  
pp. 41-47
Author(s):  
Donald A. Landman

This paper describes some recent results of our quiescent prominence spectrometry program at the Mees Solar Observatory on Haleakala. The observations were made with the 25 cm coronagraph/coudé spectrograph system using a silicon vidicon detector. This detector consists of 500 contiguous channels covering approximately 6 or 80 Å, depending on the grating used. The instrument is interfaced to the Observatory’s PDP 11/45 computer system, and has the important advantages of wide spectral response, linearity and signal-averaging with real-time display. Its principal drawback is the relatively small target size. For the present work, the aperture was about 3″ × 5″. Absolute intensity calibrations were made by measuring quiet regions near sun center.


Author(s):  
Alan S. Rudolph ◽  
Ronald R. Price

We have employed cryoelectron microscopy to visualize events that occur during the freeze-drying of artificial membranes by employing real time video capture techniques. Artificial membranes or liposomes which are spherical structures within internal aqueous space are stabilized by water which provides the driving force for spontaneous self-assembly of these structures. Previous assays of damage to these structures which are induced by freeze drying reveal that the two principal deleterious events that occur are 1) fusion of liposomes and 2) leakage of contents trapped within the liposome [1]. In the past the only way to access these events was to examine the liposomes following the dehydration event. This technique allows the event to be monitored in real time as the liposomes destabilize and as water is sublimed at cryo temperatures in the vacuum of the microscope. The method by which liposomes are compromised by freeze-drying are largely unknown. This technique has shown that cryo-protectants such as glycerol and carbohydrates are able to maintain liposomal structure throughout the drying process.


Author(s):  
R.P. Goehner ◽  
W.T. Hatfield ◽  
Prakash Rao

Computer programs are now available in various laboratories for the indexing and simulation of transmission electron diffraction patterns. Although these programs address themselves to the solution of various aspects of the indexing and simulation process, the ultimate goal is to perform real time diffraction pattern analysis directly off of the imaging screen of the transmission electron microscope. The program to be described in this paper represents one step prior to real time analysis. It involves the combination of two programs, described in an earlier paper(l), into a single program for use on an interactive basis with a minicomputer. In our case, the minicomputer is an INTERDATA 70 equipped with a Tektronix 4010-1 graphical display terminal and hard copy unit.A simplified flow diagram of the combined program, written in Fortran IV, is shown in Figure 1. It consists of two programs INDEX and TEDP which index and simulate electron diffraction patterns respectively. The user has the option of choosing either the indexing or simulating aspects of the combined program.


Sign in / Sign up

Export Citation Format

Share Document