IoT-NFC Controlled Remote Access Security and an Exploration through Machine Learning

Author(s):  
Md. Abbas Ali Khan ◽  
Mohammad Hanif Ali ◽  
A.K.M Fazlul Haque ◽  
Farah Sharmin ◽  
Md. Ismail Jabiullah
Author(s):  
Md. Abbas Ali Khan ◽  
Mohammad Hanif Ali ◽  
A. K. M. Fazlul Haque ◽  
Chandan Debnath ◽  
Md. Ismail Jabiullah ◽  
...  

Author(s):  
Samuel Ndichu ◽  
◽  
Sylvester McOyowo ◽  
Henry Okoyo ◽  
Cyrus Wekesa

Information security threats exploit vulnerabilities in communication networks. Remote access vulnerabilities are evident from the point of communication initialization following the communication channel to data or resources being accessed. These threats differ depending on the type of device used to procure remote access. One kind of these remote access devices can be considered as safe as the organization probably issues it to provide for remote access. The other type is risky and unsafe, as they are beyond the organization’s control and monitoring. The myriad of devices is, however, a necessary evil, be it employees on public networks like cyber cafes, wireless networks, vendors support, or telecommuting. Virtual Private Network (VPN) securely connects a remote user or device to an internal or private network using the internet and other public networks. However, this conventional remote access security approach has several vulnerabilities, which can take advantage of encryption. The significant threats are malware, botnets, and Distributed Denial of Service (DDoS). Because of the nature of a VPN, encryption will prevent traditional security devices such as a firewall, Intrusion Detection System (IDS), and antivirus software from detecting compromised traffic. These vulnerabilities have been exploited over time by attackers using evasive techniques to avoid detection leading to costly security breaches and compromises. We highlight numerous shortcomings for several conventional approaches to remote access security. We then adopt network tiers to facilitate vulnerability management (VM) in remote access domains. We perform regular traffic simulation using Network Security Simulator (NeSSi2) to set bandwidth baseline and use this as a benchmark to investigate malware spreading capabilities and DDoS attacks by continuous flooding in remote access. Finally, we propose a novel approach to remote access security by passive learning of packet capture file features using machine learning and classification using a classifier model.


Author(s):  
Maria De Marsico ◽  
Maria De Marsico ◽  
Michele Nappi ◽  
Michele Nappi ◽  
Daniel Riccio ◽  
...  

Both government agencies and private companies are investing significant resources to improve local/remote access security. Badge or password-based procedures have proven to be too vulnerable, while biometric research has significantly grown, mostly due to technological progresses that allow using increasingly efficient techniques, yet at decreasing costs. Suitable devices capture images of user’s face, iris, etc., or other biometric elements such as fingerprints or voice. Each biometry calls for specific procedures. Measures from user’s data make up the so called biometric key, which is stored in a database (enrolment) or used for recognition (testing). During recognition, a subject’s key is matched against those in the database, producing a similarity score for each match. However, some drawbacks exist. For example, iris scanning is very reliable but presently too intrusive, while fingerprints are more socially accepted but not applicable to non-consentient people. On the other hand, face recognition represents a good solution even under less controlled conditions. In the last decade, many algorithms based on linear/non-linear methods, neural networks, wavelets, etc. have been proposed. Nevertheless, during Face Recognition Vendor Test 2002 most of them encountered problems outdoors. This lowers their reliability compared to other biometries, and underlines the need for more research. This chapter provides a survey of recent outcomes on the topic, addressing both 2D imagery and 3D models, to provide a starting reference to potential investigators. Tables containing different collections of parameters (such as input size, recognition rate, number of addressed problems) simplify comparisons. Some future directions are finally proposed.


2021 ◽  
pp. 131-148
Author(s):  
Tatiana A. Panteleeva ◽  

Subject/Topic. The article is devoted to the study of the possibilities and threats of using scientific intelligence in the business foresight and its impact on the business potential of the business in the short and long term. Methodology. In the process of writing the article, general scientific and philosophical methods of knowledge were used, as well as special economic methods based on them. Especially, the articles of the object of research – artificial intelligence – as the current process necessitated the use of problem-chronological and historical-genetic methods, which made it possible to distinguish the main stages of the formation of ideas, concepts, theories and methods for the use of artificial intelligence in business foresight, and the historical-genetic method showed the inseparability and intersectability from one stage to another of the development of the conceptual and methodological apparatus of the object of scientific research. Results. Currently, in business practice, artificial intelligence is used as a foresight tool very individually, since the complexity of its development and significant investments in the landscape infrastructure of its functioning form objective barriers to its rapid spread in the business environment. Currently, the following models of artificial intelligence are used in the business force: anthropocentric, hybrid, instrumental, machine-centric. According to the above calculations, starting from 2020, active growth is expected in the segment of business and IT services using artificial intelligence, it is also expected to increase spending on R&D projects in the field of development of products with artificial intelligence, and the most forward-specific from the point of view of investing capital and development as part of their own business model of AI directions on the horizon 2018-2025 are technologies for remote access (VDI, BKC, online communications, control), AI/ML (artificial intelligence, machine learning), VR/AR (virtual and augmented reality). Conclusions/Significance. In general, in 2020 compared to 2019, the optimism and motivation of the business to introduce artificial intelligence clearly showed a decline, and it should also be noted that the goals set by managers have become more «grounded»: in 2020, 45% spoke in favor of using artificial intelligence as a means of forming their own Big Data libraries, another 45% – for the integration of the artificial intelligence mechanism and existing systems for analysis and collection of information, however, a modern business strategy is not possible without processing huge amounts of customer information, and given their weak structuring and localization in multiple sources, the speed and quality of their processing and interpretation without the use of machine learning mechanisms became economically impractical. Application. The results of the scientific research will be useful both for educational purposes for students and readers interested in the use of artificial in-tech in business management, and for practitioners who plan to use artificial intelligence in foresight business processes.


Author(s):  
K A Scarfone ◽  
P Hoffman ◽  
M P Souppaya

Sign in / Sign up

Export Citation Format

Share Document