Author(s):  
Manjunath Kotari ◽  
Niranjan N. Chiplunkar

Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.


Author(s):  
Keywhan Chung ◽  
Charles A. Kamhoua ◽  
Kevin A. Kwiat ◽  
Zbigniew T. Kalbarczyk ◽  
Ravishankar K. Iyer

2019 ◽  
Vol 278 (3) ◽  
pp. 894-903 ◽  
Author(s):  
MHR. Khouzani ◽  
Zhengliang Liu ◽  
Pasquale Malacaria

JURNAL IT ◽  
2020 ◽  
Vol 10 (3) ◽  
Author(s):  
Melati Ayu Ratna Dewi ◽  
Indra Adi Putra ◽  
Sulistyo Sulistyo

Tingkat ketergantungan Internet yang dapat motif timbulnya ancaman oleh pihak yang tidak berwenang untuk kepentingan pribadi melalui serangan siber. Berdasarkan laporan tahunan Badan Siber dan Sandi Negara Tahun 2018, Indonesia Cyber Security Monitoring Report 2018 dinyatakan bahwa indonesia terkena serangan siber sebanyak 232.447.974 kali. 122 juta diantaranya adalah serangan malware yang merupakan jenis serangan tertinggi. Selain itu, terdapat pula insiden defacement terhadap web aplikasi sebanyak 16.939 kali, yang 30,75% nya menyerang domain .go.id.. Hal ini juga didukung oleh Laporan Tahunan Honeynet Project BSSN-IHP tahun 2018 bahwa terdapat 513.863 malware yang menyerang ke Indonesia yang masuk melalui Honeynet System. Untuk mengantisipasi serangan malware dan serangan pada web aplikasi tersebut yang masuk ke Indonesia dengan membuat sistem honeynet terintegrasi sebagai salah satu solusi sistem deteksi dini, perangkat honeypot yang digunakan untuk collecting malware adalah jenis dionaea dan perangkat untuk analisa serangan pada web aplikasi adalah glastopf. Perangkat honeypot maupun server storage akan diintegrasikan kedalam mesin virtual sehingga diharapkan mampu memberikan perspektif baru dalam metode collecting malware dan analisa serangan pada web aplikasi untuk mendukung fungsi deteksi serangan siber.


2020 ◽  
Vol 3 (1) ◽  
Author(s):  
Simon Hacks ◽  
Sotirios Katsikeas ◽  
Engla Ling ◽  
Robert Lagerström ◽  
Mathias Ekstedt

AbstractCyber-attacks these threats, the cyber security assessment of IT and OT infrastructures can foster a higher degree of safety and resilience against cyber-attacks. Therefore, the use of attack simulations based on system architecture models is proposed. To reduce the effort of creating new attack graphs for each system under assessment, domain-specific languages (DSLs) can be employed. DSLs codify the common attack logics of the considered domain.Previously, MAL (the Meta Attack Language) was proposed, which serves as a framework to develop DSLs and generate attack graphs for modeled infrastructures. In this article, powerLang as a MAL-based DSL for modeling IT and OT infrastructures in the power domain is proposed. Further, it allows analyzing weaknesses related to known attacks. To comprise powerLang, two existing MAL-based DSL are combined with a new language focusing on industrial control systems (ICS). Finally, this first version of the language was validated against a known cyber-attack.


2019 ◽  
Author(s):  
Tian Yan ◽  
Hao Hu ◽  
Dehai An ◽  
Fazhi Qi ◽  
Chen Jiang

Sign in / Sign up

Export Citation Format

Share Document