A comprehensive study of cyber attacks & counter measures for web systems

Author(s):  
Abid Jamil ◽  
Kashif Asif ◽  
Rehan Ashraf ◽  
Sheraz Mehmood ◽  
Ghulam Mustafa

2021 ◽  
Vol 11 (12) ◽  
pp. 5585
Author(s):  
Sana Al-Farsi ◽  
Muhammad Mazhar Rathore ◽  
Spiros Bakiras

Blockchain is a revolutionary technology that is being used in many applications, including supply chain management. Although, the primary motive of using a blockchain for supply chain management is to reduce the overall production cost while providing the comprehensive security to the system. However, current blockchain-based supply-chain management (BC-SCM) systems still hold the possibility of cyber attacks. Therefore, the goal of this study is to investigate practical threats and vulnerabilities in the design of BC-SCM systems. As a starting point, we first establish key requirements for the reliability and security of supply chain management systems, i.e., transparency, privacy and traceability, and then discern a threat model that includes two distinctive but practical threats including computational (i.e., the ones that threaten the functionality of the application) and communication (i.e., the ones that threaten information exchange among interconnected services of the application). For investigation, we follow a unique approach based on the hypothesis that reliability is pre-requisite of security and identify the threats considering (i) design of smart contracts and associated supply chain management applications, (ii) underlying blockchain execution environment and (iii) trust between all interconnected supply management services. Moreover, we consider both academic and industry solutions to identify the threats. We identify several challenges that hinder to establish reliability and security of the BC-SCM systems. Importantly, we also highlight research gaps that can help to establish desired security of the BC-SCM. To the best of our knowledge, this paper is the first effort that identifies practical threats to blockchain-based supply chain management systems and provides their counter measures. Finally, this work establishes foundation for future investigation towards practical security of BC-SCM system.



2016 ◽  
Vol 4 (1) ◽  
pp. 61 ◽  
Author(s):  
Muhamad Rizal ◽  
Yanyan Yani

The purpose of state defense is to protect and to save the integrity of the Unitary State of the Republic of Indonesia, the sovereignty of the state, as well as its security from all kinds of threats, whether they are military or non-military ones. One of the non-military threats that potentially threatens the sovereignty and security of the nation-state is the misuse of technology and information in cyberspace. The threat of irresponsible cyber attacks can be initiated by both state and non-state actors. The actors may be an individual, a group of people, a faction, an organization, or even a country. Therefore, the government needs to anticipate cyber threats by formulating cyber security strategies and determining comprehensive steps to defend against cyber attacks; its types and the scale of counter-measures, as well as devising the rules of law. 



Author(s):  
Aminat AJIBOLA ◽  
Innocent UJATA ◽  
Oluwasegun ADELAIYE ◽  
Noorihan Abdul RAHMAN

Cyber threats have been an issue of great concern since the advent of the information (computer and internet) age. But of greater concern is the most recent class of threats, known as Advanced Persistent Threats (APTs). It has drawn increasing attention all over the world, from researchers, and the industrial security sector. APTs are sophisticated cyber-attacks executed by sophisticated and well-resourced adversaries targeting specific information in companies and government. APT is a long-term campaign involving different steps. This form of attack if successful has significant implications to countries and large organizations, which may be from financial to reputational damage. This work presents a comprehensive study on APT, characterizing its uniqueness and attack model, and analyzing techniques commonly seen in APT attacks. On evaluating mitigation effects proposed and developed by researches, the use of a multiple mitigation methods shows good signs in detecting and preventing APT. Anomaly detection and dynamic analysis show high accuracy levels in detecting APT. This work also highlights and recommends security tips as well as methods of implementing countermeasures that can help to mitigate APTs, thereby giving directions for future research.



Author(s):  
Lionel Morel ◽  
Damien Courousse ◽  
Thomas Hiscock

Cyber-attacks combine several techniques to compromise device's functionality, recover sensitive data or unveil IP design. Combined counter-measures are needed to address these complex attacks as a whole. We address attacks that rely on reverse engineering to recover application code and side-channel attacks to access sensitive data. We present POLEN, a toolchain and a processor architecture that combines two countermeasures: code encryption and code polymorphism to thwart such complex attacks. Code encryption reduces the useful information in memory dumps, preventing reverse engineering, by encrypting machine instructions before its deployment, and instructions are only decrypted inside the CPU. Code polymorphism regularly changes the observable behaviour of the program, making it unpredictable for an attacker, and reducing the possibility to exploit side-channel leakages. Using many configuration parameters, POLEN gives the developer the ability to adapt the security level to its application. We present our prototype implementation, based on the RISC-V Spike simulator and a modified LLVM toolchain. We demonstrate that POLEN reduces side-channel leakages through leakage assessments metrics. We show that POLEN achieves a good level of security against side-channel attacks while maintaining acceptable overheads on program performance.



A digital assault is an attack propelled by cybercriminals utilizing at least one PCs against a solitary or numerous PCs or systems. A digital assault can perniciously handicap PCs, take information, or utilize a ruptured PC as a dispatch point for different assaults. Cybercriminals utilize an assortment of strategies, including malware, phishing, ransomware, refusal of administration, among different techniques. Albeit most government offices and significant enterprises have completely sent individual devices as data safety efforts, focuses of assaults have extended to incorporate, other than government foundations, basic frameworks and explicit ventures and partnerships, calling for increasingly powerful counter measures. In this paper we have discussed about Cyber Attack and its types, its initiated and a major cyber-attacks in 21st century.



2020 ◽  
Vol 32 (5) ◽  
pp. 153-166
Author(s):  
Ekaterina Mikhailovna Lavrischeva ◽  
Sergey Vadimovich Zelenov

In the paper, we analyze problems of reliability and security in the world practice and in Russia. We consider aspects of modeling software/hardware systems from service resources and ready-made reuses with ensuring reliability and security. We present the formed basic and theoretical foundations of the modeling problem, the experience of using modern service tools SOA, SCA, SOAP in software/hardware systems and Web systems to ensure their reliability and security on the Internet. We note that software/hardware systems and Web systems are created by the assembly build method in modern environments: IBM WSDK + WebSphere, Apache Axis + Tomcat; Microsoft .Net + IIS, etc. Verification and testing of systems should be conducted for searching of errors that occur in exceptional cases (cyber-attacks, forbidden access to the database, etc.). We describe methods for analyzing such situations and applying reliability and security methods to ensure stable and trouble-free operation of software/hardware systems service components in the Internet information environment.



Author(s):  
F. A. Heckman ◽  
E. Redman ◽  
J.E. Connolly

In our initial publication on this subject1) we reported results demonstrating that contrast is the most important factor in producing the high image quality required for reliable image analysis. We also listed the factors which enhance contrast in order of the experimentally determined magnitude of their effect. The two most powerful factors affecting image contrast attainable with sheet film are beam intensity and KV. At that time we had only qualitative evidence for the ranking of enhancing factors. Later we carried out the densitometric measurements which led to the results outlined below.Meaningful evaluations of the cause-effect relationships among the considerable number of variables in preparing EM negatives depend on doing things in a systematic way, varying only one parameter at a time. Unless otherwise noted, we adhered to the following procedure evolved during our comprehensive study:Philips EM-300; 30μ objective aperature; magnification 7000- 12000X, exposure time 1 second, anti-contamination device operating.



Author(s):  
A. Singh ◽  
A. Dykeman ◽  
J. Jarrelf ◽  
D. C. Villeneuve

Hexachlorobenzene (HCB), a persistent and mobile organochlorine pesticide, occurs in environment. HCB has been shown to be present in human follicular fluid. An objective of the present report, which is part of a comprehensive study on reproductive toxicity of HCB, was to determine the cytologic effects of the compound on ovarian follicles in a primate model.Materials and Methods. Eight Cynomolgus monkeys were housed under controlled conditions at Animal facility of Health and Welfare, Ottawa. Animals were orally administered gelatin capsules containing HCB mixed with glucose in daily dosages of 0.0 or 10 mg/kg b.w. for 90 days; the former was the control group. On the menstrual period following completion of dosing, the monkeys underwent an induction cycle of superovulation. At necropsy, one-half of an ovary from each animal was diced into ca. 2- to 3-mm cubed specimens that were fixed by immersion in 2.5% glutaraldehyde in 0.1 M cacodylate buffer (pH 7.3). Subsequent procedures followed to obtain thin sections that were examined in a Hitachi H-7000 electron microscope have been described earlier.



Author(s):  
D. L. Rohr ◽  
S. S. Hecker

As part of a comprehensive study of microstructural and mechanical response of metals to uniaxial and biaxial deformations, the development of substructure in 1100 A1 has been studied over a range of plastic strain for two stress states.Specimens of 1100 aluminum annealed at 350 C were tested in uniaxial (UT) and balanced biaxial tension (BBT) at room temperature to different strain levels. The biaxial specimens were produced by the in-plane punch stretching technique. Areas of known strain levels were prepared for TEM by lapping followed by jet electropolishing. All specimens were examined in a JEOL 200B run at 150 and 200 kV within 24 to 36 hours after testing.The development of the substructure with deformation is shown in Fig. 1 for both stress states. Initial deformation produces dislocation tangles, which form cell walls by 10% uniaxial deformation, and start to recover to form subgrains by 25%. The results of several hundred measurements of cell/subgrain sizes by a linear intercept technique are presented in Table I.



Sign in / Sign up

Export Citation Format

Share Document