scholarly journals MODELS AND METHODS FOR DIAGNOSING ZERO-DAY THREATS IN CYBERSPACE

2021 ◽  
Vol 4 (2) ◽  
pp. 155-167
Author(s):  
Oleksandr S. Saprykin

The article is devoted to the development of models and methods for detecting Zero-Day threats in cyberspace to improve the efficiency of detecting high-level malicious complexes that are using polymorphic mutators. The method for detecting samples by antivirus solutions using a public and local multiscanner is proposed. The method for diagnosing polymorphic malware using Yara rules is being developed. The multicomponent service that allows organizing a free malware analysis solution with a hybrid deployment architecture in public and private clouds is described. The cloud service for detecting malware based on open-source sandboxes and MAS, allowing horizontal scalability in hybrid clouds, and showing high capacity during malicious and non-malicious object processing is designed. The main task of the service is to collect artifacts after dynamic and static object analysis to detect zero-day threats. The effectiveness of the proposed solutions is shown. Scientific novelty and originality consist in the creation of the following methods: 1) detecting the sample by preinstalled antivirus solutions that allow static scanning in separate threads without requests restrictions for increasing the malware processing speed and restrict public access to confidential files; 2) diagnosing polymorphic malware using Yara rules, that allows detecting new modifications that are not detected by available solutions. The proposed hybrid system architecture allows to perform a retrospective search by families, tracking changes in destructive components, collect the malicious URLs database to block traffic to C&C servers, collect dropped and downloaded files, analyze phishing emails attachments, integrate with SIEM, IDS, IPS, antiphishing and Honeypot systems, improve the quality of the SOC analyst, decrease the incidents response times and block new threats that are not detected by available antivirus solutions. The practical significance of the results is in the cloud service development that combines MAS Sandbox and a modified distributed Cuckoo sandbox, which allows to respond to Zero-Day threats quickly, store a knowledge base for artifacts correlation between polymorphic malware samples, actively search for new malware samples and integrate with cyber protection hardware and software systems that support the Cuckoo API.

1950 ◽  
Vol 17 (4) ◽  
pp. 431-438
Author(s):  
Willard M. Dow

Abstract A theoretical analysis is made of the flow through a perforated pipe with a closed end for the special case of a constant linear rate of discharge along the length of the pipe. The results of the fluid-flow considerations are applicable to many practical manifold systems. The practical significance of the results with respect to pipe burners for gaseous fuels is emphasized as the results make possible the design of simple high-capacity and extended-range pipe burners of industrial importance. The capacity of commercially available pipe burners may be increased several hundred per cent. The validity of the theoretical results was verified by experiment.


Author(s):  
Shailaja Dilip Pawar

Abstract: Cloud computing is actually a model for enabling convenient, limitless, on demand network access to a shared pool of computing resource. This paper describes introductory part explain the concept of cloud computing, different components of cloud, types of cloud service development. At last paper elaborates the classification of cloud computing which will clear the ovelall idea of cloud computing to the learners who are new to this field. Keywords: cloud computing, SaaS, PaaS, IaaS


2021 ◽  
Vol 11 (20) ◽  
pp. 9536
Author(s):  
Jorge Alberto Ramírez-Ortega ◽  
José Trinidad Guillén-Bonilla ◽  
Alex Guillén-Bonilla ◽  
Verónica María Rodríguez-Betancourtt ◽  
Lorenzo Gildo-Ortiz ◽  
...  

In this work, powders of NiSb2O6 were synthesized using a simple and economical microwave-assisted wet chemistry method, and calcined at 700, 800, and 900 °C. It was identified through X-ray diffraction that the oxide is a nanomaterial with a trirutile-type structure and space group P42/mnm (136). UV–Vis spectroscopy measurements showed that the bandgap values were at ~3.10, ~3.14, and ~3.23 eV at 700, 800, and 900 °C, respectively. Using scanning electron microscopy (SEM), irregularly shaped polyhedral microstructures with a size of ~154.78 nm were observed on the entire material’s surface. The particle size was estimated to average ~92.30 nm at the calcination temperature of 900 °C. Sensing tests in static atmospheres containing 300 ppm of CO at 300 °C showed a maximum sensitivity of ~72.67. On the other hand, in dynamic atmospheres at different CO flows and at an operating temperature of 200 °C, changes with time in electrical resistance were recorded, showing a high response, stability, and repeatability, and good sensor efficiency during several operation cycles. The response times were ~2.77 and ~2.10 min to 150 and 200 cm3/min of CO, respectively. Dynamic tests in propane (C3H8) atmospheres revealed that the material improved its response in alternating current signals at two different frequencies (0.1 and 1 kHz). It was also observed that at 360 °C, the ability to detect propane flows increased considerably. As in the case of CO, NiSb2O6’s response in propane atmospheres showed very good thermal stability, efficiency, a high capacity to detect C3H8, and short response and recovery times at both frequencies. Considering the great performance in propane flows, a sensor prototype was developed that modulates the electrical signals at 360 °C, verifying the excellent functionality of NiSb2O6.


Author(s):  
Shruthi P. ◽  
Nagaraj G. Cholli

Cloud Computing is the environment in which several virtual machines (VM) run concurrently on physical machines. The cloud computing infrastructure hosts multiple cloud service segments that communicate with each other using the interfaces. This creates distributed computing environment. During operation, the software systems accumulate errors or garbage that leads to system failure and other hazardous consequences. This status is called software aging. Software aging happens because of memory fragmentation, resource consumption in large scale and accumulation of numerical error. Software aging degrads the performance that may result in system failure. This happens because of premature resource exhaustion. This issue cannot be determined during software testing phase because of the dynamic nature of operation. The errors that cause software aging are of special types. These errors do not disturb the software functionality but target the response time and its environment. This issue is to be resolved only during run time as it occurs because of the dynamic nature of the problem. To alleviate the impact of software aging, software rejuvenation technique is being used. Rejuvenation process reboots the system or re-initiates the softwares. This avoids faults or failure. Software rejuvenation removes accumulated error conditions, frees up deadlocks and defragments operating system resources like memory. Hence, it avoids future failures of system that may happen due to software aging. As service availability is crucial, software rejuvenation is to be carried out at defined schedules without disrupting the service. The presence of Software rejuvenation techniques can make software systems more trustworthy. Software designers are using this concept to improve the quality and reliability of the software. Software aging and rejuvenation has generated a lot of research interest in recent years. This work reviews some of the research works related to detection of software aging and identifies research gaps.


Economical ◽  
2020 ◽  
Vol 1 (1(22)) ◽  
pp. 27-35
Author(s):  
Юлія Коваленко ◽  

Striving for sustainable development requires fundamental changes in the management paradigm, which lies in the creation of an economic mechanism for rational environmental management. Recently, among the areas of implementation of the strategy for sustainable development of regions, a special place belongs to the concept of environmental marketing. Methodology. The analysis of the features of the development of environmental marketing and the development of environmental marketing in foreign and domestic practice is based on the methods of generalization and comparison. Results. Attention is focused on the fact that the main task of environmental marketing is the desire to change the classic approach to management and show enterprises that the concept of sustainable development and marketing eco-strategies will help to change the consumption structure and balance natural processes. It has been proved that the concept of sustainable development through the prism of greening must be implemented through a targeted state policy at the macro-meso - and micro levels, namely, through the mechanisms of market activation, contributing to financial support for the formation and development of environmental entrepreneurship with the help of regulatory, tax, administrative, economic, socio-psychological mechanisms. Scientific novelty. The expediency of determining the mechanisms for implementing environmental marketing in the system of sustainable development of regions and determining the main directions of their action has been substantiated. It has been proved that the development of the concept of environmental marketing in domestic practice is possible provided that an effective environmental policy of the state is formed, the system of environmental legislation is improved, the system of environmental education and culture is developed, environmental knowledge, environmental values and ideals in society are formed, the transition to an innovative model of development of the national economy is an effective mechanism for the implementation of environmental production goals and the introduction of resource conservation processes, the formation of institutional conditions and an economic mechanism for the reproduction of environmental capital, as an economic system for maintaining environmental balance, increasing the stimulating function of environmental control, etc. Practical significance. The results of the study form a theoretical-methodological and scientific-practical basis for creating and maintaining a positive ecological image of the region; communication, coordination, management and control of significant for the region socio-ecological-economic initiatives and ideas.


Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Yoshiaki Fukazawa ◽  
Takehisa Kato ◽  
Haruhiko Kaiya ◽  
...  

Requirements for cloud services include security and privacy. Although many security patterns, privacy patterns, and non-pattern-based knowledge have been reported, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the Cloud Security and Privacy Metamodel (CSPM). CSPM uses a consistent approach to classify and support existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Mingfa Wu ◽  
Chongjing Yang ◽  
Xiangke Liu

As a natural phenomenon, thunder and lightning have a major impact on human production and life. As an important part of lightning protection technology, the main task of the lightning mobile positioning system is to detect and determine the location of lightning and, at the same time, provide more accurate lightning discharge parameters for lightning research. It is a new technology that serves the entire society and is in urgent need of development. This paper aims to study the trend prediction of thunderstorm cloud based on the monitoring data of the thunder and lightning mobile positioning system. In this thesis, the inverse distance-weighted interpolation method can be used to determine the lightning area and the principle of lightning monitoring and positioning, and the classification of lightning and the practical significance of lightning mobile positioning system monitoring are also studied. Finally, the Hurst index of this paper can reveal the trend elements in the time series well through the experiment, so as to judge the lightning strikes. At the same time, it also introduces everyone’s satisfaction survey on the lightning mobile positioning system. The results of this paper show that the lightning mobile positioning system has been widely used in our country’s meteorological monitoring stations, and it plays a very important role in our national defense lightning strikes and effectively realizes the lightning strike prediction in the monitoring process, which can better enable the competent department to take timely and accurate measures to prevent lightning strikes. Experimental analysis shows that the accuracy of the lightning mobile positioning system has reached 92%, and the practicability has reached 88%.


2019 ◽  
pp. 110-114
Author(s):  
N. R. Asadullina

In the article there considered the issues of theoretical underlying reasons of public administration as an element of management system of society, the issues of combination of self-management and public management, in dependence of forms of participation of the state in economy from head institutions. The purpose of the research is the mapping of the main directions of public management and administration, in order to find ways to improve its efficiency and effec-tiveness. The object of research – the process of public administration in the country of state-owned objects, as well as ways to improve its efficiency. The methods used in the research – logical, comparative, analytical, scientific and methodological. The hypothesis of the research is the ways to improve the efficiency of public administration depend on the qualifications of management personnel and feedback from the local population. The statement of basic materials. The economic conversions which carried out in Uzbekistan have beck directed to dismantling of the institutes resisting to the market, and active formation of the new institutional struc-tures inherent in preferentially market public systems. Gradualness and sequence of the re-formatory steps excluding shock components for economy and population and providing a necessary social insurance of transformational risks are the feature of transformational model of Uzbekistan. The originality and practical significance of the research. The choice of model of public admin-istration in economy is inevitably connected by geopolitical priorities and ideas of the place of the country in the modern world. It means that exert impact on institutes of management and an assessment of management efficiency and political factors which are in turn subdivided on internal political are, first of all, support by the population of the idea of the state independence. Conclusions of the research. Further improvement of public admin-istration assumes improvement of legal base of administrative activity (from a position of in-terests of public servants), necessary guaran-tees and incentives, standardization of their activity as most complex, responsible and skilled work, and maximum informatization of administrative decisions. Such approach as-sumes formation of special legislation on pub-lic service, development of the quality stand-ards of state services, electronic forms of low-cost and transparent forms of interaction with economic entities and citizens.


2021 ◽  
Author(s):  
Kashif Mehboob Khan ◽  
Junaid Arshad ◽  
Waheed Iqbal ◽  
Sidrah Abdullah ◽  
Hassan Zaib

AbstractCloud computing is an important technology for businesses and individual users to obtain computing resources over the Internet on-demand and flexibly. Although cloud computing has been adopted across diverse applications, the owners of time-and-performance critical applications require cloud service providers’ guarantees about their services, such as availability and response times. Service Level Agreements (SLAs) are a mechanism to communicate and enforce such guarantees typically represented as service level objectives (SLOs), and financial penalties are imposed on SLO violations. Due to delays and inaccuracies caused by manual processing, an automatic method to periodically verify SLA terms in a transparent and trustworthy manner is fundamental to effective SLA monitoring, leading to the acceptance and credibility of such service to the customers of cloud services. This paper presents a blockchain-based distributed infrastructure that leverages fundamental blockchain properties to achieve immutable and trustworthy SLA monitoring within cloud services. The paper carries out an in-depth empirical investigation for the scalability of the proposed system in order to address the challenge of transparently enforcing real-time monitoring of cloud-hosted services leveraging blockchain technology. This will enable all the stakeholders to enforce accurate execution of SLA without any imprecisions and delays by maintaining an immutable ledger publicly across blockchain network. The experimentation takes into consideration several attributes of blockchain which are critical in achieving optimum performance. The paper also investigates key characteristics of these factors and their impact to the behaviour of the system for further scaling it up under various cases for increased service utilization.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 28
Author(s):  
R Rajan ◽  
Dr G. Murugaboopathi ◽  
Dr C.Parthasarathy

Cloud computing process is an IT service invented for providing efficient network, software, hardware, storage, software systems and resource services. Cloud computing delivers service to the customers through a network. The IT and the management services involved in it is taken care by third parties that owns the physical infrastructure involved in the service. Cloud service provides us the ease to access information at any place, any time with minimum cost involved and high reliability, scalability and resilience. Because of these advantages many organizations are converting themselves to cloud. With growing demand it is necessary to consider the confidentiality of information and also secure it from unauthorized users, denial of services, modification, etc. Securing the storage and computation process in cloud is essential to avoid the above threats. Security protocol in cloud is enhanced through cryptographic algorithms to eliminate the various security threats in our work.


Sign in / Sign up

Export Citation Format

Share Document