scholarly journals Network Malware Laboratory BasedOn Honeypots Technologies

2018 ◽  
Vol 3 (1) ◽  
pp. 1-12
Author(s):  
Georges Bell Bitjoka ◽  
Antoine Elang

According to studies conducted by researchers across the globe, in recent years there has been an increase in organization and company attacks. Some attacks have been detected, but others, however, were able to bypass the security mechanisms, taking advantage of an unknown vulnerability in security systems. In this context, Honeypots systems aim to collect information on the intruder’s activities and learn about threats and attackers’ behavior. Honeypots systems are not designed to remedy failures or security errors on the network, but are responsible for providing adequate information on potential attackers before compromising real systems. In this paper, a honeypot system was designed to study the techniques used by attackers. We designed and implemented a malware analysis laboratory based on honeypots technology in a controlled environment to analyze various security incidents. The use of honeypots is based on the idea of simulating applications with vulnerabilities and recording all events produced by attackers, so the network administrator can learn about the different types of attacks to protect organizational systems that are being produced. The results have been very important in terms of the number and types of security incidents recorded by the honeypots. Also, an administration interface for controlling and analyzing the gathered information was designed. This system was not only implemented but also tested for several weeks and data was collected from the attacks was analyzed.  This led to some interesting statistics and characteristics about attackers and their goals. 

2020 ◽  
Vol 12 (8) ◽  
pp. 3163
Author(s):  
Amanda M. Y. Chu ◽  
Mike K. P. So

This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees’ information security management efforts to maintain sustainable information systems in the workplace. In terms of theoretical contributions, this article identifies and develops reliable and valid instruments to measure different types of unethical employee information security behavior. In addition, it investigates factors affecting different types of such behavior and how such behavior can be used to predict employees’ willingness to report information security incidents. In terms of managerial contributions, the article suggests that information security awareness programs and perceived punishment have differential effects on the four types of unethical behavior and that certain types of unethical information security behavior exert negative effects on employees’ willingness to report information security incidents. The findings will help managers to derive better security rules and policies, which are important for business continuity.


Author(s):  
Oleh Kozlenko

Article explores application methods for systems structural analysis to use in study of security in information systems, which is based on variants of general attack scenarios, features of cybersecurity culture, q-analysis, which is part of MCQA . General security system analysis usually is based on different factors, which include  technical means, human-related mistakes in different ways and respond to security incidents. Q-analysis presents the basic principles of constructing model of information security systems elements connectivity on the example of two sets: set of threats and sets of security measures for information security and calculated numerical values. Elements of the two sets of are interconnected and form the basis of a system for ensuring their security. These calculations can be used to further determine overall formal assessment of security of the organization.


1978 ◽  
Vol 61 (6) ◽  
pp. 1395-1403
Author(s):  
George D Mack ◽  
William M Smith

Abstract Analytical methods are presented for determining the longitudinal dynamic and static forces needed to overcome the transverse frictional forces and effect the separation of hemodialysis shunt connections under controlled environmental conditions. Results for different types of shunts and their associated connectors are reported along with the factors that affect the separation force and separation times.


Tekstilec ◽  
2021 ◽  
Vol 64 (1) ◽  
pp. 4-15
Author(s):  
Veronika Štampfl ◽  
◽  
Klemen Možina ◽  
Jure Ahtik ◽  
◽  
...  

The research focuses on the quality of colour reproduction when using different light sources, often used to illuminate scenes in a photo studio, and different types of fabrics as lighting shapers. With the latter, the light can be converted into softer and more diffuse light, but the properties of the fabrics used affect the colour impression and thus the quality of the reproduced colours. This was evaluated by analysing the colour differ¬ences which were calculated from the colorimetric values of the colour patches of the X-Rite ColorChecker Passport test chart. Test chart was photographed in a controlled environment and illuminated with different combinations of light sources and tested fabrics. The results confirmed that not all combinations of variables are suitable for use if the goal of the photograph is to achieve high quality colour reproduction.


Author(s):  
Herlon Nadolny ◽  
Alessandra Santos ◽  
Wilian Demetrio ◽  
Talita Ferreira ◽  
Liliane dos Santos Maia ◽  
...  

Abstract: Earthworms are often related to fertile soils and are also frequently used as environmental quality indicators. However, to optimize their use as bioindicators, earthworm populations must be evaluated together with the environmental and anthropogenic variables regulating their communities. This review sought to identify the earthworm-sampling, soil chemical and physical, and environmental and anthropogenic attributes evaluated in 124 published studies that quantified earthworm abundance (>7,300 samples) in 765 sites with different types of climate, soils, land use, and management systems in Brazil. Soil chemical and physical attributes (except pH) were less reported (≤50% of studies) than other environmental variables such as sampling date, altitude, temperature, precipitation, climate and soil type, and land use (>50% of studies). Earthworms were rarely identified (24%) and few studies (31%) measured their biomass, although most provided adequate information on sampling protocol. Based on their importance in regulating earthworm populations, a set of variables is proposed to be evaluated when studying earthworm communities and other macrofauna groups. This should help guide future studies on earthworms in Brazil and other countries, optimize data collection and replicability, allow comparisons between different studies, and promote the use of earthworms as soil quality bioindicators.


2021 ◽  
Author(s):  
Nikolay Topolsky ◽  
Valeriy Vilisov

The monograph examines topical issues of decision support and management in safety systems for fire and emergency situations through the use of innovative approaches and tools for operations research, artificial intelligence, robotics and management methods in organizational systems. The monograph is intended for faculty, researchers, graduate students (adjuncts) and doctoral students, as well as for undergraduates, students and listeners of educational organizations, all those who are interested in the problems of decision support and management in security systems.


Author(s):  
Ryan West ◽  
Christopher Mayhorn ◽  
Jefferson Hardee ◽  
Jeremy Mendel

The goal of this chapter is to raise awareness of cognitive and human factors issues that influence user behavior when interacting with systems and making decisions with security consequences. This chapter is organized around case studies of computer security incidents and known threats. For each case study, we provide an analysis of the human factors involved based on a system model approach composed of three parts: the user, the technology, and the environment. Each analysis discusses how the user interacted with the technology within the context of the environment to actively contribute to the incident. Using this approach, we introduce key concepts from human factors research and discuss them within the context of computer security. With a fundamental understanding of the causes that lead users to make poor security decisions and take risky actions, we hope designers of security systems are better equipped to mitigate those risks.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402098868
Author(s):  
Hae Jung Oh ◽  
Zhieh Lor ◽  
Jihyang Choi

In an era of news abundance, people increasingly feel uncertain as to whether they possess adequate information to participate in politics. However, previous research has not paid attention to the issue of such efficacy. To fill the gap, this study examines (a) how different types of news repertoire are associated with political information efficacy and (b) how perceived news overload mediates the relationship. The findings show that people have three distinct types of news repertoires, such as commentary-oriented, TV, and social media news repertoires, and those who consume news via a commentary-oriented news repertoire tend to have a higher level of political information efficacy, while the use of TV and social media news repertoires does not show significant effects on political information efficacy. In addition to that, the perceived news overload negatively mediates the link between all three types of news repertoires and political information efficacy. Two-wave original survey data were used for analyses.


2019 ◽  
Vol 8 (2S8) ◽  
pp. 1792-1797

Malware has become a serious threat. Malware analysis is one of the challenging domain. The increase in the malware exploitation has made the detailed study of the malware, understand the different types of malware and its behavior model and analyze the existing detection system with their short comes to identify the research gaps [8] to solve the specific problem. So in this paper, we have presented the different malware taxonomy and different malware detection techniques with its features and also presented the malware model and the research gaps in the malware analysis domain.


2020 ◽  
Vol 10 (4) ◽  
pp. 92-103
Author(s):  
Gábor Pszota

Two different types of motion were analysed based on video footage using the free software tool named Tracker. One of them involved dropping the football vertically without any spin, the other type was the projectile motion resulted from a goalie punt. The analysis consisted of fitting the time dependence of the coordinates using a sixth order polynomial, then using these functions and other parameters to obtain the drag coefficient as a function of speed and Reynolds number. Similarly to previous works, the drag coefficient showed large differences for the different speeds. The irregularities and asymmetry of the ball also caused the results to be different for the different trials depending on the orientation of the ball, as well as the slight horizontal spin of the ball during its projectile motion. This method can prove to be a useful tool for further studies in a more controlled environment with higher quality new balls.


Sign in / Sign up

Export Citation Format

Share Document