scholarly journals A survey on various mobile malware attacks and security characteristics The increase of the smart devices is quickly expanding and is progressively turning out to be more modern device in the recent smart world. This expanding prominence is making the attackers have a flawless focus on it. The smart devices prepared with the advanced complicated software and hardware systems are paying way for the profit of the malware attackers. The malware authors targets the mobile devices and destruct the information in the devices like privacy theft, information theft, denial of service, distributed denial of service and so on. There should be an effective mechanism implemented to overcome these threats and protect the devices from these severe implications malwares. To provide the cost-effective output solution for the smart devices malware detection, the optimization techniques to be improved for the end users control during run-time.

Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2798 ◽  
Author(s):  
Alma E. Guerrero-Sanchez ◽  
Edgar A. Rivas-Araiza ◽  
Jose Luis Gonzalez-Cordoba ◽  
Manuel Toledano-Ayala ◽  
Andras Takacs

The Internet of Things (IoT) paradigm allows the connection and exchange of information between millions of smart devices. This paradigm grows and develops exponentially as do the risks and attacks on IoT infrastructures. Security, privacy, reliability, and autonomy are the most important requirements in IoT Systems. If these issues are not guaranteed, the IoT system could be susceptible to malicious users and malicious use. In centralized IoT systems, attacks and risks are greater, especially when data is transmitted between devices and shared with other organizations. To avoid these types of situations, this work presents a decentralized system that guarantees the autonomy and security of an IoT system. The proposed methodology helps to protect data integrity and availability based on the security advantages provided by blockchain and the use of cryptographic tools. The accuracy of the proposed methodology was measured on a temperature and humidity sensing IoT-based Wireless Sensor Network (WSN). The obtained results prove that the proposal fulfils the main requirements of an IoT system. It is autonomous, secure to share and send information between devices and users, has privacy, it is reliable, and the information is available in the infrastructure. Furthermore, this research demonstrates that the proposal is less susceptible to the most frequent attacks against IoT systems, such as linking attack, man in the middle, and Distributed Denial of Service (DDoS) attack.


2019 ◽  
Vol 63 (7) ◽  
pp. 983-994 ◽  
Author(s):  
Muhammad Asad ◽  
Muhammad Asim ◽  
Talha Javed ◽  
Mirza O Beg ◽  
Hasan Mujtaba ◽  
...  

Abstract At the advent of advanced wireless technology and contemporary computing paradigms, Distributed Denial of Service (DDoS) attacks on Web-based services have not only increased exponentially in number, but also in the degree of sophistication; hence the need for detecting these attacks within the ocean of communication packets is extremely important. DDoS attacks were initially projected toward the network and transport layers. Over the years, attackers have shifted their offensive strategies toward the application layer. The application layer attacks are potentially more detrimental and stealthier because of the attack traffic and the benign traffic flows being indistinguishable. The distributed nature of these attacks is difficult to combat as they may affect tangible computing resources apart from network bandwidth consumption. In addition, smart devices connected to the Internet can be infected and used as botnets to launch DDoS attacks. In this paper, we propose a novel deep neural network-based detection mechanism that uses feed-forward back-propagation for accurately discovering multiple application layer DDoS attacks. The proposed neural network architecture can identify and use the most relevant high level features of packet flows with an accuracy of 98% on the state-of-the-art dataset containing various forms of DDoS attacks.


2014 ◽  
Vol 14 (3) ◽  
pp. 71-85 ◽  
Author(s):  
N Jeyanthi ◽  
P. C. Mogankumar

Abstract Cloud is not exempted from the vulnerability of Distributed Denial of Service (DDoS) attack, a serious threat to any distributed network and has considerably less effective solutions to deploy in the network. This paper introduces a novel mechanism to protect and prevent the cloud from the spurious packets targeting the depletion of server resources. The army nodes called “Cloud DDoS Attack Protection” (CDAP) nodes are installed at the cloud server farm/ Datacenter (DC). These army nodes act as virtual firewall without destroying the Cloud Infrastructure and improve the availability of DC, even at the time of DDoS attack. By continuously monitoring the incoming packets, CDAP filters the attack packets intruding the Cloud DC. Availability is further improved by handing over the threat detection and attack mitigation to CDAP nodes and by redirecting the malicious user requests to the dump network. The simulation results prove that the introduction of CDAP nodes improve the availability and reduce the response time and the cost incurred.


Author(s):  
Shaik Yaseen Baba ◽  
P S Avadhani

For the cost effective & safe operation of ships and other marine assets it is mandatory to develop software solution tool which helps in timely maintenance with priority based to avoid both financial losses and operational downtime. Our idea is to propose concept to develop combined protection mechanisms system for Planned Maintenance system. The research is IDENTIFYING AND SCHEDULING DDOS-APPLICATION LAYER ATTACKS on onboard systems. Countering Distributed Denial of Service (DDOS) attacks are becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this paper, we consider sophisticated attacks that are protocol- compliant, non-intrusive, utilize legitimate. Application-layer requests to overwhelm system resources. We characterize application layer resource attacks on the basis of the application workload parameters that they exploit. Request flooding, asymmetric, repeated one-shot. To protect marine software-based servers from these attacks, we propose a counter-mechanism that consists of a suspicion assignment mechanism and a DDOS-resilient scheduler, DDOS Shield. In contrast to prior work, our suspicion mechanism assigns a continuous value as opposed to a binary measure to each client session, and the scheduler utilizes these values to determine if and when to schedule a session’s requests. This will be done through an integrated working of PMS and Inventory. PMS and Inventory, while performing definite tasks independently, will seamlessly integrate with each other. Further the installations will reside in the vessel, office and other office nodes, where information can be viewed and updated depending on your network of vessels. In office, the Inventory-PMS package will function in a client –server mode and in a single terminal on the ship with LAN for the purpose of accessing Internet. All the database updating and back-up maintenance shall be shown into the system to enable the user to do the database management without incurring exorbitant annual maintenance bills, which normally comes with all similar systems in the market.


2019 ◽  
Vol 161 (A3) ◽  

For the cost effective & safe operation of ships and other marine assets it is mandatory to develop software solution tool which helps in timely maintenance with priority based to avoid both financial losses and operational downtime. Our idea is to propose concept to develop combined protection mechanisms system for Planned Maintenance system. The research is IDENTIFYING AND SCHEDULING DDOS-APPLICATION LAYER ATTACKS on onboard systems. Countering Distributed Denial of Service (DDOS) attacks are becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this paper, we consider sophisticated attacks that are protocol-compliant, non-intrusive, utilize legitimate. Application-layer requests to overwhelm system resources. We characterize application layer resource attacks on the basis of the application workload parameters that they exploit. Request flooding, asymmetric, repeated one-shot. To protect marine software-based servers from these attacks, we propose a counter-mechanism that consists of a suspicion assignment mechanism and a DDOS-resilient scheduler, DDOS Shield. In contrast to prior work, our suspicion mechanism assigns a continuous value as opposed to a binary measure to each client session, and the scheduler utilizes these values to determine if and when to schedule a session’s requests. This will be done through an integrated working of PMS and Inventory. PMS and Inventory, while performing definite tasks independently, will seamlessly integrate with each other. Further the installations will reside in the vessel, office and other office nodes, where information can be viewed and updated depending on your network of vessels. In office, the Inventory-PMS package will function in a client –server mode and in a single terminal on the ship with LAN for the purpose of accessing Internet. All the database updating and back-up maintenance shall be shown into the system to enable the user to do the database management without incurring exorbitant annual maintenance bills, which normally comes with all similar systems in the market.


2019 ◽  
Vol 20 (2) ◽  
pp. 285-298 ◽  
Author(s):  
A. Dhanapal ◽  
P. Nithyanandam

Cloud computing became popular due to nature as it provides the flexibility to add or remove the resources on-demand basis. This also reduces the cost of investments for the enterprises significantly. The adoption of cloud computing is very high for enterprises running their online applications. The availability of online services is critical for businesses like financial services, e-commerce applications, etc. Though cloud provides availability, still these applications are having potential threats of going down due to the slow HTTP Distributed Denial of Service (DDoS) attack in the cloud. The slow HTTP attacks intention is to consume all the available server resources and make it unavailable to the real users. The slow HTTP DDoS attack comes with different formats such as slow HTTP headers attacks, slow HTTP body attacks and slow HTTP read attacks. Detecting the slow HTTP DDoS attacks in the cloud is very crucial to safeguard online cloud applications. This is a very interesting and challenging topic in DDoS as it mimics the slow network. This paper proposed a novel method to detect slow HTTP DDoS attacks in the cloud. The solution is implemented using the OpenStack cloud platform. The experiments conducted exhibits the accurate results on detecting the attacks at the early stages. The slowHTTPTest open source tool is used in this experiment to originate slow HTTP DDoS attacks.


2020 ◽  
Vol 6 (Extra-C) ◽  
pp. 314-319
Author(s):  
Dmitry A. Gura ◽  
Aleksandr N. Sekisov ◽  
Oksana A. Kuznetsova ◽  
Victoria I. Kalombo Mulamba ◽  
Evgeniya S. Tishchenko

The article presents a comparative analysis of various approaches to the formation of production costs. The study estimates the role of costs in the production and economic activities of companies in a market environment. At the same time, the assessment considered the impact of the problem of limited resources on the activities of production systems, which is possible to solve only with the active use of alternative ways in organizing the functioning of the cost-effective mechanism of enterprises.    


2015 ◽  
Vol 17 (3) ◽  
pp. 41-55
Author(s):  
Rohit Thaper ◽  
Amandeep Verma

Cloud Computing is most widely used in current technology. It provides a higher availability of resources to greater number of end users. In the cloud era, security has develop a reformed source of worries. Distributed Denial of Service (DDoS) and Economical Denial of Sustainability (EDoS) are attacks that can affect the ‘pay-per-use' model. This model automatically scales the resources according to the demand of consumers. The functionality of this model is to mitigate the EDoS attack by some tactical attacker/s, group of attackers or zombie machine network (BOTNET) to minimize the availability of the target resources, which directly or indirectly reduces the profits and increase the cost for the cloud operators. This paper presents a model called Enhanced-APART which is step further of the authors' previous model (APART) that can be used to mitigate the EDoS attack from the cloud platform and shows the nature of the attack. Enhanced-APART model offers pre-shared security mechanism to ensure the access of legitimate users on the cloud services. It also performs pattern analysis in order to detect the EDoS caused by BOTNET mechanism and includes time-based and key-sharing post-setup authentication scheme to prevent the replication or replay attacks and thus results in mitigation of EDoS attack.


Author(s):  
James F. Mancuso

IBM PC compatible computers are widely used in microscopy for applications ranging from control to image acquisition and analysis. The choice of IBM-PC based systems over competing computer platforms can be based on technical merit alone or on a number of factors relating to economics, availability of peripherals, management dictum, or simple personal preference.IBM-PC got a strong “head start” by first dominating clerical, document processing and financial applications. The use of these computers spilled into the laboratory where the DOS based IBM-PC replaced mini-computers. Compared to minicomputer, the PC provided a more for cost-effective platform for applications in numerical analysis, engineering and design, instrument control, image acquisition and image processing. In addition, the sitewide use of a common PC platform could reduce the cost of training and support services relative to cases where many different computer platforms were used. This could be especially true for the microscopists who must use computers in both the laboratory and the office.


Phlebologie ◽  
2007 ◽  
Vol 36 (06) ◽  
pp. 309-312 ◽  
Author(s):  
T. Schulz ◽  
M. Jünger ◽  
M. Hahn

Summary Objective: The goal of the study was to assess the effectiveness and patient tolerability of single-session, sonographically guided, transcatheter foam sclerotherapy and to evaluate its economic impact. Patients, methods: We treated 20 patients with a total of 22 varicoses of the great saphenous vein (GSV) in Hach stage III-IV, clinical stage C2-C5 and a mean GSV diameter of 9 mm (range: 7 to 13 mm). We used 10 ml 3% Aethoxysklerol®. Additional varicoses of the auxiliary veins of the GSV were sclerosed immediately afterwards. Results: The occlusion rate in the treated GSVs was 100% one week after therapy as demonstrated with duplex sonography. The cost of the procedure was 207.91 E including follow-up visit, with an average loss of working time of 0.6 days. After one year one patient showed clinical signs of recurrent varicosis in the GSV; duplex sonography showed reflux in the region of the saphenofemoral junction in a total of seven patients (32% of the treated GSVs). Conclusion: Transcatheter foam sclerotherapy of the GSV is a cost-effective, safe method of treating varicoses of GSV and broadens the spectrum of therapeutic options. Relapses can be re-treated inexpensively with sclerotherapy.


Sign in / Sign up

Export Citation Format

Share Document