scholarly journals Using honeynet data and a time series to predict the number of cyber attacks

Author(s):  
Matej Zuzcák ◽  
Petr Bujok

A large number of cyber attacks are commonly conducted against home computers, mobile devices, as well as servers providing various services. One such prominently attacked service, or a protocol in this case, is the Secure Shell (SSH) used to gain remote access to manage systems. Besides hu man attackers, botnets are a major source of attacks on SSH servers. Tools such as honeypots allow an effective means of recording and analysing such attacks. However, is it also possible to use them to effectively predict these attacks? The prediction of SSH attacks, specifically the prediction of activity on certain subjects, such as autonomous systems, will be beneficial to system administrators, internet service providers, and CSIRT teams. This article presents multiple methods for using a time series, based on real-world data, to predict these attacks. It focuses on the overall prediction of attacks on the honeynet and the prediction of attacks from specific geographical regions. Multiple approaches are used, such as ARIMA, SARIMA, GARCH, and Bootstrapping. The article presents the viability, precision and usefulness of the individual approaches for various areas of IT security.

2018 ◽  
Vol 7 (1.9) ◽  
pp. 34
Author(s):  
P S Uma Priyadarsini ◽  
P Sriramya

Today the mobile subscribers can access the internet service whenever they want or wherever they are because of the roaming service. The necessity of accessing pervasively for the developing paradigm of networking such as the Internet of Things (IoT) is accomplished through this facility. In order to provide universal roaming service which is secure and privacy preserving at the multilevel, this paper proposes a privacy-preserving validation which is conditional with access likability called CPAL for roaming service. By utilizing a method of group signature it provides linking function of an anonymous user. This method has the capability to keep the identity of the users concealed and makes the authorized bodies possible to connect all the access information of the same user even without knowing the user’s real identity. In order to connect the access information from the user for enhancing the service, the foreign operators who are authorized or the service providers particularly uses the master linking key possessed by the trust linking server. In order to examine user’s likings, the individual access information is used but user’s identity is not disclosed. Subscribers can further make use of this functionality to probe the service usage without being identified. The proposed method also has the efficiency to simultaneously revoke a group of users. Comprehensive analysis of CPAL demonstrates that it can withstand many security threats and more adjustable in privacy preservation as compared to the other techniques. Assessment of its performance further proves the efficiency of CPAL with regards to communication and computation overhead. Future work would include the extension of CPAL scheme to effectively withstand internal attackers and design the lightweight secure and privacy-preserving scheme that will support IoT devices of large group.


Author(s):  
L.V. Gorodianska ◽  
L.V. Tsiukalo

The article defines and analyzes the characteristic features of modern society digitalization, in particular the digital economy. It is noted that progress in the digital technology environment requires the application of information security measures, primarily in the financial and economic activities of small businesses. The interpretation of the definitions «information security» and «economic security» has been clarified. Attention is drawn to a conscious understanding of the interaction between people and technology during the digital transformation of the economy in such a way that the latest technologies must adapt to people, and not vice versa. It is emphasized that such an understanding can come only in the process of training and acquiring appropriate professional competencies, especially among small businesses. The types of small businesses information that are subject to protection and components of economic security are determined. Proposals have been formed for the creation of a comprehensive security program, which should include an action plan aimed at protecting the functioning of the enterprise's information system from external and internal influences, and a set of measures designed to protect the confidentiality, availability, and integrity of data from internal and external, malicious and accidental threats. Information security of small businesses in the context of digitalization should be based on the following positions: the management of the enterprise should regularly train all employees in the principles of Information Security, data protection and protect physical data carriers from cyber attacks; the corporate network should be segmented, and access to it – controlled; partnership with service providers from the point of view of information security should be equivalent; remote access to the corporate network of the enterprise, which is now becoming more widespread, should be as secure as possible and comply with information security standards. A promising area of further research is the development of a set of measures at the state level, which includes streamlining the simplified tax system, promoting the development of innovative entrepreneurship, cluster organization of small businesses, the formation of a modern information infrastructure to support entrepreneurship, the formation of a favorable business climate.


2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Alfian Ari Putra ◽  
Sumarno

Today the internet is inseparable in the life of modern society. For this reason, fast and reliable internet is very important. To achieve this, on the internet there are various kinds of technologies that make it very reliable. One of the technologies used in the internet is the Multihoming Border Gateway Protocol (BGP). This BGP technology allows every router on the internet to be connected and exchange routing information needed on the internet. BGP Multihoming allows two or more Autonomous Systems (AS) to connect and exchange routing information without any routing information being wrong. So if there is one AS experiencing interference then it will not significantly affect the other AS. That is because there are two or more pathways that can be traversed to get to the destination AS.


2014 ◽  
pp. 35-43
Author(s):  
Igor Kotenko

The paper considers the approach to investigation of distributed cooperative cyber-defense mechanisms against network infrastructure oriented attacks (Distributed Denial of Service, network worms, botnets, etc.). The approach is based on the agent-based simulation of cyber-attacks and cyber-protection mechanisms which combines discrete-event simulation, multi-agent approach and packet-level simulation of network protocols. The various methods of counteraction against cyber-attacks are explored by representing attack and defense components as agent teams using the software simulation environment under development. The teams of defense agents are able to cooperate as the defense system components of different organizations and Internet service providers (ISPs). The paper represents the common framework and implementation peculiarities of the simulation environment as well as the experiments aimed on the investigation of distributed network attacks and defense mechanisms.


2016 ◽  
Author(s):  
Jane Bailey

The music recording industry is suing Internet subscribers in Canada and the United States for alleged copyright infringement in unprecedented numbers. The procedure for obtaining non-party disclosure has taken on renewed significance in this context, as the industry requests disclosure of identifying and private information from Internet Service Providers (ISPs) who provide online communicators with their Internet connections. Legislative measures adopted in the U.S. expedited the disclosure process through an administrative mechanism with low threshold requirements for issuance of a subpoena against an ISP. In Canada (and after late 2004 in the U.S.), disclosure requests proceeded under federal rules of court. Comparison of the expedited administrative and the judicially interpreted rules-based processes raises important questions about the connection between procedure and substance, and procedural justice more generally. Not only are more permissive rules for disclosure often inconsistent with protecting substantive rights, such as privacy, bin they also cannot be presumed to enhance the likelihood of achieving accurate substantive legal outcomes. If non-party disclosure rules are not contextually designed and implemented to reflect the power and resource imbalance between the plaintiff music industry and the individual defendants pursued in online music sharing litigation, the public and private interest in substantive adjudication of critical questions relating to copyright law may be foreclosed for reasons wholly unrelated to substantive legal merits.


2018 ◽  
Vol 2018 (3) ◽  
pp. 43-62 ◽  
Author(s):  
Cecylia Bocovich ◽  
Ian Goldberg

Abstract Censorship circumvention is often characterized as a cat-and-mouse game between a nation-state censor and the developers of censorship resistance systems. Decoy routing systems offer a solution to censor- ship resistance that has the potential to tilt this race in the favour of the censorship resistor by using real connections to unblocked, overt sites to deliver censored content to users. This is achieved by employing the help of Internet Service Providers (ISPs) or Autonomous Systems (ASes) that own routers in the middle of the net- work. However, the deployment of decoy routers has yet to reach fruition. Obstacles to deployment such as the heavy requirements on routers that deploy decoy router relay stations, and the impact on the quality of service for customers that pass through these routers have deterred potential participants from deploying existing systems. Furthermore, connections from clients to overt sites often follow different paths in the upstream and downstream direction, making some existing designs impractical. Although decoy routing systems that lessen the burden on participating routers and accommodate asymmetric flows have been proposed, these arguably more deployable systems suffer from security vulnerabilities that put their users at risk of discovery or make them prone to censorship or denial of service attacks. In this paper, we propose a technique for supporting route asymmetry in previously symmetric decoy routing systems. The resulting asymmetric solution is more secure than previous asymmetric proposals and provides an option for tiered deployment, allowing more cautious ASes to deploy a lightweight, non-blocking relay station that aids in defending against routing-capable adversaries. We also provide an experimental evaluation of relay station performance on off-the-shelf hardware and additional security improvements to recently proposed systems.


2014 ◽  
Vol 5 (4) ◽  
pp. 52-65
Author(s):  
Joanna Kulesza

This article analyses the contents of the universal right to free expression in the context of its applicability on-line. It starts off with a brief recapitulation of the origin, definition and interpretation of the right to free expression, derived from article 19 UDHR. It then goes on to name the three composite rights (the right to hold, impart and receive information and ideas) and details the limitations that may be put by states upon the individual exercise of those freedoms. States' duty to protect free expression is than identified as their negative obligation to refrain from infringement as well as a positive one, to guarantee that human rights are “protected, respected and remedied” within national legal systems. Then the role of Internet Service Providers is introduced as the gate keepers of free expression in the information society. Different schemes for national ISP liability mechanisms are presented: the notice-and-take down procedure as well as Internet content filtering (preventive censorship). The paper goes on to criticize both mechanisms as enabling ISPs too much freedom in deciding upon the shape and scope of individuals' right to impart and receive information.


ADALAH ◽  
2020 ◽  
Vol 4 (2) ◽  
Author(s):  
Munadhil Abdul Muqsith

Abstract:The internet developed for the first time in Indonesia in the early 1990s. Starting from the pagayuban network, it is now expanding without boundaries anywhere. A survey conducted by the Indonesian Internet Service Providers Association (APJII) said that the number of internet users in Indonesia in 2012 reached 63 million people or 24.23 percent of the country's total population. Next year, that figure is predicted to increase by close to 30 percent to 82 million users and continue to grow to 107 million in 2014 and 139 million or 50 percent of the total population in 2015. million people. This matter also results in political communication with the internet media, or is often said to be cyber politics. Cyber politics in Indonesia has faced growth in recent years. There are many facilities that support the growth of cyber politics, such as Facebook, Twitter, mailing list, YouTube, and others.Keywords: Cyberpolitik, Internet  Abstrak:Internet berkembang pertama kali di Indonesia pada awal tahun 1990-an. Diawali dari pagayuban network kini berkembang luas tanpa batas dimanapun juga. Suatu survei yang diselenggarakan Asosiasi Penyelenggara Jasa Internet Indonesia (APJII) mengatakan kalau jumlah pengguna internet di Indonesia tahun 2012 menggapai 63 juta orang ataupun 24,23 persen dari total populasi negeri ini. Tahun depan, angka itu diprediksi naik dekat 30 persen jadi 82 juta pengguna serta terus berkembang jadi 107 juta pada 2014 serta 139 juta ataupun 50 persen total populasi pada 2015. juta orang. Perihal ini pula berakibat pada komunikasi politik dengan media internet, ataupun kerap diucap dengan cyber politic. Cyber politic di Indonesia hadapi pertumbuhan sebagian tahun terakhir. Banyaknya fasilitas yang menunjang pertumbuhan cyber politic semacam terdapatnya facebook, Twitter, mailing list, youtobe, serta lain-lain.Kata Kunci: Cyberpolitik, Internet 


2019 ◽  
Vol 10 (2) ◽  
pp. 168-177
Author(s):  
Haerdiansyah Syahnur ◽  
Jafar Basalamah

This study aimed to analyze the customer experience seen from the level of actual performance and the level of importance of services provided by internet service providers PT. XYZ in Makassar City. Variables and attributes issued by TM Forum GB 912 consisting of Customer Management, Fulfillment, Assurance, and Billing, are used to analyze the performance provided by customer service in the field. The analysis technique will be carried out using the Importance Performance Analysis and Customer Satisfaction Index consisting of quadrant analysis and gap analysis used to investigate customer satisfaction and identify variables whose performance is deemed to need improvement. Data were collected using a platform-based questionnaire application from 100 respondents selected using random sampling techniques. The results showed that customers were satisfied with the performance and quality of services provided. The customer satisfaction index value obtained by CSI analysis shows a value of 82.006%. In conclusion, that the Fulfillment variable is a service variable that is considered the most important customer and requires improvement because its performance is still relatively low. While the variables considered good and need to be maintained are the Billing variable. Other service variables are sorted based on priority of improvement in a row, namely Fulfillment, Customer Management, and Assurance.


Sign in / Sign up

Export Citation Format

Share Document