scholarly journals A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems

2021 ◽  
Vol 13 (4) ◽  
pp. 90
Author(s):  
Sanaa Kaddoura ◽  
Ramzi A. Haraty ◽  
Karam Al Kontar ◽  
Omar Alfandi

In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken from infection onward. The challenge of this research is to discover the infected transactions in a minimal time. The proposed parallel algorithm is based on the transaction dependency paradigm, with a time complexity O((M+NQ+N^3)/L) (M = total number of transactions under scrutiny, N = number of malicious and affected transactions in the testing list, Q = time for dependency check, and L = number of threads used). The memory complexity of the algorithm is O(N+KL) (N = number of malicious and affected transactions, K = number of transactions in one area handled by one thread, and L = number of threads). Since the damage assessment time is directly proportional to the denial-of-service time, the proposed algorithm provides a minimized execution time. Our algorithm is a novel approach that outperforms other existing algorithms in this domain in terms of both time and memory, working up to four times faster in terms of time and with 120,000 fewer bytes in terms of memory.

Author(s):  
Jason R. C. Nurse

Cybercrime is a significant challenge to society, but it can be particularly harmful to the individuals who become victims. This chapter engages in a comprehensive and topical analysis of the cybercrimes that target individuals. It also examines the motivation of criminals that perpetrate such attacks and the key human factors and psychological aspects that help to make cybercriminals successful. Key areas assessed include social engineering (e.g., phishing, romance scams, catfishing), online harassment (e.g., cyberbullying, trolling, revenge porn, hate crimes), identity-related crimes (e.g., identity theft, doxing), hacking (e.g., malware, cryptojacking, account hacking), and denial-of-service crimes. As a part of its contribution, the chapter introduces a summary taxonomy of cybercrimes against individuals and a case for why they will continue to occur if concerted interdisciplinary efforts are not pursued.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 156
Author(s):  
S Ravikumar ◽  
E Kannan

One of the immense risk to benefit accessibility in distributed computing is Distributed Denial of Service. Here a novel approach has been proposed to limit SDO [Strewn Defiance of Overhaul] assaults. This has been wanted to accomplish by a canny quick motion horde organize. An astute horde arrange is required to guarantee independent coordination and portion of horde hubs to play out its handing-off tasks. Clever Water Drop calculation has been adjusted for appropriated and parallel advancement. The quick motion system was utilized to keep up availability between horde hubs, customers, and servers. We have intended to reproduce this as programming comprising of different customer hubs and horde hubs


Author(s):  
L. Guida ◽  
P. Boccardo ◽  
I. Donevski ◽  
L. Lo Schiavo ◽  
M. E. Molinari ◽  
...  

Damage assessment is a fundamental step to support emergency response and recovery activities in a post-earthquake scenario. In recent years, UAVs and satellite optical imagery was applied to assess major structural damages before technicians could reach the areas affected by the earthquake. However, bad weather conditions may harm the quality of these optical assessments, thus limiting the practical applicability of these techniques. In this paper, the application of Synthetic Aperture Radar (SAR) imagery is investigated and a novel approach to SAR-based damage assessment is presented. Coherent Change Detection (CCD) algorithms on multiple interferometrically pre-processed SAR images of the area affected by the seismic event are exploited to automatically detect potential damages to buildings and other physical structures. As a case study, the 2016 Central Italy earthquake involving the cities of Amatrice and Accumoli was selected. The main contribution of the research outlined above is the integration of a complex process, requiring the coordination of a variety of methods and tools, into a unitary framework, which allows end-to-end application of the approach from SAR data pre-processing to result visualization in a Geographic Information System (GIS). A prototype of this pipeline was implemented, and the outcomes of this methodology were validated through an extended comparison with traditional damage assessment maps, created through photo-interpretation of high resolution aerial imagery. The results indicate that the proposed methodology is able to perform damage detection with a good level of accuracy, as most of the detected points of change are concentrated around highly damaged buildings.


The advancement of information and communications technology has changed an IoMT-enabled healthcare system. The Internet of Medical Things (IoMT) is a subset of the Internet of Things (IoT) that focuses on smart healthcare (medical) device connectivity. While the Internet of Medical Things (IoMT) communication environment facilitates and supports our daily health activities, it also has drawbacks such as password guessing, replay, impersonation, remote hijacking, privileged insider, denial of service (DoS), and man-in-the-middle attacks, as well as malware attacks. Malware botnets cause assaults on the system's data and other resources, compromising its authenticity, availability, confidentiality and, integrity. In the event of such an attack, crucial IoMT communication data may be exposed, altered, or even unavailable to authorised users. As a result, malware protection for the IoMT environment becomes critical. In this paper, we provide several forms of malware attacks and their consequences. We also go through security, privacy, and different IoMT malware detection schemes


2020 ◽  
Vol 20 (3) ◽  
Author(s):  
Imriyas Kamardeen ◽  
Marini Samaratunga

Personalising learning is critical for universities to achieving excellence in education.  It entails maintaining an education system that is responsive to the learning needs, aptitudes and interests of individual students.  Rather than imposing a ‘one-size fits all’ model, personalising learning is anticipated to ensure that every learner achieves his/her highest potential. Pedagogical literature suggests that learning-oriented assessments that are engaging, authentic and relevant are an effective mode for personalisation. DigiExplanations is a novel approach that requires students to create short digital media to communicate their ideas to ordinary audiences. It offers an opportunity for research-based authentic learning by harnessing digital media that exist outside of their institution and their digital competencies to create personally relevant and interesting resources. The aim of the research was to investigate the effectiveness of digiExplanations driven assessments for improving personalised learning in construction education. A case study strategy was adopted in the research. A first-year subject from the construction management degree was chosen as the case, which had a class of 159 students. A new assignment scheme was introduced for which students were required to develop digiExplanations in groups of five. The assessment criteria comprised: rationale for the study; depth and breadth of the discussions for the topic; appropriateness of media used in the discussions; creativity in the use of media (storyboarding); design of digiExplanation; quality of conclusion; and proper acknowledgement of materials used. After the submission deadline, an online survey was conducted with the students to assess how the new assessment approach facilitated personalised learning. Several findings emerged from the study. The digiExplanations based assignment provided similar learning experiences for students with different characteristics concerning their first language, domestic/international student status, work situation and digital competencies. Moreover, the study found that some considerations are more significant than others in designing assessments that can drive personalised learning, which are: personally relevant/interesting, engagement, harnessing internet resources and progressive feedback. The survey findings further suggest that while the new pedagogical approach achieved its intended aim, few students perceived it a cumbersome method as it required more efforts than traditional assignments.


2020 ◽  
Vol 14 (2) ◽  
pp. 1-19
Author(s):  
Khundrakpam Johnson Singh ◽  
Janggunlun Haokip ◽  
Usham Sanjota Chanu

In the new era of computers, everyone relies on the internet for basic day-to-day activities to sophisticated and secret tasks. The cyber threats are increasing, not only theft and manipulation of someone's information, but also forcing the victim to deny other requests. A DDoS (Distributed Denial of Service) attack, which is one of the serious issues in today's cyber world needs to be detected and their advance towards the server should be blocked. In the article, the authors are focusing mainly on preventive measures of different types of DDoS attacks using multiple IPtables rules and Windows firewall advance security settings configuration, which would be feasibly free on any PC. The IPtables when appropriately selected and implemented can establish a relatively secure barrier for the system and the external environment.


Sign in / Sign up

Export Citation Format

Share Document