scholarly journals Web-Browsing Application Using Web Scraping Technology in Korean Network Separation Application

Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1550 ◽  
Author(s):  
Won-Chi Jung ◽  
Jinsu Kim ◽  
Namje Park

Attackers’ intrusion into the Enterprise LAN is increasing every year, and the method is becoming more intelligent and crafty. Various security measures against external network intrusions, such as firewalls, are being studied and applied to protect against external attacks, but it is difficult to respond to increasing attacks. Most institutions block access from the external network for the safety of the internal network and allow access from the internal network to the external network through some restricted ports. In particular, restricted ports in subject to a variety of security techniques to block intrusion into the internal network, but in the process, access to the internal network is only applied by restricted ports, making it inefficient to handle internal requests. Although various studies have been conducted on network isolation to address these challenges, it is difficult to perform tasks efficiently as security functions, such as detecting whether request data is attacked or not, during actual application. The proposed technique is a network-blocking-based network separation technique that converts data from the external network connected to the Internet into symmetry data from which malicious code is removed through an agent and delivers it to the client of the internal network. We propose a technique to provide access.

Author(s):  
Cristinel Marius VASILE

Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Leonardo ◽  
1999 ◽  
Vol 32 (5) ◽  
pp. 353-358 ◽  
Author(s):  
Noah Wardrip-Fruin

We look to media as memory, and a place to memorialize, when we have lost. Hypermedia pioneers such as Ted Nelson and Vannevar Bush envisioned the ultimate media within the ultimate archive—with each element in continual flux, and with constant new addition. Dynamism without loss. Instead we have the Web, where “Not Found” is a daily message. Projects such as the Internet Archive and Afterlife dream of fixing this uncomfortable impermanence. Marketeers promise that agents (indentured information servants that may be the humans of About.com or the software of “Ask Jeeves”) will make the Web comfortable through filtering—hiding the impermanence and overwhelming profluence that the Web's dynamism produces. The Impermanence Agent—a programmatic, esthetic, and critical project created by the author, Brion Moss, a.c. chapman, and Duane Whitehurst— operates differently. It begins as a storytelling agent, telling stories of impermanence, stories of preservation, memorial stories. It monitors each user's Web browsing, and starts customizing its storytelling by weaving in images and texts that the user has pulled from the Web. In time, the original stories are lost. New stories, collaboratively created, have taken their place.


2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


2022 ◽  
pp. 168-180
Author(s):  
Sasikumar Gurumoorthy ◽  
L. Venkateswara Reddy ◽  
Sudhakaran Periakaruppan

Art colonnades and museums all over the world are the first option for individuals to visit for the enhancement of the cultural life of people. To ensure their safety, museums have established numerous cultural security measures. Traditional strategies do not obstruct their pace entirely. They only use a computer in the museum to check individuals at the entrance and exit. Therefore, the authors proposed a gallery anti-stealing device created on the internet-of-things (IoT) technology that ensures security through passive readers/writers of RFID. Radio frequency identification (RFID) remains a system that practices isolated data storing and recovery and offers object tracking with a unique identity code. The system then sends sound and light warning information, while the photographic camera structure is triggered to capture a picture at the same time. The recognition of the accuracy in the hardware component of the device can be additionally enhanced by the use of this technology to increase the safety of museum equipment.


Author(s):  
Jeanne Chen ◽  
Tung-Shou Chen ◽  
Meng-Wen Cheng

Great advancements in Web technology have resulted in increase activities on the Internet. Users from all walks of life — e-commerce traders, professionals and ordinary users — have become very dependent on the Internet for all sorts of data transfers, be it important data transactions or friendly exchanges. Therefore, data security measures on the Internet are very essential and important. Also, steganography plays a very important role for protecting the huge amount of data that pass through the internet daily.


Author(s):  
Mahbubur R. Syed ◽  
Mohammad M. Nur ◽  
Robert J. Bignall

In recent years the Internet has become the most popular and useful medium for information interchange due to its wide availability, flexibility, universal standards, and distributed architecture. As an outcome of increased dependency on the Internet and networked systems, intrusions have become a major threat to Internet users. Network intrusions may be categorized into the following major types: • Stealing valuable and sensitive information • Destroying or altering information • Obstructing the availability of information by destroying the service-providing ability of a victim’s server


Author(s):  
Fikri Muhammad Arifin ◽  
Giva Andriana Mutiara ◽  
Ismail Ismail

Internet is a source of information which is widely used today. However, the mode of internet abused becomes more various and unavoidable. The internet abused can be done from external or internal networks. Unified Threat Management (UTM) is one of a good solution to secure the networks, because it has several security features such as firewall, proxy, Intrusion Prevention System (IPS) and several other security features in one package. Endian is an UTM distro which is an open source in large community. Besides having some security features, Endian also has some network management features such as DHCP, routing, and VPN. This research put Endian as the center of a network topology that connected to the internal network/LAN, DMZ Server, and Internet Network/WAN. The tests are conducted in the form of implementation of DHCP feature, content filtering, port restrictions on interzone, and the response of the IPS features that exist on the Endian while receiving the attack. The results showed that Endian UTM is quite well in maintaining the security of the networks.


Today, many of devices are connected to internet through networks. Malware (such as computer viruses, trojans, ransomware, and bots) has becoming a critical concern and evolving security threats to the internet users nowadays. To make legitimate users safe from these attacks, many anti-malware software products has been developed. Which provide the major defensive methods against those malwares. Due to rapid spread and easiness of generating malicious code, the number of new malware samples has dramatically increased. There need to take an immediate action against these increase in malware samples which would result in an intelligent method for malware detection. Machine learning approaches are one of the efficient choices to deal with the problem which helps to distinguish malware from benign ones. In this paper we are considering xception model for malware detection. This experiment results shows the efficiency of our proposed method, which gives 98% accuracy with malimg dataset. This paper helps network security area for their efficient works.


Author(s):  
Olga Shulga

The purpose of the work is to consider the theoretical and practical aspects of fraud in the Internet sphere and on this basis to identify ways to ensure the confidentiality and cybersecurity of private users and commercial organizations. The methodological basis of the work is the use of general and special methods of scientific knowledge. Methods of combining analysis and synthesis, induction and deduction have been used to identify different types of fraud in the Internet. Generalization methods, logical and empirical, were used in determining the directions of development of the national cyber defense system and ensuring confidentiality. The main results of the work: The most common methods of fraud with the use of bank payment cards are identified, among which: a fake poll on social networks with a prize draw; a phone call to obtain classified information; SIM card replacement for access to online banking; online payments on unsecured sites; phishing; copying card data when handed over; unsecured WI-Fi networks; computers in public places; skimming for card data theft; unauthorized micropayments; ATM fraud; use of malicious programs (viruses), fake sites in order to compromise the details of electronic payment instruments and/or logins/passwords for access to Internet/mobile banking systems; dissemination (sale, dissemination) of information on compromised data; terminal network fraud; fraud in remote service systems; social engineering. Basic security rules are defined to prevent fraud. The experience of European countries in the field of cybersecurity is analyzed. The directions of adaptation of the current legislation on cybersecurity to the EU standards are outlined and the directions of development of the national system of cybersecurity are defined. The practical significance of the results is to deepen the understanding of the nature and mechanism of various types of fraud in the Internet. The recommendations proposed in the paper can form a methodological and theoretical basis for the development of economic policy of the state to ensure the confidentiality and cybersecurity of private users and commercial organizations. Conclusions. The state should establish an effective oversight body in the field of personal data protection, but security measures and online restrictions should comply with international standards. The use of encryption should not be prohibited at the legislative level, as such restrictions reduce the ability of citizens to protect themselves from illegal intrusions into privacy. In addition, the state policy in the Internet should be aimed at promoting the development and operation of secure Internet technologies and the formation of mechanisms to protect against services and protocols that threaten the technical functioning of the Internet from viruses, phishing and more.


Sign in / Sign up

Export Citation Format

Share Document