Toward More Resilient Cyber Infrastructure

Author(s):  
Biljana Tanceska ◽  
Mitko Bogdanoski ◽  
Aleksandar Risteski

In this chapter, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The main goal of this chapter is to present the practical execution of various security attacks and their mitigation techniques due to more resilient cyber infrastructure. The network topology that has been attacked is designed in GNS3 software tool installed on Windows operating system, while the attacks are performed in Kali Linux operating system. Three groups of security attacks (Denial of Service, Man in the Middle, and Control Plane attacks) are observed in simulation scenarios with a detailed analysis on each of them, followed by a presentation of practical performance and ways of prevention (protection) against the attacks.

Author(s):  
Ankur Dumka ◽  
Hardwari Lal Mandoria ◽  
Anushree Sah

The chapter surveys the analysis of all the security aspects of software-defined network and determines the areas that are prone to security attacks in the given software-defined network architecture. If the fundamental network topology information is poisoned, all the dependent network services will become immediately affected, causing catastrophic problems like host location hijacking attack, link fabrication attack, denial of service attack, man in the middle attack. These attacks affect the following features of SDN: availability, performance, integrity, and security. The flexibility in the programmability of control plane has both acted as a bane as well as a boon to SDN. Like the ARP poisoning in the legacy networks, there are several other vulnerabilities in the SDN architecture as well.


Author(s):  
Mr Rishikesh ◽  
Kanika Thakur

Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. In this article i have used a bot created from msfvenom , which is a popular tool from a penetration operating system Kali Linux and tested it in various operating system to view the power of sustenance among them. I have used some most popular operating systems which are generally used in banks, ATMs or by individuals. I have tested all the operating system with their default anti-virus and firewalls to make it a fair comparison.


2021 ◽  
Author(s):  
maneesh pant ◽  
Brijmohan Singh ◽  
Dharam Vir Gupta

Abstract The growing and widespread presence of Internet of Things (IoT) has made the lives of all comfortable and handy, but poses various challenges, like efficiency, security, and high energy drain, threatening smart IoT-based applications. Small applications rely on Unicast communication. In a group-oriented communication, multicast is better as transmission takes place using fewer resources. Therefore, many IoT applications rely on multicast transmission. To handle sensitive applications, the multicast traffic requires an actuator control. Securing multicast traffic by itself is cumbersome, as it expects an efficient and flexible Group Key Establishment (GKE) protocol. The paper proposes a three-tier model that can control the IoT and control multicast communications. The first authentication is at network linking where we used a 256-bit keyless encryption technique. Machine learning-based chaotic map key generation authenticates the GKE. Finally, MD5 establishes the system key. 3S-IoT is smart to detect any tempering with the devices. It stores signatures of the connected devices. The algorithm reports any attempt to change or temper a device. 3S-IoT can thwart attacks such as Distributed Denial of Service (DDoS), Man-in-the-Middle (MiTM), phishing, and more. We calculated energy consumed, bandwidth, and the time taken to check the robustness of the proposed model. The results establish that 3S-IoT can efficiently deal with the attacks. The paper compares 3S-IoT with Benchmark algorithms.


2013 ◽  
Vol 4 (2) ◽  
pp. 277-283 ◽  
Author(s):  
Imtiyaz Ahmad Lone ◽  
Jahangeer Ali ◽  
Kalimullah Lone

In this paper, security attacks in ARP are classified and logically organized/represented in a more lucid manner.ARP provides no authentication mechanism to the incoming request packets this is the reason that any client can forge an ARP message contains malicious information to poison the  ARP cache of target host. There are many possible attacks on ARP which can make the communication unsecure such as man-in-the-middle (MITM), Denial of service (DOS) and cloning attack.


Author(s):  
B. Prabadevi ◽  
N. Jeyanthi

<p>Security in the era of digital computing plays a vital role. Of various attacks in the field of computing, Distributed Denial of service (DDoS) attacks, Man-in-the-Middle Attack (MITM) and data theft have their major impact on the emerging applications. The sniffing attacks, one of the most prominent reasons for DDoS attacks, are the major security threats in the client-server computing. The content or packet sniffer snorts the most sensitive information from the network and alters or disturbs the legitimate functionality of the victim system. Therefore it is extremely important to have a greater knowledge on these vulnerabilities, their issues, and various mitigation techniques. This study analyses the existing sniffing attacks, variations of sniffing attacks and prevention or detection mechanisms. The reasons for most vital Ransomware are also discussed.</p>


2021 ◽  
Vol 13 (1) ◽  
Author(s):  
Adeline Su Lyn Ng ◽  
Juan Wang ◽  
Kwun Kei Ng ◽  
Joanna Su Xian Chong ◽  
Xing Qian ◽  
...  

Abstract Background Alzheimer’s disease (AD) and behavioral variant frontotemporal dementia (bvFTD) cause distinct atrophy and functional disruptions within two major intrinsic brain networks, namely the default network and the salience network, respectively. It remains unclear if inter-network relationships and whole-brain network topology are also altered and underpin cognitive and social–emotional functional deficits. Methods In total, 111 participants (50 AD, 14 bvFTD, and 47 age- and gender-matched healthy controls) underwent resting-state functional magnetic resonance imaging (fMRI) and neuropsychological assessments. Functional connectivity was derived among 144 brain regions of interest. Graph theoretical analysis was applied to characterize network integration, segregation, and module distinctiveness (degree centrality, nodal efficiency, within-module degree, and participation coefficient) in AD, bvFTD, and healthy participants. Group differences in graph theoretical measures and empirically derived network community structures, as well as the associations between these indices and cognitive performance and neuropsychiatric symptoms, were subject to general linear models, with age, gender, education, motion, and scanner type controlled. Results Our results suggested that AD had lower integration in the default and control networks, while bvFTD exhibited disrupted integration in the salience network. Interestingly, AD and bvFTD had the highest and lowest degree of integration in the thalamus, respectively. Such divergence in topological aberration was recapitulated in network segregation and module distinctiveness loss, with AD showing poorer modular structure between the default and control networks, and bvFTD having more fragmented modules in the salience network and subcortical regions. Importantly, aberrations in network topology were related to worse attention deficits and greater severity in neuropsychiatric symptoms across syndromes. Conclusions Our findings underscore the reciprocal relationships between the default, control, and salience networks that may account for the cognitive decline and neuropsychiatric symptoms in dementia.


Author(s):  
HYEON SOO KIM ◽  
YONG RAE KWON ◽  
IN SANG CHUNG

Software restructuring is recognized as a promising method to improve logical structure and understandability of a software system which is composed of modules with loosely-coupled elements. In this paper, we present methods of restructuring an ill-structured module at the software maintenance phase. The methods identify modules performing multiple functions and restructure such modules. For identifying the multi-function modules, the notion of the tightly-coupled module that performs a single specific function is formalized. This method utilizes information on data and control dependence, and applies program slicing to carry out the task of extracting the tightly-coupled modules from the multi-function module. The identified multi-function module is restructured into a number of functional strength modules or an informational strength module. The module strength is used as a criterion to decide how to restructure. The proposed methods can be readily automated and incorporated in a software tool.


2021 ◽  
pp. 447-456
Author(s):  
Beibei Sun

Agricultural mechanization has become the main mode of agricultural production and represents the development direction of modern agriculture. The amount of data generated in the agricultural production process is extremely huge, so it is necessary to introduce the concept and analysis method of big data. Combining agricultural robots with big data can improve the performance and application effect of robots. This paper combines big data, WLAN technology and robot technology to realize man-machine remote cooperation platform. This gives full play to the advantages that people are good at object recognition and robots are good at execution, and improves the fruit picking efficiency. The target fruit positioning and recognition system aided by machine vision is adopted to realize the accurate positioning of the fruit to be picked. Design of LFM control signal fitting based on big data clustering. In order to verify the feasibility of the scheme, taking the tomato picking robot as an example, the communication error and control accuracy using big data and WIFI (Wireless Fidelity) technology were tested, and the positioning and navigation efficiency with and without remote monitoring system was compared. Test results show that using big data and WIFI remote monitoring technology can effectively improve the efficiency and accuracy of positioning and navigation of remote operating system, which is of great significance for the design of automatic control system of picking robot.


2019 ◽  
Vol 1 (1) ◽  
pp. 90-93
Author(s):  
Tan Thanh Nguyen ◽  
Duy Khanh Nguyen

Robots imitating spider’s moving have many advantages such as flexible movement, high stability, diversity in movements performed, especially in terrain  crossing, in military reconnaissance, in surveying and collecting environmental data in dangerous areas,.... In this article  with the main objective is to exploit multiple control methods to support applications of a spider robot with low-cost, a spider robot with 6 legs and 18 joints was designed. The ESPWROOM-32 module (ESP32-D0WDQ6 chip) and MIT App Inventor were used as the main tools for conducting this research. As a result, the robot is controlled via Bluetooth and Wifi to move, making some actions by self-written software running on the Android operating system. In addition, the robot has the capacity of self-propelled to avoid simple obstacles and send some environmental parameters to the software, including obstacles distance, humidity and temperature.


Sign in / Sign up

Export Citation Format

Share Document