A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools

Author(s):  
Manjunath Kotari ◽  
Niranjan N. Chiplunkar

Cyber crime is a serious threat for day-to-day transactions of the digital life. Overexposure of the personal details in social networks will lead to the cyber crime case. Therefore, detection and monitoring of cyber crime are challenging tasks. The cyber criminals are continually flooding the various intrusions all over the network. The cyber safety team should have a noteworthy challenge of filtering various such information. Continuous nonstop cyberattacks or intrusion examinations by security tools will significantly improve the threat alerts. However, cyber security becomes more expensive in the case of the above methods. The chapter provides systematic survey of various cyber security threats, evolution of intrusion detection systems, various monitoring mechanisms, open source cyber security monitoring tools, and various assessment techniques. The chapter also proposes a model of Cyber security detection and monitoring system and its challenges.

Author(s):  
Muhammad Salman Khan ◽  
Ken Ferens ◽  
Witold Kinsner

Growing global dependence over cyberspace has given rise to intelligent malicious threats due to increasing network complexities, inherent vulnerabilities embedded within the software and the limitations of existing cyber security systems to name a few. Malicious cyber actors exploit these vulnerabilities to carry out financial fraud, steal intellectual property and disrupt the delivery of essential online services. Unlike physical security, cyberspace is very difficult to secure due to the replacement of traditional computing platforms with sophisticated cloud computing and virtualization. These complex systems exhibit an increasing degree of complexity in tracking an attack or monitoring possible threats which is becoming intractable with the existing security firewalls and intrusion detection systems. In this paper, authors present a novel complexity detection technique using generalized multifractal singularity spectrum which is able to not only capture the growing complexity of the internet time series but also distinguishes the presence of an attack accurately.


2022 ◽  
pp. 883-910
Author(s):  
Gustavo Arroyo-Figueroa ◽  
Isai Rojas-Gonzalez ◽  
José Alberto Hernández-Aguilar

Internet of energy (IoE) is the natural evolution of Smart Grid incorporating the paradigm of internet of things (IoT). This complicated environment has a lot of threats and vulnerabilities, so the security challenges are very complex and specialized. This chapter contains a compilation of the main threats, vulnerabilities, and attacks that can occur in the IoE environment and the critical structure of the electrical grid. The objective is to show the best cybersecurity practices that can support maintaining a safe, reliable, and available electrical network complying with the requirements of availability, integrity, and confidentially of the information. The study includes review of countermeasures, standards, and specialized intrusion detection systems, as mechanisms to solve security problems in IoE. Better understanding of security challenges and solutions in the IoE can be the light on future research work for IoE security.


2017 ◽  
Vol 5 (1) ◽  
pp. 54-62 ◽  
Author(s):  
Matthias Schulze

This article analyzes two cryptography discourses dealing with the question of whether governments should be able to monitor secure and encrypted communication, for example via security vulnerabilities in cryptographic systems. The Clipper chip debate of 1993 and the FBI vs. Apple case of 2016 are analyzed to infer whether these discourses show similarities in their arguments and to draw lessons from them. The study is based on the securitization framework and analyzes the social construction of security threats in political discourses. The findings are that the arguments made by the proponents of exceptional access show major continuities between the two cases. In contrast, the arguments of the critics are more diverse. The critical arguments for stronger encryption remain highly relevant, especially in the context of the Snowden revelations. The article concludes that we need to adopt a more general cyber security perspective, considering the threat of cyber crime and state hacking, when debating whether the government should be able to weaken encryption.


Author(s):  
Gustavo Arroyo-Figueroa ◽  
Isai Rojas-Gonzalez ◽  
José Alberto Hernández-Aguilar

Internet of energy (IoE) is the natural evolution of Smart Grid incorporating the paradigm of internet of things (IoT). This complicated environment has a lot of threats and vulnerabilities, so the security challenges are very complex and specialized. This chapter contains a compilation of the main threats, vulnerabilities, and attacks that can occur in the IoE environment and the critical structure of the electrical grid. The objective is to show the best cybersecurity practices that can support maintaining a safe, reliable, and available electrical network complying with the requirements of availability, integrity, and confidentially of the information. The study includes review of countermeasures, standards, and specialized intrusion detection systems, as mechanisms to solve security problems in IoE. Better understanding of security challenges and solutions in the IoE can be the light on future research work for IoE security.


2012 ◽  
pp. 304-317
Author(s):  
Václav Snášel ◽  
Jan Platoš ◽  
Pavel Krömer ◽  
Ajith Abraham

Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, corrupt, damage, destroy or prohibit access to it. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This chapter presents some of the challenges in designing efficient ad light weight intrusion detection systems, which could provide high accuracy, low false alarm rate and reduced number of features. Finally, the authors present the Non-negative matrix factorization method for detecting real attacks and the performance comparison with other computational intelligence techniques.


Author(s):  
Václav Snášel ◽  
Jan Platoš ◽  
Pavel Krömer ◽  
Ajith Abraham

Recently cyber security has emerged as an established discipline for computer systems and infrastructures with a focus on protection of valuable information stored on those systems from adversaries who want to obtain, corrupt, damage, destroy or prohibit access to it. An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This chapter presents some of the challenges in designing efficient ad light weight intrusion detection systems, which could provide high accuracy, low false alarm rate and reduced number of features. Finally, the authors present the Non-negative matrix factorization method for detecting real attacks and the performance comparison with other computational intelligence techniques.


2005 ◽  
Vol 1 (1) ◽  
pp. 74-82 ◽  
Author(s):  
Ajith Abraham ◽  
◽  
Crina Grosan ◽  
Yuehui Chen ◽  
◽  
...  

Author(s):  
Leila Mechtri ◽  
Fatiha Djemili Tolba ◽  
Salim Ghanemi

Mobile Ad-hoc NETworks (MANETs) are believed to be highly vulnerable to security threats due to the numerous constraints they present such as: the absence of a fixed infrastructure, the dynamic topology change, their dependence on cooperative communication, the unreliability of wireless links and most importantly the absence of a clear line of defense. Since intrusion detection and agent technology proved to offer several potential advantages, there has been a great tendency for using agents to build optimal, adaptive and comprehensive intrusion detection systems to fit MANET security requirements. This chapter presents a survey and analysis of the work that has been recently done for the deployment of agent technology in the area of MANET intrusion detection. In particular, recent advances in that field in terms of existing frameworks, architectures and implementations as well as a discussion of the obtained advantages in addition to the potentially introduced vulnerabilities are presented.


Sign in / Sign up

Export Citation Format

Share Document