A Black-Box Framework for Malicious Traffic Detection in ICT Environments

Author(s):  
Carlos Alberto M. S. Teles ◽  
Carlos Roberto Gonçalves Viana Filho ◽  
Felipe da Rocha Henriques

Information security is gradually becoming an area that plays an important role in our daily lives as information and communications technology assets grow with increasingly connected environments. Increasingly we have information from society having their data leaked due to information security flaws in both hardware and software of ICT assets. To identify failures of ICT assets, through the detection of malicious traffic, this chapter proposes a black-box-based framework that aims to detect malicious traffic. The black-box method allows monitor the network without accessing the software or hardware details. In the proposed framework, information security and network resource usage are used together in order to provide a reliable detection of malicious traffic. Firstly, the authors collected network traffic information, generating a dataset from open source networking tools. The proposed detection scheme can identify risks and threats like malware, suspect traffic, and others. The scheme was validated verifying the correlation between network security alerts and network resource usage.

2019 ◽  
Vol 37 (1) ◽  
pp. 65-79 ◽  
Author(s):  
Gabriel J. Costello

Abstract The purpose of this paper is to contribute to the literature on theories of the firm and argues for the importance of an innovation-based view (IBV). In doing so, it examines the incumbent management theories of the firm, resource-based view (RBV), knowledge-based view (KBV) and dynamic capabilities, considering the recent developments in the academic literature and in the nature of the firm. The research approach of abduction (conceiving of theory) proposed by Peirce and described by Van de Ven is used. A conceptual framework that incorporates the growing influence of information and communications technology and open innovation on the characteristics of the firm is developed. The managerial tradition that originated in the scholarship of Edith Penrose is used to develop the framework, as opposed to the lens of economic ‘black box’ theories.


Field Methods ◽  
2021 ◽  
pp. 1525822X2199128
Author(s):  
Hana Vonkova ◽  
Jan Hrabak ◽  
Katerina Kralova ◽  
Ondrej Papajoanu

Self-assessment measures are commonly used in questionnaire surveys. However, one of the problems with self-reports is that they may be prone to differences in scale usage among respondents. The anchoring vignette method addresses this issue. It relies on two assumptions: response consistency and vignette equivalence. Here we aim to develop a framework for the examination of these assumptions using cognitive interviews and demonstrate it in the Information and Communications Technology (ICT) skills domain. First, we develop new anchoring vignettes describing various ICT skill domains. Second, we examine both assumptions using cognitive interviews with students who are studying different fields. Our analysis shows that the assumptions are indeed not adhered to, especially the assumption of vignette equivalence. Third, we develop a general framework for the examination of the method’s assumptions.


Sign in / Sign up

Export Citation Format

Share Document