scholarly journals Cyber Attacks Visualization and Prediction in Complex Multi-Stage Network

2022 ◽  
Vol 3 (33) ◽  
pp. 59-85
Author(s):  
Jassir Adel Altheyabi ◽  

In network security, various protocols exist, but these cannot be said to be secure. Moreover, is not easy to train the end-users, and this process is time-consuming as well. It can be said this way, that it takes much time for an individual to become a good cybersecurity professional. Many hackers and illegal agents try to take advantage of the vulnerabilities through various incremental penetrations that can compromise the critical systems. The conventional tools available for this purpose are not enough to handle things as desired. Risks are always present, and with dynamically evolving networks, they are very likely to lead to serious incidents. This research work has proposed a model to visualize and predict cyber-attacks in complex, multilayered networks. The calculation will correspond to the cyber software vulnerabilities in the networks within the specific domain. All the available network security conditions and the possible places where an attacker can exploit the system are summarized.

2021 ◽  
Author(s):  
Karthik K ◽  
Sudarson Jena ◽  
Venu Gopal T

Abstract A Multiprocessor is a system with at least two processing units sharing access to memory. The principle goal of utilizing a multiprocessor is to process the undertakings all the while and support the system’s performance. An Interconnection Network interfaces the various handling units and enormously impacts the exhibition of the whole framework. Interconnection Networks, also known as Multi-stage Interconnection Networks, are node-to-node links in which each node may be a single processor or a group of processors. These links transfer information from one processor to the next or from the processor to the memory, allowing the task to be isolated and measured equally. Hypercube systems are a kind of system geography used to interconnect various processors with memory modules and precisely course the information. Hypercube systems comprise of 2n nodes. Any Hypercube can be thought of as a graph with nodes and edges, where a node represents a processing unit and an edge represents a connection between the processors to transmit. Degree, Speed, Node coverage, Connectivity, Diameter, Reliability, Packet loss, Network cost, and so on are some of the different system scales that can be used to measure the performance of Interconnection Networks. A portion of the variations of Hypercube Interconnection Networks include Hypercube Network, Folded Hypercube Network, Multiple Reduced Hypercube Network, Multiply Twisted Cube, Recursive Circulant, Exchanged Crossed Cube Network, Half Hypercube Network, and so forth. This work assesses the performing capability of different variations of Hypercube Interconnection Networks. A group of properties is recognized and a weight metric is structured utilizing the distinguished properties to assess the performance exhibition. Utilizing this weight metric, the performance of considered variations of Hypercube Interconnection Networks is evaluated and summed up to recognize the effective variant. A compact survey of a portion of the variations of Hypercube systems, geographies, execution measurements, and assessment of the presentation are examined in this paper. Degree and Diameter are considered to ascertain the Network cost. On the off chance that Network Cost is considered as the measurement to assess the exhibition, Multiple Reduced Hypercube stands ideal with its lower cost. Notwithstanding it, on the off chance that we think about some other properties/ scales/metrics to assess the performance, any variant other than MRH may show considerably more ideal execution. The considered properties probably won't be ideally adequate to assess the effective performance of Hypercube variations in all respects. On the off chance that a sensibly decent number of properties are utilized to assess the presentation, a proficient variation of Hypercube Interconnection Network can be distinguished for a wide scope of uses. This is the inspiration to do this research work.


Author(s):  
Fu-qiang Chen ◽  
Zhi-xin Gao ◽  
Jin-yuan Qian ◽  
Zhi-jiang Jin

In this paper, a new high multi-stage pressure reducing valve (HMSPRV) is proposed. The main advantages include reducing noise and vibration, reducing energy consumption and dealing with complex conditions. As a new high pressure reducing valve, its flow characteristics need to be investigated. For that the valve opening has a great effect on steam flow, pressure reduction and energy consumption, thus different valve openings are taken as the research points to investigate the flow characteristics. The analysis is conducted from four aspects: pressure, velocity, temperature fields and energy consumption. The results show that valve opening has a great effect on flow characteristics. No matter for pressure, velocity or temperature field, the changing gradient mainly reflects at those throttling components for all valve openings. For energy consumption, in the study of turbulent dissipation rate, it can be found that the larger of valve opening, the larger of energy consumption. It can be concluded that the new high multi-stage pressure reducing valve works well under complex conditions. This study can provide technological support for achieving pressure regulation, and benefit the further research work on energy saving and multi-stage design of pressure reducing devices.


2021 ◽  
Vol 17 (1) ◽  
pp. 97-122
Author(s):  
Mohamed Hassan Mohamed Ali ◽  
Said Fathalla ◽  
Mohamed Kholief ◽  
Yasser Fouad Hassan

Ontologies, as semantic knowledge representation, have a crucial role in various information systems. The main pitfall of manually building ontologies is effort and time-consuming. Ontology learning is a key solution. Learning Non-Taxonomic Relationships of Ontologies (LNTRO) is the process of automatic/semi-automatic extraction of all possible relationships between concepts in a specific domain, except the hierarchal relations. Most of the research works focused on the extraction of concepts and taxonomic relations in the ontology learning process. This article presents the results of a systematic review of the state-of-the-art approaches for LNTRO. Sixteen approaches have been described and qualitatively analyzed. The solutions they provide are discussed along with their respective positive and negative aspects. The goal is to provide researchers in this area a comprehensive understanding of the drawbacks of the existing work, thereby encouraging further improvement of the research work in this area. Furthermore, this article proposes a set of recommendations for future research.


Author(s):  
Onder Onursal ◽  
Arif Sari

This chapter is a literature review of intermediate system to intermediate system (IS-IS) routing protocol to provide basic security mechanisms against cyber-attacks and enhance network security. IS-IS was originally developed by the International Organization for Standardization (ISO) as a link state routing protocol. It was first built with the ability to route CLNPs or connectionless network protocols according to the OSI standard equal to IP. IS-IS is also developed so that it can accommodate routing for any layer three-based protocol. Internet Engineering Task Force (IETF) in 1990 specified the support for IP and introduced IPv6 extensions in 2000. IS-IS protocol implementation was written as modules in order for it to be distributed freely and easily installed on the GNU routing software. SourceForge.net supported the project and gave access for developers to easily contribute to the project. The chapter elaborates the ISIS routing protocol for network security and proposes a critical survey on security routing protocols.


Author(s):  
Daniel Tetteroo ◽  
Henk Seelen ◽  
Annick Timmermans ◽  
Panos Markopoulos

The authors discuss the feasibility of End-User Development (EUD) for non-information workers in the context of neurorehabilitation. The authors present a three-week long field deployment of TagTrainer, a system that enables therapists to create, share, and use exercises for arm-hand training with a tangible interactive tabletop application. The experiences suggest that therapists are capable and motivated to create content that is tailored to the training needs of their patients. Three key challenges are identified for enabling EUD practices in a clinical setting, which appear to have a broader relevance outside the specific domain of neurorehabilitation: more support for retrieval and sharing of existing solutions developed by end users, guiding end-user developers to ensure usability and software quality for their creations, and aligning with the revenue model of the organization.


2019 ◽  
Vol 3 (4) ◽  
pp. 382-396 ◽  
Author(s):  
Ioannis Karageorgos ◽  
Mehmet M. Isgenc ◽  
Samuel Pagliarini ◽  
Larry Pileggi

AbstractIn today’s globalized integrated circuit (IC) ecosystem, untrusted foundries are often procured to build critical systems since they offer state-of-the-art silicon with the best performance available. On the other hand, ICs that originate from trusted fabrication cannot match the same performance level since trusted fabrication is often available on legacy nodes. Split-Chip is a dual-IC approach that leverages the performance of an untrusted IC and combines it with the guaranties of a trusted IC. In this paper, we provide a framework for chip-to-chip authentication that can further improve a Split-Chip system by protecting it from attacks that are unique to Split-Chip. A hardware implementation that utilizes an SRAM-based PUF as an identifier and public key cryptography for handshake is discussed. Circuit characteristics are provided, where the trusted IC is designed in a 28-nm CMOS technology and the untrusted IC is designed in an also commercial 16-nm CMOS technology. Most importantly, our solution does not require a processor for performing any of the handshake or cryptography tasks, thus being not susceptible to software vulnerabilities and exploits.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 81
Author(s):  
B Amutha ◽  
Swasti Saxena ◽  
Abhinaba Das

War driving, camp out etc. are common methodologies of gaining access of a company’s network and resources illegally. Packet capturing, out of thin air, brute force etc. are common mechanisms to gain key or password access to any company’s applications. In the times where hacking and cyber-attacks have become prevalent, companies are deploying various network security mechanisms to counter these attacks and to safe guard company’s applications and data. Beyond Corp is a new technology that is being used by Google these days to safe guard its applications. In this paper we will compare some of the network security mechanisms that many companies use to avoid cyber-attacks with Beyond Corp technology which is being used by Google to avoid security breach in the company’s network and applications.  


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 1977 ◽  
Author(s):  
Geethapriya Thamilarasu ◽  
Shiven Chawla

Cyber-attacks on the Internet of Things (IoT) are growing at an alarming rate as devices, applications, and communication networks are becoming increasingly connected and integrated. When attacks on IoT networks go undetected for longer periods, it affects availability of critical systems for end users, increases the number of data breaches and identity theft, drives up the costs and impacts the revenue. It is imperative to detect attacks on IoT systems in near real time to provide effective security and defense. In this paper, we develop an intelligent intrusion-detection system tailored to the IoT environment. Specifically, we use a deep-learning algorithm to detect malicious traffic in IoT networks. The detection solution provides security as a service and facilitates interoperability between various network communication protocols used in IoT. We evaluate our proposed detection framework using both real-network traces for providing a proof of concept, and using simulation for providing evidence of its scalability. Our experimental results confirm that the proposed intrusion-detection system can detect real-world intrusions effectively.


2014 ◽  
Vol 1 (3) ◽  
pp. 1-20
Author(s):  
Soumyo D. Moitra

Estimating the benefits of network security systems is important for security decisions since considerable resources are spent on them and organizations need to know the returns on their investments. The objective of the model presented here is to improve management decisions. Better decisions imply greater security for the budget. This model has a number of novel features such as a probabilistic sub-model for the detection and response process, a new attack/damage matrix based on damage-type and cyber-attacks by category, and extensive sensitivity analyses. The results suggest a number of insights into the factors affecting the benefits from sensors such as the effects of non-linear relationships between the rate of attacks and the damages caused. The key role of the value of sensitive information is identified. The model helps identify the conditions under which a new security system provides enough benefits to justify its purchase.


Sign in / Sign up

Export Citation Format

Share Document