scholarly journals A PROACTIVE APPROACH TO NETWORK FORENSICS INTRUSION (DENIAL OF SERVICE FLOOD ATTACK) USING DYNAMIC FEATURES, SELECTION AND CONVOLUTION NEURAL NETWORK

2021 ◽  
Vol 2 (2) ◽  
pp. 01-09
Author(s):  
G. George ◽  
C. Uppin

Currently, the use of internet-connected applications for storage by different organizations have rapidly increased with the vast need to store data, cybercrimes are also increasing and have affected large organizations and countries as a whole with highly sensitive information, countries like the United States of America, United Kingdom and Nigeria. Organizations generate a lot of information with the help of digitalization, these highly classified information are now stored in databases via the use of computer networks. Thus, allowing for attacks by cybercriminals and state-sponsored agents. Therefore, these organizations and countries spend more resources analyzing cybercrimes instead of preventing and detecting cybercrimes. The use of network forensics plays an important role in investigating cybercrimes; this is because most cybercrimes are committed via computer networks. This paper proposes a new approach to analyzing digital evidence in Nigeria using a proactive method of forensics with the help of deep learning algorithms - Convolutional Neural Networks (CNN) to proactively classify malicious packets from genuine packets and log them as they occur.

Author(s):  
Manish Gupta ◽  
Pradeep Kumar KB ◽  
H. R. Rao

Internet banking has become the preferred channel for conducting banking activities across globe and amongst all social demographics. Only a few other technological adoptions can compare with the recent trend of use of Internet banking facilities. Given the cost advantages and benefits it has to offer, it is widely touted as a win-win strategy for both banks and customers. However, with the growth in E-banking services and reliance on a public channel–Internet–to conduct business, it has been challenging for banks to ensure integrity and confidentiality of highly sensitive information. This chapter presents an overview of authentication issues and challenges in the online banking area with analysis on some of the better approaches. The chapter compares different authentication methods and discusses ensuing issues. The chapter will be invaluable for managers and professionals in understanding the current authentication landscape.


2021 ◽  
pp. 104063872110214
Author(s):  
Deepanker Tewari ◽  
David Steward ◽  
Melinda Fasnacht ◽  
Julia Livengood

Chronic wasting disease (CWD) is a prion-mediated, transmissible disease of cervids, including deer ( Odocoileus spp.), which is characterized by spongiform encephalopathy and death of the prion-infected animals. Official surveillance in the United States using immunohistochemistry (IHC) and ELISA entails the laborious collection of lymphoid and/or brainstem tissue after death. New, highly sensitive prion detection methods, such as real-time quaking-induced conversion (RT-QuIC), have shown promise in detecting abnormal prions from both antemortem and postmortem specimens. We compared RT-QuIC with ELISA and IHC for CWD detection utilizing deer retropharyngeal lymph node (RLN) tissues in a diagnostic laboratory setting. The RLNs were collected postmortem from hunter-harvested animals. RT-QuIC showed 100% sensitivity and specificity for 50 deer RLN (35 positive by both IHC and ELISA, 15 negative) included in our study. All deer were also genotyped for PRNP polymorphism. Most deer were homozygous at codons 95, 96, 116, and 226 (QQ/GG/AA/QQ genotype, with frequency 0.86), which are the codons implicated in disease susceptibility. Heterozygosity was noticed in Pennsylvania deer, albeit at a very low frequency, for codons 95GS (0.06) and 96QH (0.08), but deer with these genotypes were still found to be CWD prion-infected.


Agriculture ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 486
Author(s):  
Terence J. Centner

The development of synthetic pesticides has provided new tools for addressing troublesome pests. A review of parts of the registration process for pesticides in the United States identifies an outdated evaluation system that undervalues health damages. Registration fails to adequately consider co‑formulants and effects of exposure to multiple chemicals. Frustration with failures to protect people and property from damages accompanying pesticide usage has led injured plaintiffs to resort to tort lawsuits to secure relief. However, litigation involves compensating injured persons after they are injured rather than preventing injury. A more proactive approach would be to prevent situations that injure people. This paper offers four ideas to reduce health damages accompanying pesticide usage. Slight adjustments to pesticide registration requirements can offer greater protection for people’s health.


Author(s):  
Samantha Emma Sarles ◽  
Edward C. Hensel ◽  
Risa J. Robinson

The popularity of electronic cigarettes in the United States and around the world has led to a startling rise in youth nicotine use. The Juul® e-cigarette was introduced in the U.S. market in 2015 and had captured approximately 13% of the U.S. market by 2017. Unlike many other contemporary electronic cigarette companies, the founders behind the Juul® e-cigarette approached their product launch like a traditional high-tech start-up company, not like a tobacco company. This article presents a case study of Juul’s corporate and product development history in the context of US regulatory actions. The objective of this article is to demonstrate the value of government-curated archives as leading indicators which can (a) provide insight into emergent technologies and (b) inform emergent regulatory science research questions. A variety of sources were used to gather data about the Juul® e-cigarette and the corporations that surround it. Sources included government agencies, published academic literature, non-profit organizations, corporate and retail websites, and the popular press. Data were disambiguated, authenticated, and categorized prior to being placed on a timeline of events. A timeline of four significant milestones, nineteen corporate filings and events, twelve US regulatory actions, sixty-four patent applications, eighty-seven trademark applications, twenty-three design patents and thirty-two utility patents related to Juul Labs and its associates is presented, spanning the years 2004 through 2020. This work demonstrates the probative value of findings from patent, trademark, and SEC filing literature in establishing a premise for emergent regulatory science research questions which may not yet be supported by traditional archival research literature. The methods presented here can be used to identify key aspects of emerging technologies before products actually enter the market; this shifting policy formulation and problem identification from a paradigm of being reactive in favor of becoming proactive. Such a proactive approach may permit anticipatory regulatory science research and ultimately shorten the elapsed time between market technology innovation and regulatory response.


Author(s):  
Bruno Verdini Trejo

Explains how the United States and Mexico negotiators were able to shift their approaches, taking a series of steps outside the typical inter-agency and diplomatic protocols. Building Trust by Sharing Information demonstrates the innovative data sharing ways the two sides relied on to exchange sensitive information, without giving up confidential components, which in turn empowered the two countries to get their energy, technical and political experts on the same page. Analyzing Precedents to Define a Roadmap illustrates how Mexico prepared for the negotiation process by evaluating international examples of transboundary hydrocarbon reservoir agreements, which allowed them to devise a set of alternatives for consideration. Switching From an Adversarial to a Mutual Gains Approach presents the genesis of the innovative suggestion by the lead U.S. negotiator to set up binational working group sessions, discarding the typical draft-counter-draft strategy that pervades and drags down so many diplomatic negotiations.


Author(s):  
Champika K. Soysa ◽  
Jennifer M. Gardner

The authors examined social capital, self-esteem, popularity, need for accessibility to friends, and stress as gendered predictors of cyber technology use in 149 undergraduates. The authors investigated four kinds of cyber technology use: social networking, texting, internet surfing, and MP3 player listening. Stress was the most consistent predictor of cyber technology use in men (social networking, texting, and MP3 player listening), while popularity was the most consistent for women (social networking, texting, and MP3 player listening). Furthermore, self-esteem inversely predicted use of internet surfing in men and MP3 player listening in women. On the other hand, the social capital dimension of bridging online which is establishing weak social ties, predicted the use of both internet surfing and MP3 player listening in men and women. The authors extended the literature by establishing gendered social-cognitive dimensions of cyber technology use among undergraduates in the United States.


Cyber Crime ◽  
2013 ◽  
pp. 1314-1327
Author(s):  
Ross Wolf ◽  
Ronnie Korosec

E-government involves governments at all levels using advanced technology and communication tools to provide services, allow for transactions, and respond to citizen’s needs and requests. This on-line version of government, which is designed to enhance efficiency and improve operations, relies heavily on a network of data structures that are currently in place. While much has been written about e-government, few studies exist that link the concepts of e-government and security with individual rights and government responsibility. Now more than ever, progressive changes in technology allow public and private sector entities to routinely collect, store, and disseminate large files of personal information about the citizens and clients they interact with. The power associated with the magnitude of this information requires great responsibility and accountability. This chapter is a beginning point to discuss how governments in the United States attempt to maintain secure fortresses of data, limit the dissemination of sensitive information to unauthorized parties, and ensure on line privacy for citizens.


Author(s):  
Stephen K. Aikins

The modern network and Internet security vulnerabilities expose state and local government networks to numerous threats such as denial of service (DoS) attacks, computer viruses, unauthorized access, confidentiality breaches, and so forth. For example, in June 2005, the state of Delaware saw a spike of 141,000 instances of “suspicious activity” due to a variant of the mytopb worm, which could have brought the state’s network to its knees had appropriate steps not been taken (Jarrett, 2005; National Association of State Chief Information Officers [NASCIO], 2006b). On an average day, the state of Michigan blocks 22,059 spam e-mails, 21,702 e-mail viruses, 4,239 Web defacements, and six remote computer takeover attempts. Delaware fends off nearly 3,000 attempts at entering the state’s network daily (NASCIO, 2006b). Governments have the obligation to manage their information security risks by securing mission- critical internal resources such as financial records and taxpayer sensitive information on their networks. Consequently, public-sector information security officers are faced with the challenge to contain damage from compromised systems, prevent internally and Internet-launched attacks, provide systems for logging and intrusion detection, and build frameworks for administrators to securely manage government networks (Oxlenhandler, 2003). This chapter discusses some of the cost-effective measures needed to address government agency information security vulnerabilities and related threats.


Sign in / Sign up

Export Citation Format

Share Document