proactive security
Recently Published Documents


TOTAL DOCUMENTS

61
(FIVE YEARS 15)

H-INDEX

8
(FIVE YEARS 2)

Author(s):  
Shishir Kumar Shandilya

In recent years, the cyber security scenario has transformed predominantly from conventional response-based security mechanisms to proactive security strategies. And this transformation is still continuing which is shifting it from proactive security strategies to cyber immunity which eliminates the cyber threats by introducing stringent and adaptive security measures. In the process of developing new security algorithms/procedures, accurate modelling and effective simulation play a vital role for the robustness and effectiveness of proposed system. It is also necessary to analyze the behaviour of proposed system against multiple types of known cyber attacks. This paper focuses on the existing network testbeds for an effective analysis and monitoring while proposing a new network testbed for examining new security concepts like cyber immunity. The proposed network testbed is designed to incorporate the methods and procedures of Nature-inspired Cyber Security to accommodate the adaptive responses against the sophisticated and ever-advancing cyber attacks. The proposed testbed provides customizable analytical tool to design, test and examine the new security algorithms through a rich set of attack scenarios. It also allows developers to design, implement, and evaluate their defensive techniques with library support.


2021 ◽  
Vol 11 (4) ◽  
pp. 7483-7488
Author(s):  
M. F. Hyder ◽  
. Waseemullah ◽  
M. U. Farooq ◽  
U. Ahmed ◽  
W. Raza

Static IP addresses make the network vulnerable to different attacks and once the machines are compromised, any sensitive information within the network can be spoofed. Moving Target Defense (MTD) provides an efficient mechanism for proactive security by constantly changing different system attributes. Software Defined Networks (SDNs) provide greater flexibility in designing security solutions due to their centralized management and programming capabilities. In this paper, a mechanism for the protection of endpoint security is developed using IP address host shuffling. In the proposed approach, the real IP address of the host is masked and a virtual IP address is assigned. The virtual IPs are mined from the pool of unassigned IP addresses. The address pool is created using a pseudo-random number generator to guarantee high randomness. This approach helps in invalidating the intelligence gathered by the adversaries through the changes in the network configuration that will disturb attack execution, eventually leading to attack failure. Transparency is attained via preserving the actual IP intact and mapping a virtual IP to it. The proposed solution is implemented using the RYU Controller and Mininet. The efficient results obtained from the experiments substantiate the effectiveness of the MTD approach for enhancing endpoint security.


Author(s):  
Suryadipta Majumdar ◽  
Gagandeep Singh Chawla ◽  
Amir Alimohammadifar ◽  
Taous Madi ◽  
Yosr Jarraya ◽  
...  
Keyword(s):  

2021 ◽  
Vol 20 (2) ◽  
pp. 5-15
Author(s):  
Adam Malatinský ◽  
◽  
Luděk Lukáš

The article deals with proactive ways of fire protection of soft target objects. The first chapter deals with the general characteristics and description of a soft target object. The next chapter focuses on the characteristics and description of a proactive security breach model. The article then characterizes the analysis of fire protection measures. The subsequent chapter deals with proactive methods of fire protection, where the operation of activities in fire protection is divided into several phases. The final chapter focuses on the design and application of specific proactive methods of providing fire protection for a soft target object. Specifically, it is a shopping centre building, where several types of proactive activities are proposed to improve the effectiveness of minimizing the risk of threats in fire protection.


With the fabulous development of air traffic request expected throughout the following two decades, the security of the air transportation framework is of expanding concern. In this paper, we encourage the "proactive security" worldview to expand framework wellbeing with an emphasis on anticipating the seriousness of strange flight occasions as far as their hazard levels. To achieve this objective, a prescient model should be created to look at a wide assortment of potential cases and measure the hazard related with the conceivable result. By using the episode reports accessible in the Aviation Safety Reporting System (ASRS), we construct a half breed model comprising of help vector machine and K-closest neighbor calculation to evaluate the hazard related with the result of each perilous reason. The proposed system is created in four stages. Initially, we classify all the occasions, in view of the degree of hazard related with the occasion result, into five gatherings: high hazard, decently high hazard, medium hazard, respectably medium hazard, and okay. Furthermore, a help vector machine model is utilized to find the connections between the occasion outline in text configuration and occasion result. In this application K-closest neighbors (KNN) and bolster vector machines (SVM) are applied to group the everyday nearby climate types In equal, knn calculation is utilized to highlights and occasion results subsequently improving the forecast. At long last, the forecast on hazard level order is stretched out to occasion level results through a probabilistic choice tree


Significance Older aircraft will be replaced with newer, more fuel-efficient models. These modern aircraft also have increased connectivity, which inevitably increases cybersecurity risks. Impacts US and EU regulators will tighten rules on aircraft system designs and processes to maintain security. Proactive security research will become important in keeping connected aircraft safe through penetration testing. Airframe manufacturers and aerospace systems developers face increased requirements on secure designs.


Sign in / Sign up

Export Citation Format

Share Document