security gap
Recently Published Documents


TOTAL DOCUMENTS

59
(FIVE YEARS 15)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Vol 1 ◽  
Author(s):  
Lucia Lazarowski ◽  
Alison Simon ◽  
Sarah Krichbaum ◽  
Craig Angle ◽  
Melissa Singletary ◽  
...  

Effective explosives detection requires dogs to generalize their response to untrained variations of targets that are related to those with which they were trained. Previous research suggests that dogs tend to be highly specific to their trained odors, and are sensitive to alterations in odor profiles. Triacetone triperoxide (TATP) is an increasingly popular homemade explosive due to the widespread accessibility of starting materials. The large variety of reagent sources and production approaches yields high variability in deployed formulations. Whether dogs trained with pure forms of TATP generalize to other variations is unknown, representing a potentially significant security gap. In the current study, we tested dogs (n = 11) previously trained to detect pure TATP with four variants: diacetone diperoxide (DADP), a homologue often created as a TATP byproduct, and three different clandestine TATP formulations designed to emulate those used by terrorists or insurgents. On average, dogs detected each untrained variant at rates equivalent to the trained TATP (ps > 0.07), with individual variability in first-trial alerts for some of the variants. Chemical analyses paralleled the canine results, showing distinct similarities and differences. For the TATP samples, the laboratory-grade was the purest sample tested and did not contain DADP or the TATP homologue that the three clandestine versions showed in their respective headspace profiles. The headspace results showed that each sample could be clearly identified as TATP, yet they showed recognizable differences due to their individual syntheses. These findings suggest that training on pure TATP may be effective for generalization to untrained variants. Further research is necessary to identify factors that influence individual variation in generalization between dogs, as well as other explosives.


2021 ◽  
Vol 5 (3) ◽  
pp. 848
Author(s):  
Haeruddin Haeruddin

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.


Author(s):  
Ahmad Syaichul Hadi ◽  
Mochamad Alfan Rosid

This research is purpose to design a virtual machine to simulate cyber attacks and find out how to design and build a virtual machine with a security gap that has been designed, so that it is used as education for web and server developers. The method used in building this system is the waterfall method which starts from designing a system to make it easier to build a system and then collecting data using observations to students of informatics engineering and computer engineering. The results of this system show that the system is able to run well, the guide for working on questions can be understood by the player, the player can inputs flags without problems, the clues provided are understandable and the educational videos provided are easy to understand. From the explanation aboce, the researchers concluded that this system can provide questions and education well


Tech-E ◽  
2021 ◽  
Vol 4 (2) ◽  
pp. 8
Author(s):  
Nahrun Hartono ◽  
Erfina Erfina

Store procedure is a group of query stored in database catalogue which allows it to be recalled. Insert, update and delete data could performed using store procedure. Stored procedure is an alternative to optimize query performance and also to reduce security gap at interface level of a system. This research provides an overview implementation of stored procedure insert, update and deleting in two DBMS, MariaDB and PostgreSQL. Software developers prefer MariaDB and PostgreSQL because it is open-source, which means free. This research is an experimental research and descriptive analysis. This research data uses student data with amount of data 25000, 15000 and 5000 data. Research result show PostgreSQL require less processing time than MariaDB. Results of this research can used as a reference to design application programs which sometimes choose a DBMS is not a concern of developer.


Author(s):  
Mohammed Ahmed Magzoub ◽  
Azlan Abd Aziz ◽  
Mohammed Ahmed Salem ◽  
Hadhrami Ab Ghani ◽  
Azlina Abdul Aziz ◽  
...  

Despite the rapid growth in the market demanding for wireless sensor networks (WSNs), they are far from being secured or efficient. WSNs are vulnerable to malicious attacks and utilize too much power. At the same time, there is a significant increment of the security threats due to the growth of the several applications that employ wireless sensor networks. Therefore, introducing physical layer security is considered to be a promising solution to mitigate the threats. This paper evaluates popular coding techniques like Reed solomon (RS) techniques and scrambled error correcting codes specifically in terms of security gap. The difference between the signal to nose ratio (SNR) of the eavesdropper and the legitimate receiver nodes is defined as the security gap. We investigate the security gap, energy efficiency, and bit error rate between RS and scrambled t-error correcting codes for wireless sensor networks. Lastly, energy efficiency in RS and Bose-Chaudhuri-Hocquenghem (BCH) is also studied. The results of the simulation emphasize that RS technique achieves similar security gap as scrambled error correcting codes. However, the analysis concludes that the computational complexities of the RS is less compared to the scrambled error correcting codes. We also found that BCH code is more energy-efficient than RS.


2020 ◽  
Vol 4 (2) ◽  
pp. 69-76
Author(s):  
Andria Andria

  Abstrak— Website sebagai media informasi dan komunikasi tentunya memiliki peran yang sangat penting. Seiring perkembangannya, tidak bisa dipungkiri bahwa terdapat ancaman terkait dengan celah keamanan dari suatu website. Adanya celah keamanan (bug) pada suatu website tentu memerlukan perhatian serius agar tidak dieksploitasi oleh pihak yang tidak bertanggung jawab. Berdasarkan hal tersebut, tentunya diperlukan adanya upaya preventif diantaranya dengan melakukan analisis terhadap kemungkinan adanya celah keamanan pada suatu website.  Pada penelitian ini, tools yang digunakan adalah WEBPWN3R yang merupakan Web Applications Security Scanner, tool open source ini dapat menganalisa, mendeteksi adanya bug dari suatu website. Pengujian dilakukan menggunakan perangkat komputer bersistem operasi Kali Linux. Penelitian ini bertujuan untuk menganalisa adanya celah keamanan pada suatu website dan membantu administrator atau pengelola web untuk dapat mengetahui adanya kemungkinan celah keamanan pada suatu website, sehingga dapat segera dilakukan perbaikan dengan tepat berdasarkan temuan kerentanan atau celah keamanan yang terdapat pada website tersebut.


Author(s):  
Irmawati Feren Kilwalaga ◽  
Fauzi Dwi Setiawan Sumadi ◽  
Syaifuddin Syaifuddin

Limitations on traditional networks contributed to the development of a new paradigm called Software Defined Network (SDN). The separation of control and data plane provides an advantage as well as a security gap on the SDN network because all controls are centralized on the controller so when the compilation of attacks are directed the controller, the controller will be overburdened and eventually dropped. One of the attacks that can be used is the DDoS attack - ICMP Flood. ICMP Flood is an attack intended to overwhelm the target with a large number of ICMP requests. To overcome this problem, this paper proposes detection and mitigation using the Modern Honey Network (MHN) integration in SDN and then makes reactive applications outside the controller using the entropy method. Entropy is a statistical method used to calculate the randomness level of an incoming packet and use header information as a reference for its calculation. In this study, the variables used are the source of IP, the destination of IP and protocol. The results show that detection and mitigation were successfully carried out with an average value of entropy around 10.830. Moreover, CPU usage either in normal packet delivery or attacks showed insignificant impact from the use of entropy. In addition, it can be concluded that the best data collected in 30 seconds in term of the promptness of mitigation flow installation.


Author(s):  
Keumseok Koh ◽  
Michelle L. Kaiser ◽  
Glennon Sweeney ◽  
Karima Samadi ◽  
Ayaz Hyder

Food insecurity is a leading public health challenge in the United States. In Columbus, Ohio, as in many American cities, there exists a great disparity between Black and White households in relation to food insecurity. This study investigates the degree to which this gap can be attributed to differences in food shopping behavior, neighborhood perception, and socioeconomic characteristics. A Blinder–Oaxaca decomposition method is used to analyze a household survey dataset collected in 2014. We find a 34.2 percent point difference in food security between White and Black households. Variables related to food shopping behavior, neighborhood perception, and socioeconomic characteristics explain 13.8 percent, 11.6 percent, and 63.1 percent of the difference, respectively. These independent variables combined can explain 68.2 percent of the food security gap between White and Black households. Most of this is attributable to socioeconomic variables. Sense of friendship in neighborhood, use of private vehicles, and satisfaction of neighborhood food environment also partially contribute to the food security gap.


2020 ◽  
Vol 9 (1) ◽  
pp. 2214-2218

The Advanced Encryption Standard (AES) algorithm is available in a wide scope of encryption packages and is the single straightforwardly accessible cipher insisted by the National Security Agency (NSA), The Rijndael S-box is a substitution box S-Box assumes a significant job in the AES algorithm security. The quality of S-Box relies upon the plan and mathematical developments. Our paper gives an outline of AES S-Box investigation, the paper finds that algebraic attack is the most security gap of AES S-Box, likewise give a thought regarding distinctive past research to improve the static Sconfines that has been utilized AES, to upgrade the quality of AES Performance by shocking the best S-box.


2020 ◽  
Vol 26 (4) ◽  
pp. 979-1003 ◽  
Author(s):  
Corinne Bara

Existing research shows that peace after civil wars is more stable with peacekeepers present. Yet, violence persists in many postwar contexts, and although postwar violence is often strategic and closely linked to the faultlines of the preceding war, we know little about the impact of peacekeepers on such violence. What we know, moreover, focuses on the former combatants, while this study shows that the majority of deaths in postwar violence are inflicted by other armed actors. This is a challenge for peacekeepers who – for mandate or capacity reasons – usually focus on the warring parties. I argue that the impact of peacekeepers on postwar violence hinges on the extent to which they fill a public security gap after war, since responsibility for violence not covered by a mission’s mandate lies with the often dysfunctional security agencies of the state. To test this I use a novel spatial approach to generate data that captures the manifold manifestations of violence across different postwar contexts. I find that only UN police – with their broader effect on public security – mitigate postwar violence generally. UN troops have some impact on civilian targeting by former combatants but no such effect could be identified for violence by other armed actors. The findings highlight the importance of peacekeeping police at a time when the modus operandi and capacity of UN police have been questioned, but also the importance of accounting for a multitude of violent actors when analysing the impact of international interventions more generally.


Sign in / Sign up

Export Citation Format

Share Document