The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, millions of physical devices are visible on the Internet through IP addresses, such as wearables, residential routers, cameras and industrial control devices. Users can access and control online devices, while attackers also target them, bringing potential security concerns. In this article, we propose a conceptual framework for discovering, recognizing and managing these online devices at...
Routine Activity Theory (RAT) is used by criminologists to explain the situational factors that influence crime in the physical world. RAT states that crime is most likely when a motivated offender, a vulnerable victim, and a lack of capable guardianship converge. We hypothesize that the time of cybercriminal actions will align with the principles of RAT. We analyzed data from over 20,000 intrusions...
Internet infrastructure is highly distributed among different private and public sector entities. Although networks using Transmission Control Protocol (TCP) are highly resistant to failures — especially when multiple paths from sender to receiver exist - they have the potential to fail if a concentration of high-capacity routes between a particular sender and receiver become unavailable. The geographic...
The process of attackers exploiting the target facilities is always gradual in cyberspace, and multiple attack steps would be performed in order to achieve the ultimate goal. How to identify the attack scenarios is one of the challenges in many research fields, such as cyberspace security situation awareness, the detection of APT (Advanced Persistent Threat) and so on. Alert correlation analysis based...
TCP veto is a detection-resistant variation of the TCP connection hijacking attack. While not limited to SCADA protocols, Modbus TCP, the Ethernet Industrial Protocol (EtherNet/IP), and the Distributed Network Protocol (DNP3) each meet the necessary assumptions of the attack. Experimental results reveal that the integrity of messages transmitted using each of the three SCADA protocols are vulnerable...
An effective approach to gather cyber threat intelligence is to collect and analyze traffic destined to unused Internet addresses known as darknets. In this paper, we elaborate on such capability by profiling darknet data. Such information could generate indicators of cyber threat activity as well as providing in-depth understanding of the nature of its traffic. Particularly, we analyze darknet packets...
Cyberspace intrusion detection systems for new generation of ship use multisensor data fusion in heterogeneous distributed net. to form cyberspace situational awareness. Project elements of grass root models based multisensor data fusion were brought forward, including IDS based Internet and basal data fusion truss. Model of TCP/IP was used to empolder sensor casing model and model of data-base. Commend...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.