Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The rapidly growing presence of Internet of Things (IoT) devices is becoming a continuously alluring playground for malicious actors who try to harness their vast numbers and diverse locations. One of their primary goals is to assemble botnets that can serve their nefarious purposes, ranging from Denial of Service (DoS) to spam and advertisement fraud. The most recent example that highlights the severity...
Darknet resources are mined for their data in order to provide possible cyber threat intelligence to network operators. Network operators, however, often have limited resources with which to search the darknet for threats. Previous work in this area has failed to address this use case instead focusing on sales volumes, vendor characteristics, and identifying the sale of zero day exploits. In this...
The Internet of Things (IoT) revolution promises to make our lives easier by providing cheap and always connected smart embedded devices, which can interact on the Internet and create added values for human needs. But all that glitters is not gold. Indeed, the other side of the coin is that, from a security perspective, this IoT revolution represents a potential disaster. This plethora of IoT devices...
In the estimated $2.1 trillion enterprise of cyber-crime, 95% of threats are attributed to human errors. Most of these errors concern infected attachments or following URLs to infected websites. This paper provides a low-cost solution that uses semi-automated trusted software publisher whitelisting to make it theoretically impossible for current-day malware to execute directly on Windows 10 and Windows...
This paper tries to shed more light on Mirai malware, with an aim to facilitate its easier detection and prevention. This malware was used in several recent high profile DDoS attacks. Mirai is used to create and control botnet of IoT devices. The code of this malware is analysed and explanation of its parts provided. Virtual environment for dynamic analysis of Mirai is created. Special settings that...
Control systems of critical infrastructures are not able to avoid dealing with some security incidents caused by cyberattacks, such as malware infection and information. It is insufficient to apply existing information security countermeasures to control systems and then we need security concept specific to control systems because there exists gaps between information and control system security policies...
Industries, people's activities and urban infrastructure rely more and more on "Internet of Things" (IoT) devices for all kinds of activities and operations. Although securing a computer network has always been a difficult task, it transmutes into a massive challenge with the exponentially-growing network size and heterogenity in these systems. A recent example in that vein is a major security...
In this work, we introduce the notion of quality of indicators (QoI) for assessing contribution of participants in information sharing for threat intelligence. We exemplify this notion through various metrics, including correctness, relevance, utility, and uniqueness of indicators. We conducted an empirical study using a benchmark to define quality metrics, and were able to unveil various interesting...
Governments in the MEA did not take cyberwarfare seriously a few years ago. Nowadays, there is a shift to a more concerned posture on the subject of cyber security after a series of public revelations of networks being penetrated around the region. The struggle unpacked by the Stuxnet malware in 2009 and then pursued through Duqu, Flame, Shamoon, Gauss, Duqu2.0, Shamoon 2.0 and Stonedrill malware...
Digital economy is strengthening in prominence and relevance in the era of digital transformation. The economic opportunity and growth of nations are dependent on the digital world, as world community increasingly connected in the cyberspace. The boom in digital economy is coupled with cyber risks and cyber threats for nations. National cybersecurity strategy (NCSS) is an essential element as cybersecurity...
Distributed Denial of Service (DDoS) attacks are some of the most persistent threats on the Internet today. The evolution of DDoS attacks calls for an in-depth analysis of those attacks. A better understanding of the attackers’ behavior can provide insights to unveil patterns and strategies utilized by attackers. The prior art on the attackers’ behavior analysis often falls in two aspects: it assumes...
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. OpenStack lets users deploy virtual machines and other instances which handle different tasks for managing a cloud environment. A cloud usually possesses profound resources, and has full control and dynamic allocation capability of its resources. Cloud offers us the...
In a variety of Network-based Intrusion Detection System (NIDS) applications, one desires to detect groups of unknown attack (e.g., botnet) packet-flows, with a group potentially manifesting its atypicality (relative to a known reference “normal”/null model) on a low-dimensional subset of the full measured set of features used by the IDS. What makes this anomaly detection problem quite challenging...
A substantive prerequisite for the development of any industry, organization, or institute is nothing but the big data. Big data comprises numerous maneuvers for its production, warehousing, and utilization. Security vulnerability comes into existence from the scratch of a collection of the big data and parallel exists till the end. Security of the data is quite essential since its effluence may incorporate...
Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid...
With the advent of the Internet of Things (IoT), privacy and security of sensitive data has become a major concern. In general, sensors which are the enablers for IoT, send the sensed data to a cloud database over the internet. The communication to the cloud database may be compromised by an adversary, or the database maybe accessed by a curious database administrator, thereby raising security concerns...
To assess cybersecurity capabilities in developing countries, governments need to develop a social influence strategy. The main aim is to explore the social influence in the cyberworld and its ability to improve the cybersecurity capabilities in cyberspace' users. Developing countries are from the most source and target of cybercrime in the world, however, their poor infrastructures make them as an...
While the power of social media on the Internet is undeniable, it has become a major weapon for launching cyberattacks against an organization and its people. Today, there is a growing number of cyberattacks being launched through social media such as posting of false content from hacked accounts, posting malicious URLs to spread malware, and others. In this paper, we present a simple and flexible...
Cybercrimes today are focused over returns, especially in the form of monetary returns. In this paper - through a literature study and conducting interviews for the people victimized by ransomware and a survey with random set of victimized and non-victimized by ransomware - conclusions about the dependence of ransomware on demographics like age and education areshown. Increasing threats due to ease...
Since our last paper, cyber attacks have shown no evidence of declining in frequency or sophistication. We claim that applying isolation zones is an effective way to defend cyber systems; our team proposes a simulation and mathematical model that provide numerical data that supports this claim. This paper extends our earlier cyber zone defense (CZD) framework in two critical ways. First, we relax...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.