The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Identity theft has been known for some centuries whereby falsified identity documents were misused as well as offences such as impersonating others were common in the society. However, the advent of technology changed the method used for conducting this crime, whereby through the use of the Internet, personal information is can be stolen and misused by criminals. The crime has its causes originating...
Computer and Internet technology has become a vital part of a daily life for many as it has brought many enhancements to the quality of many individuals' lives. Although advances in computer and Internet technology are utilised by many people for various respectable reasons, at the same time it has become a tool in the hands of cybercriminals for various nefarious reasons. Cybercrime has become a...
Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet...
Almost the whole information that belongs to Goverment or private sector, Corporate or individual has been digitized currently. The computers which keep digitized information provides to use those information properly via applications such as database and web services. If necessary precautions hadn't been taken at individual or corporate level in both configuring network and applications, ‘your information...
Recent advances in Cyber-Physical Systems (CPSs) promote the Internet as the main communication technology for monitoring, controlling and managing the physical entities as well as exchanging information between the physical entities and human users. On the other hand, the Internet introduces a variety of vulnerabilities that may put the security and privacy of CPSs under risk. The consequences of...
Distributed denial of service attacks pose an immense threat to the internet. In this work TCP SYN flood attacks are detected using matching pursuit algorithm. Dictionaries are generated using K-SVD algorithm from normal and attack traffic of training data. Using these dictionaries and applying matching pursuit algorithm detection of attacks are performed pursing resulting residuals of matching pursuit...
Phishing is a network type attack where the attacker creates the fake of an existing webpage to fool an online user into elicit personal Information. The prime objective of this review is to do literature survey on social engineering attack: Phishing attack and techniques to detect attack. Phishing is the combination of social engineering and technical methods to convince the user to reveal their...
Measuring the instability of IP prefixes in BGP is critical for network operation and management. In particular, identifying and investigating the most active prefixes assist in detecting, analyzing, and understanding network problems. The traditional metric to assess the activeness of a prefix is the quantity of BGP update. However, this metric may be strongly affected by monitor-local events: the...
Tracing IP packets to their sources, known as IP-Traceback, is a critical task in defending against IP spoofing and DoS attacks. There are several solutions to traceback to the origin of the attack. However, all these solutions require either all routers or ISPs to support the same IP-Traceback mechanism. To address this limitation, we propose an IP-Traceback approach at the level of autonomous systems,...
Distributed Denial of Service (DDoS) flooding attacks are one of the biggest challenges to the availability of online services today. These DDoS attacks overwhelm the victim with huge volume of traffic and render it incapable of performing normal communication or crashes it completely. If there are delays in detecting the flooding attacks, nothing much can be done except to manually disconnect the...
IP Telephony or simply Voice over IP (VoIP) is technology that enables real time voice communications over packet switched networks using TCP/IP. This technology is booming and its deployment is very complex. VoIP is often deployed in an open environment; therefore, it is subject to the same threats, e.g., denial-of-service attacks (DoS), frequently seen on the Internet. Given this, our first objective...
The world is facing a lot of issues related to cyber crime. The technology has developed and it should be used for a constructive purpose. But the technology is being used for destructive purpose and hence we can see a lot of cyber crime victims. As per the data collected in the past years the cyber crime in the globe has increased to a great extent and the persons committing the crime are using technology...
Looking at cyber war, cyber threat becomes the pitfall as the threats are what that results in a war at a level so big that can shake the political activities. Often the threats are misunderstood or not looked carefully at. Cyber-attacks extracts confidential data at macro and micro level. It's about the advanced threats that are emerging now days in the form of codes and we focus upon the future...
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers with simple attacks to cause denial of service. We proposed a defense mechanism based on a proof-of-work protocol. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of...
Cardinality in network flow data gives useful information for network administrators about suspicious communication on their network. Such communication tends to present abnormal number of source and/or destination network address. Our research group reported that cardinality presented in TCP/IP packet header can be used to detect malware propagation and P2P software usage in small size network. However...
The case of Critical Infrastructures (CIs), and especially Cyber-Physical CIs, which nowadays rely on computers and the Internet for their operation, is an important research area. Decentralized Critical Infrastructure management systems play a key role in reducing costs and improving the quality of service of industrial processes, but also they introduce various security vulnerabilities. In this...
The number of devices connected to computer networks is increasing daily, and so is the number of network-based attacks. A honeypot is a system trap that is set to act against unauthorised use of information systems. The objective of this study was to survey the emergent trends in extant honeypot research with the aims of contributing to the knowledge gaps in the honeypot environment. The relevant...
The network traffics of Denial of Service (DoS) rise in large scale. Adaptive detection technologies for large-scale DoS network behaviors are needed urgently. For the above, a detection method for large-scale DoS behaviors based on Artificial Immune System is proposed in this paper. The feature collection technology is used to efficiently capture large-scale network data. Network features are analyzed...
Network Security has become one of the most important factors to consider as the Internet evolves. The most important attack which affects the availability of service is Distributed Denial of Service. The service disruption may cause substantial financial loss as well as damage to the concerned network system. The traffic patterns exhibited by the DDoS affected traffic can be effectively captured...
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks. By this study we aim to explore and comprehend the current state of these attacks. Focusing on the Indian Autonomous System...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.