The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyberization, as a new big trend following computerization and informatization, is the process of forming a new cyberworld and transforming our current physical, social and mental worlds into novel cyber-combined worlds. Cyber science, responding to the cyberization trend, aims to create a new collection of knowledge about these cyber-enabled worlds, and provide a way of discovering what is in the...
To design a secure system we need to understand its possible threats, more specifically we need to understand how the components of the architecture are compromised and used by an attacker in order to fulfill his objectives and how the attack proceeds through these units. We can do this using misuse patterns, an artifact we have introduced in earlier work. Threat modeling of IT systems has been widely...
Owing to the ubiquity of web applications in modern computing, the server software that delivers these applications is an attractive attack vector for would-be malicious actors in cyberspace. Recently, Moving Target Defense (MTD) strategies have grown in popularity in the computer security community because of their ability to enhance resilience and force attackers into uncharacteristic behavior....
Named Data Networking (NDN) is a promising future Internet architecture which retrieves the content using their names. Content names composed of strings separated by '/' are stored in the NDN Forwarding Information Base (FIB) to forward the incoming packets further. To retrieve content through their names poses two main challenges for the NDN FIB: high memory consumption and high lookup time. Therefore,...
This short empirical paper investigates a snapshot of about two million files from a continuously updated big data collection maintained by F-Secure for security intelligence purposes. By further augmenting the snapshot with open data covering about a half of a million files, the paper examines two questions: (a) what is the shape of a probability distribution characterizing the relative share of...
Today, E-Commerce has become the largest revenue generation industry, letting seller sell everything from a pen to plane to the customers across the globe. Over an E-commerce platform where user and vendor merely interact with each other, the trust is undeniably the most important factor for users to perform transactions online. But at the same time it can't be assessed directly using some pre-defined...
Democracy is vital and powerful political source in major countries and for the established and development of democracy, elections are being practiced. Pakistan is a democratic country and still practicing the manual and expensive methods for election. That causes slow procedure, bogus entries, counting errors, misuse of ballot papers, and serious security, accessibility, and reliability faults....
Named data networking (NDN) shifts today's host-centric Internet architecture to a new data-centric network architecture. This well suits the increasingly mobile and information-intensive applications that dominate today's Internet. NDN allows routers to cache named content, leading to a significant improvement of content retrieval which, however, opens a door for many new attacks. In this work, we...
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived for over 30 years and has been an integral part of the Internet revolution. However, due to its limitation, IPv4 is being replacing by IPv6. Today, IPv6 is more and more widely used on the Internet. On the other hand, criminals are also well aware of the introduction of IPv6. They are continuously...
Within the policies of an organization could find the not to allow users to access sites on the Internet for entertainment or social networks, as in the case of production organizations and educational therefore a firewall that is used implemented certain rules based on the policies of the organization, blocks access to certain defined sites while you let others. However as has not been implemented...
The Network Address Translation (NAT) is a mechanism used almost for every user on the internet, primarily to alleviate the exhaustion of IPv4 address space by allowing multiple hosts to share a public/Internet address. The NAT allow to establish TCP communications if the communication start from internal NAT, but does not allow communication if it start from the public internet, external NAT. This...
Phishing is a considerable problem differs from the other security threats such as intrusions and Malware which are based on the technical security holes of the network systems. The weakness point of any network system is its Users. Phishing attacks are targeting these users depending on the trikes of social engineering. Despite there are several ways to carry out these attacks, unfortunately the...
A secure and reliable critical infrastructure is a concern of industry and governments. SCADA systems (Supervisory Control and Data Acquisition) are a subgroup of ICS (Industrial Control Systems) and known to be well interconnected with other networks. It is not uncommon to use public networks as transport route but a rising number of incidents of industrial control systems shows the danger of excessive...
Anonymous communications are growing extremely fast because more and more Internet users employ anony mous systems, such as the I2P or Tor networks, as a way to hide their online activity. Therefore, these networks have been more and more studied, mainly from a security point of view. Different studies have shown important design flaws in these systems that could break users' anonymity and how these...
Spam has been infesting our emails and Web experience for decades; distributing phishing scams, adult/dating scams, rogue security software, ransomware, money laundering and banking scams… the list goes on. Fortunately, in the last few years, user awareness has increased and email spam filters have become more effective, catching over 99% of spam. The downside is that spammers are constantly changing...
Mobile devices — especially smartphones — have gained widespread adoption in recent years, due to the plethora of features they offer. The use of such devices for web browsing and accessing email services is also getting continuously more popular. The same holds true with other more sensitive online activities, such as online shopping, contactless payments, and web banking. However, the security mechanisms...
Currently, the issues for the time being have become complex and diverse in the region, such as the disappearance of the local government by the super aging population is feared. Therefore from being considered as a tool for problem-solving is ICT to progress rapidly, among the information and communication technology such as IOT(internet of things), CPS(cyber physical system), AI(Artificial intelligence),...
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
The upcoming technology where machine to machine communication is possible by deploying the intelligent sensors on machine for smart interaction. Internet of things (IoT) gives a wide scope in many application domains where number of smart gadgets per person is increasing exponentially with time. The automobile sector is also one of the application domain where vehicle can be made intelligent by using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.