1,167 research outputs found

    Distributed reflection denial of service attack: A critical review

    Get PDF
    As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks

    PENERAPAN EVIL TWIN DETEKTOR DALAM PENDETEKSIAN PENGGANGGU JARINGAN NIRKABEL PADA USER

    Get PDF
    Nowadays, wireless networking facilities are provided in public places such as fast food restaurant, airports, hotels, campuses and are an attraction for users to use them. The wireless network provided uses an open authentication system and web-based authentication as the second layer used by customers to identify themselves according to the service they have before they can connect to the internet or WiFi Hotspot is a frequently used name. However, unnoticed by the user, it can be utilized by parties who are not entitled to attack and disturb. One of the attacks on wireless networks is the evil twin attack, given the ease in creating it by only duplicating the existing wireless network configuration and forcing users to move to the evil twin network because the installation tends to be closer to the victim's location. Administrator-based detection is one solution that is implemented but has a dependency on the availability of network administrators and supporting devices. To assist users in detecting disturbances, this research proposed client-based evil twin detection that utilizes Medium Access Control (MAC) address data and automatic configuration information provided by a Dynamic Host Configuration Protocol (DHCP) server on a wireless network. Shell programming on the Linux operating system is used to implement the solution. Keywords: Evil Twin Attack, Hotspot WiFi, WiFi Securit

    Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach

    Get PDF
    Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet access and providers draw new prospective customers. While users are able to enjoy the ease of Wi-Fi Internet hotspot networks in public more conveniently, they are more susceptible to a particular type of fraud and identify theft, referred to as evil twin attack (ETA). Through setting up an ETA, an attacker can intercept sensitive data such as passwords or credit card information by snooping into the communication links. Since the objective of free open (unencrypted) public Wi-Fi hotspots is to provide ease of accessibility and to entice customers, no security mechanisms are in place. The public’s lack of awareness of the security threat posed by free open public Wi-Fi hotspots makes this problem even more heinous. Client-side systems to help wireless users detect and protect themselves from evil twin attacks in public Wi-Fi hotspots are in great need. In this dissertation report, the author explored the problem of the need for client-side detection systems that will allow wireless users to help protect their data from evil twin attacks while using free open public Wi-Fi. The client-side evil twin attack detection system constructed as part of this dissertation linked the gap between the need for wireless security in free open public Wi-Fi hotspots and limitations in existing client-side evil twin attack detection solutions. Based on design science research (DSR) literature, Hevner’s seven guidelines of DSR, Peffer’s design science research methodology (DSRM), Gregor’s IS design theory, and Hossen & Wenyuan’s (2014) study evaluation methodology, the author developed design principles, procedures and specifications to guide the construction, implementation, and evaluation of a prototype client-side evil twin attack detection artifact. The client-side evil twin attack detection system was evaluated in a hotel public Wi-Fi environment. The goal of this research was to develop a more effective, efficient, and practical client-side detection system for wireless users to independently detect and protect themselves from mobile evil twin attacks while using free open public Wi-Fi hotspots. The experimental results showed that client-side evil twin attack detection system can effectively detect and protect users from mobile evil twin AP attacks in public Wi-Fi hotspots in various real-world scenarios despite time delay caused by many factors

    Darma: Defeating And Reconnaissance Manna-Karma Attacks In 802.11 With Multiple Detections And Prevention

    Get PDF
    The vast growing usage of mobile phones increases Wi-Fi technology. At present, the pattern of human interaction with the internet is not a desktop or laptop anymore. The assimilation of tools for surfing, working, and communication is now shifting to mobile phones. Thus, this is the motivation to expand Wi-Fi technology so that it will be the primary medium for internet connectivity. Hence, increasing the security risk for it attracts attackers despite its popularity among users. The DOS attack in 802.11 management frames is widely known as an initial process before Man-in-the-middle (MiTM) attacks in 802.11 takes part. Karma and Manna's attacks are an unprecedented attack in the 802.11 management frames. This paper proposed a mechanism called Defeating and Reconnaissance Manna-karma Attack (DARMA), which is client-side multiple detection techniques to defeat and prevent karma-manna attack. The proposed mechanism consisted of 4 layers of processes inclusive of monitors, detection, confirmation, and preventions. The effectiveness of the detection is base of the current real-time behaviour of the packets

    How to humiliate and shame: A reporter's guide to the power of the mugshot

    Get PDF
    This is an Author's Accepted Manuscript of an article published in Social Semiotics, 24(1), 56-87, 2014, copyright Taylor & Francis, available online at: http://www.tandfonline.com/The judicial photograph – the “mugshot” – is a ubiquitous and instantly recognisable form, appearing in the news media, on the internet, on book covers, law enforcement noticeboards and in many other mediums. This essay attempts to situate the mugshot in a historical and theoretical context to explain the explicit and implicit meaning of the genre as it has developed, focussing in particular on their use in the UK media in late modernity. The analysis is based on the author's reflexive practice as a journalist covering crime in the national news media for 30 years and who has used mugshots to illustrate stories for their explicit and specific content. The author argues that the visual limitations of the standardised “head and shoulders” format of the mugshot make it a robust subject for analysing the changing meaning of images over time. With little variation in the image format, arguments for certain accreted layers of signification are easier to make. Within a few years of the first appearance of the mugshot form in the mid-19th century, it was adopted and adapted as a research tool by scientists and criminologists. While the positivist scientists claimed empirical objectivity we can now see that mugshots played a part in the construction of subjective notions of “the other”, “the lesser” or “sub-human” on the grounds of class, race and religion. These dehumanising ideas later informed the theorists and bureaucrats of National Socialist ideology from the 1920s to 1940s. The author concludes that once again the mugshot has become, in certain parts of the media, a signifier widely used to exclude or deride certain groups. In late modernity, the part of the media that most use mugshots – the tabloid press and increasingly tabloid TV – is part of a neo-liberal process that, in a conscious commercial appeal to the paying audience, seeks to separate rather than unify wider society

    Advanced detection of rogue access point in wireless networks

    Get PDF
    CĂ­lem bakaláƙskĂ© prĂĄce je seznĂĄmit se s dostupnĂœmi moĆŸnostmi realizace Rogue Access Point(RAP) a detekčnĂ­mi metodami, slouĆŸĂ­cĂ­mi k odhalenĂ­ takovĂœch bodĆŻ ze strany klienta nebo serveru a z principu nastudovanĂœch metod vytvoƙit detekčnĂ­ metodu, schopnou odhalit rĆŻznĂ© typy Evil Twin(ET). ZabĂœvĂĄ se implementacĂ­ detekčnĂ­ metody zaloĆŸenĂœch na vlastnostech TCP spojenĂ­ a metody sledujĂ­cĂ­ datovĂ© rĂĄmce, konkrĂ©tně jejich pƙíchozĂ­ čas, specifickou dĂ©lku a zdrojovou i cĂ­lovou MAC adresu. SpojenĂ­m vlastnostĂ­ těchto metod vznikla vĆĄestrannĂĄ detekčnĂ­ metoda na straně klienta, kterĂĄ je otestovĂĄna na experimentĂĄlnĂ­ sĂ­ti.The aim of the bachelor’s thesis is to get acquainted with the available implementation options of Rogue Access Point (RAP) and the detection methods used to detect such points from the side of the client or server, and from the principles of the studied methods implement a solution that is able to detect various types of the Evil Twin (ET). The thesis covers implementation of detection methods based on TCP connection properties and a method monitoring data frames, specifically their arrival time, specific length and source and destination MAC address. Connection of these methods creates an universal detection methods on the client’s side that is tested on the experimental network.

    Cultures of Compliance

    Get PDF
    There has been a cultural turn in discussion and debates about the promise of corporate compliance efforts. These efforts are occurring quickly, without great confidence in their efficacy. Thus the interest in culture. This article explores what a culture of compliance means and why it is so hard to achieve. The dark side that enables non-compliance in organizations is powerful and often hidden from view, working via scripts that rationalize or normalize, denigrations of regulation, and celebrations of beliefs and attitudes that bring with them compliance dangers. The article addresses how both culture and compliance should be judged by those wishing for better corporate behavior

    Ransomware: A New Era of Digital Terrorism

    Get PDF
    This work entails the study of ten nasty ransomwares to reveal out the analytical similarities and differences among them, which will help in understanding the mindset of cyber crooks crawling over the dark net. It also reviews the traps used by ransomware for its distribution and side by side examining the new possibilities of its dispersal. It conclude by divulging inter-relationship between various distribution approaches adopted by ransomwares and some attentive measures to hinder the ransomware and supporting alertness as ultimate tool of defense at user’s hand
    • 

    corecore