561 research outputs found
DDoS: DeepDefence and Machine Learning for identifying attacks
Distributed Denial of Service (DDoS) attacks are very common type of
computer attack in the world of internet today. Automatically detecting such type of
DDoS attack packets & dropping them before passing through the network is the best
prevention method. Conventional solution only monitors and provide the feedforward
solution instead of the feedback machine-based learning. A Design of Deep neural
network has been suggested in this work and developments have been made on
proactive detection of attacks. In this approach, high level features are extracted for
representation and inference of the dataset. Experiment has been conducted based on
the ISCX dataset published in year 2017,2018 and CICDDoS2019 and program has
been developed in Matlab R17b, utilizing Wireshark for features extraction from the
datasets.
Network Intrusion attacks on critical oil and gas industrial installation become
common nowadays, which in turn bring down the giant industrial sites to standstill and
suffer financial impacts. This has made the production companies to started investing
millions of dollars revenue to protect their critical infrastructure with such attacks with
the active and passive solutions available. Our thesis constitutes a contribution to such
domain, focusing mainly on security of industrial network, impersonation and attacking
with DDoS
Resource Allocation in Networking and Computing Systems: A Security and Dependability Perspective
In recent years, there has been a trend to integrate networking and computing systems, whose management is getting increasingly complex. Resource allocation is one of the crucial aspects of managing such systems and is affected by this increased complexity. Resource allocation strategies aim to effectively maximize performance, system utilization, and profit by considering virtualization technologies, heterogeneous resources, context awareness, and other features. In such complex scenario, security and dependability are vital concerns that need to be considered in future computing and networking systems in order to provide the future advanced services, such as mission-critical applications. This paper provides a comprehensive survey of existing literature that considers security and dependability for resource allocation in computing and networking systems. The current research works are categorized by considering the allocated type of resources for different technologies, scenarios, issues, attributes, and solutions. The paper presents the research works on resource allocation that includes security and dependability, both singularly and jointly. The future research directions on resource allocation are also discussed. The paper shows how there are only a few works that, even singularly, consider security and dependability in resource allocation in the future computing and networking systems and highlights the importance of jointly considering security and dependability and the need for intelligent, adaptive and robust solutions. This paper aims to help the researchers effectively consider security and dependability in future networking and computing systems.publishedVersio
CNA Tactics and Techniques: A Structure Proposal
[EN] Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation activities (CNE), those related to intelligence gathering. While in CNE operations the main tactics and techniques are defined and well structured, in CNA there is a lack of such consensuated approaches. This situation hinders the modeling of threat actors, which prevents an accurate definition of control to identify and to neutralize malicious activities. In this paper, we propose the first global approach for CNA operations that can be used to map real-world activities. The proposal significantly reduces the amount of effort need to identify, analyze, and neutralize advanced threat actors targeting cyber physical systems. It follows a logical structure that can be easy to expand and adapt.Villalón-Huerta, A.; Ripoll-Ripoll, I.; Marco-Gisbert, H. (2021). CNA Tactics and Techniques: A Structure Proposal. Journal of Sensor and Actuator Networks. 10(1):1-23. https://doi.org/10.3390/jsan10010014S12310
- …