4 research outputs found

    Deployment of DeepTech AI Models in Engineering Solutions

    Get PDF
    Ponencia presentada en ICRAMAE-2k21, International Conference on Recent Advances in Mechanical and Automation Engineering, Vivekananda Global University, Jaipur, India, 29-30th November 2021[EN]Industrial Engineering is a branch of engineering that focuses on the design and operation of industrial processes. It involves the application of science to the construction of production systems. This field has undergone significant advancements over the last decades. In the last centuries, the emergence of different technologies has led to breakthroughs in engineering, making it possible to automate processes in industries. Steam, electricity, the internet, and now Artificial Intelligence technologies have all brought with them greater levels of automation to machinery, gradually decreasing human involvement in processes such as procurement, raw material handling, manufacturing and quality control

    GUIDE FOR THE COLLECTION OF INSTRUSION DATA FOR MALWARE ANALYSIS AND DETECTION IN THE BUILD AND DEPLOYMENT PHASE

    Get PDF
    During the COVID-19 pandemic, when most businesses were not equipped for remote work and cloud computing, we saw a significant surge in ransomware attacks. This study aims to utilize machine learning and artificial intelligence to prevent known and unknown malware threats from being exploited by threat actors when developers build and deploy applications to the cloud. This study demonstrated an experimental quantitative research design using Aqua. The experiment\u27s sample is a Docker image. Aqua checked the Docker image for malware, sensitive data, Critical/High vulnerabilities, misconfiguration, and OSS license. The data collection approach is experimental. Our analysis of the experiment demonstrated how unapproved images were prevented from running anywhere in our environment based on known vulnerabilities, embedded secrets, OSS licensing, dynamic threat analysis, and secure image configuration. In addition to the experiment, the forensic data collected in the build and deployment phase are exploitable vulnerability, Critical/High Vulnerability Score, Misconfiguration, Sensitive Data, and Root User (Super User). Since Aqua generates a detailed audit record for every event during risk assessment and runtime, we viewed two events on the Audit page for our experiment. One of the events caused an alert due to two failed controls (Vulnerability Score, Super User), and the other was a successful event meaning that the image is secure to deploy in the production environment. The primary finding for our study is the forensic data associated with the two events on the Audit page in Aqua. In addition, Aqua validated our security controls and runtime policies based on the forensic data with both events on the Audit page. Finally, the study’s conclusions will mitigate the likelihood that organizations will fall victim to ransomware by mitigating and preventing the total damage caused by a malware attack

    Analysis of System Performance Metrics Towards the Detection of Cryptojacking in IOT Devices

    Get PDF
    This single-case mechanism study examined the effects of cryptojacking on Internet of Things (IoT) device performance metrics. Cryptojacking is a cyber-threat that involves stealing the computational resources of devices belonging to others to generate cryptocurrencies. The resources primarily include the processing cycles of devices and the additional electricity needed to power this additional load. The literature surveyed showed that cryptojacking has been gaining in popularity and is now one of the top cyberthreats. Cryptocurrencies offer anyone more freedom and anonymity than dealing with traditional financial institutions which make them especially attractive to cybercriminals. Other reasons for the increasing popularity of cryptojacking include a large number of vulnerable devices, the low cost to implement, minimal to no expertise required, and the low risk of getting caught or prosecuted. Internet connected devices are becoming increasingly popular and commonplace. Many of these devices also are inherently insecure and make great targets of threat actors. Although many of these devices are low powered, the sheer number of available devices make up for the lack of processing power. Future research could expand on this study by incorporating machine learning, virtualization, live cryptojacking malware samples, or a combination of those items

    Infrastructure as Code Strategies and Benefits in Cloud Computing

    Get PDF
    Hybrid and multicloud infrastructure implementation without automation and versioning strategy can negatively impact organizations’ productivity. Organization leaders must ensure that infrastructures are implemented using the infrastructure as code (IaC) strategy because implementation solutions, including automated and DevOps procedures, provide assets for repeatable infrastructure implementation use cases. Grounded in the disruptive innovation theory, the purpose of this qualitative pragmatic inquiry study was to explore strategies solution architects use to implement IaC architecture using repeatable assets with DevOps procedures in cloud computing. The participants were seven solution architects in the information technology (IT) industry within the United States who have successfully implemented IaC in hybrid and multicloud within the past 3 years in cloud computing with DevOps procedures. Data were collected using semi-structured interviews, a focus group, and IT industry documents. The data analysis processes were analyzed using thematic analysis Eight themes emerged: IaC benefits, IaC cloud computing models, IaC cloud service providers, IaC configuration best practices, IaC DevOps practices, IaC implementation tools, IaC Kubernetes platforms, and IT infrastructure design practices. A specific recommendation is for organizational leaders to implement the IaC approach as it offers sustaining and disruptive innovation benefits, in addition, space agencies such as the National Aeronautics and Space Administration (NASA), European Space Agency (ESA), et al., could use this study in their mission infrastructures. The implications for positive social change include the potential to make the user application offerings affordable as it supports IT innovation in hybrid and multicloud globally
    corecore