9 research outputs found

    An Event Based Digital Forensic Scheme for Vehicular Networks

    Get PDF
    The software in today's cars has become increasingly important in recent years. The development of high-tech driver assistance devices has helped fuel this movement. This tendency is anticipated to accelerate with the advent of completely autonomous vehicles. As more modern vehicles incorporate software and security-based solutions, "Event-Based digital forensics," the analysis of digital evidence of accidents and warranty claims, has become increasingly significant. The objective of this study is to ascertain, in a realistic setting, whether or not digital forensics can be successfully applied to a state-of-the-art automobile. We did this by dissecting the procedure of automotive forensics, which is used on in-car systems to track the mysterious activity by means of digital evidence. We did this by applying established methods of digital forensics to a state-of-the-art car.Our research employs specialized cameras installed in the study areas and a log of system activity that may be utilized as future digital proof to examine the effectiveness of security checkpoints and other similar technologies. The goal is to keep an eye on the vehicles entering the checkpoint, look into them if there is any reason to suspect anything, and then take the appropriate measures. The problem with analyzing this data is that it is becoming increasingly complex and time-consuming as the amount of data that has been collected keeps growing. In this paper, we outline a high-level methodology for automotive forensics to fill in the blanks, and we put it through its paces on a network simulator in a state-of-the-art vehicle to simulate a scenario in which devices are tampered with while the car is in motion. Here, we test how well the strategy functions. Diagnostics over IP (Diagnostics over IP), on-board diagnostics interface, and unified diagnostic services are all used during implementation. To work, our solution requires vehicles to be able to exchange diagnostic information wirelessly.These results show that it is possible to undertake automotive forensic analysis on state-of-the-art vehicles without using intrusion detection systems or event data recorders, and they lead the way towards a more fruitful future for automotive forensics. The results also show that modern autos are amenable to forensic automotive analysis

    Analisis Keamanan Jaringan Menggunakan Intrusion Prevention System (Ips) Dengan Metode Traffic Behavior

    Get PDF
    Riset ini mengangkat masalah tentang celah keamanan jaringan untuk disusupi oleh peretas jaringan internet, diantaranya yang saat ini diteliti adalah Port Scanning, DDoS (Distribute Denial of Service), Bruteforce. Tujuan penelitian ini adalah mendeteksi setiap serangan yang terjadi dan melakukan blokir akses masuk ke server. Hipotesis riset ini adalah mendeteksi dan melakukan pencegahan terhadap serangan menggunakan default rules yang dimiliki oleh Suricata 6.0.4. Metode yang diusulkan adalah penelitian eksperimen yang bersifat kuantitatif untuk dapat mengamankan suatu sistem jaringan menggunakan Intrusion Prevention System (IPS) yang dikombinasikan antara fitur blocking dari Firewall dan fitur detection capabilities dari Intrusion Detection System (IDS) berdasarkan traffic behavior atau anomali yang ditemukan selama dalam pengamatan dan pengujian yang telah dilakukan. Perancangan sistem keamanan ini membutuhkan sistem jaringan yang sudah yang terpasang aplikasi pfSense yang memiliki service Suricata sebagai IPS. Hasil riset ini menunjukan bahwa IPS dapat melakukan deteksi dan blokir terhadap serangan Scanning Port, Bruteforce dengan 3 kali pengujian dan DDoS dengan pengujian selama durasi waktu 30 detik, 1 menit dan 3 menit

    Competency-Based Curriculum Planning Model To Overcome Inconsistencies In Vocational Training

    Get PDF
    "The objective of the research was to evaluate the consistency of different training proposals, proposing as a reference a competency-based curriculum planning model. Qualitative methodology was used from an interpretive paradigm, making use of inductive and deductive analysis at the same time. Inductively, observations were generated through documentary analysis, interviews with experts, and a focus group with university professors, who then deductively derived interpretations and forecasts regarding curricular planning. As a result, it was obtained that the designed model, based on the triangulation of the information collected, allowed evaluating and determining the strengths and weaknesses of the priority elements of the university curriculum: the graduation profile, the study plan and the evaluation system. The main conclusion was that it is necessary to have clear parameters for specifying the university curriculum, through a referential model that allows the development of a virtuous circle of evaluation and continuous improvement of curricular planning.Keywords: -competencies; curriculum planning; consistency; discharge profile; Curriculum; evaluation systemINTRODUCTIONThe Bologna agreement signed by the European Union led to great transformations in the training processes of future professionals. One of these was that the university curriculum presents competencies to develop for the exercise of a certain career 18 . According to the Tuning Project for Latin America 45 , competencies are classified by their basic, transversal or specific nature. Basic skills allow people to function as individuals who are part of society and support the development of more complex skillsof analysis, synthesis, understanding and action, thanks to the cognitive skills of information processing, argumentation and interpretation 44 accompanied by of central aspects.Transversal, generic or soft skills are common to different professions, and increase performance expertise, employability, management and productivity in different work environments 8,14, 19,26,44 . The specific competencies are those specific to each profession, and establish the performance expected in each of the professional disciplines, which promote specialization, thanks to the development of specific training processes 2, 20, 39,44 .Another transformation was the management of curricular planningso that all the elements of the curriculum (profiles, objectives, competencies, contents, didactic strategies and evaluation strategies) converge harmoniously and, thus, achieve the graduation profile 11,38 . The design of a curricular planning by competencies must start by identifying the challenges and needs of each profession, this with the aim of contributing to the solution of the latent problems that society faces, for which the competencies to be trained for a suitable performance. All this with theaim of guaranteeing the articulation between the training proposal and the set of demands on the profession 6 .Based on the above, curricular planning is defined in a competency-based approach as the design process of each of the central components of the curriculum, taking into account the educational model of the university, which defines the fundamental orientations of training, as well as the environment of the profession, its demands and development trends.From this perspective, a Curriculum Planning Model for Competencies -hereinafter MPCC -becomes the reference for the construction, organization and readjustment of the competency-based training curriculum, which contains the description of the stages and processes that guarantee consistency, coherence, relevance and gradualness of the training process, likewise, it articulates the macro, meso and micro stages of curricular planning where the structure of each of its components is taken into account 3,24,25,41,50 .The fundamental elements of the MPCC are the graduate profile, the study plan and the evaluation system. The graduation profile is made up of the set of generic and specific competencies for performance in a certain profession, identified after

    WARDOG: Awareness detection watchbog for Botnet infection on the host device

    Get PDF
    Botnets constitute nowadays one of the most dangerous security threats worldwide. High volumes of infected machines are controlled by a malicious entity and perform coordinated cyber-attacks. The problem will become even worse in the era of the Internet of Things (IoT) as the number of insecure devices is going to be exponentially increased. This paper presents WARDOG – an awareness and digital forensic system that informs the end-user of the botnet’s infection, exposes the botnet infrastructure, and captures verifiable data that can be utilized in a court of law. The responsible authority gathers all information and automatically generates a unitary documentation for the case. The document contains undisputed forensic information, tracking all involved parties and their role in the attack. The deployed security mechanisms and the overall administration setting ensures non-repudiation of performed actions and enforces accountability. The provided properties are verified through theoretic analysis. In simulated environment, the effectiveness of the proposed solution, in mitigating the botnet operations, is also tested against real attack strategies that have been captured by the FORTHcert honeypots, overcoming state-of-the-art solutions. Moreover, a preliminary version is implemented in real computers and IoT devices, highlighting the low computational/communicational overheads of WARDOG in the field

    Profile of investigative capacities that determine factors to investigate in the universities of Peru

    Get PDF
    The need to develop research in the Peruvian university context is urgently needed. That is why, in order to develop the research processes, it is required to have a profile of the research capacity of the students. For this reason, the purpose was to determine the profile of investigative capacities that derive from factors to investigate in universities. It corresponds to the quantitative approach, of a transversal type; a sample made up of 303 university students was used. Two instruments were used: investigative skills scale and the questionnaire of factors that influence investigative skills with construct validity by the KMO test (0.623 and 0.706,respectively). The results referring to the profiles showed that 32.3% of the respondents identified themselves with the reflective inquiry investigative capacity profile, followed by 26.7% with the generic conceptualization investigative capacity profile; while 27.7% were related to the specific cognitive investigative abilities profile and, finally, 13.2% ofthose evaluated were identified in the active cognitive construction investigative abilities profile. It is concluded that students have investigative skills at different progressive levels, with different characteristics depending on the influence of factors in the training process.Campus Huancay

    "Curriculum Alignment To Ensure The Achievement Of The Teacher's Graduation Profile"

    Get PDF
    "Initial teacher training is recognized as one of the fundamental factors to improve the quality of educational processes in the classroom, therefore, it is relevant to ensure that future teachers acquire the disciplinary and pedagogical skills necessary for the exercise of a teaching practice appropriate to the diversity. In this sense, the purpose of this study was to analyze the curricular alignment process of the Initial Teacher Training (FID) curriculum for primary education in the training proposal of an Institute of Higher Pedagogical Education. The approach that is assumed is qualitative with a phenomenological design, which allows the description and interpretation of the incorporation and approach of the National Basic Curriculum Design (DCBN) of the FID in the levels and processes of management through documentary analysis and interviews that collect the experiences of the participants. The research made it possible to describe the meaning and specific character of the curricular alignment processes, the implications of assuming the transversality of research and pre-professional practice, and the relevance of integrative projects in the articulation of the curriculum and the improvement of the efficiency of initial teacher training in terms of skills development. Experience reveals that. to improve the coherence between the initial teacher training curriculum and the pedagogical practice aimed at achieving the teacher's graduation profile. Permanent reflection by the educational community and continuous improvement of their skills is required.

    Understanding the Relationship between Online Discussions and Bitcoin Return and Volume: Topic Modeling and Sentiment Analysis

    Get PDF
    This thesis examines Bitcoin related discussions on Bitcointalk.com over the 2013-2022 period. Using Latent Dirichlet Allocation (LDA) topic modeling algorithm, we discover eight distinct topics: Mining, Regulation, Investment/trading, Public perception, Bitcoin’s nature, Wallet, Payment, and Other. Importantly, we find differences in relations between different topics’ sentiment, disagreement (proxy for uncertainty) and hype (proxy for attention) on one hand and Bitcoin return and trading volume on the other hand. Specifically, among all topics, only the sentiment and disagreement of Investment/trading topic have significant contemporaneous relation with Bitcoin return. In addition, sentiment and disagreement of several topics, such as Mining and Wallet, show significant relationships with Bitcoin return only on the tails of the return distribution (bullish and bearish markets). In contrast, sentiment, disagreement, and hype of each topic show significant relation with Bitcoin volume across the entire distribution. In addition, whereas hype has a positive relation with trading volume in a low-volume market, this relation becomes negative in a high-volume market

    A systematic design approach to IOT security for legacy production machinery

    Get PDF
    The Internet of Things (IoT) is an emerging topic of rapidly growing technical importance for the industry. The aim is to connect objects with unique identifiers and combine them with internet connectivity for data transfer. This advanced connectivity has significant potential in the workshop-level upgrade of existing legacy equipment to unlock new features and economic benefits especially for monitoring and control applications However, the introduction of the Industrial Internet of Things (IIoT) brings new additional security and integrity risks for the industrial environment in the form of network, communication, software and hardware security risks. This thesis addresses such fundamental new risks at their root by introducing a novel approach for IoT-enabled monitoring of legacy production machinery, which consist of five stages, incorporating security by design features. The first two phases of this novel approach aim to analyse current monitoring practices and security and vulnerability issues related to the application domain. The proposed approach applies three more stages which make the domain-relevant analysis to become application specific. These include a detailed model of the application context on legacy production machinery monitoring, together with its interfaces and functionality, implementing threat mitigations combined with a new modular IoT DAQ unit mechanism, validated by functional tests against Denial of Service (DoS) and clone attacks. Thus, to be effective, the design approach is further developed with application-specific functionality. This research demonstrates an instance of this innovative riskaverse design thinking through introducing an IoT device design which is applicable to a wide set of industrial scenarios. A practical showcase example of a specific implementation of the generic IoT design is given through a concrete industrial application that upgrades existing legacy machine tool equipment. The reported work establishes a novel viewpoint for the understanding of IoT security risks and their consequent mitigation, opening a new space of riskaverse designs that can bring significant confidence in data, safety, and security of IoT-enabled industry.Manufacturin

    Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics

    No full text
    Due to the dynamic in nature, the vulnerabilities that exist in VANET are much higher when compared with that of the wired network infrastructure. In DoS attacks, the legitimate users are prohibited from accessing the services or network resource. The primary goal of the attack to make the desired destination vehicle unavailable or relegate the message all the way through the network affects the reachability. The proposed reCAPTCHA controller mechanism prevents the automated attacks similarly like botnet zombies. The reCAPTCHA controller is used to check and prohibit most of the automated DDoS attacks. For implementing this technique, the information theory based metric is used to analyze the deviation in users request in terms of entropy. Frequency and entropy are the metrics used to measure the vulnerability of the attack. The stochastic model based reCAPTCHA controller is used as a prevention mechanism for the large botnet based attackers. To inspect the efficiency of the proposed method, various network parameters are considered such as Packet Delivery Ratio (PDR), Average Latency (AL), Detection Rate (DR) and Energy Consumption (EC). In the proposed research work, the metric PDR is used to know successful delivery of data packets to the destination vehicle without any interrruption. These parameters are used to measure how effectively the data is delivered to the destination from source vehicle.Published versio
    corecore