388,918 research outputs found
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
Mobile collaborative learning (MCL) is highly acknowledged and focusing
paradigm in eductional institutions and several organizations across the world.
It exhibits intellectual synergy of various combined minds to handle the
problem and stimulate the social activity of mutual understanding. To improve
and foster the baseline of MCL, several supporting architectures, frameworks
including number of the mobile applications have been introduced. Limited
research was reported that particularly focuses to enhance the security of
those pardigms and provide secure MCL to users. The paper handles the issue of
rogue DHCP server that affects and disrupts the network resources during the
MCL. The rogue DHCP is unauthorized server that releases the incorrect IP
address to users and sniffs the traffic illegally. The contribution specially
provides the privacy to users and enhances the security aspects of mobile
supported collaborative framework (MSCF). The paper introduces multi-frame
signature-cum anomaly-based intrusion detection systems (MSAIDS) supported with
novel algorithms through addition of new rules in IDS and mathematcal model.
The major target of contribution is to detect the malicious attacks and blocks
the illegal activities of rogue DHCP server. This innovative security mechanism
reinforces the confidence of users, protects network from illicit intervention
and restore the privacy of users. Finally, the paper validates the idea through
simulation and compares the findings with other existing techniques.Comment: 20 pages and 11 figures; International Journal of Computer Networks
and Communications (IJCNC) July 2012, Volume 4. Number
Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues
Improved interoperability between public and private organizations is of key
significance to make digital government newest triumphant. Digital Government
interoperability, information sharing protocol and security are measured the
key issue for achieving a refined stage of digital government. Flawless
interoperability is essential to share the information between diverse and
merely dispersed organisations in several network environments by using
computer based tools. Digital government must ensure security for its
information systems, including computers and networks for providing better
service to the citizens. Governments around the world are increasingly
revolving to information sharing and integration for solving problems in
programs and policy areas. Evils of global worry such as syndrome discovery and
manage, terror campaign, immigration and border control, prohibited drug
trafficking, and more demand information sharing, harmonization and cooperation
amid government agencies within a country and across national borders. A number
of daunting challenges survive to the progress of an efficient information
sharing protocol. A secure and trusted information-sharing protocol is required
to enable users to interact and share information easily and perfectly across
many diverse networks and databases globally.Comment: 20 page
The effect of cyber-attacks on stock returns
A widely debated issue in recent years is cybercrime. Breaches in the security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms. This paper investigates the impact of information security breaches on stock returns. Using event-study methodology, the study provides empirical evidence on the effect of announcements of cyber-attacks on the market value of firms from 1995 to 2015. Results show that substantial negative market returns occur following announcements of cyber-attacks. Financial entities often suffer greater negative effects than other companies and non-confidential cyber-attacks are the most dangerous, especially for the financial sector. Overall findings seem to show a link between cybercrime and insider trading
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Radio Frequency Identification (RFID) technology one of the most promising
technologies in the field of ubiquitous computing. Indeed, RFID technology may
well replace barcode technology. Although it offers many advantages over other
identification systems, there are also associated security risks that are not
easy to be addressed. When designing a real lightweight authentication protocol
for low cost RFID tags, a number of challenges arise due to the extremely
limited computational, storage and communication abilities of Low-cost RFID
tags. This paper proposes a real mutual authentication protocol for low cost
RFID tags. The proposed protocol prevents passive attacks as active attacks are
discounted when designing a protocol to meet the requirements of low cost RFID
tags. However the implementation of the protocol meets the limited abilities of
low cost RFID tags.Comment: 11 Pages, IJNS
Password Cracking and Countermeasures in Computer Security: A Survey
With the rapid development of internet technologies, social networks, and
other related areas, user authentication becomes more and more important to
protect the data of the users. Password authentication is one of the widely
used methods to achieve authentication for legal users and defense against
intruders. There have been many password cracking methods developed during the
past years, and people have been designing the countermeasures against password
cracking all the time. However, we find that the survey work on the password
cracking research has not been done very much. This paper is mainly to give a
brief review of the password cracking methods, import technologies of password
cracking, and the countermeasures against password cracking that are usually
designed at two stages including the password design stage (e.g. user
education, dynamic password, use of tokens, computer generations) and after the
design (e.g. reactive password checking, proactive password checking, password
encryption, access control). The main objective of this work is offering the
abecedarian IT security professionals and the common audiences with some
knowledge about the computer security and password cracking, and promoting the
development of this area.Comment: add copyright to the tables to the original authors, add
acknowledgement to helpe
Blackspot analysis of road traffic crashes in Surabaya - Manyar Toll Road, East Java
Traffic crashes are one of the problems that cannot be prevented, especially on toll roads.
Knowing the crash element, including crash number, type, factor, and fatality, could lead the investigation to
set crash solving and prevention by finding the blackspot point. Surabaya-Manyar toll roads were reported
as crash-prone locations, with 149 crashes from 2014-2018. This research concerns the impact on a specific
period obtained by PT. Margabumi Matrajaya was ranging from 2014-2018 at Surabaya-Manyar toll road.
The objectives aim to analyze the crash element using submitted data from PT. Margabumi Matrajaya
to find the blackspot at each line. The collected data were the primary data from field observation and
documentation and secondary data, consisting of crash data, road length, time of the crash, what types
of vehicles were involved in the crash, and wound victim data. The locations of crash-prone points
(Blackspots) on the Surabaya - Manyar Toll road are as follows: The locations of crash-prone points
(Blackspots) on the Surabaya Toll road - Manyar line mostly occurred at Km 9 + 925 - 16 + 400 mostly in
2018, on the Romokalisari - Kebomas section, and for Manyar - Surabaya line, occurred at Km 3 + 500 - 0
+ 000 mostly in 2016, on the Tandes - Dupak section. Therefore, to decrease the crash number in Surabaya
- Manyar toll road, PT. Margabumi Matrajaya should add traffic sign as blackspot area, speed trap, warning
sign like slippery road ahead warning, crossroad, and merging traffic
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that
allows the secure distribution of a bit string, used as key in cryptographic
protocols. When it was noted that quantum computers could break public key
cryptosystems based on number theory extensive studies have been undertaken on
QKD. Based on quantum mechanics, QKD offers unconditionally secure
communication. Now, the progress of research in this field allows the
anticipation of QKD to be available outside of laboratories within the next few
years. Efforts are made to improve the performance and reliability of the
implemented technologies. But several challenges remain despite this big
progress. The task of how to test the apparatuses of QKD For example did not
yet receive enough attention. These devises become complex and demand a big
verification effort. In this paper we are interested in an approach based on
the technique of probabilistic model checking for studying quantum information.
Precisely, we use the PRISM tool to analyze the security of BB84 protocol and
we are focused on the specific security property of eavesdropping detection. We
show that this property is affected by the parameters of quantum channel and
the power of eavesdropper.Comment: 12 Pages, IJNS
- …