192 research outputs found

    Advanced Methods for Botnet Intrusion Detection Systems

    Get PDF

    Intelligent Circuits and Systems

    Get PDF
    ICICS-2020 is the third conference initiated by the School of Electronics and Electrical Engineering at Lovely Professional University that explored recent innovations of researchers working for the development of smart and green technologies in the fields of Energy, Electronics, Communications, Computers, and Control. ICICS provides innovators to identify new opportunities for the social and economic benefits of society.  This conference bridges the gap between academics and R&D institutions, social visionaries, and experts from all strata of society to present their ongoing research activities and foster research relations between them. It provides opportunities for the exchange of new ideas, applications, and experiences in the field of smart technologies and finding global partners for future collaboration. The ICICS-2020 was conducted in two broad categories, Intelligent Circuits & Intelligent Systems and Emerging Technologies in Electrical Engineering

    NFT for Eternity

    Get PDF
    Non-fungible tokens (NFTs) are unique tokens stored on a digital ledger – the blockchain. They are meant to represent unique, non-interchangeable digital assets, as there is only one token with that exact data. Moreover, the information attached to the token cannot be altered as on a regular database. While copies of these digital items are available to all, NFTs are tracked on blockchains to provide the owner with proof of ownership. This possibility of buying and owning digital assets can be attractive to many individuals. NFTs are presently at the stage of early adoption and their uses are expanding. In the future, they could become a fundamental and integral component of tomorrow’s web. NFTs bear the potential to become the engine of speech: as tokenized expressions cannot be altered or deleted, they enable complete freedom of expression, which is not subject to censorship. However, tokenized speech can also bear significant costs and risks, which can threaten individual dignity and the public interest. Anyone can tokenize a defamatory tweet, a shaming tweet, or a tweet that includes personal identifying information and these tokenized expressions can never be deleted or removed from the blockchain, risking permanent damage to the reputations of those involved. Even worse, anyone can tokenize extremist political views, such as alt-right incitement, which could ultimately result in violence against minorities, and infringe on the public interest. To date, literature has focused on harmful speech that appears on dominant digital platforms, but has yet to explore and address the benefits, challenges and risks of tokenized speech. Such speech cannot be deleted from the web in the same way traditional internet intermediaries currently remove content. Thus, the potential influence of NFTs on freedom of expression remains unclear. This Article strives to fill the gap and contribute to literature in several ways. It introduces the idea of owning digital assets by using NFT technology, surveys the main uses of tokenizing digital assets and the benefits of such practices. It aims to raise awareness of the potential of tokenized speech to circumvent censorship and to act as the engine of freedom of expression. Yet it also addresses the challenges and risks posed by tokenized speech. Finally, it proposes various solutions and remedies for the abuse of NFT technology, which may have the potential to perpetuate harmful speech. As we are well aware of the challenges inherent in our proposals for mitigation, this Article also addresses First Amendment objections to the proposed solution

    SECURITY RESEARCH FOR BLOCKCHAIN IN SMART GRID

    Get PDF
    Smart grid is a power supply system that uses digital communication technology to detect and react to local changes for power demand. Modern and future power supply system requires a distributed system for effective communication and management. Blockchain, a distributed technology, has been applied in many fields, e.g., cryptocurrency exchange, secure sharing of medical data, and personal identity security. Much research has been done on the application of blockchain to smart grid. While blockchain has many advantages, such as security and no interference from third parties, it also has inherent disadvantages, such as untrusted network environment, lacking data source privacy, and low network throughput.In this research, three systems are designed to tackle some of these problems in blockchain technology. In the first study, Information-Centric Blockchain Model, we focus on data privacy. In this model, the transactions created by nodes in the network are categorized into separate groups, such as billing transactions, power generation transactions, etc. In this model, all transactions are first encrypted by the corresponding pairs of asymmetric keys, which guarantees that only the intended receivers can see the data so that data confidentiality is preserved. Secondly, all transactions are sent on behalf of their groups, which hides the data sources to preserve the privacy. Our preliminary implementation verified the feasibility of the model, and our analysis demonstrates its effectiveness in securing data source privacy, increasing network throughput, and reducing storage usage. In the second study, we focus on increasing the network’s trustworthiness in an untrusted network environment. A reputation system is designed to evaluate all node’s behaviors. The reputation of a node is evaluated on its computing power, online time, defense ability, function, and service quality. The performance of a node will affect its reputation scores, and a node’s reputation scores will be used to assess its qualification, privileges, and job assignments. Our design is a relatively thorough, self-operated, and closed-loop system. Continuing evaluation of all node’s abilities and behaviors guarantees that only nodes with good scores are qualified to handle certain tasks. Thus, the reputation system helps enhance network security by preventing both internal and external attacks. Preliminary implementation and security analysis showed that the reputation model is feasible and enhances blockchain system’s security. In the third research, a countermeasure was designed for double spending. Double spending is one of the two most concerned security attacks in blockchain. In this study, one of the most reputable nodes was selected as detection node, which keeps checking for conflict transactions in two consecutive blocks. Upon a problematic transaction was discovered, two punishment transactions were created to punish the current attack behavior and to prevent it to happen in future. The experiment shows our design can detect the double spending effectively while using much less detection time and resources

    Digital copyright law: exploring the changing interface between copyright and regulation in the digital environment

    Get PDF
    This thesis seeks to address and clarify the changing interface between copyright law and other forms of regulation in the digital environment, in the context of recorded music. This is in order to explain the problems that rightsholders have had in tackling the issue of unauthorised copyright infringement facilitated by digital technologies. Copyright law is inextricably bound-up with technological developments, but the ‘convergence’ of content into a single digital form was perceived as problematic by rightsholders and was deemed to warrant increased regulation through law. However, the problem is that the reliance on copyright law in the digital environment ignores the other regulatory influences in operation. The use of copyright law in a ‘preventative’ sense also ignores the fact that other regulatory factors may positively encourage users to behave, and consume in ways that may not be directly governed by copyright. The issues digital technologies have posed for rightsholders in the music industry are not addressed, or even potentially addressable directly through law, because the regulatory picture is complex. The work of Lawrence Lessig, in relation to his regulatory ‘modalities’ can be applied in this context in order to identify and understand the other forms of regulation that exist in the digital environment, and which govern user behaviour and consumption. By combining his work with that of other scholars in the field, a bespoke ‘Lessigan’ framework is formulated to address and analyse those other regulatory factors in conjunction with actions undertaken by rightsholders to secure their copyrights in the digital age. The thesis will analyse the effect such reliance on copyright law may have on these regulatory influences, and the creative potential of the digital environment

    Controles de ciberseguridad más utilizados para el bloqueo de diferentes tipos de contenido pornográfico en el ciberespacio que afecta principalmente a niños y adolescentes de la región

    Get PDF
    El uso del internet en niños y adolescentes se ha incrementado con el pasar del tiempo, con la pandemia iniciada en el 2020 por el COVID-19 más menores de 18 años ha incrementado el tiempo conectados a internet, los delincuentes hacen uso de técnicas como el grooming para obtener la confianza de ellos y así obtener imágenes, videos y/o audios y comercializar estos abusos sexuales infantiles a través del ciberespacio, por tanto es recomendable proteger a los niños y adolescentes conectados a internet a través de diferentes técnicas de filtrado de contenido que pueden ser implementadas en hogares e instituciones educativas. Los softwares para el control parental usan distintas técnicas para filtrar el tráfico de datos que se considera inapropiado para los menores de 18 años, así que se identificarán dichas técnicas para el bloqueo no apto para niños en el ciberespacio. Además, se realiza una revisión sistemática de las técnicas para el filtro de datos en dispositivos y aplicaciones usadas por esta población.The use of the Internet in children and adolescents has increased over time, with the pandemic that began in 2020 by COVID-19, more people under 18 years of age have increased the time connected to the Internet, criminals make use of techniques such as grooming to obtain their trust and thus obtain images, videos and/or audios and market these child sexual abuses through cyberspace, therefore it is advisable to protect children and adolescents connected to the Internet through different content filtering techniques that can be implemented in homes and educational institutions. Parental control software uses different techniques to filter data traffic that is considered inappropriate for those under the age of 18, so such techniques for non-child-friendly blocking in cyberspace will be identified. In addition, a systematic review of the techniques for data filtering in devices and applications used by this population is carried out

    Internet Myth #3 Code Is Law

    Get PDF

    Security techniques for sensor systems and the Internet of Things

    Get PDF
    Sensor systems are becoming pervasive in many domains, and are recently being generalized by the Internet of Things (IoT). This wide deployment, however, presents significant security issues. We develop security techniques for sensor systems and IoT, addressing all security management phases. Prior to deployment, the nodes need to be hardened. We develop nesCheck, a novel approach that combines static analysis and dynamic checking to efficiently enforce memory safety on TinyOS applications. As security guarantees come at a cost, determining which resources to protect becomes important. Our solution, OptAll, leverages game-theoretic techniques to determine the optimal allocation of security resources in IoT networks, taking into account fixed and variable costs, criticality of different portions of the network, and risk metrics related to a specified security goal. Monitoring IoT devices and sensors during operation is necessary to detect incidents. We design Kalis, a knowledge-driven intrusion detection technique for IoT that does not target a single protocol or application, and adapts the detection strategy to the network features. As the scale of IoT makes the devices good targets for botnets, we design Heimdall, a whitelist-based anomaly detection technique for detecting and protecting against IoT-based denial of service attacks. Once our monitoring tools detect an attack, determining its actual cause is crucial to an effective reaction. We design a fine-grained analysis tool for sensor networks that leverages resident packet parameters to determine whether a packet loss attack is node- or link-related and, in the second case, locate the attack source. Moreover, we design a statistical model for determining optimal system thresholds by exploiting packet parameters variances. With our techniques\u27 diagnosis information, we develop Kinesis, a security incident response system for sensor networks designed to recover from attacks without significant interruption, dynamically selecting response actions while being lightweight in communication and energy overhead
    • …
    corecore