• 제목/요약/키워드: Security Solutions

검색결과 750건 처리시간 0.025초

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Analysis of Farmer Behavior Based on Farmer Characteristics, Economic Conditions, and Number of Family Members

  • HENDRAINI, Hamidah;SOEDARTO, Teguh
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권2호
    • /
    • pp.1225-1235
    • /
    • 2021
  • This study aims to analyze the influence of farmer characteristics, Ihsan attitude, economic conditions, and socio-cultural environmental support, and the number of family members on farmer behavior in meeting food needs in realizing household food security, with the role of the government as a moderator. This study is about the relationship between farmer behavior and their household food security. This research uses a quantitative research method involving 337 farmers from three villages located in three different sub-districts, namely Alang-alang village, Tragah sub-district, Mrecah village, Tanah Merah sub-district, and finally Gangsean village, Sepulu sub-district. The quantitative analysis approach consists of formulating problems, compiling models, obtaining data, finding solutions, testing solutions, analyzing results, and interpreting results. From the 7 hypotheses that were built, it was identified that there was 1 hypothesis that was not significant, namely the influence of the support of the socio-cultural environment on farmer behavior to meet the food needs of farmers' households. The attitude that is identified is still very rarely used in the context of agricultural human resources and at the same time is an inherent character of Madurese farmers which is an interesting part for researchers to study more deeply and become new or authentic in this research.

A Novel Framework for APT Attack Detection Based on Network Traffic

  • Vu Ngoc Son
    • International Journal of Computer Science & Network Security
    • /
    • 제24권1호
    • /
    • pp.52-60
    • /
    • 2024
  • APT (Advanced Persistent Threat) attack is a dangerous, targeted attack form with clear targets. APT attack campaigns have huge consequences. Therefore, the problem of researching and developing the APT attack detection solution is very urgent and necessary nowadays. On the other hand, no matter how advanced the APT attack, it has clear processes and lifecycles. Taking advantage of this point, security experts recommend that could develop APT attack detection solutions for each of their life cycles and processes. In APT attacks, hackers often use phishing techniques to perform attacks and steal data. If this attack and phishing phase is detected, the entire APT attack campaign will be crash. Therefore, it is necessary to research and deploy technology and solutions that could detect early the APT attack when it is in the stages of attacking and stealing data. This paper proposes an APT attack detection framework based on the Network traffic analysis technique using open-source tools and deep learning models. This research focuses on analyzing Network traffic into different components, then finds ways to extract abnormal behaviors on those components, and finally uses deep learning algorithms to classify Network traffic based on the extracted abnormal behaviors. The abnormal behavior analysis process is presented in detail in section III.A of the paper. The APT attack detection method based on Network traffic is presented in section III.B of this paper. Finally, the experimental process of the proposal is performed in section IV of the paper.

변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구 (A Research on Mobile Malware Model propagated Update Attacks)

  • 주승환;서희석
    • 디지털산업정보학회논문지
    • /
    • 제11권2호
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

사례로 살펴본 렌섬웨어 공격에 의한 피해를 최소화하는 연구 고찰 (Research on Minimizing the Damage from Ransomware Attack by Case Study)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.103-111
    • /
    • 2017
  • Recently, new variants of Ransomware are becoming a new security issue. Ransomware continues to evolve to avoid network of security solutions and extort users' information to demand Bitcoin using social engineering technique. Ransomware is damaging to users not only in Korea but also in all around the world. In this thesis, it will present research solution to prevent and cope from damage by new variants Ransomware, by studying on the types and damage cases of Ransomware that cause social problems. Ransomware which introduced in this paper, is the most issued malicious code in 2016, so it will evolve to a new and more powerful Ransomware which security officers cannot predict to gain profit. In this thesis, it proposes 4 methods to prevent the damage from the new variants of Ransomware to minimize the damage and infection from Ransomware. Most importantly, if user infected from Ransomware, it is very hard to recover. Thus, it is important that users understand the basic security rules and effort to prevent them from infection.

Fifteen Deadly Cybersecurity Threats Aimed Covid-19

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.123-130
    • /
    • 2021
  • Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.

정보보호 필요에 따른 클라우드 기반의 안전한 파일관리 보안솔루션 연구 (A Study on Cloud-Based Secure File Management Security Solutions According yo Information Protection Needs)

  • 김희철
    • 한국전자통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.243-250
    • /
    • 2019
  • 본 연구는 클라우드 환경에서 매체기반의 SFMS(: Secure File Management Security) 개발을 통하여 블루투스 기반의 암호모듈을 이용하여 컴퓨터에서 클라우드 데이터를 암 복호화 한다. 블루투스 암호모듈은 클라우드에 저장된 파일을 손쉽게 열람 가능하지만 모듈이 없으면 절대 열람이 불가능하다. 최근 이슈화 되고 있는 해킹이나 개인자료유출 등의 문제점을 근본적으로 차단하는 솔루션이라 할 수 있다.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

IBM DIGITAL LIBRARY

  • Kook, Hong-Jung
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 1995년도 제4회 멀티미디어 산업기술 학술대회 논문집
    • /
    • pp.20-42
    • /
    • 1995
  • ■ IBM Digital Library is a major new IBM initiative ■ Customer solutions are available today ■ End-to-End solution focused on content asset management and creation, security, access and distribution.(omitted)

  • PDF

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.