6,623 Hits in 9.9 sec

Attribution of Cyber Attacks [chapter]

Klaus-Peter Saalbach
2019 Information Technology for Peace and Security  
This was criticized in media as limited evidence, but the Michailow and Surkov incidents indicate that there was possibly more behind the scene than only digital attribution and analysis of political motivations  ...  From this, it is difficult to mimic the attack of an APT even when the malware of the respective hacker group is available on the black market.  ... 
doi:10.1007/978-3-658-25652-4_13 fatcat:bjmhfvcbyjavrbdfbnelbcpedq

Captcha Attack: Turning Captchas Against Humanity [article]

Mauro Conti, Luca Pajola, Pier Paolo Tricomi
2022 arXiv   pre-print
We test our attack on real-world ACM, and the results confirm the ferocity of our simple yet effective attack, reaching up to a 100% evasion success in most cases.  ...  Despite their advantages, attackers can exploit weaknesses of DL components (e.g., preprocessing, model) to affect their performance.  ...  An attacker can thus spread custom textual captchas on online platforms, threatening ACM detection performance.  ... 
arXiv:2201.04014v3 fatcat:4yo7gcznhfgtnf5m324hxnjbri

Cyber-Security and Combatting Cyber-Attacks: A Study

C Berin Jones
2017 Journal of excellence in Computer Science and Engineering  
In any case, cybersecurity endeavours must be precisely custom fitted, keeping in mind the end goal to protect security, freedom, advancement and the open way of the internet which emphasizes on the need  ...  Expanded cyber-security will help ensure purchasers and organizations, guarantee the accessibility of basic frameworks on which our economy depends, and reinforce national security.  ...  Motivation behind attacks The hackers have some motivation behind the cyber-attacks.  ... 
doi:10.18831/ fatcat:qgzgeajoabatreosybupvjvbba

Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model

David Airehrour, Nisha Vasudevan Nair, Samaneh Madanian
2018 Information  
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency  ...  The study further identified attack stages and provided a user-reflective model for the mitigation of attacks at every stage of the social engineering attack cycle.  ...  Other metrics were customers' level of technical knowledge in identifying the threats behind every pop-up, web browsing and online advertisements.  ... 
doi:10.3390/info9050110 fatcat:v6ggtdp5x5febj2fjaeaopcx3m

Attribution Across Cyber Attack Types: Network Intrusions and Information Operations

Sanjay Goel, Brian Nussbaum
2021 IEEE Open Journal of the Communications Society  
Attribution of attacks is typically done through a burdensome manual process that relies on both technical analysis and ground intelligence.  ...  Attribution tools and techniques for malicious activities on the internet are still nascent, relying mainly on technical measurements, the provenance of malicious code, and nontechnical assessments of  ...  Based on forensic analysis, it is often possible to determine the source of an attack and even the device.  ... 
doi:10.1109/ojcoms.2021.3074591 fatcat:k6vuj2ygnra5plsohkxde2htzy

Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL

Christopher Soghoian, Sid Stamm
2010 Social Science Research Network  
Finally, we use reductive analysis of governments' legal capabilities to perform an adversarial threat model analysis of the attack and our proposed defensive technology.  ...  Finally, we use reductive analysis of governments' legal capabilities to perform an adversarial threat model analysis of the attack and our proposed defensive technology.  ...  A Appendix The following two scanned pages are a limited portion of Packet Forensics' marketing materials, sufficient to document the product's features and the company's statements.  ... 
doi:10.2139/ssrn.1591033 fatcat:txbc2t3mvfdlxocnv4nosbp46e

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
In the end, the paper puts forward our security considerations on the future development of DT-based smart grid.  ...  Specifically, the paper i) introduces the background of the smart grid; ii) reviews external cyber attacks from attack incidents and attack methods; iii) introduces critical defense approaches in industrial  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

WaveSpy: Remote and Through-wall Screen Attack via mmWave Sensing

Zhengxiong Li, Fenglong Ma, Aditya Singh Rathore, Zhuolin Yang, Baicheng Chen, Lu Su, Wenyao Xu
2020 2020 IEEE Symposium on Security and Privacy (SP)  
We intensively evaluate the performance and practicality of WaveSpy in screen attacks, including over 100 different types of content on 30 digital screens of modern electronic devices.  ...  By leveraging the relationship between the screen content and the states of liquid crystal arrays in displays, we develop WaveSpy, an endto-end portable through-wall screen attack system.  ...  Matthew Hicks, and all anonymous reviewers for their insightful comments on this paper. We also appreciate the suggestion and hardware support from Prof. Changzhi Li in Texas Tech University.  ... 
doi:10.1109/sp40000.2020.00004 dblp:conf/sp/LiMRYCSX20 fatcat:x5rjgydbsrgppbysjvzh364hje

Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack [article]

Shahroz Tariq, Sowon Jeon, Simon S. Woo
2021 arXiv   pre-print
This work provides a measurement study on the robustness of black-box commercial face recognition APIs against Deepfake Impersonation (DI) attacks using celebrity recognition APIs as an example case study  ...  More specifically, we measure attack performance based on two scenarios (targeted and non-targeted) and further analyze the differing system behaviors using fidelity, confidence, and similarity metrics  ...  However, to the best of our knowledge, no study exploits deepfakes as an impersonation attack method to attack face recognition web APIs.  ... 
arXiv:2103.00847v2 fatcat:445enlzfobcmrgtesiib3qn7de

An Experimental Analysis of Current DDoS attacks Based on a Provider Edge Router Honeynet

Stamatia Triantopoulou, Dimitrios Papanikas, Panayiotis Kotzanikolaou
2019 2019 10th International Conference on Information, Intelligence, Systems and Applications (IISA)  
In an HTTP flood DDoS attack, the attacker exploits seemingly-legitimate HTTP GET or POST requests to attack a web server or application.  ...  Chapter 4: Experimental analysis 4.1 Overview of the cyber-attacks chain This chapter describes the analysis of the attack patterns found on the honeynet and presents an overall statistical analysis of  ... 
doi:10.1109/iisa.2019.8900732 dblp:conf/iisa/TriantopoulouPK19 fatcat:igfrz2hpyzgp7jwdxaotimwvle

Distributed reflection denial of service attack: A critical review

Riyadh Rahef Nuiaa, Selvakumar Manickam, Ali Hakem Alsaeedi
2021 International Journal of Power Electronics and Drive Systems (IJPEDS)  
One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS).  ...  On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP.  ...  DRDoS based on UDP protocol An attacker who plans to launch attacks such as a DRDoS attack exploits the UDP protocol to perform their attack because of UDP properties, which sometimes enable the abuse  ... 
doi:10.11591/ijece.v11i6.pp5327-5341 fatcat:xm4wt7jjvfff7olsckqf4q6clq

Security Assessment for Cyber Physical Distribution Power System under Intrusion Attacks

Rong Fu, Xiaojuan Huang, Yusheng Xue, Yingjun Wu, Yi Tang, Dong Yue
2018 IEEE Access  
In this paper, first we present an overview of the system operation from the fusion system perspective. The significant effects of network intrusion attacks on operational security are evaluated.  ...  This paper is focused on realizing a unified system attack modeling and security assessment of an active distribution power system.  ...  ACKNOWLEDGMENT The authors would like to thank the NARI National Key Laboratory for the facilities and equipment provided. They are also thankful for their participants in the experiments.  ... 
doi:10.1109/access.2018.2855752 fatcat:hl6ufri5qrhhnbo7kr33b2hlme

A Cognitive Unsupervised Clustering for Detecting Cyber Attacks [chapter]

Kaiser Nahiyan, Samilat Kaiser, Ken Ferens
2021 Artificial Intelligence in IoT  
Table of Contents Abstract List of Figures List of Tables Chapter 1 Introduction In the modern era, use of technology and online resources is an absolutely necessity.  ...  , along with the rationale behind, have been elaborated in this section.  ...  Labelled Features Attack_cat The name of each attack category. Label 0 for normal and 1 for attack records  ... 
doi:10.1007/978-3-030-70296-0_84 fatcat:tum3exefvbb53flh5ntnqvskju

The Attack on Basic Writing-- And After

Harvey S. Wiener
1998 Journal of Basic Writing  
Visit our web site for the complete project statement and submission guidelines.  ...  Focusing primarily on experimental, linguistic, and computational approaches, the journal discusses the syntax, semantics, pragmatics, and phonology of language acquisition -merging the data of developmental  ...  In New York the attacks have grown more and more vitriolic.  ... 
doi:10.37514/jbw-j.1998.17.1.07 fatcat:eumpvduofncxlie6m6zcyj6aci

State-of-the-Art Review on IoT Threats and Attacks: Taxonomy, Challenges and Solutions

Ritika Raj Krishna, Aanchal Priyadarshini, Amitkumar V. Jha, Bhargav Appasani, Avireni Srinivasulu, Nicu Bizon
2021 Sustainability  
It is known that almost 98% of IoT traffic is not encrypted, exposing confidential and personal information on the network.  ...  In addition, the impact of different threats and attacks along with their detection, mitigation, and prevention are comprehensively presented.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su13169463 doaj:44db3364484545048c70058a0a459fd4 fatcat:f5ruitiqprhxlfnx4iiwcf67ju
« Previous Showing results 1 — 15 out of 6,623 results