Filters








542 Hits in 7.1 sec

Data Science for the Internet of Things

Francesco Piccialli, Salvatore Cuomo, Nik Bessis, Yuji Yoshimura
2020 IEEE Internet of Things Journal  
He has been involved in research and development projects in the research areas of the Internet of Things, smart environments, data science, and mobile applications. Dr.  ...  ., Treviso, Italy, an innovative startup company whose mission is the development of innovative systems and services based on IoT technology for cultural heritage.  ...  The article titled "Countering malicious URLs in Internet of Things using a knowledge-based approach and a simulated expert" proposes a novel methodology to detect malicious URLs using a simulated expert  ... 
doi:10.1109/jiot.2020.2985598 fatcat:6rmpgcitjbbmdkctvhirzxxk3q

The Current Phishing Techniques – Perspective of the Nigerian Environment

Palang Nicolyn Mangut, Kalamba Aristarkus Datukun
2021 World Journal of Innovative Research  
Often the numerical data can be used as fetched or stored as Bag-of-words (a dictionary made of words that appear in a URL and used as a feature) approach.  ...  Their work reviewed machine learning techniques already in use and they proposed systematic formulation of Malicious URL for machine learning approach as well as addressing feature representation and designing  ... 
doi:10.31871/wjir.10.1.9 fatcat:3kfhm2uevrap3bwukrpaav74l4

Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures [chapter]

Andre Adelsbach, Sebastian Gajek, Jörg Schwenk
2005 Lecture Notes in Computer Science  
of a secure SSL/TLS connection and make them disclose secrets to attackers.  ...  Today the standard means for secure transactions in the World Wide Web (WWW) are the SSL/TLS protocols, which provide secure (i.e., private and authentic) channels between browsers and servers.  ...  Recent studies [9, 10] show a strongly increasing number of VS attacks in the Internet, because, in contrast to buffer-overflow attacks, VS attacks do not require sophisticated expert knowledge of operating  ... 
doi:10.1007/978-3-540-31979-5_18 fatcat:wljrn566jnarndsjjhjwlksf6u

The Vulnerabilities of Trusted Notifier-Models in Russia: The Case of Netoscope

Liudmila Sivetc, Mariëlle Wijermars
2021 Media and Communication  
Zooming in on the use of trusted notifier-models to counter online harms in Russia, we examine the Netoscope project (a database of Russian domain names suspected of malware, botnet, or phishing activities  ...  We argue that, in the absence of effective legal safeguards and transparency requirements, the politicised nature of internet infrastructure makes the trusted notifier-model vulnerable to abuse in authoritarian  ...  Acknowledgments The authors would like to thank Mykola Makhortykh and two anonymous reviewers for their insightful comments.  ... 
doi:10.17645/mac.v9i4.4237 fatcat:354rcntvazdmtmte5freiwr2py

Research Methodology on Web Mining for Malware Detection
English

Shaik. Irfan Babu, Dr. M.V.P. Chandra Sekhara Rao, G.Nagi Reddy
2014 International Journal of Computer Trends and Technology  
The proposed web mining methodology uses web structure mining, using graph mining for malware detection with a case study proposed on cloud mining.  ...  In this review paper we want to discuss Research Methodology on Web mining for Malware detection.  ...  One input is its knowledge of the malicious behavior. In anomaly-based detection, the inverse of this knowledge comes from the learning phase.  ... 
doi:10.14445/22312803/ijctt-v12p131 fatcat:tt4nfblmhfb43a5a5j7hrew2pm

Serious Games for Cyber Security Education [article]

Nalin Asanka Gamagedara Arachchilage
2016 arXiv   pre-print
The elements of a game design framework for avoiding phishing attacks were used to address the game design issues.  ...  The study results showed a significant improvement of participants' phishing avoidance behaviour in their post-test assessment.  ...  The first study used a quantitative approach and both quantitative and qualitative approaches were used in in the second.  ... 
arXiv:1610.09511v1 fatcat:u23ow7jhrza23pqcbl6dsbdc4y

Testing And Hardening IoT Devices Against the Mirai Botnet

Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis
2020 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)  
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufactures, and are vulnerable  ...  A combination of software assets not being utilised safely and effectively are exposing consumers to a full compromise. We configured and attacked 4 different IoT devices using the Mirai libraries.  ...  A litany of security flaws and vulnerabilities make devices in the Internet of Things prime targets for exploitation by malware.  ... 
doi:10.1109/cybersecurity49315.2020.9138887 dblp:conf/cybersecpods/KellyPML20 fatcat:pzj37t773ffcnkyfggeujvr4ee

Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature

Sangeetha Prabhu, Subramanya Bhat
2020 Zenodo  
This survey aims to tackle Trust, Protection, identification and activity on wide scale networks and Internet of Things.  ...  Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks.  ...  This is a groundbreaking way of monitoring malicious behaviour in terms of DDoS and Ransomware cyber threats using deep learning techniques.  ... 
doi:10.5281/zenodo.3978912 fatcat:u6dcenmygvcjpbtveyc7rbfyl4

Intelligent Techniques for Detecting Network Attacks: Review and Research Directions

Malak Aljabri, Sumayh S. Aljameel, Rami Mustafa A. Mohammad, Sultan H. Almotiri, Samiha Mirza, Fatima M. Anis, Menna Aboulnour, Dorieh M. Alomari, Dina H. Alhamed, Hanan S. Altamimi
2021 Sensors  
The significant growth in the use of the Internet and the rapid development of network technologies are associated with an increased risk of network attacks.  ...  to counter current and future network attacks.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21217070 pmid:34770375 pmcid:PMC8587628 fatcat:tnedw4hhcze7foqps3jfpiog7u

Analysis and Findings of Social Engineering Industry Experts Explorative Interviews: Perspectives on Measures, Tools and Solutions

Hussain Aldawood, Geoffrey Skinner
2020 IEEE Access  
The findings build upon the researchers' ongoing work, which postulates that as an increase in contextual social engineering knowledge leads to a decrease in being victims of social engineering and is,  ...  In the context of cyber security, social engineering is the practice of taking advantage of human weaknesses through manipulation to accomplish a malicious goal.  ...  Aldulaijan, GNS General Manager, for sharing his pearls of wisdom with us during the course of this research.  ... 
doi:10.1109/access.2020.2983280 fatcat:l5qyhrtnvrge3nwrs6bh5nfboi

Detecting cyber threats through social network analysis: short survey

Lyudmyla Kirichenko, Tamara Radivilova, Carlsson Anders
2017 SocioEconomic Challenges  
Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are  ...  This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented.  ...  To identify experts in social networks, for example, approach of ant colony optimization (ACO) is used.  ... 
doi:10.21272/sec.2017.1-03 fatcat:m7wj7om4o5hthluqblwcpcbmni

Detecting cyber threats through social network analysis: short survey [article]

Lyudmyla Kirichenko, Tamara Radivilova, Anders Carlsson
2018 arXiv   pre-print
Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are  ...  This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented.  ...  To identify experts in social networks, for example, approach of ant colony optimization (ACO) is used.  ... 
arXiv:1805.06680v1 fatcat:iqdtg73oovgaxeupdovfk4valy

Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity

Sherali Zeadally, Erwin Adi, Zubair Baig, Imran Khan
2020 IEEE Access  
Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat  ...  Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions which helped us improve the content, quality, and presentation of this paper.  ... 
doi:10.1109/access.2020.2968045 fatcat:tb6xkdqqhfcahb5soip66x5qce

A Survey on Ethical Hacking: Issues and Challenges [article]

Jean-Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Ali Chehab
2021 arXiv   pre-print
In other terms, pen testing is a simulated attack with the goal of identifying any exploitable vulnerability or/and a security gap.  ...  Therefore, in order to resist unknown vulnerabilities, a new kind of modern penetration tests is required, in addition to reinforcing the use of shadows honeypots.  ...  PENTOS, or "Penetration Testing Tool for Internet of Thing Devices" was presented by the Visoottiviseth et al. in [243] .  ... 
arXiv:2103.15072v1 fatcat:kqj6isalovdzbald3w2kxnqhbe

Systematic Literature Review over IDPS, Classification and Application in its Different Areas

Shehroz Afzal, Jamil Asim
2021 STATISTICS, COMPUTING AND INTERDISCIPLINARY RESEARCH  
In this Survey paper focuses on Classifying various kinds of IDS with the major types of attacks based on intrusion methods.  ...  Presenting a classification of network anomaly IDS evaluation metrics and discussion on the importance of the feature selection.  ...  In an expert system, the rules are generally defined manually by a knowledge engineer working in collaboration with an expert in the field (Kenkre et al., 2015) .  ... 
doi:10.52700/scir.v3i2.58 fatcat:xrczlxjg5ncclf2ftxyw3y5zce
« Previous Showing results 1 — 15 out of 542 results