23 Hits in 8.0 sec

Dissecting a Social Botnet

Norah Abokhodair, Daisy Yoo, David W. McDonald
2015 Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW '15  
Our analysis is based on a qualitative coding for approximately 3000 tweets in Arabic and English from the Syrian social bot that was active for 35 weeks on Twitter before it was shutdown.  ...  In this paper we considered one specific social botnet in Twitter to understand how it grows over time, how the content of tweets by the social botnet differ from regular users in the same dataset, and  ...  In particular, the volume of SSB's networking activity spiked on week 28. However, despite this immense volume, the SSB was not immediately shutdown.  ... 
doi:10.1145/2675133.2675208 dblp:conf/cscw/AbokhodairYM15 fatcat:szudxujcurdbdkqeeyi3ex2cnu

A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment

N.Ch. Sriman Narayana Iyengar, Gopinath Ganapathy, P.C. Mogan Kumar, Ajith Abraham
2014 International Journal of Grid and Utility Computing  
He serves/has served the editorial board of over 50 international journals, guest-edited 40 special issues on various topics.  ...  He works in a multidisciplinary environment involving machine (network) intelligence, cyber security, sensor networks, web intelligence, scheduling and data mining.  ...  Type 1: botnets Botnet (Robot Network) is a group of computers that injects malicious requests towards the DC and makes the DC resources unavailable to legitimate users.  ... 
doi:10.1504/ijguc.2014.065384 fatcat:zztqkeino5glpalnsxvprvdgs4

Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

Christos Xenofontos, Ioannis Zografopoulos, Charalambos Konstantinou, Alireza Jolfaei, Muhammad Khurram Khan, Kim-Kwang Raymond Choo
2021 IEEE Internet of Things Journal  
A 2020 study conducted by Nokia's threat intelligence labs, for example, indicated that IoT devices account for almost 30% of the attacks encountered in mobile and wireless networks (e.g., WiFi, Bluetooth  ...  Despite the development of energy efficient communication and control protocols for IoT to overcome such issues, vulnerabilities in such protocols can still be stealthily lurking.  ...  He served as the Chairman of the Computational Intelligence Society in the IEEE Victoria Section and also as the Chairman of Professional and Career Activities for the IEEE Queensland Section.  ... 
doi:10.1109/jiot.2021.3079916 fatcat:rfmkc6wrk5co3i7bl44ar432bi

Toward a Culture of Cybersecurity Research

Aaron J. Burstein
2008 Social Science Research Network  
Research offers great promise of addressing cybersecurity threats in the short and long term.  ...  Progress in cybersecurity research, however, is beset by a lack of access data from communications networks.  ...  In both of these uses, the wide distribution of computers in the botnet work to the attackers' advantage and against attack identification and analysis.  ... 
doi:10.2139/ssrn.1113014 fatcat:mmza4omw65c7lgcbqsigtzu3km

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Research assistance was provided by Tessa Cole and David Flint. Editorial assistance was provided by Isobel Scavetta.  ...  For instance, the BlackShades botnet consisted of a network of computers that infected nearly half a million machines across ten countries.  ...  A botnet is a network of computers infected by malicious codes, which are controlled by an attacker, making the affected computers work in a joint manner.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

Unravelling Ariadne's Thread: Exploring the Threats of Decentralised DNS

Constantinos Patsakis, Fran Casino, Nikolaos Lykousas, Vasilios Katos
2020 IEEE Access  
However, such an alternative comes with its own security concerns and issues, as any introduction and adoption of a new technology typically does -let alone a disruptive one.  ...  At the same time, over the past years there have been considerable attempts to address the security and privacy issues affecting the Domain Name System (DNS).  ...  In fact, the use of the blockhain DNS from various botnets 12 to connect to the C2 servers has reportedly created more issues in the analysis, attribution, and takedown.  ... 
doi:10.1109/access.2020.3004727 fatcat:wvydbzpl2zgfrjwdv3ngn7nxha

Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review [article]

Faheem Ullah, M. Ali Babar
2018 arXiv   pre-print
Context: Big Data Cybersecurity Analytics is aimed at protecting networks, computers, and data from unauthorized access by analysing security event data using big data tools and technologies.  ...  The identified tactics include six performance tactics, four accuracy tactics, two scalability tactics, three reliability tactics, and one security and usability tactic each.  ...  For example, the paper "A Cloud Computing Based Network Monitoring and Threat Detection System for Critical Infrastructures" is identified by S10.  ... 
arXiv:1802.03178v1 fatcat:m6yigyrqrvcpdhg7qxncdh3lsi

A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems

Ahmed Patel, Hitham Alhussian, Jens Myrup Pedersen, Bouchaib Bounabat, Joaquim Celestino Júnior, Sokratis Katsikas
2017 Computers & security  
logic analysis, it detects and prevents intrusions more efficiently.  ...  Traditional intrusion detection systems based on signature and anomaly techniques are no longer sufficient to protect SGs due to their new connectivity and management challenges, the ever-rapidly-evolving  ...  Acknowledgements Ahmed Patel, co-author, wishes to thank CAPES (Coordenação de Aperfeiçoamento de Pessoal de Nível Superior) for sponsoring his one year stay as Senior Visiting Professor through the "Projeto  ... 
doi:10.1016/j.cose.2016.07.002 fatcat:g5ftx3fexvbenc4shzum5lr7ze

Cybercrime Lawmaking and Human Rights in Ethiopia

Kinfe Micheal Yilma
2021 Mizan Law Review  
Ethiopia has embarked upon an ambitious project of revising a number of laws with a view to entrench human rights and democratic governance.  ...  Part of this legal reform program has been the revision of Computer Crime Proclamation No 958/2016.  ...  of the Federal Attorney General incidentally offered a legal justification of sorts for Internet shutdowns in its formal comments on a report of the UN Special Rapporteur on Freedom of Opinion and Expression  ... 
doi:10.4314/mlr.v15i1.3 fatcat:ipdikjp6vvg4tlmgr2issut6ba

Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeok Lim
2020 IEEE Access  
Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces  ...  Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper.  ...  He also guest edited many special issues in leading technical journals (i.e., the IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, the Journal of Networks and Computer Applications, Information Sciences, and  ... 
doi:10.1109/access.2020.3022661 fatcat:li7hno53n5fm5dn4lgd3bfjafy

The Emergence of the Lean Global Startup as a New Type of Firm

Erik Stavnsager Rasmussen, Stoyan Tanev
2015 Technology Innovation Management Review  
The TIM Review focuses on the theories, strategies, and tools that help small and large technology companies succeed.  ...  Overview The Technology Innovation Management Review (TIM Review) provides insights about the issues and emerging trends relevant to launching and growing technology businesses.  ...  This work is part of the research program "Towards Relational Business Practices" (REBUS), which is one of the research programs of the Finnish Metals and Engineering Competence Cluster, FIMECC. Q&A.  ... 
doi:10.22215/timreview/941 fatcat:el6gve4wgnb2pnmumqex2vae7e

An Approach to Resisting Malformed and Flooding Attacks on SIP Servers

Ming-Yang Su, Chen-Han Tsai
2015 Journal of Networks  
Abstract-A Mesh Network Topological Optimization and Routing II (MENTOR-II) algorithm is a low complexity and efficient network design algorithm for IP networks with OSPF routing protocol in which appropriate  ...  The Q-MENTOR are evaluated in terms of installation cost, routing cost and reliability for 486 network design conditions.  ...  as Network Security Situational Awareness NSSA, DDoS defense, worm and virus detection, botnet detection, etc.  ... 
doi:10.4304/jnw.10.2.77-84 fatcat:dt4cpvazwndsthm36jr32hkgxi

Full Text PDF of The JBBA, Volume 2 Issue 2, October 2019

Naseem Naqvi
2019 The Journal of British Blockchain Association  
Virus scanning and network protection rules could be used to search detect and block hosted material entering or leaving a network.  ...  Virus scanning and network protection rules could be used to search detect and block hosted material entering or leaving a network.  ...  Competing Interests: The JBBA | Volume 2 | Issue 2 | October 2019 j b b a t h e 62 [14] J. K.-S. Liew and L.  ... 
doi:10.31585/jbba-2-2-(full)2019 fatcat:lsnv4wnuhvhpne33puatdc4p4e

A Reasoned Approach to Prohibiting the Bis in Idem : Between the Double and the Triple Identities

Pierpaolo Rossi-Maccanico
2022 eucrim – The European Criminal Law Associations Forum  
Fresh Perspectives on Unresolved Problems in European Criminal/ Administrative Law The Associations for European Criminal Law and the Protection of Financial Interests of the EU is a network of academics  ...  For other language versions, please navigate using the external website.  ...  The EPPO assumed its investigatory and prosecutorial tasks on 1 June 2021 (special eucrim issue 1/2021).  ... 
doi:10.30709/eucrim-2021-032 fatcat:qygvgdtjwvejzbepy5oh4uqmna

Cybercrime precursors: towards a model of offender resources [article]

Ki Hong Steve Chon, University, The Australian National, University, The Australian National
Cybercrime is facilitated by crimeware, a specific type of computer software, and a focus on this element can help better understand how cybercrime evolves. Keywords: Cybercri [...]  ...  This thesis applies Ekblom and Tilley's concept of offender resources to the study of criminal behaviour on the Internet.  ...  A network of compromised computers, or the botnet, is in itself a case of unauthorised access of computers.  ... 
doi:10.25911/5d778a24d8836 fatcat:juofiyuoqjg4pp5mdejwrz3obq
« Previous Showing results 1 — 15 out of 23 results