- Mehdi Kargar added an answer:What is penetration testing? How it is implemented in information security?I need information on penetration testing to find out the vulnerabilities in the network.
The action is to find security holes in a company or an organization to protect and secure sensitive informationFollowing
- Abdullah A. Mohamed added an answer:I aim to design on-line IDS by using nsl-kDD data set. is there any way to extract the features of NSL-KDD from a real packet?NSL-KDD features consist of 42 features, divided into three classes TCP header, domain and 2-Minette connection. The first type is extracted easily, but the last tow type i can't seem to get. Is there any tool, program language lib. C#.net or other that could be of help?
The feature is shown below.
10 hot no. of hot indicators
11 number failed logins no. of failed logins
12 logged in (discrete)
13 number compromised no. of compromised conditions
14 root shell
15 su attempted
16 num root no. of root accesses
17 num file creations no. of file creation operations
18 num shells no. of shell prompts
19 num access files no. of operations on access control files
20 num outbound cmds no. of outbound commands in an ftp sessionc
21 is host login (if the login belongs to the hot List)
22 is guest login
23 count no. of connections to the same host as the current connection in
24 srv count no. of connections to the same service as the current connection in the past two seconds
25 Serror rate % of connections that have SYN errors
26 srv Serror rate % of connections that have SYN errors
27 rerror rate % of connections that have REJ errors
28 srv rerror rate % of connections that have REJ errors
29 same srv rate % of connections to the same ser-vice
30 diff srv rate % of connections to different service
31 srv diff host rate
32 dst host count
33 dst host srv count
thanks Mr. Mahdy. I will.Following
- Sirapat Boonkrong added an answer:Is there any way to perform manual assocation of random MAC addresses with the access point in a wireless environment?
I wanted to know if an attacker can do manual associations of random MAC addresses with the access point.
Can it be done in case of WPA2 encrypted networks too, i mean the complete four way handshaking involved during authentication?
It depends what type of authentication you are doing.
If you do "open authentication", it is possible for any attacker to fake a MAC address.
If you do "shared-key authentication", then it becomes more difficult because authentication is done using the pre-shared secret key, rather than a MAC address.
Bear in mind that if your wireless network uses DHCP, it is very likely that you will need to have an additional authentication layer to stop DHCP from giving out IP address automatically.Following
- Nils Ulltveit-Moe added an answer:What steps should be considered before implementing ISMS in an organization?
I am providing the scope of ISMS for an organization who has contract with us. We are going to test the feasibility before implementing ISMS. Does anyone have any idea about such an issue?
Thank you so much.
We have now released a set of resources from the PRECYSE EU project that are useful for implementing an Information Security Management System:
I have released a course on using the Verinice ISMS:
The YouTube playlist "PRECYSE Verinice Course" with screencast videos is here:
The arftoverinice import filter for importing OpenVAS scans into Verinice is here:
The Magerit control catalogue and OCIL test suite is here:
- Nils Ulltveit-Moe added an answer:How can we authenticate a remote program?
Suppose we have a set of API hosted on a local server. I only want legal remote programs to invoke those APIs. If the remote program is, let's say the original program that I uploaded to the remote machine, then I allow the invoke. If the remote program is a version tampered by the attacker, then I disallow it. How can I bind the program's identity to the function invocation to determine whether the remote program is not tampered?
Remote attestation based on trusted computing supports detecting changes of the remote software.Following
- Priti Puri added an answer:What is the most appropriate classification method to classify qualitative parameters of bank's risk (i.e. reputation, legal and compliance) ?
Regarding to Basel II Pillar 2, they spelled out that bank should notice other inherent risk such as compliance, reputation, legal and strategic risk. These are qualitative (as far as I know, except there is a way to quantify them).
I was thinking about Fuzzy Inference System, but looking at the high dynamic economic condition, this method is no longer applicable or not proper enough to cover the possibilities.
Any answer and discussion are welcome, it will be my pleasure to catch your answer/ideas.
combination of all threeFollowing
- Louis Brassard added an answer:Do you support Tom Leinster's call not to help intelligence services through mathematics?"Intelligence agencies hire lots of mathematicians, but would-be employees must realise that their work is misused to snoop on everyone, says Tom Leinster"
New Scientist has published an article recently, where Tom Leinster asks mathematicians to stay away from supporting NSA, CIA, GCHQ, (former) KGB and all the other organizations that spy on us. I even don't know the name of their Chinese colleagues' organization.
What are your thoughts on this?
I recommend the 2014 documentary film (can be freely seen on the internet) : Citizenfour ; it shows the behind the scene of the Edward Snowden and the NSA spying scandal. It was shot during the events. It won the Academy Award for Best Documentary Feature at the 2015 Oscars.Following
- Nicolai Kuntze added an answer:Can anyone help me to find research in using encryption algorithms to secure Peer to peer network?
I try to find some research papers for securing Peer to peer network,
the question here is what's your aim. There are various ideas on P2P networks out there with very different purposes. What kind of P2P network do you address? Is it more in the direction of BitTorrent (content distribution) or BATMAN (ad-hoc networks)? Do you have control, owner or are even the administrator of the devices used? To answer your question it would be good to know more of your use case first.
- Muhammad Imran Tariq added an answer:How can I simulate SLA based Information Security metrics for Cloud Computing?
I have made SLA based Information Security Metrics for Cloud Computing and desired to simulate on any simulator..
Would you please suggest me appropriate simulator and the way to simulate it
Thanks Hamza Kheddar, It is really a good material for initial study.....
I installed CloudSim and now working on this.... if you have any other material relates to my request then please send and oblige.
- Muhammad Imran Tariq added an answer:Which Information Security framework / standard/certification/guide is best for cloud organizations to maintain their security?There are several Information Security frameworks, standards, certifications and guides to maintain security in an organization.
Would you share which one is best for said purpose?
Thanks Vito for your appreciation and Acknowledge. It is Book not paper. I will find out ISO 27001:20013 on internet :)
Muhammad Imran TariqFollowing
- Rodrigo Ruiz added an answer:How to provide better security in our online communication?If it is on internet it is not private!!!
I would like to remember that ALL what you type on your computer can be recovered. Including ssl navigations using TOR if anybody have acces to your computer.
- Ahmad T Siddiqui added an answer:Is there any article which discussed case study / application of privacy in distributed data mining?
I want to know about real case study of privacy threat cause of association rule mining (Distributed or centralized database).
try these links:
Hope it helps...Following
- Vanessa Ayala-Rivera asked a question:Hi, could someone please point me to a numerical example showing how Mantaras distance is used to compare two partitions?
As additional context, I am planning to use this metric in clustering evaluation to calculate the distance between two partitions (each one with a set of clusters). However, I am always getting a distance of 1 (regardless of the input clusters). This issue leads me to believe that I might be interpreting incorrectly a part of the equation: Dist(Pa,Pb) = 2 - (I(Pa) + I(Pb)/I(Pa ∩ Pb)). Unfortunately, all the references I have found only show the involved equations without a detailed example.Following
- Per M. Gustavsson added an answer:Can anyone help me with main principles and models usually used for visualization of information security events and incidents?For information security managers in SIEM systems
Look at the start-ups that showed their products at CyberTech2014 as an example (https://www.cybertechisrael.com/) - there you have both common and innovative methods.
Is it real-time monitoring or is it to reconstruct an event chain?
Should it be used for informed decision making? Purpose ?
Real-time monitoring then the process views etc. in ITIL CORBIT may be to complicated. Often different gauge meters dashboards, network views are used, which do not provide with insightin whats happening (compare to balanced score card dashboards or lean dashboards...) In a reconstruction analysis phase ITIL, CORBIT or rather the business process view will add value for visualization.Following
- Abdul kadhem A Abdul kareem added an answer:How can I process data loss when applying steganography using DCT?
when hide some bits of secret message in DCT coefficients ,we note some lossy in extracting message(sorry for bad English)
dear Nilanjan Dey
thank you for your interactiveFollowing
- Devi Thiyagarajan added an answer:Does anyone know of a simulator that supports implementing cryptography algorithms in the cloud?I’m conducting a research on cloud computing security. I need a cloud computing simulator that supports implementation of cryptography algorithms. Please advise me which simulator to use.
I would like to implement ECC algorithm in for securing files in CLoud.. Wat kind of implementation i can do...Following
- Mojtaba Alizadeh added an answer:Is this statement correct: "Mobile devices such as laptops, mobile phones, USB memories, and PDAs do not posses tamper-resistant characteristics"?
The problem is that most of authentication methods that use smart card in authentication procedures, are vulnerable against theft. Is it correct?
Ref: "Cryptanalysis and Improvement of “An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems” (Khan and Kumari, 2014)
Thank you so much for your comprehensive answer, and for your time to answer this question. Your answer is completely helpful.
- Marcin Piekarczyk added an answer:What is an efficient algorithm for arithmetic encoding of biometric data?
Encoding of biometric data to arithmetic for use in cryptographyFollowing
- Mohamed Amine Ferrag added an answer:Could anyone present some information, survey about the public key encryption with keyword search applied to cloud computing ?
Traditional searchable encryption has been widely studied in the context of cryptography. Could anyone present some information, survey about the public key encryption with keyword search applied to cloud computing?
Thnaks for the link.
- Natalia G. Miloslavskaya added an answer:Do we need Information Security Theory?Any thoughts about the need for and possibility of creating a complete IS Theory as a basic science?
I am not agree that it is needed only for academic purpose. No build an effective protection for a real infosystem you should follow some obligatory steps, which you cannot fulfill without knowing the basics of IS theoryFollowing
- A. Frolov added an answer:How can we automate penetration testing in order to improve network security?Penetration testing is a very difficult and complex task in network security testing. How can we automate this process? Which tools or demo and test versions are available?
Alexander Frolov, Alexander Vinnikov. FSM Simulation of Cryptographic Protocols Using Algebraic Pr0cessor. In Proceedings of the Ninth International Conference on Dependability and Complex systems DepCoS-RELCOMEX, June 30-Juy 4,2014. P.189-198.
We study FSM model of cryptographic protocols that reflects both the system functionality and strategy of attacks and explored the fact that all data are divided into two classes: public transactions available to all parties and private data available to only party that inputted or originated them. In terms of this model the protocols FSM composition property and operation of composition of protocols FSM models are determined. This approach is supported by created software called algebraic processor that allows computer experiments to identify and demonstrate the leaks. We describe the structure and functionality of algebraic processor and some examples of attacked cryptographic protocols simulations.Following
- David Arroyo added an answer:Are there any practical application of prediction algorithms to encrypted data?
I am doing a research on prediction analysis of encrypted data. And would like to find out what latest developments (algorithms, tools, methods, practical applications etc.) have been done in this area.
The first scenario determines a less demanding trust model. Therefore, the client achieved better protection against a non-trusted cloud server. Take into account that nowadays the role of the client is more a more relevante, it is advisable to go for solutions focused on the client. In this regard, it is very interesting the SPION project:
Also, you could consider the Websand european project:
- Adil AL-Rammahi added an answer:Can someone please share reviews on security measurements of Line mobile Messaging Application?
I have a project of analyzing the security level of Line mobile Messaging Application by sniffing the packet and see whether or not I can read it's messages being exchanged between user and the server.
So far, I could not find reviews in the security side expect one review on the application structure and nothing is says about security aspects.
Could someone please share here any relevant reviews on the security measurements being implemented by Line (i.e cryptography implementations) ?
see affine cryptography.Following
- Santosh Kumar Sahu added an answer:Is there any alternative for wordfield to brute force cap file?
I am brute forcing cap file captured by adapter using wordfield in Kali Linux and it is testing keys with a very slow rate of 750k/s. Is there any other efficient tool available for the same?
You try to use caploader which decode the pcap files into connections. Anther tool is commview. It is also converts the pcap files as per sessions. I hope it will useful to you.Following
- Nirmal Singh added an answer:What benefits can we get from the behaviour analysis of Malware?
Studying malwares behaviour might be complicated but after we do behaviour analysis of malware, what advantages can we get?
These all are widely used tools. if you still want to test then setup your own system (Cuckoo Sandbox- http://www.cuckoosandbox.org/ )and compare both results :)Following
- Mohamed Amine Ferrag added an answer:Could anyone present some information on securing embedded systems: cyber attacks, countermeasures, and challenges?
The security is now a major issue in our economy, hence the need to revisit the concepts and terms related to safety in order to protect themselves effectively against malicious adversaries. In embedded systems, the security covers many issues related to protection of circuits and data that they handle.
Many thanks for your answers.Following
- Dan Eigeles added an answer:What approach would you take to implement a (true) random number generator?
One that is both useful for cryptography and yet reasonable for a master thesis. What physical phenomena would you consider as entropy sources? Any with minimum (preferably no) hardware engineering? What about humans or any other sources?
To what extent can I then pursue the goal of true randomness?
This is an example of what may solve your need http://www.random.org/integers/ In fact you can use any source of random phenomena which can be converted to an electrical signal, then digitized by an A2D converter and use the output values as random numbers.
As a paraphrase, nothing in the Nature is random. Even what we call "chaos" has its deterministic rules. The truth is that the human kind is still far away from really understanding the rules of Nature. So we, the humans, "blame" Nature for so many phenomena which we are unable yet to understand in full their rules (human cognitive dissonance).Following
- Randhir Bhandari added an answer:What is the method of security provision in core network (home environment) in 3G mobile communication networks - Encryption or Encoding?In order to security provision in radio access network of mobile communication networks we use encryption methods, I was wondering what method is used to keep confidentiality in core network.
security protocols like AKA for 3G networks provides security/authenticationFollowing