Context in source publication

Context 1
... tion modules rely on this internal representation and pro- vide keywords for use in rules. Overview of the Suricata's architecture is shown in Figure 6. Each packet is first processed in decoding functions and then in detection modules. ...

Similar publications

Conference Paper
Full-text available
Recently, due to economical escalation & with the need of advancements in national strategy based on scientific technologies, maximum institutions have been adopting their own campus network. That is why setting up campus network is being realized as important part of school education information. The utilization of campus network shares opportunit...
Preprint
Full-text available
The Internet of Things, which is in the next phase of communication, is quickly overtaking all other technologies. IoT enables seamless data exchange, interaction, and communication between various physical objects. IoT brings automation and intelligence to a variety of industries and fields, including agriculture, transportation, industry, and hea...
Article
Full-text available
With the rapid development of the Internet, network security situation awareness has attracted tremendous attention. In large-scale complex networks, network security situation awareness data presents the characteristics of large-scale, multi-source, and heterogeneous. Recently, much research work have been done on network security situation awaren...
Article
Full-text available
The prediction of intrusion intention of abnormal information in wireless network can effectively guarantee the security and stability of network. Traditional methods describe the relationship between different types of attacks. When building the model, only the path of the network nodes involved in the current attack behavior is considered, so the...
Article
Full-text available
Location privacy protection is an essential but challenging topic in the field of network security. Although the existing research methods, such as k -anonymity, mix zone, and differential privacy, show significant success, they usually neglect the location semantic and the proper trade-off between privacy and utility, which may allow attackers to...

Citations

... Some of these threats are significantly unpredictable, as various malicious agents can exploit several vulnerabilities before compromising a prized asset within the heterogeneous system, especially in IoT systems. To develop dependable IoT-Driven applications, the security attribute of the system must be well considered from the design stage of a system [26,56]. This effort is necessary to ensure that the systems are guarded against the exploitation of intended malicious agents from compromising the system's CIA and other security attributes [57]. ...
Article
Full-text available
The rapid progress of the Internet of Things (IoT) has continued to offer humanity numerous benefits, including many security and safety-critical applications. However, unlocking the full potential of IoT applications, especially in high-consequence domains, requires the assurance that IoT devices will not constitute risk hazards to the users or the environment. To design safe, secure, and reliable IoT systems, numerous frameworks have been proposed to analyse the safety and security, among other properties. This paper reviews some of the prominent classical and model-based system engineering (MBSE) approaches for IoT systems' safety and security analysis. The review established that most analysis frameworks are based on classical manual approaches, which independently evaluate the two properties. The manual frameworks tend to inherit the natural limitations of informal system modelling, such as human error, a cumbersome processes, time consumption, and a lack of support for reusability. Model-based approaches have been incorporated into the safety and security analysis process to simplify the analysis process and improve the system design's efficiency and manageability. Conversely, the existing MBSE safety and security analysis approaches in the IoT environment are still in their infancy. The limited number of proposed MBSE approaches have only considered limited and simple scenarios, which are yet to adequately evaluate the complex interactions between the two properties in the IoT domain. The findings of this survey are that the existing methods have not adequately addressed the analysis of safety/security interdependencies, detailed cyber security quantification analysis, and the unified treatment of safety and security properties. The existing classical and MBSE frameworks' limitations obviously create gaps for a meaningful assessment of IoT dependability. To address some of the gaps, we proposed a possible research direction for developing a novel MBSE approach for the IoT domain's safety and security coanalysis framework.
... Originally called 'hidden services', websites that are exclusive to Tor networks and have a top level domain of '.onion' are now called onion services [23]. These are websites that are made anonymously and can only be accessed via a link provided from the website's host [12]. Onion services are private servers that allow two-way anonymity. ...
... Once the target is selected, the attacker creates a Point of Entry (PoE), and once inside the targeted network a communication channel with the attacker should be established, so the rest of the attack can continue with no interference. This initial stage of the attack typically includes an initial dropper file, which can contain any type of malware that has the main purpose to download another file from the Internet, which will be useful to continue with the rest of the attack [2]. ...
... An interesting detection method is the Intrusion Kill Chain (IKC) model [2]. This method facilitates the identification of multi-stage attacks by following the IKC seven-phase model that an attacker generally follows to carry out an attack. ...
... So, by following the IKC model, we could be able to break the attack by interfering any of the seven phases. Breaking the attack at an early stage can stop the multi-stage on time [2]. ...
... It has been widely used in traffic management. [2], security monitoring [3], intelligent transportation systems [4], robot navigation [5], auto pilot [6], and video surveillance [7]. ...
Article
Full-text available
This study proposes a visual tracking system that can detect and track multiple fast-moving appearance-varying targets simultaneously with 500 fps image processing. The system comprises a high-speed camera and a pan-tilt galvanometer system, which can rapidly generate large-scale high-definition images of the wide monitored area. We developed a CNN-based hybrid tracking algorithm that can robustly track multiple high-speed moving objects simultaneously. Experimental results demonstrate that our system can track up to three moving objects with velocities lower than 30 m per second simultaneously within an 8-m range. The effectiveness of our system was demonstrated through several experiments conducted on simultaneous zoom shooting of multiple moving objects (persons and bottles) in a natural outdoor scene. Moreover, our system demonstrates high robustness to target loss and crossing situations.
... According to the study of Ghafir and Prenosil [19], network monitoring is a set of tools that allows network administrators to keep track of the current state and longterm trends of a complex computer network. This study discusses the current state of network monitoring. ...
... Furthermore, numerous identified resources are focused on specific technologies and tools that CSIRTs and SOCs leverage to carry out their mission, such as for performing malware analysis [14], vulnerability assessment and penetration testing [15], and network [16] and endpoint monitoring [17]. However, these are very narrow in scope. ...
Conference Paper
With digital technologies now being part of the fabric of our societies, identifying and managing cybersecurity threats becomes imperative. Within the European Union, several initiatives are underway, aiming to motivate, regulate and eventually orchestrate the establishment of capacity and enhancement of situational awareness, incident response, and preparedness capabilities, with an expected emphasis on operators of essential services and state actors entrusted with cybersecurity. In this context, the institution of cooperation and information exchange channels to allow for coordinated cross-border responses to largescale incidents is particularly prioritized. Motivated by the above, this work presents a conceptual blueprint in support of architecting and establishing interoperable Cyber Security Operations Centres that combine capacity for situational awareness, incident response, and preparedness, also benefiting from the interplay between them, ultimately enhancing national cybersecurity capabilities, cross-border collaboration, and national supervision of their critical sectors, in line with current and upcoming regulatory requirements and the ever-increasing need for national and international cooperation.
... The use of the Tor browser is completely legal unless you reside in a country like China that actively blocks access to the Tor network. The Tor browser has the capability to facilitate or commit crimes [6]. The privacy offered by a browser like Tor is extremely important in the digital age today, as many corporations and hackers partake in unauthorised surveillance of online activity [2]. ...
... Before this, in 1994, there was a small community of self-identified people from America. It was mentioned in an article by the maker of the phishing software 'AOHell' [4], showing this is just one case from the millions of people who have done this attack, some maybe dating to the early days of the internet dating back to early-to-mid 1980s. 'By 1983, ARPANET was being used by a significant number of defense R&D and operational organizations' [5]. ...
... Identifying attacks on web servers is a basic task of any administrator who maintains them because if protection is breached, the application may be inaccessible to a large number of users or permanently destroyed [1]. There are many network security monitoring solutions used worldwide [2]. One helps identify and detect attacks on web servers is Wazuh. ...
Conference Paper
During the difficult times of the Covid pandemics and the transfer of work from the office to the home, security has never been more challenging. Because the development of information technology is expanding day by day, there is increasing amount of network traffic. Within that traffic, a potential attacker can often cover up his evil intentions. To detect attacks on host computer and prevent it from further malicious activities, Host Intrusion Detection Systems are often used. One of these systems is Wazuh and thanks to its powerful features it has been adopted by many companies. This paper provides an overview of the possibilities of Wazuh tools with a special emphasis on well-known attack detection on web servers.
... [45][46][47] By the IoE system, utilities will be able to manage and operate all smart device-related processes and data acquisition systems, communicate with all grid devices, receive problem notifications, and manage new metering points. The security of the system can not be neglected so we will employ different approaches to achieve secure cloud and IoT services as in the work of Ghafir et al. 48 These developments will also motivate us to investigate other forecasting-related issues, such as the spatial correlation of one station with other stations, the micro-scale forecasting for small urban areas, and the effect of other conditions, eg, weather, on the forecast. We will utilize machine learning methods derived for abnormal conditions as in the work of Khalaf et al 49 ...
Article
Full-text available
Abstract Accurate and efficient model predictive control (MPC) is essential for Internet of energy (IoE) to enable active real-time control, decentralized demand-supply balance, and dynamic energy management. The MPC consists of short-term electric load forecasting, whose accuracy is affected by the load characteristics, such as overdispersion, autocorrelation, and seasonal patterns. The forecast- ing efficiency depends on the computational time that is required to produce accurate results and is affected by the IoE data volume. Although several funda- mental short-term forecasting models have been proposed, more accurate and efficient models are needed for IoE. Therefore, we propose a novel forecasting temporal negative binomial linear model (NBLM) that handles overdispersion and captures nonlinearity of electric load. We also classify the load into low, moderate, and high intraday seasons to increase the forecast accuracy by mod- eling the autocorrelation in each season, separately. The temporal NBLM was evaluated using real-world data from Jericho city, and its results were compared to other forecasting models. The temporal NBLM is found more accurate than the other models as the mean absolute percentage error (MAPE) is reduced by 29% compared to the ARMA model. In addition, the proposed model is more efficient as its running time is reduced by 63% in the training phase and by 87% in the forecast phase compared to the Holt-Winter model. This increase in accuracy and efficiency makes the proposed model applicable for load forecast- ing in IoE contexts where data volume is large and load is highly fluctuated, is overdispersed, is autocorrelated, and follows seasonal patterns.