Thomas Lange’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


On Security Challenges of Future Technologies
  • Article
  • Full-text available

November 2019

·

1,168 Reads

·

7 Citations

Journal of Communications

Thomas Lange

·

Considering emerging technologies and applications is an important step in assessing future security needs. For example, Advances in Internet of Things (IoT) and Autonomous Systems have presented new cyber security challenges. The severity of such cyber threats is magnified as societies are becoming more and more dependent on such emerging technologies. The purpose of this paper is to identify these emerging technologies and the associated threat landscape based on current knowledge and ongoing research. This can help protect societies from cyber threats associated with such technologies.

Download

On Security Threats of Botnets to Cyber Systems

March 2019

·

2,099 Reads

·

29 Citations

As the dynamics of cyber warfare continue to change, it is very important to be aware of the issues currently confronting cyberspace. One threat which continues to grow in the danger it poses to cyber security are botnets. Botnets can launch massive Distributed Denial of Service (DDoS) attacks against internet connected hosts anonymously, undertake intricate spam campaigns, launch mass financial fraud campaigns, and even manipulate public opinion via social media bots. The network topology and technology undergirding each botnet varies greatly, as do the motivations commonly behind such networks. Furthermore, as botnets have continued to evolve, many newer ones demonstrate increased levels of anonymity and sophistication, making it more difficult to effectively counter them. Increases in the production of vulnerable Internet of Things (IoT) devices has made it easier for malicious actors to quickly assemble sizable botnets. Because of this, the steps necessary to stop botnets also vary, and in some cases, it may be extremely difficult to effectively defeat a fully functional and sophisticated botnet. While in some cases, the infrastructure supporting the botnet can be targeted and remotely disabled, other cases require the physical assistance of law enforcement to shut down the botnet. In the latter case, it is often a significant challenge to cheaply end a botnet. On the other hand, there are many steps and mitigations that can be taken by end-users to prevent their own devices from becoming part of a botnet. Many of these solutions involve implementing basic cybersecurity practices like installing firewalls and changing default passwords. More sophisticated botnets may require similarly sophisticated intrusion detection systems, to detect and remove malicious infections. Much research has gone into such systems and in recent years many researchers have begun to implement machine learning techniques to defeat botnets. This paper is intended present a review on botnet evolution, trends and mitigations, and offer related examples and research to provide the reader with quick access to a broad understanding of the issues at hand.

Citations (2)


... T.Lange, 2019) Emphasizes that security problems in social networks arise from the privacy of information, when the conditions of use are not fully known, or if users are registered in applications such as Facebook, WhatsApp, and others, with a false identity; generate violations of good practices pursued by this type of application. Ethics has been an important factor in the design, implementation and use of social networks and AI as mentioned in(Taddeo, 2018) where projects have implemented regulations to define and explain when and how an AI system can make decisions and what would be their impact.(Finnemore, ...

Reference:

Proceedings of International Conference on Engineering, Science and Technology 2021
On Security Challenges of Future Technologies

Journal of Communications

... Progressive advances in cybersecurity methods are required to identify and reduce the effects of botnet attacks, which have become difficult tasks. Research and development activitiesshould prioritize improving the security of botnet attack detection in this particular environment [3]. ...

On Security Threats of Botnets to Cyber Systems