Questions related to Computer Networks Security
I would like to make a thorough investigation on the most promising simulation platforms for simulation and analysis of Cyber Attacks on Cyber Physical Energy Systems, along with the application of security solutions and their impact on performance.
To the best of my knowledge, a combination of two or more simulation/emulation tools might be required. E.g. a tool representing the cyber components (such as ns-2, Omnet++, Emulab) along with a tool representing the power grid physical components, (such as MATLAB).
Since investigation and proposals of the research community is still going on, hence the selection of the simulation platform(s) seems to be inconsistent among the researchers.
Through this question, I would request the research community of this field to share their knowledge and experience in this regard, with thanks.
Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual took a specific action, such as created information, approved information or sent or received a message.
Social media platforms such as WhatsApp have a function which allows one to send a message to an individual or a group and DELETE the message from all the recipients leaving them with no evidence of what has been sent. This allows the sender to deny having sent such a message. Read-once messages which get destroyed upon being read can also be a breach of non-repudiation on Social Media platforms.
What is your view of these functions on social media platforms? Legally are they acceptable?
The SCPS Lab (https://www.scpslab.org/) is hiring for two Ph.D. positions in the following areas:
- Federated Defense Against Adversarial Attacks in IIoT.
- Threat and Anomaly Detection for Cloud Security.
The required skills for potential graduate students include:
- Strong background in cyber security.
- Strong background in machine learning and data analytic techniques.
- Background in detection and estimation theory.
- Strong oral and written communication skills.
To apply, please contact Dr. Hadis Karimipour (email@example.com) with your most recent C.V. and a list of two references.
Dear Researchers, I perform J48 Algorithm on KDD Test dataset in WEKA. it gives me Anomaly and normal class. if i want to know detail Anomaly attacks by category like Dos, R2L, U2R. how can i do in same dataset?
if someone helps i will be very thankful
In this digital world, with increasing digital devices and data, security is a significant concern. And most cases DOS/DDoS/EDoS attacks are performed by the botnet. I want to do research to detect and prevent botnets. Can you share an efficient research title to detect and prevent botnets?
I am working on cyber security domain. Currently, the work is to trace out the real ip address behind the VPN.
1. Is there any technique or api to trace out the real ip address which is masked with VPN?
2. How to determine whether the input ip address is original/proxy/vpn without any api support?
Researchers, Kindly provide the suggestion for the above questions.
#cybersecurity #vpn #proxy #networksecurity #researcher
I am a student of Master's (Computer Networks & Security ) currently I am doing research on the GreyHole attack in Cooja in RPL, but on the web, I didn't find any source to implement the attack, Kindly help me with this.
How to define the LSSS structure, i.e. the matrix M and the function ρ which associates each row of M to an attribute in attribute based encryption?Are there some developed methods that can be used to define the structure?
What is the relationship between tree structure and LSSS? Is tree a kind of LSSS, or an entirely different structure?
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
Hi, my M.Sc. thesis is "Detecting Android Malware using TF-IDF and N-Gram Methods Leveraging Text Semantics of Network Flows”. In my M.Sc. thesis I have worked on malware detection to find a new solution for malware evasion problem in android environments. I want to implement my idea with "Rapid Miner" thus I need a ".csv" data-set of malware and benign app network flows. I've downloaded many data-sets but none of the satisfied my needs. The most appropriate data-set among all of them for me is Android Malware data-set (InvesAndMal2019).
It's a great ".csv" labeled data-set but unfortunately all of data-set rows labeled as BENIGN.
I really need a ".csv" labeled android malware data-set composed of MALWARE and BENIGN network flows.
Can anybody help me with this?!
Hello all, I'm an undergraduate student and currently I'm interested to learn more about Cryptographic for Network Security. I want to know is there any paper or journal that quickly summarize whether each Encryptions Algorithm has their own behaviour that maybe works better for its different purposes?
Like some algorithms are best-used for Cloud Computing, some others are for an E-Commerce website, some others for Social Media application, etc. that would lead to decision making of which are more suitable for algorithm for every project.
This is related to Homomorphic encryption. These three algorithms are used in additive and multiplicative homomorhism. RSA and El gamal is multiplicative and Pallier is additive.Now i want to know what is the time complexity of these algorithms.
I'm currently working on my proposal for my master's thesis and would like to find out which current research topics in the field of network security are promising/interesting/hot.
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet?
Please, answer, comments.
I invite you to the discussion.
Does anyone have experience with FIREMAN toolkit. I need to know how to install it, and how to use it to analyse the efficiency of my firewall?
Or, what tools you using to analyse and test the efficiency of your Firewall?
I am want to know how signature based detection is implemented by anti-malware software companies. I know theoretical working of it but how it is implemented in actual software for efficient detection ?
I want to know about the simplest m Artificial Neural Network that can be used for the classification of network traffics to normal and attack in java using KDD cup 99. Can the classification read the KDD records as is or does they need to be normalized?
I'm trying to develop an intrusion detection for Industrial Ethernet. e.g. S7, PROFINET, Modbus protocols.
I want to evaluate my work on IE security dataset. Does anyone know security dataset in this domain? Some PCAP examples or sanitize dataset like KDD?
I want to simulate the cyber attack behaviour, such as the spread of worms, on computer networks to test a detection method. Could you please give me some advice about the selection among different simulators?
MulVAL- is a logic-based attack graph generation technique invented by Xinming Ou. I have installed "MulVAL" as per the instructions given in (http://people.cis.ksu.edu/~xou/argus/software/mulval/readme.html) and tried to run it for the testcase given in input file (input.P) as follows:
shyam@ubuntu:~/Desktop/Graph/mulval/utils$ ./graph_gen.sh /home/shyam/Desktop/Graph/mulval/testcases/3host/input.P -v
But I am getting the following error:
cat: goals.txt: No such file or directory
rm: cannot remove `goals.txt': No such file or directory
The attack simulation encountered an error.
Please check xsb_log.txt.
What does it mean and how do I solve it? Any kind of help would be appreciated.
I am looking for problems which are being currently researched in the domain of security for IoT especially in the aforementioned protocols.
i am working on creating an effective attack database for the researchers? Hence i need to know about the challenges faced by them in getting the attack datasets for reserach purposes
I want to analyse the effect of key management in DTN . I would appreciate any useful idea especially using ONE simulator.
Polymorphic generators can be used in software, to make self-modifying code (to prevent unauthorized copying of executable code).
Are there any ways to implement this mechanism for preventing unauthorized copying of some data from hard disk or RAM? E.g. I have a license.txt and I don’t want anyone to get copy of this file from my storage. So when intruder copies this file, he’ll get a fully changed copy of this file.
Can someone suggest any literature related (papers/documents)? It would be very much appreciated.
I have a number of trace files which I used it to extract features and create a lot of records in both situation normal, and abnormal. Are there any rules can we rely on to determine the final number of records in dataset for each class? can we choose the same number for both? or the normal class must has more number of records?Please what is the best solution which is more reliability?
I am working on developing a patch for DHCP server software. Please let me know from where I can get source code for an open source dhcp server.
I'm doing some research on the explosive characteristic of fountain codes,which means the original symbols can be decoded suddenly when the receiver gets some key symbols. I do think this feature can be used in the problem of physical layer security, in which the legitimate user can get enough encoded symbols before eavesdroppers,and finishes decoding firstly. I'm now focusing on how to enhance the explosive characteristic. I will really appreciate it that someone can give me some suggestions.
I would like to design a security model for smart city applications. However, I haven't come across a simulation tool specifically for smart cities. Is there any one who has an idea about the tools for simulating smart cities?
Sometimes it is necessary to use tools for hack (testing) or discover vulnerabilities and resolving security vulnerabilities in the system of institutions by using attacker tools :
- Kali Linux
- Network Security Toolkit (NST)
- Parrot Security
- BackBox Linux
Users are still vulnerable to malicious SPs that may collude to profile a user’s identity in a cloud environment. For instance, we have ten (10) Service Providers (SPs) and each of them have partial information about a user, what measure can one put in place to prevent these SPs from colluding to profile users’ attributes?
i want to implement a detection scheme which can detect data modification attack in ecg data. can anyone tell me which simulator should i use? how can i simulate an attack?
Eavesdropping, Man in the middle attack (MitM):
Attackers can take advantage of a known weakness in LTE wherein the user identity transference occurs unencrypted, in clear text between the UE and the eNodeB, during the initial attach procedure. This allows an eavesdropper to track the user cell-location or launch a man in the middle attack by user international mobile subscriber identifier (IMSI) impersonation and relay of user messages.
How would you classify the threat of cyber-attacks and their impact on supply chains?
Isn’t it a megathreat like natural disasters? Cyber-attack as an unknown-unknown risk that is rather uncontrollable with huge potential impact?
What is the role of Prof. Simchi-Levi’s Risk Exposure Index regarding cyber risk assessment? Do you think it is possible and beneficial to apply the REI for the mitigation of cyber risks?
What Windows based honeypot do you suggest for gathering interactions to be used with WEKA to generate a training file using WEKA supervised learning?
[To be installed on VMWare]
detecting network layer attacks in manet requires some background knowledge. how can this be implemented.Suggest some ways kindly.
I have new authentication method asked user to login based in some features,
how can I calculate the FP and FN .and is there any tool can help.
After reading some papers, I found many papers skip the detail of making IDS, instead, directly go to evaluation part.
Can anyone give me some hints about how to build a host based light weight IDS for detecting VM escape? Good references?
Thank you very much!
I have to send the encrypted data to more than one cloud storage.I have a same question as Neetha Sharma do. Where can I insert my code in a simulation program example. First of all, Which example can I take for my project?
Suppose I have made a IDS (Intrusion Detection System), For example using KDD CUP99 I have made a system and I have done the test and evaluation and the result is acceptable. Now, I want to evaluate my proposed system on real online traffic . I can capture the packet using PCAP, I can extract the features and detect is it normal and anomaly. BTW, my problem is how can evaluate the output, because there is no ground file for that traffic. How can evaluate my system on real traffic? may be during the testing all the traffic in normal how can evaluate the performance of system on abnormal traffic? I think I have to make some abnormal traffic and test the system using my own abnormal traffic, Does this idea is correct and how should I make abnormal traffic?
Does single or dual-n-back training have any lasting, transferable effects on other cognitive skills, apart from improving the performance in running the dual-n-back game? Some research studies indicate that it may have some effect for some people with some conditions (e.g. older people, people with dysphoria etc.), however larger meta-studies indicate no or very small effect in general as well as methodological problems in the underlying studies. The research therefore seems inconclusive.
What is your research experience with this? Are there any groups or conditions where such training has been shown to have transferable, lasting effects?
How to measure how strong the correlation between cloud security policies and privacy requirement in saas and paas to protect those security threat related privacy?
I am trying to implement the video watermarking based on visual cryptography. I have created two share of a image in '.bmp' formats. How these two shares will be embedding in the video while using the frequency domain.
I have divided the video into parts ( Suppose the video consisting 300 frames. In this way each part is having 150 frames each) to embed these share in two different parts. I have extracted the Y component of each part of the video. On which I had applied the DWT. Extract the HH Band. Apply SVD. And get the singular matrix.
How could I process the two share of transparencies in order to embed into the singular value obtained of these two parts of video as indicated above. Also requested to please tell me the extraction process of these two transparencies from watermarked video ?
You are most welcomed to informed me about any other method to implement the visual cryptography based video watermarking.
My undergraduate students are involved in designing a web based student admission system. They have to make the system secure from different types of attacks and cover vulnerabilities. What types of attacks and vulnerabilities are there? What basic security features should be implemented to provide average level of security.
I have two sets of entities A and B, members of A have a kind of relationship with members of B, we need to investigate the stability of the relationship between a member or a subset from A with a member or a subset from B over a long time (week, month, year) with a time window (five minutes for example)
I am searching for such network attacks which are quite new and current research is going on to propose mitigation techniques for that attack.
i would like to ask that what are the efficient way to exchange the session key among N party in adhoc. Here, i want to make an algorithm to generate the session key among n people in the network, new user who want to join the network may also share the same session key and user who left the network may diminish the key permission.
I have used Boneh Shaw's concatenated scheme, but because of replication factor the code length is too long. So what can I do to minimize the length?
I am interested to know how the cloud providers trust their new cloud users and what are the factors they considered for trusting the new user.
Generally a cryptosystem is used to encrypt and de-crypt the data
where as a commitment scheme is used to commit and de-commit the data.
By combining the two : cryptosystem and commitment scheme can we enhance the security of a system?
Definition 1: A key k is called perfect if it is uniformly distributed from the adversary's point of view; a key k is called ε-perfect, if its distribution has an ε trace (statistical) distance to the uniform.
For hash functions, we have following theorem of composition:
Let F be a set of of ε1-AU2 hash functions from M->Z, and let G be a set of ε2-ASU2 hash functions from Z->T. Then H=G*F is an ε-ASU2 hash function family from M->T with ε=ε1+ε2
My Questions is following:
Is there any theorem of composition of ε-perfect keys that is not related to hash functions? To be precise, let us analyze key k1 which is ε1-perfect and key k2 which is ε2-perfect. What is the security (perfectness of the output) of their composition k1 XOR k2? Both keys have the same length.