Science topic

Network Security - Science topic

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
Questions related to Network Security
  • asked a question related to Network Security
Question
3 answers
To prevent and detect man-in-the-middle attacks in the Oracle blockchain (Oracle problem) It involves a combination of cryptographic techniques, secure communication protocols, and network security measures.
I need proposals for research contributions in this aspect that can help me in my doctoral research ????
Relevant answer
Answer
Securing an Oracle blockchain against man-in-the-middle (MitM) attacks involves implementing a combination of cryptographic techniques, secure communication protocols, and network security measures. Here are some general guidelines that you can follow, Use Secure Communication Protocols:Employ TLS/SSL: Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL), should be used to encrypt communication between nodes in the Oracle blockchain network. This ensures that the data exchanged between nodes is secure and cannot be intercepted by an attacker, Implement Cryptographic Techniques:Public Key Infrastructure (PKI): Utilize a PKI to manage and distribute public keys for secure communication between nodes. This involves using digital certificates to authenticate the identity of each participant in the blockchain network, Digital Signatures: Implement digital signatures to ensure the integrity and authenticity of messages. Each transaction or block should be signed by the sender using their private key, and the recipient can verify the signature using the sender's public key, Enforce Identity and Access Management (IAM):Implement strict identity and access controls to ensure that only authorized participants can join the blockchain network. Use strong authentication mechanisms, such as multi-factor authentication, to protect user accounts and prevent unauthorized access, Secure Key Management:Properly manage and secure cryptographic keys used for signing and encrypting data. Use hardware security modules (HSMs) or other secure key storage solutions to protect private keys from unauthorized access, Network Security Measures:Firewalls: Deploy firewalls to control and monitor incoming and outgoing network traffic. Configure firewalls to only allow necessary communication between blockchain nodes and block unauthorized acces,و Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): Implement IDS and IPS to detect and prevent suspicious activities or potential attacks. These systems can help identify and block malicious traffic in real-time, Regular Audits and Monitoring:Conduct regular security audits to identify vulnerabilities and ensure that security measures are effective. Implement continuous monitoring to detect and respond to potential security incidents promptly Security Awareness and Training:Ensure that all participants in the Oracle blockchain network are educated about security best practices. This includes understanding the risks associated with MitM attacks and knowing how to recognize and report suspicious activities, Regularly Update and Patch:Keep all software, including the blockchain platform and underlying infrastructure, up to date with the latest security patches. Regularly update and patch the operating systems, databases, and other components to address known vulnerabilities, By implementing these measures, you can enhance the security of your Oracle blockchain network and reduce the risk of man-in-the-middle attacks. Keep in mind that security is an ongoing process, and it's essential to stay vigilant and adapt to emerging threats.
  • asked a question related to Network Security
Question
3 answers
To prevent and detect man-in-the-middle attacks in the Oracle blockchain (Oracle problem) It involves a combination of cryptographic techniques, secure communication protocols, and network security measures.
I need proposals for research contributions in this aspect that can help me in my doctoral research ????
Relevant answer
Answer
Good suggestions are given by Dimitrios Sargiotis and Mohanad ali Mohammed. You may think in these burning areas
  • asked a question related to Network Security
Question
3 answers
The field of cyber security is open and has multiple fields (network security, information security, and digital forensics), so I need help in suggesting some recent topics in which I can register for my Ph.D. and improve them. Thank you.
Relevant answer
Answer
Here are some recommendations for major recent cybersecurity topics to register for a Ph.D. in 2023:
  • Quantum computing and cybersecurity
  • Artificial intelligence (AI) and cybersecurity
  • Internet of Things (IoT) security
  • Cloud security
  • 5G security
  • Software-defined cybersecurity
  • Cyber insurance
  • Cyberpsychology
  • Blockchain technology for cybersecurity
  • Machine learning for cybersecurity
  • Cybersecurity for smart systems
  • Decentralized cybersecurity
  • Data provenance and evidence collection in the cloud
  • Data structures for IoT security
These topics are all important and timely, and they offer the potential to make significant contributions to the field of cybersecurity.
Here are some specific examples of PhD research projects in these areas:
  • Quantum computing and cybersecurity:Developing new cryptographic algorithms that are resistant to attack by quantum computers Designing new quantum-safe security protocols
  • AI and cybersecurity:Developing AI-based malware detection and prevention systems Using AI to improve the security of critical infrastructure Investigating the ethical implications of using AI in cybersecurity
  • IoT security:Developing new security solutions for IoT devices and networks Protecting IoT data from unauthorized access and use Securing IoT systems against cyberattacks
  • Cloud security:Developing new security solutions for cloud computing environments Protecting cloud data and applications from cyberattacks Ensuring compliance with cloud security regulations
  • 5G security:Developing new security solutions for 5G networks and applications Protecting 5G data and services from cyberattacks Ensuring the resilience of 5G networks to cyberattacks
When choosing a PhD research topic, it is important to consider your own interests and expertise, as well as the availability of supervisors and funding. It is also important to choose a topic that is both challenging and feasible.
If you are interested in pursuing a PhD in cybersecurity, I encourage you to explore the topics listed above and to contact potential supervisors to discuss your research ideas.
  • asked a question related to Network Security
Question
8 answers
What are the best simulation tools for Network Security? Are there any free tools available?
Relevant answer
Answer
There are several simulation tools for network security, and some of them are available for free. These tools are valuable for testing and evaluating network security measures, conducting penetration testing, and assessing vulnerabilities. Here are some of the best simulation tools for network security, including both free and open-source options:
  1. Wireshark (Free):Wireshark is a widely-used network protocol analyzer. It allows you to capture and analyze network traffic in real-time. It's helpful for identifying network issues and potential security threats.
  2. Nmap (Free and Open Source):Nmap, short for "Network Mapper," is a versatile open-source tool for network discovery and security auditing. It's commonly used for network scanning and vulnerability assessment.
  3. Metasploit Community (Free and Paid):Metasploit is a penetration testing framework that helps you identify and exploit vulnerabilities in network systems. The Metasploit Community edition is free and provides essential penetration testing capabilities.
  4. OpenVAS (Free and Open Source):OpenVAS (Open Vulnerability Assessment System) is an open-source vulnerability scanner. It assists in identifying security issues in networks and provides detailed reports on discovered vulnerabilities.
  5. Snort (Free and Open Source):Snort is an open-source intrusion detection system (IDS) and intrusion prevention system (IPS). It can be used to monitor network traffic for suspicious activity and attacks.
  6. Security Onion (Free and Open Source):Security Onion is a Linux distribution designed for network security monitoring. It includes a range of security tools, including Snort, Suricata, Bro, and more, for network analysis and threat detection.
  7. Cuckoo Sandbox (Free and Open Source):Cuckoo Sandbox is an open-source automated malware analysis system. It allows you to safely analyze suspicious files and URLs in a controlled environment.
  8. GNS3 (Free and Open Source):While primarily a network emulator, GNS3 is valuable for testing network security configurations, including the deployment and testing of security appliances and configurations.
  9. Ostinato (Free and Open Source):Ostinato is a packet crafter and network traffic generator. It can be used to create and send custom network packets for testing network security measures and analyzing network behavior.
  10. Suricata (Free and Open Source):Suricata is an open-source IDS/IPS engine that provides real-time intrusion detection and prevention capabilities. It's known for its high performance and support for the Emerging Threats and ETPro rule sets.
  11. Bro (Zeek) (Free and Open Source):Bro, now known as Zeek, is a powerful network analysis framework for security monitoring and intrusion detection. It captures, analyzes, and logs network traffic.
  12. Moloch (Free and Open Source):Moloch is a large-scale, open-source, indexed packet capture and search system. It's designed for large-scale network forensics and traffic analysis.
These tools cover a range of network security needs, from monitoring and analysis to vulnerability assessment and penetration testing. Depending on your specific requirements and objectives, you can choose the appropriate tool or combination of tools to enhance your network security measures.
  • asked a question related to Network Security
Question
14 answers
Hello everyone,
I would like to make a thorough investigation on the most promising simulation platforms for simulation and analysis of Cyber Attacks on Cyber Physical Energy Systems, along with the application of security solutions and their impact on performance.
To the best of my knowledge, a combination of two or more simulation/emulation tools might be required. E.g. a tool representing the cyber components (such as ns-2, Omnet++, Emulab) along with a tool representing the power grid physical components, (such as MATLAB).
Since investigation and proposals of the research community is still going on, hence the selection of the simulation platform(s) seems to be inconsistent among the researchers.
Through this question, I would request the research community of this field to share their knowledge and experience in this regard, with thanks.
Relevant answer
Answer
Your research on the simulation and analysis of cyber attacks on Cyber-Physical Energy Systems (CPES) is an important and challenging endeavor. Indeed, combining multiple simulation and emulation tools is often necessary to model the complex interplay between cyber and physical components. Here are some insights and suggestions for your research:
  1. Cyber Component Simulation/Emulation Tools:ns-2 and ns-3: Network simulators like ns-2 and ns-3 are widely used for simulating network behaviors, making them suitable for modeling cyber components of CPES. OMNeT++: OMNeT++ is a discrete-event simulation framework that can be used to model communication networks and protocols, making it a valuable tool for cyber component modeling. Mininet: Mininet is a network emulator that can be used to create virtual network topologies for testing and evaluating network security solutions.
  2. Physical Component Simulation Tools:MATLAB/Simulink: MATLAB is often used for modeling and simulating physical systems, including power grids. Simulink, an extension of MATLAB, is suitable for modeling the dynamic behavior of CPES components. DIgSILENT PowerFactory: This commercial software is specifically designed for modeling and simulating power systems, making it a powerful tool for studying the physical aspects of CPES.
  3. Integration of Tools:To model CPES comprehensively, you may need to integrate these tools. This can be achieved by developing custom interfaces or using middleware that allows communication between the cyber and physical components. Co-simulation frameworks like FMI (Functional Mock-up Interface) can facilitate the integration of different simulation tools.
  4. Security Solutions Integration:To study the impact of security solutions, you can integrate security tools and frameworks into your simulation environment. Tools like Wireshark, Snort, or intrusion detection/prevention systems can be incorporated to analyze and respond to cyber threats. Consider modeling the deployment and behavior of security solutions within the CPES to assess their effectiveness and performance impact.
  5. Datasets and Attack Scenarios:Access to real-world datasets and the creation of realistic attack scenarios are crucial for meaningful simulations. Look for publicly available datasets related to power grid and cyber-physical systems. Design attack scenarios that reflect different threat vectors, including cyber attacks on communication networks, power grid components, and control systems.
  6. Validation and Performance Metrics:Develop appropriate validation methodologies and performance metrics to assess the impact of cyber attacks and security solutions on CPES. This may include measures of system resilience, response time, and data integrity.
  7. Collaboration and Knowledge Sharing:Engage with the research community in the field of CPES security. Collaborate with experts and consider participating in conferences, workshops, and forums dedicated to cyber-physical systems and cybersecurity.
  8. Stay Updated: Given the evolving nature of cybersecurity threats, stay up-to-date with the latest research, attack techniques, and defense strategies to ensure the relevance and effectiveness of your simulations.
Your research can contribute significantly to enhancing the security and resilience of Cyber-Physical Energy Systems, which are critical infrastructure components. Collaboration and knowledge sharing within the research community will be invaluable as you work to address the challenges in this field.
  • asked a question related to Network Security
Question
4 answers
what kind of securities are provided by the network providers and how much security does the common people received
Relevant answer
Answer
Here below the most common reasons of facing those data insecurities are presented:
The abundance of insecurities in protecting users' data in the internet world can be attributed to several complex factors:
  1. Evolution of Technology: The internet has evolved rapidly, and new technologies are constantly emerging. This fast pace of development often means that security measures are playing catch-up to new threats and vulnerabilities. As a result, legacy systems and technologies with inherent vulnerabilities might still be in use.
  2. Complexity: The internet is a complex ecosystem involving a multitude of devices, software, protocols, and services. Each layer adds its own potential vulnerabilities. The sheer complexity makes it difficult to predict and address all possible attack vectors.
  3. Profit Motive for Attackers: Cybercriminals are motivated by financial gain. With the rise of cybercrime-as-a-service and the ability to monetize stolen data, hackers are incentivized to find and exploit vulnerabilities for their own benefit.
  4. Human Factor: Many security breaches occur due to human error, such as weak passwords, falling for phishing attacks, or misconfigured settings. Education and awareness about cybersecurity are not yet at the level they should be.
  5. Lack of Standardization: The lack of standardized security practices across the internet contributes to inconsistencies in how data is protected. Different platforms and services might implement security measures differently or not at all.
  6. Resource Constraints: Not all organizations, especially smaller ones, have the resources or expertise to implement robust cybersecurity measures. This can create vulnerabilities that attackers can exploit.
  7. Rapid Development Cycles: Software and online services are often developed with short release cycles, leaving limited time for thorough security testing. This can result in products being released with undiscovered vulnerabilities.
  8. Legacy Systems: Many older systems were designed and built before security concerns were as prominent as they are today. These systems might not be easily updated or secured without significant overhauls.
  9. Third-Party Dependencies: Modern applications and services often rely on third-party libraries and components. If these components have vulnerabilities, they can be exploited to breach the security of the entire system.
  10. Global Nature of the Internet: The global nature of the internet means that laws, regulations, and security practices vary widely across jurisdictions. This can make it challenging to enforce consistent security standards.
  11. Rapidly Changing Threat Landscape: New attack techniques and vulnerabilities are constantly being discovered. This requires continuous vigilance and adaptation of security measures to stay ahead of potential threats.
Addressing these challenges requires a combination of technical solutions, education, regulations, and a shift in the overall mindset toward security. It's an ongoing battle that requires collaboration from all stakeholders, including governments, technology companies, security experts, and individual users.
  • asked a question related to Network Security
Question
4 answers
Please guide me on how can I find a topic for my thesis and where to start work.
Relevant answer
Answer
You have a general topic, now think about the skills you want to use. What skills and knowledge do you want to sharpen for your next job? What have you mastered? Do you like playing with data or writing and explaining models? Are your interests interdisciplinary?
At the end of your thesis, for one hot minute, you will be the world's expert in answering one question. What do you want that question to be?
  • asked a question related to Network Security
Question
3 answers
Physical security
Network security
Software security
Relevant answer
Answer
You might find the article below relevant, and it has some interesting references you might want to contact.
This is a very hot topic right now.
  • asked a question related to Network Security
Question
5 answers
Which products would you recommend to integrate Android and iOS mobile devices into the company network? What about data security?
Relevant answer
Answer
some top mobile device management software packages for small and medium businesses. Some of them are:
1. Microsoft Intune
2. VMware Workspace ONE
3. Cisco Meraki
4. IBM MaaS360
5. ManageEngine Mobile Device Manager Plus
6. Hexnode MDM
7. BlackBerry UEM (Unified Endpoint Manager)
8. MobileIron
9. Jamf Pro
10. Scalefusion
It's important to evaluate each software and determine which one is the best fit for your company's needs, budget, and level of technical expertise.
  • asked a question related to Network Security
Question
11 answers
These days VAS are playing important roles in mobile networks, so without their security nobody can rely on them. In these instances cryptography plays an important role in securing these issues. I want to know the best way to apply cryptography VAS. Also any references would be appreciated.
Relevant answer
Answer
There are various ways in which cryptography can be applied to value-added services in mobile networks. One way is to use encryption to secure the communication between the mobile device and the service provider. This can be done by using algorithms such as AES (Advanced Encryption Standard) or RSA (Rivest–Shamir–Adleman).
Another way is to use digital signatures to authenticate users and transactions. Digital signatures use a combination of public and private keys to prove the authenticity of a message or transaction. This can be particularly important for financial transactions or other sensitive transactions.
Finally, it's important to use secure protocols such as TLS (Transport Layer Security) or HTTPS (HTTP Secure) to ensure that all communication between the mobile device and the service provider is encrypted and secure. These protocols can help to prevent eavesdropping and other types of attacks that can compromise the security of value-added services in mobile networks.
  • asked a question related to Network Security
Question
6 answers
I want to implement various WSN attacks and then to analyze network performance. Is there any WSN attack simulator available. How can we implement WSN attacks 
Relevant answer
Answer
You can see this post which explains the impact of DDOS attacks on the performance of a WSN network https://support.tetcos.com/a/solutions/articles/14000141596
  • asked a question related to Network Security
Question
1 answer
Dear Researchers,
Research Greetings !
Glad to share that my all research paper publications (in peer-reviewed WOS and Scopus Index Journals) are available in the area of Wireless Networks, Security, Ad Hoc Networks, Sensor Networks, VANETs, Cloud Computing, Mobile Computing, IoT, Cyber-Physical Systems and Quantum Computing.
You may refer to these research papers available at Research Gate and use it for your applicable research work:
Professor Nirbhay Chaubey, Ph.D Computer Science
Relevant answer
Answer
Currently, there is no widely accepted definition or framework for IIOT 5.0. However, it is generally believed that IIOT 5.0 will build on the foundations of IIOT 4.0, which is characterized by the convergence of operational technology (OT) and information technology (IT) systems, and the widespread use of advanced analytics and artificial intelligence to improve industrial processes and decision-making.
Some of the potential differences between IIOT 4.0 and IIOT 5.0 could include the increased adoption of edge computing and the use of advanced robotics and autonomous systems. IIOT 5.0 may also involve a greater emphasis on interoperability and the integration of data from a wide range of sources, including distributed ledgers and blockchain technology.
In terms of cybersecurity challenges, IIOT 4.0 and IIOT 5.0 share many of the same risks and vulnerabilities, such as the potential for cyber attacks on critical infrastructure, data breaches, and the compromise of industrial control systems. However, IIOT 5.0 may present additional challenges due to the greater use of edge computing and the deployment of more complex and autonomous systems.
Possible solutions to address these challenges include implementing robust access controls and authentication mechanisms, ensuring the secure transmission and storage of data, and incorporating cybersecurity into the design of IIOT systems from the outset. Other measures could include the use of machine learning algorithms and artificial intelligence to detect and respond to cyber threats in real-time, and the adoption of industry-wide cybersecurity standards and best practices. It will be important for organizations and stakeholders to work collaboratively to address these challenges and ensure the continued security and reliability of IIOT systems.
  • asked a question related to Network Security
Question
3 answers
I have written a python script that can read packet details and identify abnormalities in the network. I see that NetSim has a socket interface that can be used to communicate with an external python program. But I am unable to figure out a method to send packet details to my algorithm. Upon processing the data based I also want to send commands from the Python script to NetSim to improve the network performance as well as take countermeasures in case of network attacks.
Relevant answer
Answer
  • NetSim simulation can be run with the Wireshark option set to Online on one or more devices as per your requirement, to generate live PCAP log files.
  • The Run Time Interaction option can be enabled to allow your python program to connect to NetSim CLIInterpretor via socket.
  • During the simulation, your python code can read the Wireshark logs, and process and send commands to NetSim whenever required, to alter the network behavior.
  • You can use TShark which is part of the Wireshark distribution that uses the same packet dissection code that Wireshark does, to parse the PCAP file during runtime. Refer to the Tshark documentation at https://www.wireshark.org/docs/man-pages/tshark.html for more details.
  • asked a question related to Network Security
Question
3 answers
In this digital world, with increasing digital devices and data, security is a significant concern. And most cases DOS/DDoS/EDoS attacks are performed by the botnet. I want to do research to detect and prevent botnets. Can you share an efficient research title to detect and prevent botnets?
Relevant answer
Answer
Dear Md. Alamgir Hossain,
You may want to look over the following sources:
Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning
_____
_____
Intelligent Detection of IoT Botnets Using Machine Learning and Deep Learning
_____
_____
Deep Neural Networks for Bot Detection
_____
_____
  • asked a question related to Network Security
Question
3 answers
Hello everyone, I want to do a research on network security or intrusion detection system. Although we can get built in dataset in different sites such as GitHub or Kaggle, but we want to make the dataset on our own effort. So, we want some ideas about this.
Relevant answer
Answer
I have always seen intrusion detection datasets as a waste of time since they only represent the state of malware at a specific point in time. In [1] the review surveys steps to address some of the shortcomings of ID datasets. What I would focus on instead is in a framework for automating the datasets construction so that the dataset is constantly being updated.
As always, the challenge in security is that it is a process not a one-off thing. If you build tools to facilitate the process, then I think you are making a big contribution.
[1]A Review of the Advancement in Intrusion Detection Datasets by: Ankit Thakkar, Ritika Lohiya
  • asked a question related to Network Security
Question
10 answers
I am thinking to solve something like problems of identifying malicious activity.but there are lot of papers on that.any ideas regarding the network security much deeply to solve
Relevant answer
Answer
Dear Akku Jimin,
Aparna Murthy is right, before choosing the book you want to read, it would be nice to learn how to read.
There are two standing out problems in the network security. The first one is how to secure information flowing through the network from being stolen. That's solved by encryption/decryption algorithms and protocols. The second problem is how to trust someone(s) on the network who you don't see/talk directly. That's being cured with authentication algorithms and protocols.
12 Network Security Threats And Their Solutions
  • asked a question related to Network Security
Question
43 answers
I have to simulate DCCP and UDP on NS2 , for my presentation and showing the differences in throughput, delay, and jitter. I want to know that NS 2.35 standalone supports DCCP simulation, do I have to write any code for this simulation?
I am new to NS2 n linux platform.
Help is appreciated.
Relevant answer
Answer
Fedora or Ubuntu both work well with NS
  • asked a question related to Network Security
Question
7 answers
I am working on cyber security domain. Currently, the work is to trace out the real ip address behind the VPN.
1. Is there any technique or api to trace out the real ip address which is masked with VPN?
2. How to determine whether the input ip address is original/proxy/vpn without any api support?
Researchers, Kindly provide the suggestion for the above questions.
#cybersecurity #vpn #proxy #networksecurity #researcher
Relevant answer
Answer
  • asked a question related to Network Security
Question
6 answers
What is the background story of calculating the value of d in the RSA algorithm of Cryptography and Network Security?
The value of d is required for decryption. I want to know the derivation of finding d. The equation of finding d is d = e-1mod Φ(n).
Consider an example: P = 17, q = 7, n = 119, φ (n) = 96, e = 5. From here I want to find the value of d in my hand. How can I do this?
Relevant answer
Answer
The idea! The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public key consists of two numbers where one number is multiplication of two large prime numbers. And private key is also derived from the same two prime numbers. So if somebody can factorize the large number, the private key is compromised. Therefore encryption strength totally lies on the key size and if we double or triple the key size, the strength of encryption increases exponentially. RSA keys can be typically 1024 or 2048 bits long, but experts believe that 1024 bit keys could be broken in the near future. But till now it seems to be an infeasible task.
  • asked a question related to Network Security
Question
12 answers
Dear Researchgators;
For the researchers who are specialized in Cybersecurity and/or Network Security, would you please tell us a little about the difference between Cybersecurity and Network Security.
Are they both the same?
Are they different fields?
One is a subset of the other?
It would be great if you can support me with a reference?
Actually, this is not my area of interest but I am doing curiously.
Regards
Relevant answer
Answer
Dear Basim,
I view network security as intrinsic part of cyber security.
Daimi, K., Francia, G., Ertaul, L., Encinas, L. H., & El-sheikh, E. (Eds.). (2018). Computer and network security essentials. Springer.
  • asked a question related to Network Security
Question
8 answers
Respected all,
i am interested in starting a research group on cyber and network security in my institution . Kindly advise on how should i proceed ?
Mainly i want to include faculty members and students who are interested in above domains .
Relevant answer
Answer
U can contact specialist researchers in this field working in different countries to gain more experience,wish u all the best.
  • asked a question related to Network Security
Question
3 answers
What are the hot research topics in Network Security and Computer Networking?
Relevant answer
Answer
Dear Harith Ghanim Ayoub,
Look over the sources below:
Network Security
_____
Computer Network Security Problems and Solutions - Possible Threats
_____
  • asked a question related to Network Security
Question
5 answers
Quantum communications technologies (like Quantum Key distribution) are often viewed as panacea of all ills required to make data transmission in telecom network secure. The question is - Can QKD help secure the ICT systems from computer viruses and worms?
Relevant answer
Answer
Dear Brajesh Mishra,
Here below is some auxiliary info:
, CTO at Serissa Research (2001-present) Lawrence Stewart
Answered Jul 11, 2019
AES with 256-bit keys is pretty good.
See Is AES-256 a post-quantum secure cipher or not?
Attacks are always improving, so there is nothing you can do that will be secure indefinitely. Also, you have to keep the key somewhere, so all encryption does is substitute keeping a small thing secret in exchange for keeping a larger thing secret. If you can keep a key secure somewhere, just put your data there too. Storage devices are pretty small.
If you have nowhere to keep your crypto keys, then no algorithm is going to help.
  • asked a question related to Network Security
Question
4 answers
Since I don't have any coding background its difficult for me to pick a topic in system security or network security. Please help me with any topics or suggestions you have. Thank you in advance.
Relevant answer
You can check out some topics below
Also, I believe you can take some python lessons online that can be of great help to you as well
  • asked a question related to Network Security
Question
15 answers
Would you please suggest to me a Q1 or Q2 subscription journal (without any publishing fee) in various areas of computer networks and the Internet of Things with a fast-processing time and no limit to publishing the number of free pages (unlike IEEE IoT, IEEE Systems, IEEE Sensors, etc.)? Unfortunately, journals such as Computer Networks, Computer Communications, and FGCS have slowed down a lot in the last year or two, especially in the process of initial review by editors and assignment of reviewers.
Relevant answer
Answer
Ali Seyfollahi Check out ACM Transactions on Sensor Networks too (TOSN).
  • asked a question related to Network Security
Question
6 answers
I need an idea to research network security using machine learning?
Relevant answer
Answer
Machine learning can be applied in various ways in security, for instance, in malware analysis, to make predictions, and for clustering security events. It can also be used to detect previously unknown attacks with no established signature.
  • asked a question related to Network Security
Question
7 answers
Need some Recent Research if possible
Thanks
Relevant answer
Answer
Dear Esraa Alomari,
the idea of the Software-Defined Network (SDN) is well suited to building intelligent Defense Systems with Honeypots against DDoS Attacks. The SDN Controllers can be "supplied" - i.e. controlled - from Digital Twins (DTs) with Artificial Intelligence (AI). In this way, "Intelligent Concepts based on the Idea of Honeypots against DDoS Attacks" could be developed. DDoS Attacks can be redirected to the Honeypots using SDN Controllers. The SDN Controllers can be intelligently configured with Specifications (Instructions) coming from DTs.
Siehe hierfür my literature sources.
My figures show the idea of DTs -- at the address:
The concept of SDN is illustrated by my figures at the address:
Much success
Anatol Badach
Seungwon Shin, Lei Xu, Sungmin Hong, Guofei Gu: Enhancing Network Security through Software Defined Networking (SDN); 25th International Conference on Computer Communication and Networks (ICCCN), Aug. 2016; DOI: 10.1109/ICCCN.2016.7568520
Luo, X.; Yan, Q.; Wang, M.; Huang, W. Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT. In Proceedings of the 2019 Computing, Communications and IoT Applications (ComComAp), Shenzhen, China, Oct 2019; DOI: 10.1109/ComComAp46287.2019.9018775
Pokhrel, Abhishek, Vikash Katta, and Ricardo Colomo-Palacios. “Digital Twin for Cybersecurity Incident Prediction: A Multivocal Literature Review” Proceedings of the IEEE/ACM; 42nd International Conference on Software Engineering Workshops, 2020
Felipe S. Dantas Silva, Esau Silva, Emidio P. Neto, Marcilio Lemos, Augusto J. Venancio Neto, Flavio Esposito: A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios; Sensors, Vol. 20, Issue 11, May 2020; DOI:10.3390/s20113078
Ozgur Yurekten, Mehmet Demirci: “SDN-based cyber defense: A survey”; Future Generation Computer Systems, Vol. 115, Feb 2021
Zhenhua Wang , Wei Xie, Baosheng Wang, Jing Tao, Enze Wang: A Survey on Recent Advanced Research of CPS Security; Applied Sciences, Vol. 11 Issue 9, April 2021; DOI: 10.3390/app11093751
CyberSec4Europe D4.4: Research and Development Roadmap 2
S. Lim, J. Ha, H. Kim, Y. Kim, S. Yang: A SDN-Oriented DDoS Blocking Scheme for Botnet-Based Attacks; Sixth International Conference on Ubiquitous and Future Networks (ICUFN); Jul 2014
  • asked a question related to Network Security
Question
6 answers
Today's network security is mainly based on public-key cryptography. It is expected that these algorithms will be faster to break for attackers with quantum computers. Especially in case of collecting vehicle data in central storage systems, which could be used to support autonomous driving or to solve crimes, security plays a major role. This raises the question of the application of Post-Quantum Cryptography. In which time frame are realizations seen and also the costs of the application?
Relevant answer
Answer
I want to share this talk with you: " Drive (Quantum) Safe! –Towards Post-Quantum Security for Vehicle-to- Vehicle Communications; " which is presented at CAST e.V. Workshop “Quantentechnologie und Quantencomputer-resistente Sicherheit” 2021 (virtual). The link is here https://ninabindel.de/presentations-2.
In short, they concluded that Falcon-512 is the most suitable NIST PQC finalist for V2V and illustrate how Falcon can be incorporated.
  • asked a question related to Network Security
Question
4 answers
According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
Relevant answer
Answer
Zero trust strategy, or policy, or concept, or architecture are already published and actively discussed. However, the reliably secure practical implementations require more variety of secure, usable, and cheap Identity and Access Management (IAM) technologies, which are a backbone of the Zero Trust approach to security.
  • asked a question related to Network Security
Question
8 answers
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Relevant answer
Answer
Students' formal certification and graduation in cases of utilizing online learning fraud are obvious economic and moral crimes. Countries' laws should be corrected to take into consideration of this upcoming global trend. Yet, it's a sort of a fraud utilizing cybercrime methods, leading to criminalization of the entire educational process. That should be suppressed by all possible, available technical means.
  • asked a question related to Network Security
Question
22 answers
Recommended research fields:
Applying Machine Learning methods to Network Protocols field in many areas like IoT, Sensor Networks, Network Security aspects, Traffic Predictions...
Also, he is ready to participate in present related research and in a teamwork environment to publish scientific articles.
Relevant answer
Answer
A good way to start is to read recent overview articles and look for open problems that are stated in those papers. When it comes to machine learning, a general advice is to identify an existing protocol that you know is suboptimal, and then using machine learning to tweak the protocol.
  • asked a question related to Network Security
Question
3 answers
Usecase- To provide the security of the data by building Next-generation firewalls or Is there any better firewall type to handle the normal systems. Please do suggest me any answers!!.
Relevant answer
Answer
Dear Roshan Reddy,
To enable security of electronic communications there are three groups of problems - endpoint security, cloud / network security, and identity and access management security. Firewalls are important, but it's just a part of the puzzle.
  • asked a question related to Network Security
Question
6 answers
Can someone guide me a little? I am working on my Thesis related to IoT Security. Can you specify some major/challenging topics related to the Network Security of IoT Devices using Artificial Neural Networks? Any Precise topic/area in this field pls? Your response in this regard will be highly helpful for me. Thank you
Relevant answer
Answer
tt
  • asked a question related to Network Security
Question
25 answers
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
Relevant answer
Very interesting question! I completely agree and support the opinion of dear colleagues Ljubomir Jacić, Doherty Odueko Funmilayo. Thank you!
  • asked a question related to Network Security
Question
4 answers
SQL injections attacks have been on the number one list of dangerous threats to information systems for over a decade. The threats of an injection attack do not seem to go away or rather slow down BUT seems to get more complicated and more dangerous every time one is launched successfully.
Are the current mitigation techniques well crafted to halt the attacks or its high time new methods of protecting data in-situ are designed?
What do you think?
Relevant answer
Answer
What is the primary method of mitigating SQL injection attacks?
Option 1: Use of Prepared Statements (with Parameterized Queries) Option 2: Use of Stored Procedures. Option 3: Allow-list Input Validation. Option 4: Escaping All User Supplied Input.
SQL Injection attacks are unfortunately very common, and this is due to two factors:
  1. the significant prevalence of SQL Injection vulnerabilities, and
  2. the attractiveness of the target (i.e., the database typically contains all the interesting/critical data for your application).
It's somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.
SQL Injection flaws are introduced when software developers create dynamic database queries that include user supplied input. To avoid SQL injection flaws is simple. Developers need to either: a) stop writing dynamic queries; and/or b) prevent user supplied input which contains malicious SQL from affecting the logic of the executed query.
Primary Defenses:
  • Option 1: Use of Prepared Statements (with Parameterized Queries)
  • Option 2: Use of Stored Procedures
  • Option 3: Allow-list Input Validation
  • Option 4: Escaping All User Supplied Input
Additional Defenses:
  • Also: Enforcing Least Privilege
  • Also: Performing Allow-list Input Validation as a Secondary Defense
  • asked a question related to Network Security
Question
3 answers
please recommend me subtopic in Honeypot network security topic for my MS level research and thesis
Relevant answer
Answer
Dear Faheem Tariq,
you can use the idea of Software-Defined Networking (SDN) to improve security in the IoT - especially against DDoS Attacks - through the use of Honeypots. See these literature sources.
Best regards
Anatol Badach
Xupeng Luo, Qiao Yan, Mingde Wang, Wenyao Huang: Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT; Computing, Communications and IoT Applications (ComComAp), Oct 2019
Jinwoo Kim, Seungwon Shin: “Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks”; 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops¸ Jun 2017
  • asked a question related to Network Security
Question
20 answers
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes
Relevant answer
Answer
The level of cybersecurity of data collected on social media is constantly being raised. However, there is still no full 100 percent. cybersecurity on this issue.
I invite you to the discussion,
Regards,
Dariusz Prokopowicz
  • asked a question related to Network Security
Question
10 answers
Traditional or perimeter network security models are designed to focus on keeping attackers out of the network but is vulnerable to users and devices inside the network. Zero Trust security models assume the network has been compromised and challenges the user or device to prove that they are not attackers.
In this age and time of near boundary-less network systems can we rely on Zero trust models for securing our networks against information systems attacks?
Relevant answer
Answer
its desirable but not despensible
  • asked a question related to Network Security
Question
11 answers
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
Relevant answer
Answer
Dr. MOHAMMAD FAISAL currently working at the department of computer science and IT, University of Malakand Pakistan, received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
  • asked a question related to Network Security
Question
6 answers
Hi, my M.Sc. thesis is "Detecting Android Malware using TF-IDF and N-Gram Methods Leveraging Text Semantics of Network Flows”. In my M.Sc. thesis I have worked on malware detection to find a new solution for malware evasion problem in android environments.  I want to implement my idea with "Rapid Miner" thus I need a ".csv" data-set of malware and benign app network flows. I've downloaded many data-sets but none of the satisfied my needs. The most appropriate data-set among all of them for me is Android Malware data-set (InvesAndMal2019).
It's a great ".csv" labeled data-set but unfortunately all of data-set rows labeled as BENIGN. 
I really need a ".csv" labeled android malware data-set composed of MALWARE and BENIGN network flows.
Can anybody help me with this?!
Regards
Mikael
Relevant answer
Answer
You can try BLADE Android Malware Dataset available on Kaggle.
  • asked a question related to Network Security
Question
5 answers
Hello,
I want to publish a manuscript related to communication networks and network security and I need your suggestions please for Q3 journals that don't take a long time in the review and notification process.
Thank you so much for your responses
Relevant answer
Answer
  • asked a question related to Network Security
Question
4 answers
Dear Mr. Puys,
My name is Rocio Lopez Perez, I am master student of the University of Luxembourg and I am currently doing my thesis in the topic "Anomaly Detection System for SCADA".
I saw your project in Research Gate related to Attacks Scenarios Against Industrial Systems.
Actually, my work is focused on finding malicious data in Modbus/TCP packets that can cause a failure in a Power Plant (SCADA system).
From my understanding, Master and Slaves devices in SCADA systems communicate through Modbus/TCP protocol, 
e.g. Master sends to Slave: Query -> Write single Coil(5)
                  Slave to Master: Response -> Write single Coil(5)
Since I would like to use this dataset to train Machine Learning algorithms, I should need a big amount of data composed of benign and malicious Modbus/TCP packets (pcap files for example).
Do you happen to know where I could find benign and malicious Modbus protocol data? Do you have any advise for my Master Thesis?
Thank you very much in advance,
Best regards,
 Rocio
Relevant answer
Answer
network's Security, HEC Approved PhD Supervisor WIPO-Korea Summer School on Intellectual Property 2020
  • asked a question related to Network Security
Question
7 answers
Hello all, I'm an undergraduate student and currently I'm interested to learn more about Cryptographic for Network Security. I want to know is there any paper or journal that quickly summarize whether each Encryptions Algorithm has their own behaviour that maybe works better for its different purposes?
Like some algorithms are best-used for Cloud Computing, some others are for an E-Commerce website, some others for Social Media application, etc. that would lead to decision making of which are more suitable for algorithm for every project.
Thanks before!
Relevant answer
Answer
RSA
  • asked a question related to Network Security
Question
8 answers
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes
Relevant answer
Answer
In recent months, there have been cybercriminal attacks on public institutions and large enterprises as well as technology companies based on data stolen by cybercriminals from social networks and by sending fake e-mails containing malware and hidden ransomware viruses.
Regards,
Dariusz Prokopowicz
  • asked a question related to Network Security
Question
28 answers
What kind of scientific research dominate in the field of Cybercrime and the security of online banking?
Please, provide your suggestions for a question, problem or research thesis in the issues: Cybercrime and the security of online banking.
Please reply.
I invite you to the discussion
Best wishes
Relevant answer
Answer
In the area of ​​cybersecurity of online banking, I propose the following research topic: Analysis of the use of Industry 4.0 technology in the field of improving cybersecurity of online banking, including mobile banking. This topic may also take into account the scale of application of cybersecurity rules and recommendations by bank customers and the level of cybersecurity of operating systems used by bank customers, web browsers and other Internet applications installed on laptops and smartphones, through which bank customers use online banking.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Network Security
Question
5 answers
In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes
Relevant answer
Answer
Most citizens are unaware of how much information about Internet users is possessed by Internet technology companies that offer certain information services on the Internet.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Network Security
Question
2 answers
Anyone may have some information about Transfer Learning in terms of network security, especially DDoS attacks?
Relevant answer
Answer
Hi... The following article may be useful for you.
with regards
Jayapandian N
  • asked a question related to Network Security
Question
8 answers
Today IoT devices are required network security i want to perform some research work in this area so kindly provide Best open source tool for Artificial Intelligence IoT Network Security Simulation Tools.
Relevant answer
Answer
MatLab along with Simulink can provide many functions for signal and image processing, optimization techniques, and machine learning in IoT. Many codes are available online and can be modified as per our requirements. Integration of codes from other software can also be done in MatLab.
  • asked a question related to Network Security
Question
13 answers
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes
Relevant answer
Answer
Since Big Data and / or Data Science resources in the databases of many Internet technology companies are constantly growing, is the importance of cyber security of the information systems of these companies and the data stored in these databases growing analogically?
Thank you, Regards,
Dariusz Prokopowicz
  • asked a question related to Network Security
Question
4 answers
In Mobile Ad Hoc Network I had a security issue, that is already identified by IDS.
Relevant answer
Answer
There are projects available in https://tetcos.com/file-exchange.html covering IDS
  • asked a question related to Network Security
Question
4 answers
Hi, I would like to simulate IOT/WSN ddos attacks inside some type of simulation software. I haven't found many papers simulating this specifically or comparing which simulation software (ns3, cooja, omnet++, etc) is best suited for this purpose. Any help would be much appreciated.
Relevant answer
Answer
You can look at NetSim, and some project code and documentation can be got in https://tetcos.com/file-exchange.html
  • asked a question related to Network Security
Question
14 answers
Hi,
I have been through some discussion regarding survey paper writing tips and tricks. However, these are very generic. I want to know how to write a survey paper related to computer science topics (e.g., blockchain,.internet of things, so on). I have some following queries regarding the aforementioned concerns.
  • How to design the flow of the survey paper?
  • What will be the minimum length of the survey paper?
  • How to pick up a reference paper and which criteria should be the first concern while selecting it? What is the minimum number of references that should I pick?
  • Is it necessary to propose an idea in the paper? If yes then is it necessary to show a performance evaluation of the proposed scheme?
  • While writing a survey paper which things should I focus on or care about?
Please share your experience regarding this.
Thanks for your time and input.
Thanks in advance.
Relevant answer
Answer
Importance and significance of the topic.
Discuss the background and target audience.
Summarize the surveyed research area and explain why the surveyed area has been studied.
Summarize the classification scheme you used to do the survey.
Summarize the surveyed techniques with the above classification scheme.
  • asked a question related to Network Security
Question
15 answers
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Security of social media portals is currently one of the most important topics of social media portals and other new internet media and information services. Therefore, scientists at various universities are involved in researching this issue. Therefore, security tools for information collected in social media portals databases and data security systems on the Internet are being developed. In companies and key public institutions, systems for risk management of information systems and information transfer on the Internet are also developed.
Do you agree with me on the above matter?
In the context of the above issues, the following question is valid:
Is the security of information collected in social media portals databases currently one of the key determinants of the development of new online media?
Please reply
I invite you to the discussion
Thank you very much
I also conduct research in this matter. I am researching the security of social media portals in connection with Big Data database technology. Below are links to my publications:
I invite you to discussion and cooperation.
Thank you very much
Best wishes
Relevant answer
Answer
Social media, in recent times, has with eased an explosion of data with so many social media platforms available to interact and express opinions freely. This has led to easy access to the privacy of social media users which raise broader security concerns … Sharma, S., & Jain, A. (2020). Role of sentiment analysis in social media security and analytics. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, e1366.
  • asked a question related to Network Security
Question
7 answers
For quantum cryptography(QKD) simulation, which simulator is best one
  • asked a question related to Network Security
Question
11 answers
I am willing to do work on cloud security issues at SaaS and IaaS. for the same. Can anyone suggest approaches and future scopes for this?
Relevant answer
Answer
Dear respected researchers,
I have a complete section about "Implementation Challenges of CC Adoption" in my new paper (65-pages) which contains 65 pages about this subject and the IoT:
Nidhal Kamel Taha El-Omari, “Cloud IoT as a Crucial Enabler: a Survey and Taxonomy”, Modern Applied Science, The Canadian Center of Science and Education, published by Canadian Center of Science and Education, Canada, p-ISSN: 1913-1844, e-ISSN: 1913-1852, DOI:10.5539/mas.v13n8p86, 13(8):86-149, 2019.
Or simply you can click the link below:
  • asked a question related to Network Security
Question
4 answers
This attack mechanism called a botnet which is illustrated in figure 01. The Botnet has Bot-Master, Command and Control Server, and many numbers of Bots. The Bot-Master is the mastermind behind the DDoS attack and it injects the malicious code to the IoT devices. These affected devices work as the army of the DDoS attack, and they are called as Bots.
Relevant answer
Answer
The cheapest DDoS attack has malware which continuously accesses a web page of the victim's server. A better attack is to continuously download the contents of the /icons directory, which usually represents a few megabytes, and places a greater load on the network.
SYN flood, ACK flood and SYN/ACK amplification are the most effective, but require a more complex setup, including a spoofed source address, and spoofed destination addresses for reflectors, such as DNS servers, which always reply with more data than they receive.
Incidentally, the things you call bots, we call zombies, and they're not only IoT devices, but usually include hijacked home PC's and high-end servers in data centres.
Hope this helps.
  • asked a question related to Network Security
Question
8 answers
Distributed denial of service (DDoS) attacks are a subclass of denial of service (DoS) attacks. A DDoS attack involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
Relevant answer
Answer
In general, DDoS is indicated when the frequency of the requests incoming from a botnet becomes comparable with a reliable system response to a single request for connection. Let's say the system reliable connection time is 1 millisecond (1 kHz). If the amount of incoming requests for connection is near or above 1,000 per one second (1 kHz ), the attack registration can begin. It's just a basic rough idea. There are many things to check yet. For instance, the DDoS detection system ought to make sure it's not a random load peak but a consistent DDoS attack, whether or not it's enough time to automatic deployment of network/compute resources to suppress the attack, etc.
  • asked a question related to Network Security
Question
5 answers
I want to simulate security attacks in VANET. I do not know what best simulator for acheiving this and how to start?
Relevant answer
Answer
I suggest the Omnet++ and sumo simulation
  • asked a question related to Network Security
Question
15 answers
Considering the specifics of the increasingly common IT systems and computerized advanced data processing in Internet information systems, connected to the internet database systems, data processing in the cloud, the increasingly common use of the Internet of Things etc., the following question arises:
What do you think about the security of information processing in Big Data database systems?
Please reply
Best wishes
Relevant answer
Answer
The risk could be in tow form - one you already have mentioned is Security, a vital risk - needs to addressed by collective efforts on a war footing.
Secondly, the size of data itself, how integration takes place among hardware, software, latest internet serervice providers, cloud, etc. across the globe is also a risk.
  • asked a question related to Network Security
Question
21 answers
I've just graduated in Computer Science. I would like to start a research about networking/network security/information security fields. Can anyone give me some unsolved problems of above areas to start my research?
  • asked a question related to Network Security
Question
1 answer
Tcpreplay use to replay network traffic
Relevant answer
Answer
Hello, Could you find some solution? I am with the same problem.
Thanks.
  • asked a question related to Network Security
Question
9 answers
Systems are connected in 1 modem and switch.
Relevant answer
Answer
For Linux based system:
If the Secure Shell (SSH) is active in the target system (If not, make it active), then simply log in to the system by ssh. Then type :
shutdown -h 5m (to shutdown after 5m)
shutdown -h 1h (to shutdown after 1 hour)
shutdown -h now (to shutdown immediately)
shutdown -r (to reboot)
shutdown -c (to cancel a pending shutdown like in 1st and 2nd example)
For Windows system:
Install TeamViewer ( https://www.teamviewer.com/en/ ) in the target system, then set a personal password going in the setting. Then simply login through TeamViewer and shutdown normally.
Thanks
  • asked a question related to Network Security
Question
27 answers
- What are the pros and cons of Smart contracts?
- What are the latest technologies and tools?
- What do you like and/or dislike about smart contracts?
It's an open discussion to help improve our understand of future technologies. You are welcome to share your opinions and experience.
Relevant answer
Answer
Dear Nguyen ,
Currently, I'm working on enhancing the security of the smart contract, which focuses on :
1- Design patterns
2- coding and development of smart contract
  • asked a question related to Network Security
Question
5 answers
Topics required for postgraduate dissertation in cybersecurity.
Relevant answer
Answer
Dear Patrick,
I will recommend you to go through the Internet of Things (IoT). As they said:
"By 2020, More Than 25% of Cyberattacks Will Involve IoT Devices".
There are too many challenges facing IoT technology, you can initiate your research on these challenges.
Good luck (:
  • asked a question related to Network Security
Question
10 answers
I'm currently working on my proposal for my master's thesis and would like to find out which current research topics in the field of network security are promising/interesting/hot.
Relevant answer
Answer
Most trend work is the cybersecurity defence algorithm over 5G
  • asked a question related to Network Security
Question
5 answers
By reading the literature, it is not enough to consider social online network secure if their services are secure.
Relevant answer
Answer
Deaer Khalaf,
Here are 7 critical points a security expert should take into consideration when designing security policies for social media. I hope you find them useful.
  1. Develop a social media security policy: Enterprises can significantly reduce risk by developing social media security policies that governs the usage of social media by employees and the company as a whole. While designing a social media security strategy, one needs to keep in mind the company’s requirements of using social media for business and also its risk appetite. However, the real value will be achieved only when policies are properly enforced and continuously monitored over time.
  2. Have a multidimensional, risk-based approach: Social media is just a new vector ― attackers are essentially targeting poorly protected infrastructure and information, weakly enforced policies, and badly managed systems. Besides, there is an ambiguity over ownership and responsibility of information on social networking sites. Hence, an infrastructure-centric approach to secure information may not be enough. The social media security strategy needs to be multi-layered, risk-based, and information-centric with tools and solutions that take into account the unique risks that social media pose.
  3. Identify safe social networking sites: Not all social networks are created equal when it comes to safety and security. Social media security policies should allow employees to have access only to sites that are safe and trustworthy.
  4. Enhance enterprise network visibility: Social media security policies should also be set up to monitor, detect, and remediate incidents. Enterprises need visibility into the network to monitor activity on social media to automatically detect and report threats, and take action. This, for instance, may be done by using data loss prevention and web content filtering solutions.
  5. Classify sensitive data: Enterprises need to first identify and locate sensitive data. An example of a policy would be safeguarding the employees from tactics employed by image spammers. Image spamming involves the email recipient unwittingly sending a request to the spammer’s server hosting the image every time he/ she opens spam email, thus divulging his/ her email address.
  6. Protect endpoints: From the infrastructure perspective, social networking sites are now accessed through multiple endpoints — from laptops and desktops to smart phones. Hence, enterprises should ensure that they have the right endpoint protection solutions for each of these devices. Social media security policies should be defined on the kind of sites that each device is allowed to access.
  7. Educate employees: It is advisable to inform employees to be conscientious of who is being added and to avoid clicking on links from unfamiliar followers. For example, shortened links can contain traps to malware and infect computer systems, if opened. Educate the employees to use tools that allow them to view the full URL before clicking, as an infected link could harm not just their personal computers but the entire company network. The social media security policy should educate them on what to reveal about the company.
  • asked a question related to Network Security
Question
23 answers
Dear all
Based on Research perspectives, what is the differences between Network Security vs Information Security
Relevant answer
Answer
Before we jump into our main topic of interest – cyber security vs. network security – let’s try to understand what information security is first.
By now it’s not totally wrong to say that Internet has revolutionized everything by changing how we do things. Social media has become the internet sensation within a few years and e-commerce giants like Amazon have made purchasing online a breeze, and Google has made everything easily accessible at our fingertips.
Businesses are more digitally advanced than ever, and as technology advances, businesses’ security infrastructure must be tightened as well. Internet has evolved and so does vulnerabilities with more people taking advantage of these interconnected systems and exploit weaknesses. This pertains to information security.
Information security refers to the processes and techniques designed to protect any kind of sensitive data and information whether in print or electronic form from unauthorized access. Information is a valuable asset to every individual and businesses, which makes even more important to protect them from theft or damage.
Cyber security is a subset of information security which deals with protecting internet-connected systems including hardware, software, programs, and data from potential cyberattacks. It protects the integrity of networks from unauthorized electronic access. Network security is the subset of cyber security designed to protect the integrity of any network and data that is being sent through devices in that network.
What is Cyber Security?
Cyber security is a common term concerned with all aspects of cyber space. It is a subset of information security that deals with protecting the integrity of networks, devices, and programs from attack, damage, or unauthorized outside access. It refers to a set of techniques, technologies, and processes designed to protect systems and networks from potential cyber attacks. It protects the integrity of networks from unauthorized electronic access by implementing various security measures and controls in place. The cyber security professionals monitor all incoming and outgoing traffic to reduce the risk of cyber attacks all the while protecting the organization from unauthorized exploitation of systems.
Read more: Difference between Cyber Security and Network Security | Difference Between http://www.differencebetween.net/technology/difference-between-cyber-security-and-network-security/#ixzz6ASN30luG
  • asked a question related to Network Security
Question
11 answers
I am planning to do a dissertation on intrusion prevention system. Can anyone give suggestion on how to develop one from scratch? Like what are the things that I should look upon. I have a fair idea of computer networks. I'm very much interested in information security, network security. Please provide me some intuitive and simple ways to understand the system and implement the same.
Relevant answer
If you want to develop one you can do it using python. There are many tutorials on youtube that shows how to develop one from scratch.
ex - Udemy - Learn Python & Ethical Hacking From Scratch
  • asked a question related to Network Security
Question
6 answers
I've been dwelling around the network security field. I used Ensemble learning methods before to classify several intrusions. However, this still seems insufficient as there are more attacks beyond the given set. I'm looking for possible collaborators to initialize further research with regards to this topic. :)
here is my previous work.
Relevant answer
Answer
Sure, I am not trying to discourage you, I am just saying be aware of the limitations and don't fall into the trap thinking that you can cover all attacks with one, or even a collection of algorithms. Not going to happen any time soon.
  • asked a question related to Network Security
Question
29 answers
I have found some datasets captured on the border router of an orgnization (e.g., The CTU-13 Dataset, http://mcfp.weebly.com/the-ctu-13-dataset-a-labeled-dataset-with-botnet-normal-and-background-traffic.html), but these data contain few internal connections within the organization.
So, could you please give me some advice about where to find a network dataset of an organization with internal connection data?
Many thanks for your time!
Relevant answer
Answer
Hey , I'm looking for IoT network traffic datasets having MQTT, CoAP , HTTP protocols. Kindly, let me know.
  • asked a question related to Network Security
Question
27 answers
Will the use of Blockchain technology improve the security of information transfer on the Internet? Will the development of Blockchain technologies reduce the scale of cybercrime on the Internet?
Please, answer, comments.
I invite you to the discussion.
Best wishes
Relevant answer
Answer
Blockchain technology & security system - Interesting - Following .
  • asked a question related to Network Security
Question
5 answers
I've been working with my partner project on developing various sklearn ids models that