• Title/Summary/Keyword: Intruder

Search Result 159, Processing Time 0.028 seconds

Hybrid Model Based Intruder Detection System to Prevent Users from Cyber Attacks

  • Singh, Devendra Kumar;Shrivastava, Manish
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.272-276
    • /
    • 2021
  • Presently, Online / Offline Users are facing cyber attacks every day. These cyber attacks affect user's performance, resources and various daily activities. Due to this critical situation, attention must be given to prevent such users through cyber attacks. The objective of this research paper is to improve the IDS systems by using machine learning approach to develop a hybrid model which controls the cyber attacks. This Hybrid model uses the available KDD 1999 intrusion detection dataset. In first step, Hybrid Model performs feature optimization by reducing the unimportant features of the dataset through decision tree, support vector machine, genetic algorithm, particle swarm optimization and principal component analysis techniques. In second step, Hybrid Model will find out the minimum number of features to point out accurate detection of cyber attacks. This hybrid model was developed by using machine learning algorithms like PSO, GA and ELM, which trained the system with available data to perform the predictions. The Hybrid Model had an accuracy of 99.94%, which states that it may be highly useful to prevent the users from cyber attacks.

Sensor Density for Full-View Problem in Heterogeneous Deployed Camera Sensor Networks

  • Liu, Zhimin;Jiang, Guiyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4492-4507
    • /
    • 2021
  • In camera sensor networks (CSNs), in order to better identify the point, full-view problem requires capture any facing direction of target (point or intruder), and its coverage prediction and sensor density issues are more complicated. At present, a lot of research supposes that a large number of homogeneous camera sensors are randomly distributed in a bounded square monitoring region to obtain full-view rate which is close to 1. In this paper, we deduce the sensor density prediction model in heterogeneous deployed CSNs with arbitrary full-view rate. Aiming to reduce the influence of boundary effect, we introduce the concepts of expanded monitoring region and maximum detection area. Besides, in order to verify the performance of the proposed sensor density model, we carried out different scenarios in simulation experiments to verify the theoretical results. The simulation results indicate that the proposed model can effectively predict the sensor density with arbitrary full-view rate.

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.

A Study on the Security of Infrastructure using fiber Optic Scattering Sensors (광섬유 산란형 센서를 이용한 사회기반시설물의 보안에 관한 연구)

  • Kwon, Il-Bum;Yoon, Dong-Jin;Lee, Seung-Seok
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.5
    • /
    • pp.499-507
    • /
    • 2004
  • We have studied tile detection techniques, which can determine the location and the weight of an intruder into infrastructure, by using fiber-optic ROTDR (Rayleigh optical time domain reflectometry) sensor and fiber-optic BOTDA (Brillouin Optical time domain analysis) sensor, which can use an optical fiber longer than that of ROTDR sensor Fiber-optic sensing plates of ROTDR sensor, which arc buried in sand, were prepared to respond the intruder effects. The signal of ROTDR was analyzed to confirm the detection performance. The constructed ROTDR could be used up to 10km at the pulse width of 30ns. The location error was less than 2 m and the weight could be detected as 4 grades, such as 20kgf, 40kgf, 60kgf and 80kgf. Also, fiber optic BOTDA sensor was developed to be able to detect intrusion effect through an optical fiber of tells of kilometers longer than ROTDR sensor. fiber-optic BOTDA sensor was constructed with 1 laser diode and 2 electro-optic modulators. The intrusion detection experiment was peformed by the strain inducing set-up installed on an optical table to simulate all intrusion effect. In the result of this experiment, the intrusion effort was well detected as the distance resolution of 3m through the fiber length of about 4.81km during 1.5 seconds.

Feeding Territory of the Maiden Goby, Pterogobius virgo, and Invasion Feeding of the Multicolorfin Rainbowfish, Halichoeres poecilopterus (금줄망둑 Pterogobius virgo의 섭식세력권과 용치놀래기 Halichoeres poecilopterus의 침입 섭식)

  • Choi, Seung-Ho;Park, Se-Chang
    • Korean Journal of Ichthyology
    • /
    • v.17 no.3
    • /
    • pp.187-194
    • /
    • 2005
  • Feeding of the maiden goby, Pterogobius virgo and multicolorfin rainbowfish, Halichoeres poecilopterus, was studied at Kurahashi Island in the Seto Inland Sea, Japan. P. virgo foraged on only benthic invertebrates in a pit on the bottom by spot-fixed fin digging. Territory size of P. virgo was very small, because they only defended the excavated pit. H. poecilopterus frequently intruded into the feeding territory of P. virgo and fed on benthic invertebrates flushed out by the fin digging of P. virgo. Feeding activity and vigilance time of P. virgo tended to decrease significantly more in such an association than when solitary. Frequency of aggression of P. virgo when H.poecilopterus intruded into the territory was higher the intruder came from the front of the territory than when the invasion was from the side and back, regardless of the size of the intruder. In small H.poecilopterus, feeding success rate was greater from the side and back of the territory than from the front. However, similar-sized H.poecilopterus were more successful in feeding from the front and side. Feeding association provides an antipredatory benefit to P. virgo because of less alert time against predators and earlier detection of predators, although their cost is great because of territory defense and decrease of feeding activity.

Study on the Institutional Control Period Through the Post-drilling Scenario Of Near Surface Disposal Facility for Low and Intermediate-Level Radioactive Waste (중·저준위 방사성폐기물 천층처분시설에서 시추 후 거주시나리오 평가를 통한 폐쇄 후 제도적 관리기간 연구)

  • Hong, Sung-Wook;Park, Jin-Baek;Yoon, Jung-Hyun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.12 no.1
    • /
    • pp.59-68
    • /
    • 2014
  • The public's access to the disposal facilities should be restricted during the institutional control period. Even after the institutional control period, disposal facilities should be designed to protect radiologically against inadvertent human intruders. This study is to assess the effective dose equivalent to the inadvertent intruder after the institutional control period thorough the GENII. The disposal unit was allocated with different kind of radioactive waste and the effects of the radiation dose to inadvertent intruder were evaluated in accordance with the institutional control period. As a result, even though there is no institutional control period, all were satisfied with the regulatory guide, except for the disposal unit with only spent filter. However, the disposal unit with only spent filter was satisfied with the regulatory guide after the institutional control period of 300 years. But the disposal unit with spent filter mixed with dry active waste could shorten the institutional control period. So the institutional control period can be reduced through the mixing the other waste with spent filter in disposal unit. Therefore, establishing an appropriate plan for the disposal unit with spent filter and other radioactive waste will be effective for radiological safety and reduction of the institutional control period, rather than increasing the institutional control period and spending costs for the maintenance and conservation for the disposal unit with only spent filter.

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

A Tree-Based Routing Algorithm Considering An Optimization for Efficient Link-Cost Estimation in Military WSN Environments (무선 센서 네트워크에서 링크 비용 최적화를 고려한 감시·정찰 환경의 트리 기반 라우팅 알고리즘에 대한 연구)

  • Kong, Joon-Ik;Lee, Jae-Ho;Kang, Ji-Heon;Eom, Doo-Seop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8B
    • /
    • pp.637-646
    • /
    • 2012
  • Recently, Wireless Sensor Networks (WSNs) are used in many applications. When sensor nodes are deployed on special areas, where humans have any difficulties to get in, the nodes form network topology themselves. By using the sensor nodes, users are able to obtain environmental information. Due to the lack of the battery capability, sensor nodes should be efficiently managed with energy consumption in WSNs. In specific applications (e.g. in intrusion detections), intruders tend to occur unexpectedly. For the energy efficiency in the applications, an appropriate algorithm is strongly required. In this paper, we propose tree-based routing algorithm for the specific applications, which based on the intrusion detection. In addition, In order to decrease traffic density, the proposed algorithm provides enhanced method considering link cost and load balance, and it establishes efficient links amongst the sensor nodes. Simultaneously, by using the proposed scheme, parent and child nodes are (re-)defined. Furthermore, efficient routing table management facilitates to improve energy efficiency especially in the limited power source. In order to apply a realistic military environment, in this paper, we design three scenarios according to an intruder's moving direction; (1) the intruder is passing along a path where sensor nodes have been already deployed. (2) the intruders are crossing the path. (3) the intruders, who are moving as (1)'s scenario, are certainly deviating from the middle of the path. In conclusion, through the simulation results, we obtain the performance results in terms of latency and energy consumption, and analyze them. Finally, we validate our algorithm is highly able to adapt on such the application environments.