Search results

1 – 10 of over 5000
Article
Publication date: 20 September 2019

S. Velliangiri

The service denial threats are regularly regarded as tools for effortlessly triggering online-based services offline. Moreover, the present occurrences reveal that these threats…

Abstract

Purpose

The service denial threats are regularly regarded as tools for effortlessly triggering online-based services offline. Moreover, the present occurrences reveal that these threats are being constantly employed for masking other vulnerable threats like disseminating malware, information losses, wire scams and mining bitcoins (Sujithra et al., 2018; Boujnouni and Jedra, 2018). In some cases, service denials have been employed to cyberheist financial firms which sums around $100,000. Documentation from Neustar accounts that is about 70 percent of the financial sector are aware of the threat, and therefore, incidents result in few losses, more than 35 percent of service denial attempts are identified as malware soon after the threat is sent out (Divyavani and Dileep Kumar Reddy, 2018). Intensive packet analysis (IPA) explores the packet headers from Layers 2 to 4 along with the application information layer from Layers 5 to 7 for locating and evading vulnerable network-related threats. The networked systems could be simply contained by low potent service denial operations in case the supplies of the systems are minimized by the safety modules. The paper aims to discuss these issues.

Design/methodology/approach

The initial feature will be resolved using the IPDME by locating the standard precise header delimiters such as carriage return line feed equally locating the header names. For the designed IPDME, the time difficulties in locating the initial position of the header field within a packet with static time expenses of four cycles. For buffering packets, the framework functions at the speed of cables. Soon after locating the header position, the value of the field is mined linearly from the position. Mining all the field values consequentially resolves the forthcoming restrictions which could be increased by estimating various information bytes per cycle and omitting non-required information packets. In this way, the exploration space is minimized from the packet length to the length of the header. Because of the minimized mining time, the buffered packets could be operated at an increasing time.

Findings

Based on the assessments of IPDME against broadly employed SIP application layer function tools it discloses hardware offloading of IPDME it could minimize the loads on the essential system supplies of about 25 percent. The IPDME reveals that the acceleration of 22X– 75X as evaluated against PJSIP parser and SNORT SIP pre-processor. One IPDME portrays an acceleration of 4X–6X during 12 occurrences of SNORT parsers executing on 12 processors. The IPDME accomplishes 3X superior to 200 parallel occurrences of GPU speeded up processors. Additionally, the IPDME has very minimal latencies with 12X–1,010X minimal than GPUs. IPDME accomplishes minimal energy trails of nearly 0.75 W using two engines and for 15 engines it is 3.6 W, which is 22.5X–100X less as evaluated to the graphic-based GPU speeding up.

Originality/value

IPDME assures that the system pools are not fatigued on Layer 7 mining by transmitting straightforwardly based on network intrusions without branching into the operating systems. IPDME averts the latencies because of the memory accesses by sidestepping the operating system which essentially permits the scheme to function at wired speed. Based on the safety perception, IPDME ultimately enhances the performance of the safety systems employing them. The increased bandwidth of the IPDME assures that the IPA’s could function at their utmost bandwidth. The service time for the threat independent traffic is enhanced because of minimization over the comprehensive latencies over the path among the network intrusions and the related applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 March 2006

L. Kazatzopoulos, C. Delakouridis, G.F. Marias and P. Georgiadis

The purpose of this paper is to propose the use of priority‐based incentives for collaborative hiding of confidential information in dynamic environments, such as self‐organized…

Abstract

Purpose

The purpose of this paper is to propose the use of priority‐based incentives for collaborative hiding of confidential information in dynamic environments, such as self‐organized networks, peer‐to‐peer systems, pervasive and grid computing applications.

Design/methodology/approach

The paper documents the necessity of ISSON (Incentives for Secret‐sharing in Self‐Organised Networks); it provides functional and technical details on the proposed architecture; and, it assesses its feasibility in mobile ad‐hoc networks through real experiments. The paper elaborates on the availability of the hidden information through an analytical framework.

Findings

Through the real experiments, ISSON was found to be efficient in terms of communication and processing costs. Additionally, it avoids collusions for unauthorized revealing of the hidden information, and ensures the unlinkability and availability of the secret when it is divided and stored to peers.

Originality/value

The proposed, incentive‐based, privacy enforcement architecture is novel and applies to distributed, dynamic, and self‐configured computing environments.

Details

Internet Research, vol. 16 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 February 1999

Richard E. Overill

SCOPE AND DEFINITIONS The provision of any service requires the utilisation of resources. In a digital context these resources might be processor cycles, memory capacity, disk…

Abstract

SCOPE AND DEFINITIONS The provision of any service requires the utilisation of resources. In a digital context these resources might be processor cycles, memory capacity, disk space or communications bandwidth. A Denial of Service (DoS) attack implies either the removal of those resources by some external event or their pre‐emption by a competing process; this should be understood to include rerouting or replacing a service. The sole objective of a DoS attack is thus to prevent the normal operation of a digital system in the manner required by its customers and intended by its designers. As such, DoS attacks on the mission‐critical or business‐critical infrastructure systems of financial, commercial or other enterprises offer the potential for sabotage, blackmail or extortion operations.

Details

Journal of Financial Crime, vol. 6 no. 4
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 13 March 2017

David Douglas, José Jair Santanna, Ricardo de Oliveira Schmidt, Lisandro Zambenedetti Granville and Aiko Pras

This paper aims to examine whether there are morally defensible reasons for using or operating websites (called ‘booters’) that offer distributed denial-of-service (DDoS) attacks…

Abstract

Purpose

This paper aims to examine whether there are morally defensible reasons for using or operating websites (called ‘booters’) that offer distributed denial-of-service (DDoS) attacks on a specified target to users for a price. Booters have been linked to some of the most powerful DDoS attacks in recent years.

Design/methodology/approach

The authors identify the various parties associated with booter websites and the means through which booters operate. Then, the authors present and evaluate the two arguments that they claim may be used to justify operating and using booters: that they are a useful tool for testing the ability of networks and servers to handle heavy traffic, and that they may be used to perform DDoS attacks as a form of civil disobedience on the internet.

Findings

The authors argue that the characteristics of existing booters disqualify them from being morally justified as network stress testing tools or as a means of performing civil disobedience. The use of botnets that include systems without the permission of their owners undermines the legitimacy of both justifications. While a booter that does not use any third-party systems without permission might in principle be justified under certain conditions, the authors argue that it is unlikely that any existing booters meet these requirements.

Practical/implications

Law enforcement agencies may use the arguments presented here to justify shutting down the operation of booters, and so reduce the number of DDoS attacks on the internet.

Originality/value

The value of this work is in critically examining the potential justifications for using and operating booter websites and in further exploring the ethical aspects of using DDoS attacks as a form of civil disobedience.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 01
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 1 February 2006

Yang Xiang and Wanlei Zhou

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high‐profile government and commercial websites have made…

Abstract

In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high‐profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment mixture of sub‐systems to protect web applications from DDoS attacks. According to the simulation experiments, this system is effective in that it is able to defend web applications against attacks. It can avoid overall network congestion and provide more resources to legitimate web users.

Details

International Journal of Web Information Systems, vol. 2 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 28 February 2019

Nienke Fredrika Boesveldt

The purpose of this paper is to focus on the denial of social support to homeless persons and related societal effects of new local governance arrangements.

3046

Abstract

Purpose

The purpose of this paper is to focus on the denial of social support to homeless persons and related societal effects of new local governance arrangements.

Design/methodology/approach

Analysis of new data and secondary evaluative and comparative data on the policies, administrative structures and management styles of Copenhagen, Glasgow and Amsterdam have brought better understanding of the elements of local governance arrangements that influence the number of homeless persons who are denied access to services and the number of persons sleeping rough who are not eligible for social support. Theoretical explanations for the impact of governance arrangements on these processes and societal effects are considered.

Findings

It appears that while the body of research, reports and policy documents on non-eligibility for homelessness services is growing, legal responses at best remain vague, and policies are still in the process of being developed. Modest progress on policy goals, and even more so on policy instruments, leading to less detrimental outcomes, can be explained by centralising and decentralising trends and the relationships between state and society. The latter may also be indicative of how the increased focus on the legal problems of some EU migrants can be explained.

Research limitations/implications

The two points in time documented for the case studies are relevant in understanding processes underlying the current circumstances of homeless persons and homeless migrants and offer an interdisciplinary insight into governance and politics, law, and public and health service perspectives.

Social implications

Good policy practice, as this paper shows, can lead to a difference in individual lives.

Originality/value

Much is unknown about considerations inside government. This paper contributes by combining theoretical and insider perspectives.

Details

International Journal of Human Rights in Healthcare, vol. 12 no. 3
Type: Research Article
ISSN: 2056-4902

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 July 2019

S. Vijayakumar Bharathi

Internet of Things (IoT) interconnects many heterogeneous devices to each other, collecting and processing large volumes of data for decision making without human intervention…

Abstract

Purpose

Internet of Things (IoT) interconnects many heterogeneous devices to each other, collecting and processing large volumes of data for decision making without human intervention. However, the information security concern it brings has attracted quite a lot of attention, and, at this stage, the smart step would be to analyze the security issues of IoT platform and get to the state of readiness before embarking upon this attractive technology. The purpose of this paper is to address these issues.

Design/methodology/approach

IoT risk assessment through the application of the analytical hierarchy process (AHP), a favorite multi-criteria decision making technique, is proposed. The IoT risks are prioritized and ranked at different layers, before which a well-defined IoT risk taxonomy is defined comprising of 25 risks across six layers of the IoT model for developing control and mitigation plans for information security of IoT.

Findings

People and processes layer, network layer and applications layer are the top three critical layers with risks like the lack of awareness, malware injection, malicious code injection, denial of service and inefficient policies for IoT practice get the highest priority and rank. Pareto analysis of the overall risk factors revealed that the top ten factors contribute to 80 percent of the risks perceived by information security experts.

Research limitations/implications

The study focuses only on certain predefined constructs or layers of the IoT model traced from legacy studies. It is essential to re-look these constructs on a timely basis to prolong the results’ validity. The study’s empirical scope is confined only to the risk perception of select IoT experts and does not encompass a broader segment of the IoT ecosystem. Therefore, the risks assessment may not be sweeping to a bigger audience.

Practical implications

The study implications are two-fold: one it consolidates the earlier siloed works to intensify the need for risk assessment in the IoT domain, and second the study brings yet another contextual avenue of extending the application AHP and Pareto principle combination. The paper also draws specific critical organizational interventions about IoT risks. A comprehensive approach to prioritizing and ranking IoT risks are present in this research paper.

Originality/value

The contribution of this study to the benchmarking of IoT risk assessment is two-fold. One, a comprehensive risk assessment taxonomy is proposed, and two, the risks are prioritized and ranked to give a convincing reference for the organizations while making information security plans for IoT technology.

Details

Benchmarking: An International Journal, vol. 26 no. 8
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 5 April 2011

Ok‐Ran Jeong, Chulyun Kim, Won Kim and Jungmin So

A botnet is a network of computers on the internet infected with software robots (or bots). There are numerous botnets, and some of them control millions of computers. Cyber…

1465

Abstract

Purpose

A botnet is a network of computers on the internet infected with software robots (or bots). There are numerous botnets, and some of them control millions of computers. Cyber criminals use botnets to launch spam e‐mails and denial of service attacks; and commit click fraud and data theft. Governments use botnets for political purposes or to wage cyber warfare. The purpose of this paper is to review the botnet threats and the responses to the botnet threats.

Design/methodology/approach

The paper describes how botnets are created and operated. Then, the paper discusses botnets in terms of architecture, attacking behaviors, communication protocols, observable botnet activities, rally mechanisms, and evasion techniques. Finally, the paper reviews state‐of‐the‐art techniques for detecting and counteracting botnets, and also legal responses to botnet threats.

Findings

Botnets have become the platform for many online threats such as spam, denial of service attacks, phishing, data thefts, and online frauds. Security researchers must develop technology to detect and take down botnets, and governments must develop capacity to crack down on botmasters and botnets. Individual computer owners must diligently take measures to keep their computers from becoming members of botnets.

Originality/value

The paper provides a review of current status of botnets and a summary of up‐to‐date responses to botnets in both technical and legal aspects, which can be used as a stepping stone for further research.

Details

International Journal of Web Information Systems, vol. 7 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 10 July 2017

Elizabeth A. Minton, Frank Cabano, Meryl Gardner, Daniele Mathras, Esi Elliot and Naomi Mandel

The USA is witnessing a conflict between LGBTQ (lesbian, gay, bisexual, transgender and queer) consumers/supporters and Christian fundamentalist service providers/opponents…

2648

Abstract

Purpose

The USA is witnessing a conflict between LGBTQ (lesbian, gay, bisexual, transgender and queer) consumers/supporters and Christian fundamentalist service providers/opponents regarding whether service can be denied based on religious values. The purpose of this paper is to make a timely investigation into this conflict between marketplace inclusion (for LGBTQ consumers) and freedom of religion (for religious service providers).

Design/methodology/approach

The intersection of marketplace inclusion for LGBTQ consumers and religious freedom for service providers is examined by identifying appropriate strategies that address this conflict and reviewing how differing religious perspectives influence perceptions of LGBTQ consumer rights, all building off the social identity threat literature.

Findings

LGBTQ and religious identities often conflict to influence consumer behavior and service provider interactions. Such conflict is heightened when there is a lack of substitutes (i.e. only one service provider in an area for a specific service). Common LGBTQ consumer responses include changing service providers, providing justification for the provision of services and pursing legal recourse. Suggested strategies to address this conflict include highlighting common social identities and using two-sided messages for service providers, using in-group interventions for social groups and using government interventions for public policy.

Originality/value

Research has yet to examine the conflict between marketplace inclusion and religious freedom, particularly for the inclusion of LGBTQ consumers. Thus, this paper provides a novel conceptual model detailing these relationships to stimulate discussion among consumers, service providers, social groups and public policy in addition to serving as a foundation for future research.

Details

Journal of Services Marketing, vol. 31 no. 4/5
Type: Research Article
ISSN: 0887-6045

Keywords

1 – 10 of over 5000