Search results

1 – 10 of 500
Article
Publication date: 16 August 2023

Jialiang Xie, Shanli Zhang, Honghui Wang and Mingzhi Chen

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent…

Abstract

Purpose

With the rapid development of Internet technology, cybersecurity threats such as security loopholes, data leaks, network fraud, and ransomware have become increasingly prominent, and organized and purposeful cyberattacks have increased, posing more challenges to cybersecurity protection. Therefore, reliable network risk assessment methods and effective network security protection schemes are urgently needed.

Design/methodology/approach

Based on the dynamic behavior patterns of attackers and defenders, a Bayesian network attack graph is constructed, and a multitarget risk dynamic assessment model is proposed based on network availability, network utilization impact and vulnerability attack possibility. Then, the self-organizing multiobjective evolutionary algorithm based on grey wolf optimization is proposed. And the authors use this algorithm to solve the multiobjective risk assessment model, and a variety of different attack strategies are obtained.

Findings

The experimental results demonstrate that the method yields 29 distinct attack strategies, and then attacker's preferences can be obtained according to these attack strategies. Furthermore, the method efficiently addresses the security assessment problem involving multiple decision variables, thereby providing constructive guidance for the construction of security network, security reinforcement and active defense.

Originality/value

A method for network risk assessment methods is given. And this study proposed a multiobjective risk dynamic assessment model based on network availability, network utilization impact and the possibility of vulnerability attacks. The example demonstrates the effectiveness of the method in addressing network security risks.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 17 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 26 January 2024

Merly Thomas and Meshram B.B.

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously…

Abstract

Purpose

Denial-of-service (DoS) attacks develop unauthorized entry to various network services and user information by building traffic that creates multiple requests simultaneously making the system unavailable to users. Protection of internet services requires effective DoS attack detection to keep an eye on traffic passing across protected networks, freeing the protected internet servers from surveillance threats and ensuring they can focus on offering high-quality services with the fewest response times possible.

Design/methodology/approach

This paper aims to develop a hybrid optimization-based deep learning model to precisely detect DoS attacks.

Findings

The designed Aquila deer hunting optimization-enabled deep belief network technique achieved improved performance with an accuracy of 92.8%, a true positive rate of 92.8% and a true negative rate of 93.6.

Originality/value

The introduced detection approach effectively detects DoS attacks available on the internet.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 23 December 2022

Yu Song, Bingrui Liu, Lejia Li and Jia Liu

In recent years, terrorist attacks have gradually become one of the important factors endangering social security. In this context, this research aims to propose methods and…

Abstract

Purpose

In recent years, terrorist attacks have gradually become one of the important factors endangering social security. In this context, this research aims to propose methods and principles which can be utilized to make effective evacuation plans to reduce casualties in terrorist attacks.

Design/methodology/approach

By analyzing the statistical data of terrorist attack videos, this paper proposes an extended cellular automaton (CA) model and simulates the panic evacuation of the pedestrians in the terrorist attack.

Findings

The main findings are as follows. (1) The panic movement of pedestrians leads to the dispersal of the crowd and the increase in evacuation time. (2) Most deaths occur in the early stage of crowd evacuation while pedestrians gather without perceiving the risk. (3) There is a trade-off between escaping from the room and avoidance of attackers for pedestrians. Appropriate panic contagion enables pedestrians to respond more quickly to risks. (4) Casualties are mainly concentrated in complex terrains, e.g. walls, corners, obstacles, exits, etc. (5) The initial position of the attackers has a significant effect on the crowd evacuation. The evacuation efficiency should be reduced if the attacker starts the attack from the exit or corners.

Originality/value

In this research, the concept of “focus region” is proposed to depict the different reactions of pedestrians to danger and the effects of the attacker’s motion (especially the attack strategies of attackers) are classified. Additionally, the influences on pedestrians by direct and indirect panic sources are studied.

Details

Kybernetes, vol. 53 no. 4
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 9 June 2023

Anuradha Yadav, Rajesh Kumar Singh, Ruchi Mishra and Surajit Bag

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying…

Abstract

Purpose

With gaining popularity, online communities are increasing. It is leading to the data and information overflow. So, there are some challenges like cyber frauds, cyberbullying, etc. while engaging with online communities. Not only this, anonymity of the participants, stress and racism are also big challenges in online communities' interaction. Online harassers' attack tactics have changed over time. In addition, there are challenges like quality of discussion, inequality in participation of the users, etc. may scale online communities towards incitement and activism. Therefore, this study will try to analyse these challenges for overall benefit of the society.

Design/methodology/approach

The underlying fuzzy set theory is employed to handle the fuzziness of users' perceptions since the attributes are expressed in linguistic preferences. Through exhaustive literature review, the authors have identified 15 challenges. These challenges are further categorised as cause and effect by using DEMATEL (Decision-Making Trial and Evaluation Laboratory) approach.

Findings

Lack of strategic planning and uninspired discussions between users has emerged as a major challenge in cause category. This study further demonstrates how individual challenge can be managed and developed to navigate the online communities to maintain a healthy environment in society.

Research limitations/implications

Results are based on limited dataset. Therefore, findings cannot be generalised for all online communities.

Originality/value

The research findings offer a suitable direction to policymakers to formulate and design policies, laws and regulations to increase user engagement in the online community. The study is beneficial to firms and researchers in understanding the factors influencing effective management of online communities.

Details

Benchmarking: An International Journal, vol. 31 no. 4
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 12 February 2024

Kate-Riin Kont

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…

Abstract

Purpose

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.

Design/methodology/approach

The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.

Findings

The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.

Originality/value

The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Book part
Publication date: 13 May 2024

Sanjeev Kumar

Purpose: This study examines the effect of uncertainties on the hospitality industry from different perspectives across the globe. The hospitality industry faces several…

Abstract

Purpose: This study examines the effect of uncertainties on the hospitality industry from different perspectives across the globe. The hospitality industry faces several contemporary issues and challenges that have the potential to impact its growth and development. This study aims to analyse the current problems and uncertainties in the hospitality sector.

Need for the Study: The hospitality industry plays a significant role in the global economy with various services, including accommodation, food and beverage, events, and tourism. However, the sector faces several contemporary issues and challenges that have the potential to impact its growth and development. This study provides an overview of the most significant problems and challenges facing the hospitality industry today.

Methodology: A systematic literature review was conducted to identify and synthesise relevant studies on the effect of uncertainties issues on the hospitality industry. A systematic search of the Web of Science and Scopus databases was conducted to determine relevant studies published between 2010 and 2021. Studies were screened and selected based on pre-defined inclusion and exclusion criteria. A thematic analysis was performed to categorise the uncertainties and issues in the hospitality industry.

Findings: The study identified several uncertainties and issues facing the hospitality industry, including the pandemic uncertainties, financial crisis, whether positive and negative impacts, terrorism attacks on hotels and tourist places, uncertainties in government policies, situational risks like uncertainties, ambiguity, cultural differences, changes in tourist preferences and changing habits of the tourist.

Details

VUCA and Other Analytics in Business Resilience, Part B
Type: Book
ISBN: 978-1-83753-199-8

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 10 of 500