Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Computer Science (1)
- Computer security (1)
- Cyber (1)
- Cyberdefense (1)
- Cybereducation (1)
-
- Cybersecurity (1)
- Data integrity (1)
- Denial-of-service (DoS). Internet Control Message Protocol (ICMP). User Datagram Protocol (UDP). Open Systems Interconnection Layers Attacks (OSI). Self-Organize-Map (SOM). Multilayer perceptron (MLP). (1)
- Raspberry Pi (1)
- Router (1)
- Security and Privacy in Vehicular Networks (1)
- VPN (1)
- Vehicular Ad Hoc Networks (1)
- Vehicular Cloud (1)
Articles 1 - 5 of 5
Full-Text Articles in Information Security
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly
HON499 projects
The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …
Raspberry Pi Vpn Travel Router, Daniel S. Pierson
Raspberry Pi Vpn Travel Router, Daniel S. Pierson
Computer Science and Software Engineering
Consumers are increasingly relying on public wireless hotspots to access the internet from a growing number of devices. Usage of these hotspots has expanded from just laptops to everything from iPhones to tablets, which are expected to be internet-connected for full functionality. It has become common for one to check if there’s an open wireless hotspot connection available at places like coffee shops, hotels, restaurants, or even a doctor’s waiting room. The issue that arises is that these public connections present an inherent security risk, as anyone can connect and gain access to the network. For increased security, the use …
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Packet Filter Approach To Detect Denial Of Service Attacks, Essa Yahya M Muharish
Electronic Theses, Projects, and Dissertations
Denial of service attacks (DoS) are a common threat to many online services. These attacks aim to overcome the availability of an online service with massive traffic from multiple sources. By spoofing legitimate users, an attacker floods a target system with a high quantity of packets or connections to crash its network resources, bandwidth, equipment, or servers. Packet filtering methods are the most known way to prevent these attacks via identifying and blocking the spoofed attack from reaching its target. In this project, the extent of the DoS attacks problem and attempts to prevent it are explored. The attacks categories …
Secure And Authenticated Message Dissemination In Vehicular Ad Hoc Networks And An Incentive-Based Architecture For Vehicular Cloud, Kiho Lim
Theses and Dissertations--Computer Science
Vehicular ad hoc Networks (VANETs) allow vehicles to form a self-organized network. VANETs are likely to be widely deployed in the future, given the interest shown by industry in self-driving cars and satisfying their customers various interests. Problems related to Mobile ad hoc Networks (MANETs) such as routing, security, etc.have been extensively studied. Even though VANETs are special type of MANETs, solutions proposed for MANETs cannot be directly applied to VANETs because all problems related to MANETs have been studied for small networks. Moreover, in MANETs, nodes can move randomly. On the other hand, movement of nodes in VANETs are …
Maia And Mandos: Tools For Integrity Protection On Arbitrary Files, Paul J. Bonamy
Maia And Mandos: Tools For Integrity Protection On Arbitrary Files, Paul J. Bonamy
Dissertations, Master's Theses and Master's Reports
We present the results of our dissertation research, which focuses on practical means of protecting system data integrity. In particular, we present Maia, a language for describing integrity constraints on arbitrary file types, and Mandos, a Linux Security Module which uses verify-on-close to enforce mandatory integrity guarantees. We also provide details of a Maia-based verifier generator, demonstrate that Maia and Mandos introduce minimal delay in performing their tasks, and include a selection of sample Maia specifications.