Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Anomaly IDS (1)
- Awareness (1)
- Blockchain security intrusion detection systems IDS architecture (1)
- Certified (1)
- Cross Entropy (1)
-
- Facebook (1)
- Genetic Algorithm (1)
- ICSA Labs (1)
- IDS (1)
- IT students (1)
- Information Theory (1)
- Inverse Document Frequency (1)
- IoT (1)
- Latent Semantic Index (1)
- Protection motivation theory (1)
- Security (1)
- Signature IDS (1)
- Social media (1)
- Term-Frequency (1)
- Threats (1)
- UL (1)
- Untrustworthy (1)
- User’s behavior (1)
- Vulnerability (1)
Articles 1 - 5 of 5
Full-Text Articles in Information Security
Distributed Denial Of Service Attack Detection, Travis Blue
Distributed Denial Of Service Attack Detection, Travis Blue
Master of Science in Information Technology Theses
Distributed Denial of Service (DDoS) attacks on web applications has been a persistent threat. Successful attacks can lead to inaccessible service to legitimate users in time and loss of business reputation. Most research effort on DDoS focused on network layer attacks. Existing approaches on application layer DDoS attack mitigation have limitations such as the lack of detection ability for low rate DDoS and not being able to detect attacks targeting resource files. In this work, we propose DDoS attack detection using concepts from information retrieval and machine learning. We include two popular concepts from information retrieval: Term Frequency (TF)-Inverse Document …
An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg
An Architecture For Blockchain-Based Collaborative Signature-Based Intrusion Detection System, Daniel Laufenberg
Master of Science in Information Technology Theses
Collaborative intrusion detection system (CIDS), where IDS hosts work with each other and share resources, have been proposed to cope with the increasingly sophisticated cyberattacks. Despite the promising benefits such as expanded signature databases and alert data from multiple sites, trust management and consensus building remain as challenges for a CIDS to work effectively. The blockchain technology with built-in immutability and consensus building capability provides a viable solution to the issues of CIDS. In this paper, we introduce an architecture for a blockchain-enabled signature-based collaborative IDS, discuss the implementation strategy of the proposed architecture and developed a prototype using Hyperledger …
Why Certified Iot Devices Remain Untrustworthy, Donald Privitera
Why Certified Iot Devices Remain Untrustworthy, Donald Privitera
Master of Science in Information Technology Theses
Digital networked devices also known as Internet of Things (IoT) are ubiquitous today and are now a fundamental part of the functioning of the US digital economy and comprise a significant part of people’s daily activities. These devices have been shown to be insecure in general especially at categories that include any of the following: low-cost, home use, small business, and factory automation. There are continuing research and news reports showing Internet connected devices contain backdoors of various origins whether they be placed intentionally or are discovered as vulnerabilities. These types of devices are of concern because they are critical …
The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti
The Paradox Of Social Media Security: A Study Of It Students’ Perceptions Versus Behavior On Using Facebook, Zahra Y. Alqubaiti
Master of Science in Information Technology Theses
Social media plays an essential role in the modern society, enabling people to be better connected to each other and creating new opportunities for businesses. At the same time, social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and made recommendations on how to mitigate security risks. Users are an integral part of any security mix. In this thesis, we explore the relationship between users’ security perceptions and their actual behavior on social networking sites. Protection motivation theory (PMT), initially …
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
A Framework For Hybrid Intrusion Detection Systems, Robert N. Bronte
Master of Science in Information Technology Theses
Web application security is a definite threat to the world’s information technology infrastructure. The Open Web Application Security Project (OWASP), generally defines web application security violations as unauthorized or unintentional exposure, disclosure, or loss of personal information. These breaches occur without the company’s knowledge and it often takes a while before the web application attack is revealed to the public, specifically because the security violations are fixed. Due to the need to protect their reputation, organizations have begun researching solutions to these problems. The most widely accepted solution is the use of an Intrusion Detection System (IDS). Such systems currently …