Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Information Security (5)
- Computer Engineering (3)
- Databases and Information Systems (3)
- Engineering (3)
- Systems Architecture (3)
-
- Other Computer Engineering (2)
- Public Affairs, Public Policy and Public Administration (2)
- Social and Behavioral Sciences (2)
- Business (1)
- Defense and Security Studies (1)
- Emergency and Disaster Management (1)
- International Relations (1)
- Management Information Systems (1)
- OS and Networks (1)
- Other Political Science (1)
- Other Psychology (1)
- Peace and Conflict Studies (1)
- Political Science (1)
- Psychology (1)
- Social Psychology (1)
- Software Engineering (1)
- Terrorism Studies (1)
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Other Computer Sciences
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Intrusion Detection: Machine Learning Techniques For Software Defined Networks, Jacob S. Rodriguez
Masters Theses
In recent years, software defined networking (SDN) has gained popularity as a novel approach towards network management and architecture. Compared to traditional network architectures, this software-based approach offers greater flexibility, programmability, and automation. However, despite the advantages of this system, there still remains the possibility that it could be compromised. As we continue to explore new approaches to network management, we must also develop new ways of protecting those systems from threats. Throughout this paper, I will describe and test a network intrusion detection system (NIDS), and how it can be implemented within a software defined network. This system will …
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
An Analysis Of Modern Password Manager Security And Usage On Desktop And Mobile Devices, Timothy Oesch
Doctoral Dissertations
Security experts recommend password managers to help users generate, store, and enter strong, unique passwords. Prior research confirms that managers do help users move towards these objectives, but it also identified usability and security issues that had the potential to leak user data or prevent users from making full use of their manager. In this dissertation, I set out to measure to what extent modern managers have addressed these security issues on both desktop and mobile environments. Additionally, I have interviewed individuals to understand their password management behavior.
I begin my analysis by conducting the first security evaluation of the …
Dronescape:Distributed Rapid On-Site Network Self-Deploying Cellular Advanced Phone Environment, Daryl Johnson, Bill Stackpole
Dronescape:Distributed Rapid On-Site Network Self-Deploying Cellular Advanced Phone Environment, Daryl Johnson, Bill Stackpole
Presentations and other scholarship
When disasters happen, the speed with which first responders and emergency personnel can contact and be contacted by the people affected by the disaster during the first minutes or hours is critical. Early communications can make the difference between life and death. During a disaster communications infrastructure of the affected area is likely to be compromised. This project proposes an inexpensive, rapidly deployable cloud of autonomous drones, each coupled with a micro-cellular base station that deploys from a transportable deployment module. The goal is to temporarily restore communications for both first responders to communicate amongst themselves as well as for …
Securing Our Future Homes: Smart Home Security Issues And Solutions, Nicholas Romano
Securing Our Future Homes: Smart Home Security Issues And Solutions, Nicholas Romano
Senior Honors Theses
The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a …
Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva
Secure And Efficient Delegation Of A Single And Multiple Exponentiations To A Single Malicious Server, Matluba Khodjaeva
Dissertations, Theses, and Capstone Projects
Group exponentiation is an important operation used in many cryptographic protocols, specifically public-key cryptosystems such as RSA, Diffie Hellman, ElGamal, etc. To expand the applicability of group exponentiation to computationally weaker devices, procedures were established by which to delegate this operation from a computationally weaker client to a computationally stronger server. However, solving this problem with a single, possibly malicious, server, has remained open since a formal cryptographic model was introduced by Hohenberger and Lysyanskaya in 2005. Several later attempts either failed to achieve privacy or only achieved constant security probability.
In this dissertation, we study and solve this problem …
A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang
A System For Detecting Malicious Insider Data Theft In Iaas Cloud Environments, Jason Nikolai, Yong Wang
Faculty Research & Publications
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate our approach using the Eucalyptus cloud computing infrastructure where we observe a 100 percent detection rate for abnormal login events and data copies to outside systems.
Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh
Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh
Australian Information Security Management Conference
The business use of cloud computing services is motivated by the ease of use and the potential financial cost reductions. Service failure may occur when the service provider does not protect information or when the use of the services becomes overly complex and difficult. The benefits also bring optimisation challenges for the information owners who must assess the service security risk and the degree to which new human behaviours are required. In this research we look at the risk of identity theft when ease of service access is provided through a Single Sign On (SSO) authorisation and ask: What are …
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe
Hybrid Spread-Spectrum Tcp For Combating Fraudulent Cyber Activities Against Reconnaissance Attacks, Simon Enoch Yusuf, Olumide Longe
The African Journal of Information Systems
The inefficiencies of current intrusion detection system against fraudulent cyber activities attracts the attention of computer gurus, also known as “hackers” to exploit known weakness on a particular host or network. These hackers are expert programmers who mainly focus on how the Internet works, and they interact with each other to know its strengths and weaknesses. Then they develop advanced tools which an average attacker with little background can use to know the liveness, reachability and running service on the network. Once an attacker identifies these details, he can accurately launch an effective attack and get maximum benefit out of …
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Cloud Computing:Strategies For Cloud Computing Adoption, Faith Shimba
Dissertations
The advent of cloud computing in recent years has sparked an interest from different organisations, institutions and users to take advantage of web applications. This is a result of the new economic model for the Information Technology (IT) department that cloud computing promises. The model promises a shift from an organisation required to invest heavily for limited IT resources that are internally managed, to a model where the organisation can buy or rent resources that are managed by a cloud provider, and pay per use. Cloud computing also promises scalability of resources and on-demand availability of resources.
Although, the adoption …
The Psychology Of Intelligent Video Analysis, Ibpp Editor
The Psychology Of Intelligent Video Analysis, Ibpp Editor
International Bulletin of Political Psychology
This article examines issues surrounding software-enhanced video analysis in an intelligence context.
Covert Shells, John Christian Smith
Covert Shells, John Christian Smith
John Christian Smith
The potential for covert communications exist anywhere that legitimate communication channels are in use. In order to maintain control of the channel once exploited, the insertion of a backdoor Trojan horse server, to be used with a client that provides shell access, is often a necessary prerequisite to establishing and using a covert channel long term.
We discuss covert channel communications methods ranging from embedded channels to disguised protocols. What follows is a review of available covert shell tools. The underground, historical evolution of covert shells is reviewed, focusing on selected, available tools, which range from simple encapsulation methods to …