Journal articles on the topic 'Trust attacks Prevention'

To see the other types of publications on this topic, follow the link: Trust attacks Prevention.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Trust attacks Prevention.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Karabacak, Bilge, and Todd Whittaker. "Zero Trust and Advanced Persistent Threats: Who Will Win the War?" International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 92–101. http://dx.doi.org/10.34190/iccws.17.1.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Advanced Persistent Threats (APTs) are state-sponsored actors who break into computer networks for political or industrial espionage. Because of the nature of cyberspace and ever-changing sophisticated attack techniques, it is challenging to prevent and detect APT attacks. 2020 United States Federal Government data breach once again showed how difficult to protect networks from targeted attacks. Among many other solutions and techniques, zero trust is a promising security architecture that might effectively prevent the intrusion attempts of APT actors. In the zero trust model, no process insider or outside the network is trusted by default. Zero trust is also called perimeterless security to indicate that it changes the focus from network devices to assets. All processes are required to verify themselves to access the resources. In this paper, we focused on APT prevention. We sought an answer to the question: "could the 2020 United States Federal Government data breach have been prevented if the attacked networks used zero trust architecture?" To answer this question, we used MITRE's ATT&CK® framework to extract how the APT29 threat group techniques could be mitigated to prevent initial access to federal networks. Secondly, we listed basic constructs of the zero trust model using NIST Special Publication 800-207 and several other academic and industry resources. Finally, we analyzed how zero trust can prevent malicious APT activities. We found that zero trust has a strong potential of preventing APT attacks or mitigating them significantly. We also suggested that vulnerability scanning, application developer guidance, and training should not be neglected in zero trust implementations as they are not explicitly or strongly mentioned in NIST SP 800-207 and are among the mostly referred controls in academic and industry publications.
2

Li, Lixiang, Jürgen Kurths, Yixian Yang, and Guole Liu. "Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks." Mathematical Problems in Engineering 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/189213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years, the complex network as the frontier of complex system has received more and more attention. Peer-to-peer (P2P) networks with openness, anonymity, and dynamic nature are vulnerable and are easily attacked by peers with malicious behaviors. Building trusted relationships among peers in a large-scale distributed P2P system is a fundamental and challenging research topic. Based on interpersonal relationships among peers of large-scale P2P networks, we present prevention and trust evaluation scheme, called IRTrust. The framework incorporates a strategy of identity authentication and a global trust of peers to improve the ability of resisting the malicious behaviors. It uses the quality of service (QoS), quality of recommendation (QoR), and comprehensive risk factor to evaluate the trustworthiness of a peer, which is applicable for large-scale unstructured P2P networks. The proposed IRTrust can defend against several kinds of malicious attacks, such as simple malicious attacks, collusive attacks, strategic attacks, and sybil attacks. Our simulation results show that the proposed scheme provides greater accuracy and stronger resistance compared with existing global trust schemes. The proposed scheme has potential application in secure P2P network coding.
3

Khan, Muhammad Ali, Rao Naveed Bin Rais, Osman Khalid, and Sanan Ahmad. "Trust-Based Optimized Reporting for Detection and Prevention of Black Hole Attacks in Low-Power and Lossy Green IoT Networks." Sensors 24, no. 6 (March 9, 2024): 1775. http://dx.doi.org/10.3390/s24061775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) is empowering various sectors and aspects of daily life. Green IoT systems typically involve Low-Power and Lossy Networks (LLNs) with resource-constrained nodes. Lightweight routing protocols, such as the Routing Protocol for Low-Power and Lossy Networks (RPL), are increasingly being applied for efficient communication in LLNs. However, RPL is susceptible to various attacks, such as the black hole attack, which compromises network security. The existing black hole attack detection methods in Green IoT rely on static thresholds and unreliable metrics to compute trust scores. This results in increasing false positive rates, especially in resource-constrained IoT environments. To overcome these limitations, we propose a delta-threshold-based trust model called the Optimized Reporting Module (ORM) to mitigate black hole attacks in Green IoT systems. The proposed scheme comprises both direct trust and indirect trust and utilizes a forgetting curve. Direct trust is derived from performance metrics, including honesty, dishonesty, energy, and unselfishness. Indirect trust requires the use of similarity. The forgetting curve provides a mechanism to consider the most significant and recent feedback from direct and indirect trust. To assess the efficacy of the proposed scheme, we compare it with the well-known trust-based attack detection scheme. Simulation results demonstrate that the proposed scheme has a higher detection rate and low false positive alarms compared to the existing scheme, confirming the applicability of the proposed scheme in green IoT systems.
4

S, Ananthakumaran. "Prevention of Routing Attacks using Trust-Based Multipath Protocol." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 3 (June 25, 2020): 4022–29. http://dx.doi.org/10.30534/ijatcse/2020/227932020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Atiq, Eman, Maheen Mujeeb, and Mujeeb Ur Rehman. "An Epidemiological study of Acid Burn Incidents in Pakistan: Causes, Consequences and Prevention Strategies." British journal of Psychology Research 11, no. 2 (February 15, 2023): 51–58. http://dx.doi.org/10.37745/bjpr.2013/vol11n25158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
According to Acid Survivors Foundation (ASF), there are about 200 acid attacks every year in Pakistan, and there have been more incidents reported this year than last (Ahmad, S. 2022). Murder is regarded better than throwing acid (Mihaela B. I. 2015). Unfortunately, Pakistan is becoming more and more popular for hurling acid. A woman in Lahore was recently beaten with acid after rejecting a marriage proposal (Ashraf, S. 2017). South Punjab, a region known for its agriculture and as the "cotton belt," is where more than half of all acid-related crimes occur. This region has historically been plagued by low socioeconomic indicators, and it is also where acid is easily accessible in local markets and frequently used to clean cotton. According to an unbiased study, 9,340 people in Pakistan were victims of acid attacks between 1994 and 2018 (Wong, Y. 2021). Unless the government takes strong action to put an end to the evildoer, such attacks will continue to occur in the nation. According to the Acid Survivors Trust International, 80% of acid attack victims are women, putting acid attacks in the category of gender-based violence (J. G. 2019). Although attackers also target men, the problem primarily impacts women and is more likely to happen in societies where there is a strong gender division (Duggan, M. 2020). This way of life supports gender inequality and highlights the vulnerable status of women in Pakistani society, who frequently face attacks not just from outsiders but even from their own spouses and relatives.
6

Boakye-Boateng, Kwasi, Ali A. Ghorbani, and Arash Habibi Lashkari. "A Trust-Influenced Smart Grid: A Survey and a Proposal." Journal of Sensor and Actuator Networks 11, no. 3 (July 11, 2022): 34. http://dx.doi.org/10.3390/jsan11030034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A compromised Smart Grid, or its components, can have cascading effects that can affect lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in research areas such as encryption, intrusion detection and prevention, privacy and trust. Even though trust is an essential component of cybersecurity research; it has not received considerable attention compared to the other areas within the context of Smart Grid. As of the time of this study, we observed that there has neither been a study assessing trust within the Smart Grid nor were there trust models that could detect malicious attacks within the substation. With these two gaps as our objectives, we began by presenting a mathematical formalization of trust within the context of Smart Grid devices. We then categorized the existing trust-based literature within the Smart Grid under the NIST conceptual domains and priority areas, multi-agent systems and the derived trust formalization. We then proposed a novel substation-based trust model and implemented a Modbus variation to detect final-phase attacks. The variation was tested against two publicly available Modbus datasets (EPM and ATENA H2020) under three kinds of tests, namely external, internal, and internal with IP-MAC blocking. The first test assumes that external substation adversaries remain so and the second test assumes all adversaries within the substation. The third test assumes the second test but blacklists any device that sends malicious requests. The tests were performed from a Modbus server’s point of view and a Modbus client’s point of view. Aside from detecting the attacks within the dataset, our model also revealed the behaviour of the attack datasets and their influence on the trust model components. Being able to detect all labelled attacks in one of the datasets also increased our confidence in the model in the detection of attacks in the other dataset. We also believe that variations of the model can be created for other OT-based protocols as well as extended to other critical infrastructures.
7

Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (April 2, 2019): 89. http://dx.doi.org/10.3390/fi11040089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
8

Subathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A Mobile Ad hoc Network (MANET) is a collection of wireless computers (nodes) communicating over multi-hop paths, without infrastructures such as base stations and access points. Nodes must cooperate to provide necessary network functionalities. The Dynamic Source Routing (DSR) protocol is a principal routing protocol in MANET, where security can be compromised by a “Black Hole” attack. In this attack, a malicious node claims to have the shortest path to the destination and attracts all traffic and drops all packets sent for forwarding, leading to performance degradation in the network. The situation becomes even more severe when two or more nodes cooperate and perform an attack called the “Cooperative Black Hole” attack. This article proposes a solution based on probing to identify and prevent such attacks. The proposed solution discovers a secure route between the source and destination by identifying and isolating both single and cooperative black holes, making the MANET resistant against such attacks. Simulation results show that the protocol provides better security and performance in terms of detection time, packet delivery ratio and false negative probability in comparison with trust and probe based schemes.
9

Moinescu, Radu. "Study of social engineering attacks in Romania 2019." Scientific Bulletin of Naval Academy XXIII, no. 1 (July 15, 2020): 263–70. http://dx.doi.org/10.21279/1454-864x-20-i1-037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. In recent years, cybercriminals have done everything in their power to be innovative. They are taking advantage of every aspect of our lives to develop new social engineering schemes. This paper provides an in-depth survey about the social engineering attacks that took place in Romania in 2019, their classifications, detection strategies, and prevention procedures.
10

Quader, Faisal, and Vandana P. Janeja. "Insights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies." Journal of Cybersecurity and Privacy 1, no. 4 (November 11, 2021): 638–59. http://dx.doi.org/10.3390/jcp1040032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper focuses on understanding the characteristics of multiple types of cyber-attacks through a comprehensive evaluation of case studies of real-world cyber-attacks. For each type of attack, we identify and link the attack type to the characteristics of that attack and the factors leading up to the attack, as observed from the review of case studies for that type of attack. We explored both the quantitative and qualitative characteristics for the types of attacks, including the type of industry, the financial intensity of the attack, non-financial intensity impacts, the number of impacted customers, and the impact on users’ trust and loyalty. In addition, we investigated the key factors leading up to an attack, including the human behavioral aspects; the organizational–cultural factors at play; the security policies adapted; the technology adoption and investment by the business; the training and awareness of all stakeholders, including users, customers and employees; and the investments in cybersecurity. In our study, we also analyzed how these factors are related to each other by evaluating the co-occurrence and linkage of factors to form graphs of connected frequent rules seen across the case studies. This study aims to help organizations take a proactive approach to the study of relevant cyber threats and aims to educate organizations to become more knowledgeable through lessons learned from other organizations experiencing cyber-attacks. Our findings indicate that the human behavioral aspects leading up to attacks are the weakest link in the successful prevention of cyber threats. We focus on human factors and discuss mitigation strategies.
11

Srinivas, T. Aditya Sai, and S. S. Manivannan. "Black Hole and Selective Forwarding Attack Detection and Prevention in IoT in Health Care Sector: Hybrid meta-heuristic-based shortest path routing." Journal of Ambient Intelligence and Smart Environments 13, no. 2 (March 26, 2021): 133–56. http://dx.doi.org/10.3233/ais-210591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the current health care scenario, security is the major concern in IoT-WSN with more devices or nodes. Attack or anomaly detection in the IoT infrastructure is increasing distress in the field of medical IoT. With the enormous usage of IoT infrastructure in every province, threats and attacks in these infrastructures are also mounting commensurately. This paper intends to develop a security mechanism to detect and prevent the black hole and selective forwarding attack from medical IoT-WSN. The proposed secure strategy is developed in five stages: First is selecting the cluster heads, second is generating k-routing paths, third is security against black hole attack, fourth is security against the selective forwarding attack, and the last is optimal shortest route path selection. Initially, a topology is developed for finding the cluster heads and discovering the best route. In the next phase, the black hole attacks are detected and prevented by the bait process. For detecting the selective forwarding attacks, the packet validation is done by checking the transmitted packet and the received packet. For promoting the packet security, Elliptic Curve Cryptography (ECC)-based hashing function is deployed. As the main contribution of this paper, optimal shortest route path is determined by the proposed hybrid algorithm with the integration of Deer Hunting Optimization Algorithm (DHOA), and DragonFly Algorithm (DA) termed Dragonfly-based DHOA (D-DHOA) by concerting the parameters like trust, distance, delay or latency and packet loss ratio in the objective model. Hence, the entire phases will be very active in detecting and preventing the two fundamental attacks like a black hole and selective forwarding from IoT-WSN in the health care sector.
12

Al-Shareeda, Mahmood A., Selvakumar Manickam, Murtaja Ali Saare, and Navaneethan C. Arjuman. "Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network." Indonesian Journal of Electrical Engineering and Computer Science 29, no. 1 (January 1, 2022): 518. http://dx.doi.org/10.11591/ijeecs.v29.i1.pp518-526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host and router. Fake router advertisement (RA) attacks have been made possible by this RD protocol design defect. Studies show that the standard RD protocol is vulnerable to a fake RA attack where the host will be denied a valid gateway. To cope with this problem, several prevention techniques have been proposed in the past to secure the RD process. Nevertheless, these methods have a significant temporal complexity as well as other flaws, including the bootstrapping issue and hash collision attacks. Thus, the SecMac-secure router discovery (SecMac-SRD) technique, which requires reduced processing time and may thwart fake RA assaults, is proposed in this study as an improved secure RD mechanism. SecMac-SRD is built based on a UMAC hashing algorithm with ElGamal public key distribution cryptosystem that hides the RD message exchange in the IPv6 link-local network. Based on the obtained expected results display that the SecMac-SRD mechanism achieved less processing time compared to the existing secure RD mechanism and can resist fake RA attacks. The outcome of the expected results clearly proves that the SecMac-SRD mechanism effectively copes with the fake RA attacks during the RD process.
13

Ovaz Akpinar, Kevser, and Ibrahim Ozcelik. "Development of the ECAT Preprocessor with the Trust Communication Approach." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/2639750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In the past several years, attacks over industrial control systems (ICS) have become increasingly frequent and sophisticated. The most common objectives of these types of attacks are controlling/monitoring the physical process, manipulating programmable controllers, or affecting the integrity of software and networking equipment. As one of the widely applied protocols in the ICS world, EtherCAT is an Ethernet-based protocol; thus, it is exposed to both TCP/IP and ICS-specific attacks. In this paper, we analyze EtherCAT field-level communication principles from the security viewpoint focusing on the protocol vulnerabilities, which have been rarely analyzed previously. Our research showed that it lacks the most common security parameters, such as authentication, encryption, and authorization, and is open to Media Access Control (MAC) spoofing, data injection, and other advanced attacks, which require superior skills. To prevent, detect, and reduce attacks over the EtherCAT-based critical systems, first, we improved the open-source Snort intrusion detection/prevention system (IDS/IPS) to support packets that are not processed over transport and network layers. Second, by incorporating a vulnerability analysis, we proposed the EtherCAT (ECAT) preprocessor. Third, we introduced a novel approach called trust-node identification and applied the approach as three rules into the preprocessor. In this sense, the ECAT preprocessor differs from other supported ICS preprocessors in the literature, such as DNP3 and Modbus/TCP. Besides supporting traditional rule expansion, it is also able to handle layer 2 packets and to apply deep packet inspection on EtherCAT packets using the trust-node approach. This method first identifies engineering-station approved nodes based on EtherCAT network information (ENI) configuration files and then deeply inspects incoming packets, considering protocol specifications. The improvements and approach have been tested on the physically developed testbed environment and we have proved that proposals can detect related attacks and provide a basic level of security over the EtherCAT-implemented systems.
14

Karri, Ganesh Reddy, A. V. Prabu, Sidheswar Routray, D. Sumathi, S. Rajasoundaran, Amrit Mukherjee, Pushpita Chatterjee, and Waleed Alnumay. "Efficient Key Management Mechanism with Trusted Gateways for Wireless Mesh Networks." Wireless Communications and Mobile Computing 2022 (August 17, 2022): 1–20. http://dx.doi.org/10.1155/2022/7240795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Securing wireless mesh networks (WMNs) is a crucial issue due to its intrinsic characteristics. Several endangered features might emerge due to the exposure of the networks to a diversity of medium access control (MAC) layers such as distributed denial of service (DDoS) attacks, false reply attacks, and other identity attacks. Against these attacks, the determination of existing techniques is insufficient to ensure the complete security solutions to protect the backbone network at multiple levels. As a result, effective, scalable, and integrated security solutions for WMNs are required. In WMNs, protecting legitimate gateway nodes and internal mesh routers against malicious attacks at the MAC layer remains a difficult problem. Our proposed trust-based security mechanism includes distributed authentication and deauthentication algorithms that validates backbone mesh routers as well as gateway nodes. Particularly, this proposed model targets DDoS attacks in the network. The proposed DDoS attack prevention mechanism (DAPM) uses distributed authentication and deauthentication algorithms to build trusted group heads for managing secure data communication in the network. Our research and practical results show that the proposed mechanism decreases the severity of malicious nodes and strengthens the security compared to existing centralized schemes such as digital signature authentication (DSA-Mesh, MENSA, Mobisec, and AHKM). The experimental solutions show the significance of the proposed work with 10% to 12% of better performance than the existing techniques.
15

Andrade, Rui, Isabel Praça, Sinan Wannous, and Sergio Ramos. "The Impact of Attacks in LEM and Prevention Measures Based on Forecasting and Trust Models." Processes 9, no. 2 (February 8, 2021): 314. http://dx.doi.org/10.3390/pr9020314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In recent years Local Energy Markets (LEM) have emerged as an innovative and versatile energy trade solution. They bring benefits when renewable energy sources are used and are more flexible for consumers. There are, however, security concerns that put the feasibility of the local energy market at risk. One of these security challenges is the integrity of data in the smart-grid that supports the local market. In this article the LEM and the types of attacks that can have a negative impact on it are presented, and a security mechanism based on a trust model is proposed. A case study is elaborated using a multi-agent system called Local Energy Market Multi-Agent System (LEMMAS), capable of simulating the LEM and testing the proposed security mechanism.
16

Ullah, Ikram, Gerard de Roode, Nirvana Meratnia, and Paul Havinga. "Threat Modeling—How to Visualize Attacks on IOTA?" Sensors 21, no. 5 (March 6, 2021): 1834. http://dx.doi.org/10.3390/s21051834.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) has been deployed in a vast number of smart applications with the aim to bring ease and comfort into our lives. However, with the expansion of IoT applications, the number of security and privacy breaches has also increased, which brings into question the resilience of existing security and trust mechanisms. Furthermore, the contemporaneous centralized technology is posing significant challenges viz scalability, transparency and efficiency to wide range of IoT applications such as smart logistics, where millions of IoT devices need to be connected simultaneously. Alternatively, IOTA is a distributed ledger technology that offers resilient security and trust mechanisms and a decentralized architecture to overcome IoT impediments. IOTA has already been implemented in many applications and has clearly demonstrated its significance in real-world applications. Like any other technology, IOTA unfortunately also encounters security vulnerabilities. The purpose of this study is to explore and highlight security vulnerabilities of IOTA and simultaneously demonstrate the value of threat modeling in evaluating security vulnerabilities of distributed ledger technology. IOTA vulnerabilities are scrutinized in terms of feasibility and impact and we have also presented prevention techniques where applicable. To identify IOTA vulnerabilities, we have examined existing literature and online blogs. Literature available on this topic is very limited so far. As far as we know IOTA has barely been addressed in the traditional journals, conferences and books. In total we have identified six vulnerabilities. We used Common Vulnerability Scoring System (CVSS v3.0) to further categorize these vulnerabilities on the basis of their feasibility and impact.
17

Martínez, Jeferson, and Javier M. Durán. "Software Supply Chain Attacks, a Threat to Global Cybersecurity: SolarWinds’ Case Study." International Journal of Safety and Security Engineering 11, no. 5 (October 31, 2021): 537–45. http://dx.doi.org/10.18280/ijsse.110505.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Exploitation of a vulnerability that compromised the source code of the Solar Winds’ Orion system, a software that is used widely by different government and industry actors in the world for the administration and monitoring of networks; brought to the fore a type of stealth attack that has been gaining momentum: supply chain attacks. The main problem in the violation of the software supply chain is that, from 85% to 97% of the code currently used in the software development industry comes from the reuse of open source code frameworks, repositories of third-party software and APIs, creating potential vulnerabilities in the development cycle of a software product. This research analyzes the SolarWinds case study from an exploratory review of academic literature, government information, but also from the articles and reports that are published by different cybersecurity consulting firms and software providers. Then, a set of good practices is proposed such as: Zero trust, Multi-Factor authentication mechanisms (MFA), strategies such as SBOM and the recommendations of the CISA guide to defend against this type of attack. Finally, the research discusses about how to improve response times and prevention against this type of attacks, also future research related to the subject is suggested, such as the application of Machine Learning and Blockchain technologies. Additionally for risk reduction, in addition to the management and articulation of IT teams that participate in all the actors that are part of the software life cycle under a DevSecOps approach.
18

Chandan, Radha Raman, Awatef Balobaid, Naga Lakshmi Sowjanya Cherukupalli, Gururaj H L, Francesco Flammini, and Rajesh Natarajan. "Secure Modern Wireless Communication Network Based on Blockchain Technology." Electronics 12, no. 5 (February 22, 2023): 1095. http://dx.doi.org/10.3390/electronics12051095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Sixth-generation (6G) wireless networking studies have begun with the global implementation of fifth-generation (5G) wireless systems. It is predicted that multiple heterogeneity applications and facilities may be supported by modern wireless communication networks (MWCNs) with improved effectiveness and protection. Nevertheless, a variety of trust-related problems that are commonly disregarded in network architectures prevent us from achieving this objective. In the current world, MWCN transmits a lot of sensitive information. It is essential to protect MWCN users from harmful attacks and offer them a secure transmission to meet their requirements. A malicious node causes a major attack on reliable data during transmission. Blockchain offers a potential answer for confidentiality and safety as an innovative transformative tool that has emerged in the last few years. Blockchain has been extensively investigated in several domains, including mobile networks and the Internet of Things, as a feasible option for system protection. Therefore, a blockchain-based modal, Transaction Verification Denied conflict with spurious node (TVDCSN) methodology, was presented in this study for wireless communication technologies to detect malicious nodes and prevent attacks. In the suggested mode, malicious nodes will be found and removed from the MWCN and intrusion will be prevented before the sensitive information is transferred to the precise recipient. Detection accuracy, attack prevention, security, network overhead, and computation time are the performance metrics used for evaluation. Various performance measures are used to assess the method’s efficacy, and it is compared with more traditional methods.
19

Uslu, Suleyman, Davinder Kaur, Mimoza Durresi, and Arjan Durresi. "Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing." Sensors 22, no. 24 (December 16, 2022): 9905. http://dx.doi.org/10.3390/s22249905.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on devices, sensors, and networks that require advanced mitigation strategies and the active monitoring of the system components. Therefore, a paradigm shift is needed, from traditional prevention and detection approaches toward resilience. This study proposes a trust-based defense framework to ensure resilient IoT services on 5G multi-access edge computing (MEC) systems. This defense framework is based on the trustability metric, which is an extension of the concept of reliability and measures how much a system can be trusted to keep a given level of performance under a specific successful attack vector. Furthermore, trustability is used as a trade-off with system cost to measure the net utility of the system. Systems using multiple sensors with different levels of redundancy were tested, and the framework was shown to measure the trustability of the entire system. Furthermore, different types of attacks were simulated on an edge cloud with multiple nodes, and the trustability was compared to the capabilities of dynamic node addition for the redundancy and removal of untrusted nodes. Finally, the defense framework measured the net utility of the service, comparing the two types of edge clouds with and without the node deactivation capability. Overall, the proposed defense framework based on trustability ensures a satisfactory level of resilience for IoT on 5G MEC systems, which serves as a trade-off with an accepted cost of redundant resources under various attacks.
20

Singhal, Prateek, Puneet Sharma, and Deepak Arora. "An approach towards preventing iot based sybil attack based on contiki framework through cooja simulator." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 261. http://dx.doi.org/10.14419/ijet.v7i2.8.10421.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper we propagate the Sybil attack in WSN (Wireless sensor network), by the researchers many attacks have been recognized in WSN till now and there are many attacks which can attack over through internet, Internet of thing means all devices is interconnected to each other M2M over internet and can be attacked by any of the attacker on any devices. Sybil attack is the detrimental attack against sensor network where several counterfeit identities and legitimate identities are used to get prohibited pass in a network. This is major attack which results an information loss and misinterpretation in the network, and it also minimizes the routing disturbance, trustworthiness and dropping sensitivity packets into a network. In this instance node can trust the imaginary node and sharing of information starts, owed to this security of node is get affected and information is lost. In this paper, a survey of CONTIKI OS-2.7, stimulation tool COOJA and the Sybil attack and proposed the defense mechanisms and CAM (Compare and Match) approach to verify the Sybil attack position and prevent it. This Sybil attack can be stimulated on the stimulation tool COOJA which helps to identify the attacker position node, whereas these attacks outcome in uni-casting as well as multicasting and in this paper specifically given the secure security for Wireless sensor network.
21

Santosh Kumar, Dinesh Kumar Singh, Atma Prakash Singh,. "Enhanced Internet Access in MANETs: A Robust and Efficient Gateway Detection Approach with Amplified Backing." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2403–7. http://dx.doi.org/10.17762/ijritcc.v11i9.9295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
When a certain gateway is connected to a significant number of mobile devices, the quality of service begins to decline. As a result, we propose that the number of mobile devices up to which a specific gateway performs well within expectations be identified, and that this number be referred to as the gateway's capacity. The capacity of each node should then be verified in the optimum gateway discovery protocol before connecting to the gateway for the best results. Trust-based systems might help protect decentralised, self-organized networks like dedicated cellular carriers and dedicated vehicle networks against insider attacks. To guard against external threats, A/V encryption and access control might be utilised. Cryptographic systems, for example, are prevention-focused.
22

Khan, Prince Waqas, and Yungcheol Byun. "A Blockchain-Based Secure Image Encryption Scheme for the Industrial Internet of Things." Entropy 22, no. 2 (February 4, 2020): 175. http://dx.doi.org/10.3390/e22020175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Smart cameras and image sensors are widely used in industrial processes, from the designing to the quality checking of the final product. Images generated by these sensors are at continuous risk of disclosure and privacy breach in the industrial Internet of Things (IIoT). Traditional solutions to secure sensitive data fade in IIoT environments because of the involvement of third parties. Blockchain technology is the modern-day solution for trust issues and eliminating or minimizing the role of the third party. In the context of the IIoT, we propose a permissioned private blockchain-based solution to secure the image while encrypting it. In this scheme, the cryptographic pixel values of an image are stored on the blockchain, ensuring the privacy and security of the image data. Based on the number of pixels change rate (NPCR), the unified averaged changed intensity (UACI), and information entropy analysis, we evaluate the strength of proposed image encryption algorithm ciphers with respect to differential attacks. We obtained entropy values near to an ideal value of 8, which is considered to be safe from brute force attack. Encrypted results show that the proposed scheme is highly effective for data leakage prevention and security.
23

Zimba, Aaron, Luckson Simukonda, and Mumbi Chishimba. "Demystifying Ransomware Attacks: Reverse Engineering and Dynamic Malware Analysis of WannaCry for Network and Information Security." Zambia ICT Journal 1, no. 1 (December 11, 2017): 35–40. http://dx.doi.org/10.33260/zictjournal.v1i1.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Encryption has protected the Internet for some time now and it has come to raise user trust on the otherwise unsecure Internet. However, recent years have seen the use of robust encryption as stepping stone for cyber-criminal activities. Ransomware has not escaped the headlines even as it has attacked almost every sector of the society using a myriad of infection vectors. Mission critical data has been held to ransom and victims have had to part away with millions of dollars. The advent of the anonymous Bitcoin network has made matters worse where it’s been virtually infeasible to trace the perpetrators. In this paper, we endeavor to perform dynamic analysis of WannaCry ransomware samples based on malwarefree infection vectors. Further, we perform reverse-engineering to dissect the ransomware code for further analysis. Results show that despite the use of resilient encryption, the ransomware like other families in the wild uses the same attack structure and cryptographic primitives. Our analysis leads us to the conclusion that this ransomware strain isn't as complex as previously reported. This detailed practical analysis tries to raise awareness to the business community on the realities and importance of IT security whilst hinting on prevention, recovery and the limitations thereof.
24

U. V., Esara, Mfon E. A., and Walter O. O. "Impact of Modern Cultism and Governance in Akwa Ibom State, Nigeria." African Journal of Law, Political Research and Administration 7, no. 1 (July 2, 2024): 135–47. http://dx.doi.org/10.52589/ajlpra-4ndqroth.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study was conducted to investigate the factors responsible for cultism in Akwa Ibom State, Nigeria. This was necessitated by the prevalent cult attacks that threaten lives and property in the state, and to examine the measures taken to fight against this menace. This study adopted two theories to guide the research, namely, symbolic interactionism and brotherhoodism in efforts to explain cultism. The data for the study were obtained through personal interviews with traditional rulers, police and the clergy, while secondary data were obtained from textbooks, journals, newspapers, and magazines. A total of 100 respondents were selected using purposive and snowball sampling techniques. Data were analyzed qualitatively as well as theoretically and empirical studies were reviewed from the basis for conclusion and recommendations. The paper recommends that the Nigeria police force should establish a police community trust relationship in their various stations for effective crime prevention and control. Also, distress call lines should be made available to the public to send information to the police.
25

Johnson, Anju P., Hussain Al-Aqrabi, and Richard Hill. "Bio-Inspired Approaches to Safety and Security in IoT-Enabled Cyber-Physical Systems." Sensors 20, no. 3 (February 5, 2020): 844. http://dx.doi.org/10.3390/s20030844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Internet of Things (IoT) and Cyber-Physical Systems (CPS) have profoundly influenced the way individuals and enterprises interact with the world. Although attacks on IoT devices are becoming more commonplace, security metrics often focus on software, network, and cloud security. For CPS systems employed in IoT applications, the implementation of hardware security is crucial. The identity of electronic circuits measured in terms of device parameters serves as a fingerprint. Estimating the parameters of this fingerprint assists the identification and prevention of Trojan attacks in a CPS. We demonstrate a bio-inspired approach for hardware Trojan detection using unsupervised learning methods. The bio-inspired principles of pattern identification use a Spiking Neural Network (SNN), and glial cells form the basis of this work. When hardware device parameters are in an acceptable range, the design produces a stable firing pattern. When unbalanced, the firing rate reduces to zero, indicating the presence of a Trojan. This network is tunable to accommodate natural variations in device parameters and to avoid false triggering of Trojan alerts. The tolerance is tuned using bio-inspired principles for various security requirements, such as forming high-alert systems for safety-critical missions. The Trojan detection circuit is resilient to a range of faults and attacks, both intentional and unintentional. Also, we devise a design-for-trust architecture by developing a bio-inspired device-locking mechanism. The proposed architecture is implemented on a Xilinx Artix-7 Field Programmable Gate Array (FPGA) device. Results demonstrate the suitability of the proposal for resource-constrained environments with minimal hardware and power dissipation profiles. The design is tested with a wide range of device parameters to demonstrate the effectiveness of Trojan detection. This work serves as a new approach to enable secure CPSs and to employ bio-inspired unsupervised machine intelligence.
26

Maheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In an ad hoc network, the routing protocol takes into account a variety of activities, including maintaining network connection, transmission scheduling, channel evaluation, and preserving network connectivity. Additionally, it determines network architecture. In addition, a number of different elements determines the performance of a routing protocol. These include node mobility, which is responsible for multiple link failures, support for quality of service (QoS), network size, the amount of traffic, and the level of security. The performance may occasionally also be affected by the manner in which the network is behaving in addition to the kinds of apps that are running in that environment. Selecting an appropriate protocol that is based on security is highly crucial in order to set up an effective network. A significant amount of effort has been put into improving the safety mechanisms that are built into routing protocols, most prominently in WSNs, MANETs, VANETs, and WMNs. Only MANET will be the topic of discussion here. Mobile Ad-Hoc Network is a wireless network that does not need infrastructure and is composed of mobile nodes. Mobile ad-hoc network, also known as MANET, is one of the most promising forms of next-generation wireless networking technology. It has garnered a significant amount of interest because it is self-organized and can be deployed at a cheap cost. In comparison to a traditional network, a MANET presents a number of challenges that are especially difficult to overcome when it comes to the duty of routing. The many difficulties that are inherent with MANET have made it an excellent subject for academic investigation. This provides a concise overview of security in MANETs as well as the issues that relate to maintaining them. Understanding the different routing mechanisms and the potential attacks that might be mounted against them is the first step in designing a reliable security mechanism. Within the scope of this study effort, we have provided specifics on the detection and prevention of various routing attacks, with the primary emphasis being placed on the network layer assaults that are unique to MANET. When compared to other study fields, MANET presents the greatest challenge in terms of maintaining network security. In recent years, a significant amount of research has been carried out to investigate several forms of assault; nevertheless, most of the surveys have been carried out without any kind of performance analysis. There is a paucity of research that seeks to find an all-encompassing study of the impact of the many different attacks that bring the overall performance of the Adhoc network down. On the other hand, secure routing in the face of a black hole attack can be difficult because preferences are often incomplete. The in-degree centrality and importance degree measurement applied to the collected consensus-based trust from decision-makers solves the issue of incomplete preferences and improves the accuracy of trust at the same time. Utilizing Network Simulator, we examine how well the suggested approach works. Based on the findings of the simulations, it has been demonstrated that the detection accuracy and throughput of the proposed CREDIT are both significantly higher than those of existing work, making the proposed CREDIT scheme superior.
27

Yang, Jing, Yen-Lin Chen, Lip Yee Por, and Chin Soon Ku. "A Systematic Literature Review of Information Security in Chatbots." Applied Sciences 13, no. 11 (May 23, 2023): 6355. http://dx.doi.org/10.3390/app13116355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Chatbots have become increasingly popular in recent years, but they also present security risks and vulnerabilities that need to be addressed. This systematic literature review examines the existing research relating to information security in chatbots, identifying the potential threats, proposed solutions, and future directions for research. The review finds that chatbots face various security threats, including malicious input, user profiling, contextual attacks, and data breaches, and that solutions such as blockchain technology, end-to-end encryption, and organizational controls can be used to mitigate these concerns. The review also highlights the importance of maintaining user trust and addressing privacy concerns for the successful adoption and continued use of chatbots. A taxonomy developed in this review provides a useful framework for categorizing the articles and their findings. The review concludes by identifying future research directions that include developing more sophisticated authentication and authorization mechanisms, exploring the use of privacy-enhancing technologies, and improving the detection and prevention of security threats, among others. This review contributes to the growing body of literature on information security in chatbots and can guide future research and practice in this field.
28

Preiya, V. Sathya, V. D. Ambeth Kumar, R. Vijay, Vijay K., and N. Kirubakaran. "Blockchain-Based E-Voting System with Face Recognition." Fusion: Practice and Applications 12, no. 1 (2023): 53–63. http://dx.doi.org/10.54216/fpa.120104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Given the increasing importance of technology in meeting human needs, its utilization has become crucial. In contemporary democracies, where public trust in governments is declining and elections play a pivotal role, the widespread adoption of technology has led to new challenges. Elections hold significant importance as they determine the future leaders of countries or organizations. However, certain computerized voting systems have faced criticism for their lack of transparency. Establishing public trust in the government is a formidable task due to the lack of transparency and susceptibility to exploitation in existing voting procedures. Both traditional and current digital voting systems are ineffective due to their vulnerabilities. The main objective is to address issues in conventional and electronic voting systems, including errors and unfairness that may arise during the voting process. Integrating blockchain technology into the electoral process can ensure fair elections and reduce unfair practices. The computerized voting methods do not meet the necessary standards for widespread usage, and the physical voting systems also face numerous issues. This underscores the importance of finding a solution to protect the democratic principles of citizens. By offering a fast and secure voting method, this system has the potential to bring about a revolutionary change in the electoral process. It could lead to higher voter participation and more accurate election results. The proposed approach presents a framework for digital voting using blockchain technology, eliminating the need for physical polling locations. Our suggested design incorporates adaptable consensus algorithms to support a scalable blockchain. Smart contracts ensure secure interactions between users and the network during transaction execution. The security aspects of the blockchain-based voting mechanism have also been addressed, including the use of cryptographic hashes for transaction encryption and prevention of 51% attacks. Furthermore, blockchain technology has been utilized to establish transaction systems throughout the voting process. Performance studies of the proposed system demonstrate its feasibility for deployment in large populations.
29

Alshammari, Salah T., and Khalid Alsubhi. "Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment." Applied Sciences 11, no. 18 (September 13, 2021): 8496. http://dx.doi.org/10.3390/app11188496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.
30

Kuo, Jong-Yih, Zhi-Jia Wen, Ti-Feng Hsieh, and Han-Xuan Huang. "A Study on the Security of Online Judge System Applied Sandbox Technology." Electronics 12, no. 14 (July 10, 2023): 3018. http://dx.doi.org/10.3390/electronics12143018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The majority of programming courses currently employ online judge systems as lesson materials. Online judge systems are becoming more common as the number of courses and persons studying computer science and information engineering grows. At the same time, there is an increase in the number of attacks against online judge systems; for example, Denial-Of-Service attacks, whose goal is to disrupt the target system by exhausting resources and blocking ordinary users from using the service normally. As a result, preventing attacks on online judge systems is becoming increasingly crucial. This research investigates and organizes these attack techniques, as well as develops a threat model for the online judge system by the STRIDE threat model approach, which provides a way to classify attacks into six categories. This research also designs code analysis rules and implements a code analysis tool. This tool can assist developers in analyzing the existing online judge system to determine whether the judge system is vulnerable to attack and dealing with vulnerability as soon as feasible to improve the judge system’s security. After enhancing the security of online judge systems, the system can foster trust and reliability among users as benefits.
31

Park, Sangwoo, Soowoong Lee, and Jooseok Song. "An Improved Trust-Free Approach for Preserving Privacy in Internet of Things." International Journal on Cybernetics & Informatics 11, no. 4 (August 27, 2022): 157–65. http://dx.doi.org/10.5121/ijci.2022.110412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As the researches for Internet of things(IoT) are very active, those for preventing privacy leakage in IoT is also getting important. Various methods have been proposed, but each has its own drawbacks such as reliance on the service provider or a trusted third party. Recently a new method called Blind Peer Approach (BLP) has been proposed to resolve the drawbacks by cooperating untrusted blind peer instead of trusted third party. Blind Peer Approach, however, is still in the early stage, therefore the detailed procedure is missing. In addition, the method still has a critical issue, which is the fact that BLP is vulnerable to trajectory attack. In this paper, we propose Enhanced Blind Peer Approach (EBLP) and its detailed procedures. This method is resilient to the trajectory attack by carefully selecting the blind peer in the feasible moving area. We analyse the resiliency for some privacy attacks for EBLP. Our analysis shows that EBLP has acceptable communication and computational costs.
32

Chandel, Tanmay. "Review of Malware and Phishing in the Current and Next Generation of the Internet." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6499–502. http://dx.doi.org/10.22214/ijraset.2023.52927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: The advent of Web 2.0 and Web 3.0 technologies has created new opportunities for cybercriminals to launch malware and phishing attacks. This review paper aims to provide an overview of the current state of these types of attacks in Web 2.0 and Web 3.0 environments, as well as the tools and strategies that can be used to prevent them. The paper begins by defining malware and phishing and describing the basic methods used to execute these attacks. It then delves into the specific characteristics of Web 2.0 and Web 3.0 environments that make them vulnerable to these types of attacks. For example, the ability to share information and collaborate in real time in Web 2.0 environments can create opportunities for cybercriminals to exploit trust relationships and launch phishing attacks. In Web 3.0 environments, the use of blockchain and decentralized technologies introduces new challenges for preventing malware and phishing attacks. The paper discusses the the functioning and the procedures which are followed in the event of a malware attack or phishing attack in unison with social engineering and also takes a look at a case study of a real life phishing attack in web 3.0. The paper concludes by outlining some of the key tools and strategies that can be used to prevent malware and phishing attacks in Web 2.0 and Web 3.0 environments. These include technical measures such as anti-malware software, firewalls, and spam filters, as well as user education and training to recognize and avoid phishing attacks. Overall, the paper provides a comprehensive overview of the current state of malware and phishing attacks in Web 2.0 and Web 3.0 environments, as well as the strategies and tools that can be used to prevent them. As the use of these technologies continues to grow, it is essential that individuals and organizations take steps to protect themselves against these types of cyber attacks.
33

Zhang, Fu-Guo. "Preventing Recommendation Attack in Trust-Based Recommender Systems." Journal of Computer Science and Technology 26, no. 5 (September 2011): 823–28. http://dx.doi.org/10.1007/s11390-011-0181-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Blatchford, J. "An audit of a general practices compliance with national recommendations for the avoidance of complications for type 2 diabetic patients." International Journal of Pharmacy Practice 31, Supplement_2 (November 30, 2023): ii8—ii9. http://dx.doi.org/10.1093/ijpp/riad074.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Introduction Each week, diabetes leads to more than 700 strokes, almost 600 heart attacks and more than 2000 instances of heart failure, in addition to being the single most common cause of chronic kidney disease in the UK.1 The NHS spends 10% of its annual budget on diabetes with 80% of that treating the complications of diabetes.2 Pharmacists have a crucial role to optimise the medication of diabetic patients and prevent future problems. Aim To assess a general practices (GP) compliance with national recommendations and the Quality and Outcomes Framework for the avoidance of complications for Type 2 Diabetes Mellitus (T2DM) patients. Methods This single-centre, retrospective audit was conducted at a GP in the London Borough of Southwark. Six standards were measured focusing on the prevention of the complications of diabetes. Each standard incorporated an exclusion and inclusion criteria. Standard 1 and 2 reviewed the appropriate management of nephropathy and hypertension respectively. Standard 3 and 4 relate to statin use for primary and secondary prevention. The final standards assess how many patients have documented QRISK2 scores and initiated on a Sodium-Glucose Co-Transporter 2 (SGLT2) inhibitor as per the new NICE guidelines.3 Ethical approval was not deemed necessary for this clinical audit in agreement with the Hurley Group and King’s College Hospital NHS Foundation Trust guidelines. Results Half (50%, n=153/304) of all included T2DM patients at the practice have a blood pressure reading defined as hypertensive. Out of all diabetic patients, 25 of them had clinical proteinuria, micro-albuminuria, or a diagnosis of nephropathy. Of these 25 patients, 19 (76%) were prescribed an angiotensin-converting enzyme inhibitor or angiotensin-receptor blockers. A small portion (7%, n=28/374) of the diagnosed T2DM patients have a documented QRISK2 score. Subsequently, only 32 diabetic patients (9%, n=32/374) are prescribed an SGLT2 inhibitor. For standards 3 and 4, there were 122 patients (73%) who were prescribed a statin for primary prevention and 89 patients (87%) who were prescribed a statin for secondary prevention. Discussion/Conclusion The microvascular and macrovascular complications of diabetes are well documented. The incidence of these complications can be reduced by pharmacological management. Although none of the standards were met, the results are similar to other practices across the country. However, in comparison to the local average, the audited GP underperformed with no standards being better than the average of GPs in the area. Sub-analysis emphasises the disparities in health between various racial and ethnic groups. The results of the two largest demographic groups audited, Caucasian and Caribbean patients, show that the former is more likely to meet the standards. These findings indicate that the processes of the practice require change to meet the needs of our diabetic patients. In particular, work is required to understand the disparities in care for our patients categorised as ethnic minorities. The recommendations fall under 5 main categories – feedback, learn, templates, analyse, and review. References 1. NHS Digital. National Diabetes Audit, 2017-18 Report 2a: Complications and Mortality. [online]. England and Wales 2019. [Accessed 10/10/22] Available from: https://files.digital.nhs.uk/91/084B1D/National%20Diabetes%20Audit%2C%202017-18%2C%20Report%202a.pdf 2. The British Diabetic Association. Diabetes Statistics. [online]. London. Diabetes UK. [Accessed 10/10/22] Available from: https://www.diabetes.org.uk/professionals/position-statements-reports/statistics 3. National Institute for Health and Care Excellence. Type 2 diabetes in adults: Management. [online]. London. 2022. [Accessed 10/10/22] Available from: https://www.nice.org.uk/guidance/ng28/
35

Nivedita, V., and N. Nandhagopal. "Trust Management-Based Service Recovery and Attack Prevention in MANET." Intelligent Automation & Soft Computing 29, no. 3 (2021): 771–86. http://dx.doi.org/10.32604/iasc.2021.017547.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rajamäki, Jyri. "Towards Resilient Cyber-Physical eHealth Systems." EQUATIONS 1 (December 24, 2021): 78–82. http://dx.doi.org/10.37394/232021.2021.1.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Current eHealth systems are cyber-physical systems (CPS) making safety-critical decisions based on information from other systems not known during development. To achieve the trust of users, measures of safety have to be taken into consideration in accordance with the ""privacy by design"" approach. This requires secure storage of information and guaranteeing safe exchange of data preventing unauthorized access, loss of data and cyber-attacks. From citizens’ point of view, eHealth is wholeness in which sectors of information security (availability/confidentiality/integrity) hold true. Present procedures emphasize confidentiality at the expense of integrity and availability, and regulations/instructions are used as an excuse not to change even vital information. The mental-picture of cyber security should turn from “threat, crime, attack” to “trust”. Creating confidence in safe digital future is truly needed in the integration of the digital and physical world’s leading to a new digital revolution. The precondition for the exchange of information “trust” must be systematically built at every CPS’ level (cyber, platform, and people).
37

Haval, Abhijeet Madhukar. "Integration of Nonlinear Dynamics in Blockchain Security Protocols." Advances in Nonlinear Variational Inequalities 26, no. 2 (June 30, 2023): 94–109. http://dx.doi.org/10.52783/anvi.v26.i2.286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Because of its ability to completely revamp current blockchain security methods, this connection is crucial. An effective safeguard against complex assaults, Nonlinear Dynamics (ND) adds a living, breathing component to consensus methods and cryptographic primitives. There is an urgent need for creative, nonlinear methods to strengthen blockchain security in light of present challenges including increasing attack vectors and risks posed by quantum computing. The suggested Dynamic Chaos-based Blockchain Security (DC-BS) system in this paper makes use of the chaotic dynamics present in ND to strengthen various aspects of blockchain security. Adaptive threat detection systems, dynamic consensus methods, and chaos-based encryption are all newly introduced in DC-BS. Validation of DC-BS's efficacy in preventing various attack scenarios through simulation studies demonstrates its advantages in reducing vulnerabilities and responding to new attack types. Various decentralized systems can benefit from DC-BS, including as supply chain management, the Internet of Things (IoT), conventional blockchain networks, and decentralized finance (DeFi). To strengthen the security of various decentralized applications, DC-BS works to increase trust, transparency, and resilience. The effectiveness of DCBS is confirmed by thorough simulation analyses that cover a wide range of attack scenarios, including double-spending assaults, Sybil attacks, and eclipse attacks. Based on the results of the simulations, DCBS is much more effective than conventional blockchain security procedures at reducing these risks. Showcased as well is the technique's capacity to react to changing attack techniques, highlighting its capacity to provide strong security even in dynamic settings.
38

Syed, Salman Ali, and Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Secure data transfer in mobile ad hoc network (MANET) against malicious attacks is of immense importance. In this paper, we propose a new enhanced trust model for securing the MANET using trust-based scheme that uses both blind trust and referential trust. In order to do this, the trust relationship function has to be integrated with the dynamic source routing (DSR) protocol for making the protocol more secure. We thoroughly analyze the DSR protocol and generate the performance matrices for the data pertaining to packets sent, packets received, packets loss, and throughput. We also analyze the outcome attained from the improvised trust establishment scheme by using the three algorithm implementations in NS2 simulator for detecting and preventing various types of attacks.
39

Kang, Xin, and Yongdong Wu. "A trust-based pollution attack prevention scheme in peer-to-peer streaming networks." Computer Networks 72 (October 2014): 62–73. http://dx.doi.org/10.1016/j.comnet.2014.07.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Balaji Srikaanth, P., and V. Nagarajan. "A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs." Wireless Personal Communications 101, no. 1 (May 2, 2018): 339–57. http://dx.doi.org/10.1007/s11277-018-5691-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Shinde, Prof Kaustubh, Sakshi Hadole, Rutuja Sathe, Sakshi Sirgan, and Abhijit Thorat. "Cyber Attack Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (March 5, 2024): 1–13. http://dx.doi.org/10.55041/ijsrem29058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets. It emphasizes the constant evolution of attack methods, necessitating adaptive and intelligent detection systems. The abstract highlights the importance of real-time monitoring, anomaly detection and behavioral analysis as key techniques in identifying cyber threats. It also underscores the role of machine learning in enhancing the accuracy and speed of detection. In conclusion, cyber attack detection is an indispensable aspect of cybersecurity playing a pivotal role in preventing data breaches ensuring data integrity and preserving the trust of digital ecosystems.
42

Singh, Kamini, Gyan Singh, and Arpit Agrawal. "A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET." International Journal of Computer Applications 94, no. 20 (May 30, 2014): 1–5. http://dx.doi.org/10.5120/16548-5825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gellert, George A., Sean P. Kelly, Edwin W. Wright, and Leslie C. Keil. "Zero Trust and the future of cybersecurity in healthcare delivery organizations." Journal of Hospital Administration 12, no. 1 (February 9, 2023): 1. http://dx.doi.org/10.5430/jha.v12n1p1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Digital care transformation, the proliferation of disruptive technologies and the changing hybrid workforce have forced the evolution of traditional information technology network boundaries of healthcare organizations. The new landscape has rendered legacy existing perimeter defined and based cybersecurity solutions inadequate to meet increasing regulatory and federal demands for highly secure access management. Emerging compliance requirements, coupled with the concerning increase in healthcare data breaches, ransomware attacks, and security incidents targeting the healthcare sector, have transformed our historic notion of trust into an organizational vulnerability. A “Zero Trust” approach to information security is driven by an imperative to “never trust, always verify,” and requires strict, rigorous and continuous identity verification to minimize trust zones and their associated risk of security breach. Healthcare delivery organizations need to appreciate the importance of a Zero Trust strategy in reducing vulnerabilities, strengthening health system information security, and preventing successful security breaches, while also recognizing how identity and access management serves as the foundation of achieving Zero Trust.
44

Junejo, Aisha Kanwal, Imran Ali Jokhio, and Tony Jan. "A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services." Electronics 11, no. 13 (June 21, 2022): 1932. http://dx.doi.org/10.3390/electronics11131932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper, we propose a novel trust computation framework (TCF) for cloud services. Trust is computed by taking into consideration multi-dimensional quality of service (QoS) evidence and user feedback. Feedback provides ample evidence regarding the quality of experience (QoE) of cloud service users. However, in some cases, users may behave maliciously and report false feedback. Users can carry out collusion and Sybil attacks to slander/self-promote cloud services. Trust computed in such cases could be misleading and inaccurate. Evaluating the credibility of user feedback can help in not only preventing the collusion and Sybil attacks but also remunerating the affected cloud services. Despite the advantages of credibility evaluation, very few studies take into consideration feedback credibility and multi-dimensional evaluation criteria. Considering the limitations of existing studies, we propose a new TCF in which trust is computed by aggregating multi-dimensional evidence from QoS and QoE. We have used multi-dimensional QoS attributes to compute the objective trust of cloud services. The QoS attributes are divided into three dimensions, i.e., node profile, average resource consumption, and performance. The node profile of a cloud service is attributed to CPU frequency, memory size, and hard disk capacity. The average resource consumption is quantified based on the current CPU utilisation rate, current memory utilisation rate, current hard disk utilisation rate, and energy consumption. Moreover, the performance of a cloud service is measured by the average response time and task success ratio. Besides that, the credibility of feedback is evaluated to prevent the malicious behaviour of cloud users. Our results demonstrate the effectiveness of our proposed TCF in computing accurate trust in cloud services.
45

Mehetre, Deepak C., S. Emalda Roslin, and Sanjeev J. Wagh. "Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust." Cluster Computing 22, S1 (March 14, 2018): 1313–28. http://dx.doi.org/10.1007/s10586-017-1622-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Isaac Sajan, R., and J. Jasper. "Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network." International Journal of Communication Systems 33, no. 8 (January 28, 2020): e4341. http://dx.doi.org/10.1002/dac.4341.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Mishra, Priya, Ompal Singh, and Abhishek Bhatt. "A Trust Election based Mechanism for finding selfish node and preventing them from Attack." International Journal of Computer Sciences and Engineering 7, no. 2 (February 28, 2019): 223–29. http://dx.doi.org/10.26438/ijcse/v7i2.223229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Otari, Grantej Vinod, and Vijay Ram Ghorpade. "A trust management model based on NSGA-II in mobile grid system." International Journal of Knowledge-based and Intelligent Engineering Systems 24, no. 3 (September 28, 2020): 235–42. http://dx.doi.org/10.3233/kes-200045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mobile Grid network connects large number of mobile devices like smartphones, tablets, PDAs, wireless digital medical equipment’s etc for the purpose of sharing their resources and performing the task collaboratively and cooperatively. The mobile nodes participating in the mobile grid are autonomous and open in nature making them more vulnerable to data and control attacks made by malicious or selfish nodes. Preventing these malicious or selfish nodes and identifying the trusted nodes to participate in the network is an NP-hard problem. To recognize trusted nodes in the mobile grid system a novel trust management model is proposed in this paper by applying an elitist multi objective optimization algorithm Non-dominated Sorting Genetic Algorithm-II (NSGA-II). The proposed trust management model assesses the trust index of each mobile node in the network using various evaluation factors or attributes and then obtains the non-dominated set of trusted nodes in each front. Comparative analysis of the proposed trust model shows that the proposed model can be a potential candidate for implementing trust management in mobile grid network.
49

Shinde, Kaustubh. "Implementation Paper on Cyberattack Detection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (May 31, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem35135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets. It emphasizes the constant evolution of attack methods, necessitating adaptive and intelligent detection systems. The abstract highlights the importance of real-time monitoring, anomaly detection and behavioral analysis as key techniques in identifying cyber threats. It also underscores the role of machine learning in enhancing the accuracy and speed of detection. In conclusion, cyber attack detection is an indispensable aspect of cybersecurity playing a pivotal role in preventing data breaches ensuring data integrity and preserving the trust of digital ecosystems.
50

Marynissen, Hugo, and Mike Lauder. "Stakeholder-Focused Communication Strategy During Crisis: A Case Study Based on the Brussels Terror Attacks." International Journal of Business Communication 57, no. 2 (November 2, 2019): 176–93. http://dx.doi.org/10.1177/2329488419882736.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Research in the field of risk and crisis communication indicates that large disasters not only cause distress among those affected by a crisis situation but also among the wider public. It is known that feelings of anxiety and dread are rooted in a heuristic interpretation of the situation, and that this leads to elevated stress levels in both the individual and the collective. From the literature on psychosocial behavior, we know that the lack of information, the shortness of guidance on what to do, and the absence of acknowledgement of any emotional distress, all have an immediate negative impact on the individual’s stress level. To tackle this phenomenon, this research looks to communication practices as a way of dealing with this issue during a crisis. The prevailing crisis communication literature suggests its prime aim is to safeguard the sender’s reputation thereby preventing the loss of trust. In our work, we inverted that logic by introducing a crisis communication strategy that focuses on restoring trust by diminishing victims’ and other stakeholders’ stress levels. Based on a case, the Brussels terror attacks (March, 2016), we proved the effectiveness of this approach and the diminishing effect on the population’s stress levels.

To the bibliography