Search results for "attack"
showing 10 items of 221 documents
Terroryzm islamski a bezpieczeństwo globalne
2016
Gwałtowny wzrost liczby zamachów terrorystycznych na przełomie XX i XXI w. w wymiarze międzynarodowych wyraźnie wskazuje na zwiększenie aktywności ugrupowań terrorystycznych o charakterze religijnym, który kojarzony był z ugrupowaniami terrorystycznymi o rodowodzie islamskim. Aktywność tych ugrupowań była ukierunkowana na przeprowadzanie różnego typu ataków w wielu częściach świata, co w naturalny sposób odczytane było jako prowadzenie działań terrorystycznych w skali globalnej. Z jednej strony ataki terrorystyczne powodowały liczne ofiary wśród ludności cywilnej oraz ogromne straty materialne, z drugiej fundamentaliści islamscy osiągnęli inny bardzo ważny dla nich cel propagandowy – wywoła…
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
2020
IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…
AI-based quantum-safe cybersecurity automation and orchestration for edge intelligence in future networks
2023
The AIQUSEC (AI-based quantum secure cyber security automation and orchestration in the edge intelligence of future networks) brings measurable advances to the cyber security of access and edge networks and their services, as well as Operational Service Technologies (OT). The research aims for significant cybersecurity scalability, efficiency, and effectiveness of operations through improved and enhanced device and sensor securities, security assurance, quantum security, and Artificial Intelligence (AI) based automation solutions. The new application scenarios of near future, the multiple stakeholders within each scenario, and the higher data volumes raise the need for novel cybersecurity s…
Cybersecurity Attacks on Software Logic and Error Handling Within AIS Implementations: A Systematic Testing of Resilience
2022
To increase situational awareness of maritime vessels and other entities and to enable their exchange of various information, the International Maritime Organization mandated the use of the Automatic Identification System (AIS) in 2004. The AIS is a self-reporting system that uses the VHF radio link. However, any radio-based self-reporting system is prone to forgery, especially in situations where authentication of the message is not designed into the architecture. As AIS was designed in the 1990s when cyberattacks were in their infancy, it does not implement authentication or encryption; thus, it can be seen as fundamentally vulnerable against modern-day cyberattacks. This paper demonstrat…
Primer estudio experimental sobre los efectos de la digestión en restos esqueléticos de murciélagos (Mammalia: Chiroptera)
2018
Taphonomic studies dealing with small mammals do not usually consider bats. Therefore, the degree to which bat bones are modi? ed by predation and other taphonomic agents are largely unknown. Here we present the results obtained from a set of experiments developed to approach this issue, focusing initially on the e?ect of digestion. For this purpose several bat bones and teeth were exposed to HCl and to two di?erent proteolithic enzymes. The experiments showed that bat bones are altered by acidic and enzymatic attack in a similar way as the bones of other small mammals. However, some patterns were observed in the teeth that had not been previously described in other groups. Thus, both the i…
Arctic Connect Project and Cyber Security Control, ARCY
2019
The submarine communication cables form a vast network on the seabed and transmit massive amounts of data across oceans. They provide over 95% of international telecommunications — not via satellites as is commonly assumed. The global submarine network is the “backbone” of the Internet, and enables the ubiquitous use of mail, social media, phone and banking services. To these days no any other technology than submarine cables systems has not been such a strategic impact to our society without being known it as such by the people. This also means that it is at the same time a very interesting destination for hackers, cyber attackers, terrorist and state actors. They seek to gain access to in…
Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic
2021
Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are becoming more sophisticated and targeted, leaving unprepared environments easy prey for the attackers. Organizations with working antivirus systems and firewalls may be surprised when they discover their network has been encrypted by a ransomware operator. This raises a serious question, how did the attacks go undetected? The conducted research focuses on the most common pitfalls regarding late or even non-existent detection by defining the root cause behind the failed detec…
APT Cyber-attack Modelling: Building a General Model
2022
The global community continues to experience an increase in the scale, sophistication, and successful perpetration of cyber-attacks. As the quantity and value of electronic information have increased, so too have the efforts of criminals and other malicious actors who have embraced the Internet as a more anonymous, convenient, and profitable way of carrying out their activities. The systems are attacked more and more by single or multiple hacktivists, state sponsored hackers, cyber criminals, cyber terrorists, cyber spies, or cyber warfare warfighters. The cyber security approach requires a balance of cyber threat intelligence, real time cyber-attack detection and especially the cyber early…
Palvelunestohyökkäysten havainnointi ja torjuminen tilastollisilla menetelmillä
2015
Palvelunestohyökkäykset ovat ajankohtaisena ongelmana tärkeä tutkimuksen kohde. Palvelunestohyökkäysten torjumiseen tarvitaan menetelmiä, joilla palvelua kuormittava hyökkäysliikenne voidaan erottaa tavallisesta verkkoliikenteestä. Tämän tutkimuksen tavoitteena on perehtyä palvelunestohyökkäysten toimintaan ja selvittää, mitä tilastollisia torjumismenetelmiä hyökkäysten torjumiseen käytetään. Tutkimuksessa selvitettiin palvelunestohyökkäysten yleiset pääpiirteet ja luokiteltiin hyökkäykset kahteen pääluokkaan. Lisäksi tutkimuksessa tunnistettiin neljä eri tilastollista torjumismenetelmää. Palvelunestohyökkäysten torjuminen on haasteellista, eikä yleiskäyttöistä torjumismenetelmää ole kehite…
E-health systems in digital environments
2019
As we live in the digital world, people can be provided with more effective treatment methods that allow them to live longer in their home and to live there better. People can be provided with better home care and preventive health care. People can easily carry portable sensors and intelligent devices in their bodies and wrists that relay their vital information to hospital systems in real time, from which healthcare staff can track human vitality even in real time. Although the digital world offers good opportunities to improve healthcare systems and make disease analyses more effective, we must look deeper about that issue. Devices and systems may not work well together. Almost every manu…