期刊论文详细信息
American Journal of Applied Sciences
COMBATING CYBER TERRORISM-ASSESSMENT OF LOG FOR MALICIOUS SIGNATURES | Science Publications
Kamalanaban Ethala1  R. Seshadri1 
关键词: Intrusion;    IDS;    IPS;    Entropical;    Cyber Threats;    Cyber Terrorism;    Anomalies;    Signatures;    Backtrack Operating System;    Backtrack OS;   
DOI  :  10.3844/ajassp.2013.1660.1666
学科分类:自然科学(综合)
来源: Science Publications
PDF
【 摘 要 】

Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this study, a new class of cyber terrorism is addressed where mischievous and malicious behaviour is the root cause for the modification of network data stored in an open database. An attempt is made in this study to develop an algorithm that screens network, database results and detects anomalies in the input data that could have been revised by cyber-attacks, that is cyber terrorism. Combating Cyber Terrorism (CCT) Algorithm that is developed in this attempt uses multi path navigation based on six degree separation to analyze data flow inconsistency into bound and unbound values. This is the first such attempt made in this communication wherein the results presented clearly denote the reduced rate of cyber terrorism based attacks. Analysis of information in the unbound values determines whether the database value has been compromised for any attacks. Success has been achieved in reducing the false alarm rate. Future enhancement will be attempted in the entropical model for profiling the network agents for better performance.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201911300723821ZK.pdf 197KB PDF download
  文献评价指标  
  下载次数:9次 浏览次数:14次