American Journal of Applied Sciences | |
COMBATING CYBER TERRORISM-ASSESSMENT OF LOG FOR MALICIOUS SIGNATURES | Science Publications | |
Kamalanaban Ethala1  R. Seshadri1  | |
关键词: Intrusion; IDS; IPS; Entropical; Cyber Threats; Cyber Terrorism; Anomalies; Signatures; Backtrack Operating System; Backtrack OS; | |
DOI : 10.3844/ajassp.2013.1660.1666 | |
学科分类:自然科学(综合) | |
来源: Science Publications | |
【 摘 要 】
Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this study, a new class of cyber terrorism is addressed where mischievous and malicious behaviour is the root cause for the modification of network data stored in an open database. An attempt is made in this study to develop an algorithm that screens network, database results and detects anomalies in the input data that could have been revised by cyber-attacks, that is cyber terrorism. Combating Cyber Terrorism (CCT) Algorithm that is developed in this attempt uses multi path navigation based on six degree separation to analyze data flow inconsistency into bound and unbound values. This is the first such attempt made in this communication wherein the results presented clearly denote the reduced rate of cyber terrorism based attacks. Analysis of information in the unbound values determines whether the database value has been compromised for any attacks. Success has been achieved in reducing the false alarm rate. Future enhancement will be attempted in the entropical model for profiling the network agents for better performance.
【 授权许可】
Unknown
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO201911300723821ZK.pdf | 197KB | download |