A Survey on Fast-flux Attacks
“Fast-flux” refers to rapidly assigning different IP addresses to the same domain name. Although there are some legitimate uses for this technique, recently it has become a favorite tool for cyber criminals to launch collaborative attacks. After it was ...
Automated Compliance Checking Methodology for Non-Log Operations
Compliance Management CM is the management process that an organization implements to ensure organizational compliance with relevant requirements and expectations. The most complicated, time-consuming, and costly process in CM is compliance checking ...
Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment
This paper addresses the problem of data security and fault tolerance in the Cloud. The application of the proposed model includes organizations, business groups, and establishments where the data are highly confidential and need to be kept in a very ...
On the Implementation of a Secured Digital Watermarking Framework
In this paper, a saliency-based digital watermarking system which employs a higher degree security by means of Symmetric Key Cryptography is proposed. The projected algorithm can implant more information into less perceptive areas within the original ...
An Overview of Modern Botnets
Botnets, a network of malware-infected computers, have been used for a range of malicious activities. Evolving from fast fluxing to employing anonymous networks, they have matured and have become exceedingly sophisticated over the years. Understanding ...
An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System
SMS Spam, which is an unsolicited or unwanted message, is a major problem with Global System for Mobile Communication GSM subscribers. Existing Spam filters have not been able to stop the SMS Spam problem due to frequent drift in spammer’s words, ...
An Authentication and Authorization Solution for a Multiplatform Cloud Environment
Providing security at all levels within the multiplatform cloud-computing environment is has not been properly solved due to a variety of problems arising from technical and human-based sources. This paper presents an authentication-and-authorization ...
QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications
The increasingly ubiquitous two-dimensional barcodes designed by the Denso Wave company, known as the QR code, were originally intended to track millions of parts as they moved about on high-speed assembly lines. Since then, these increasingly ...
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
Literature in malware proliferation focuses on modeling and analyzing its spread dynamics. Epidemiology models, which are inspired by the characteristics of biological disease spread in human populations, have been used against this threat to analyze ...
Potential Problems with Information Security Risk Assessments
To protect the information assets of any organization, management must rely on accurate information security risk management. Management must access the risk to the organizations assets then develop information security strategies to reduce the risks. ...
Commutative Re-encryption Techniques: Significance and Analysis
Commutative re-encryption techniques are important tools for different applications where the encryption and decryption operations are performed in arbitrary order. These techniques also enable one to transfer information securely in a network without ...
Predicting Cyber Risks through National Vulnerability Database
Software vulnerabilities are the major cause of cyber security problems. The National Vulnerability Database NVD is a public data source that maintains standardized information about reported software vulnerabilities. Since its inception in 1997, NVD ...
Secure Graphical One Time Password GOTPass: An Empirical Study
The traditional text-based password has been the default security medium for years; however, the difficulty of memorizing secure strong passwords often leads to insecure practices. A possible alternative solution is graphical authentication, which is ...