Hybrid Insider Cyber Security Threats Mitigation Scheme Using ECC and Behavoural Analysis Methodology
Stephen M. Musili,
Michael Kimwele,
Richard Rimiru
Issue:
Volume 3, Issue 4, July 2017
Pages:
29-38
Received:
3 December 2016
Accepted:
23 December 2016
Published:
4 July 2017
Abstract: The last decade has been characterized by many organizations making it their priority to embrace digital technologies in running their services. Cyberspace has hugely dominated how organizations use electronics and the electromagnetic spectrum to manipulate, and exchange data via interconnected systems. Due to cyber space’s great dependence on informatics and telecommunications for almost every activity and service, it’s extremely catastrophic to ignore the growing phenomenon of cybercrimes and the increasing number of threats to organizations’ systems. The threat to enterprises from insider activities is increasing, getting worse and that significant losses are being incurred. ESG research indicates that more than half (54%) of IT and security professionals believe that insider threats are more difficult to detect or even prevent today than they were in 2011 (Jon Oltsik, 2013). While many organizations focus their security efforts on their network border via excellently configured firewall systems, it is actually the insider who perhaps poses the most risk to cyber-security. Even the existence of some personnel can be at stake if the data is leaked. Cyber Security takes many forms and the range and nature of threat is so varied that there just isn’t any getting away from the fact that it will require a multi-faceted solution. This paper suggests a hybrid framework aimed at guiding the management in coming up with a near real time mitigation solution that can be used to mitigate (Detecting, Preventing and Responding) the dynamic enigma of insider threats. The framework is based on behavioral variation analysis in conjunction with the use of technical techniques. We tried to change the landscape by adding the technological and behavioral equivalent of security cameras or additional lighting, and see whether the resulting uncertainty will eradicate the risk of attack in the cyber space.
Abstract: The last decade has been characterized by many organizations making it their priority to embrace digital technologies in running their services. Cyberspace has hugely dominated how organizations use electronics and the electromagnetic spectrum to manipulate, and exchange data via interconnected systems. Due to cyber space’s great dependence on info...
Show More
M2M Communication in Ad-Hoc WSNs for Industrial Application Using MQTT Protocol
Suma Manuvinakurike Narasimhasastry,
Pramodh Basavaraju,
Kirthana Bhaskar,
Ranganatha Horigowda,
Bhimalinga Kore
Issue:
Volume 3, Issue 4, July 2017
Pages:
39-44
Received:
8 May 2017
Accepted:
6 June 2017
Published:
25 July 2017
Abstract: M2M communication is based on data transfer data between devices to a remote central location for effective monitoring and control. M2M enables networked devices to share information and perform actions, without the manual assistance or not much of human intervention. In this paper, M2M communication connected in an Adhoc using the MQTT protocol is presented and demonstrated. The open cloud is used for the database storage and the results are shown in jsonformat. Experimental studies suggest Adhoc M2M communications established with MQTT protocol has provided effective communications for industrial applications with minimum packet loss and delays.
Abstract: M2M communication is based on data transfer data between devices to a remote central location for effective monitoring and control. M2M enables networked devices to share information and perform actions, without the manual assistance or not much of human intervention. In this paper, M2M communication connected in an Adhoc using the MQTT protocol is...
Show More
Game Theory Basics and Its Application in Cyber Security
Amadi Emmanuuel Chukwudi,
Eze Udoka,
Ikerionwu Charles
Issue:
Volume 3, Issue 4, July 2017
Pages:
45-49
Received:
25 May 2017
Accepted:
4 July 2017
Published:
27 July 2017
Abstract: The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas including finance, economics, politics, auction, sciences and cyber security. This work reviews the application of game theory in cyber security. A brief introduction to the concept of game theory is presented alongside a detailed review of research works carried out using the concept of game theory for cyber security.
Abstract: The concept of game theory has in recent times has found application extensively in the area of security usually called security games. A game could be normal form or extensive form and are used to model the behaviour of players in a simple or complex contest for resources within a given scenario. Game theory finds application in various areas incl...
Show More