Cyber Security Research Papers/Topics

Detection and Avoidance of Routing Attack in Mobile Ad-hoc Network using Intelligent Node

Abstract: The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempster-shafer theory introduced a solution for these routing attacks where it entirely works on the principle of Dempster rule with various important factors to mitigate these critical routing attacks. Previously the system contains an Intrusion detection mechanism which is used to create a message whenever the attacker attacks the network. This Intrusion detection system sends an alert m...

Malicious Attacks Detection in Wireless Ad Hoc Networks by Using SNDP Protocol

Abstract: In this research to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against Multihop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching the destination through malicious behavior node. To overcome this problem we can present a protocol called SNDP (secure neighbor discovery pro...

Insecurity of WLAN for M-Learning Implementation in Tertiary Level by DoS

Abstract: Mobility, mobile technology and mobile computing are few buzz words in all the fields. This makes human beings life easy and goes for anywhere, anytime working conditions. In educational field Networking and mobile computing are playing major role in the shift from the traditional black board teaching to contemporary E-Learning and M-Learning environment. But the major issue with the wireless network is vulnerability, denial of service and in general security compared to the wired ...

Development of a Real-time Phishing Detection Website via a Triumvirate of Information Retrieval, Natural Language Processing. and Machine Learning Modules

Phishing attacks are a serious risk to people and businesses because they try to trick users into sending critical information by using phony emails and websites. Users remain susceptible to these assaults because sophisticated phishing websites are frequently difficult for existing preventive measures to identify and block. As a result, a reliable detection system that can recognize and stop phishing assaults is required. The goal of the research is to create a detection system that efficien...

Certified Ethical Hacker Study Guide

Chapter 1 Introduction to Ethical Hacking, Ethics, and Legality 1 Chapter 2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering 31 Chapter 3 Gathering Network and Host Information: Scanning and Enumeration 63 Chapter 4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files 95 Chapter 5 Trojans, Backdoors, Viruses, and Worms 125 Chapter 6 Gathering Data from Networks: Sniffers 153 Chapter 7 Denial of Service and Session Hijacking 173 Chapter 8...

Certified Ethical Hacker Exam Guide

Chapter 1 Getting Started: Essential Knowledge Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker Chapter 3 Scanning and Enumeration Chapter 4 Sniffing and Evasion Chapter 5 Attacking a System Chapter 6 Web-Based Hacking: Servers and Applications Chapter 7 Wireless Network Hacking Chapter 8 Trojans and Other Attacks Chapter 9 Cryptography 101 Chapter 10 Low Tech: Social Engineering and Physical Security Chapter 11 The Pen Test: Putting It All Together Appendix A Tool, Site...

Integer Programming

Recall that we defined integer programming problems in our discussion of the Divisibility Assumption in Section 3.1. Simply stated, an integer programming problem (IP) is an LP in which some or all of the variables are required to be non-negative integers.† In this chapter (as for LPs in Chapter 3), we find that many real-life situations may be formulated as IPs. Unfortunately, we will also see that IPs are usually much harder to solve than LPs. In Section 9.1, we begin with necessary defin...

CSS 413- Security Strategies for Web Applications and Social Networks

Philosophy of the Department The departmental philosophy is in line with the national philosophy of Nigerian educational information technological aspirations, as it is in line with the establishment of universities of technology in the Country. Our philosophy is to develop high manpower needs that would meet the Nigerian ICT aspirations in such areas as business establishments, through web networking, cybercrimes and terrorism overcoming at both local and international scenes, alleviate fra...

Darknet - C vs SAST

In security testing much like other things technical there are two very contrary methods, Dynamic Application Security Testing ( DAST) and Static Application Security Testing (SAST)

NIGERIAN COMMUNICATIONS ACT, 2003

TABLE OF CONTENTS Table of contents...............................................................................................................................2 Part I .................................................................................................................................................3 General Provision .............................................................................................................................3 Part II General Mandates on Disast...

INVESTIGATING COMPUTER-RELATED CRIME A HANDBOOK FOR CORPORATE INVESTIGATORS

The introduction of the IBM Personal Computer in 1982 fostered a technology revolution that has changed the way the world does business. Prior to that historic milestone, several personal computers existed, e.g., Apple, TRS 80, but they were primarily used by individuals, schools, and small businesses. When computer mainframe giant, International Business Machines (IBM) entered the personal computer market in 1982, the event quickly captured the attention of corporations and government agenci...

Research Problem

Cloud computing, grid computing, digital forensic, bring your own devices, biometrics technology, internet of things, data mining, data science, big data analytics, software engineering, social networking, smart grid, bioinformatics, intrusion detection, human factor in information security and so on.

Social Network Sites: Definition, History, and Scholarship

Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are hundreds of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of preexi...

The Ten Most Critical Web Application Security Risks

Insecure software is undermining our financial, healthcare, defense, energy, and other critical infrastructure. As our software becomes increasingly complex, and connected, the difficulty of achieving application security increases exponentially. The rapid pace of modern software development processes makes the most common risks essential to discover and resolve quickly and accurately. We can no longer afford to tolerate relatively simple security problems like those presented in this OWASP T...

Application Threat Modeling - OWASP

Threat modelling is an approach for anazlying the security of an application. It is a structured approach that enables you to identify, quantify and address the security risk with an application.


1 - 15 Of 17 Results