Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. The probability of the eavesdropper acquiring the key and recovering the message is high as he/she can distinguish a correct key from incorrect keys based on the output of the decryption. This is because a message has some structure-texts, pictures, and videos. Thus, an attempt at decrypting with a wrong key yields random gibberish that does not comply with the expected structure. Furthermore, the consistent increase in computational power implies that stolen encrypted data may gradually debilitate to a brute-force attack. Thus, causing the eavesdropper to learn the content of the message. To this end, the objective of this research is to reinforce the current encryption measures with a decoy-based deception model where the eavesdropper is discouraged from stealing encrypted message by confounding his resources and time. Our proposed model leverages its foundation from decoys, deception, and artificial intelligence. An instant messaging application was developed and integrated with the proposed model as a proof of concept. Further details regarding the design, analysis, and implementation of the proposed model are substantiated. The result shows that the proposed model reinforces state-of-the-art encryption schemes and will serve as an effective component for discouraging eavesdropping and curtailing brute-force attack on encrypted messages.
Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient’s account to steal the patient’s personal, medical or genetic details. This threat is amplified given that an individual’s genetic content is connected to their family, thus leading to security risks for their family members as well. Several cases of patient’s data theft have been reported where cybercriminals authenticated into the patient’s account, stole the patient’s medical data and assumed the identity of the patients. In some cases, the stolen data were used to access the patient’s accounts on other platforms and in other cases, to make fraudulent health insurance claims. Several measures have been suggested to address the security issues in electronic health record systems. Nevertheless, we emphasize that current measures proffer security in the short-term. This work studies the feasibility of using a decoy-based system named HoneyDetails in the security of the electronic health record system. HoneyDetails will serve fictitious medical data to the adversary during his hacking attempt to steal the patient’s data. However, the adversary will remain oblivious to the deceit due to the realistic structure of the data. Our findings indicate that the proposed system may serve as a potential measure for safeguarding against patient’s information theft.
The cloud computing is nowadays an embracing computing technology by many organizations, academic institutions and business centers. Resources availability, resources capacity, security are among the factors that subscriber consider while rating Cloud Service Providers when subscribing. Cloud Service Providers (CSPs) are limited in some resources, lacking some resources requested by their customers, this gave rise to the need for interconnecting multiple clouds to interoperate and share resources. The interconnected clouds can be in different features and schemes and the system can be prone to insecurity or intrusion. The architectural modeling system was used in developing framework. In this paper, a Digital Forensic Framework that can detect intrusion within heterogeneous joint clouds was developed with the architectural model and algorithm that can handle the joint clouds heterogeneity and complexity during inter-clouds resources management. This study originates a new framework and an algorithm that enable detecting crime and locating a scene of a crime for digital investigation (digital forensic) in a joined different configured cloud service providers (CSPs) platforms. Contribution/Originality: This study originates a new framework and an algorithm that enable detecting crime and locating a scene of a crime for digital investigation (digital forensic) in a joined different Configured cloud service providers (CSPs) platforms. 1. INTRODUCTION Cloud computing technology renders the acquisition of hardware and software by the industrial institutions and academic institutions useless, as sensitive data and/or information are often stored in cloud, service provider's data centers around the globe not on institutions local disk drives anymore. Different cloud platforms such as OpenStack, Amazon Web Service (AWS), Rackspace, Google Compute Engine (GCE), Microsoft Azure and others, provide services to cloud-end users on a pay-as-you-go service, the users only pay cloud resources utilized [1]. Today, various Cloud Service Providers (CSPs) are aiming to interoperable clouds. The effort is to aggregate or join different forms of cloud service providers, to one cloud platform [2]. Some scholars also have indicated broad interest in creating a cloud-of-clouds where multiple cloud service providers can gain access to resources of each other seamlessly; this can be referred to as a multi-cloud [3]. The main issues with joining multiple and differently configured cloud service providers are enormous, most of the cloud systems are not compatible with one another and cannot share services with one another since everyone speaks a different language [4]. There are no specified service standards that are specific to the effort of joining two or more clouds and these standards are deployed on
We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of common interest that cut across geographical boundaries. Behind all these incredible gains are digital crime equivalence that threatens the physical socialization. Criminal minded elements and hackers are exploiting social media platforms (SMP) for many nefarious activities to harm others. As detection tools are developed to control these crimes so also hackers’ tactics and techniques are constantly evolving. Hackers are constantly developing new attacking tools and hacking strategies to gain malicious access to systems and attack social media network thereby making it difficult for security administrators and organizations to develop and implement the proper policies and procedures necessary to prevent the hackers’ attacks. The increase in cyber-attacks on the social media platforms calls for urgent and more intelligent security measures to enhance the effectiveness of social media platforms. This paper explores the mode and tactics of hackers’ mode of attacks on social media and ways of preventing their activities against users to ensure secure social cyberspace and enhance virtual socialization. Social media platforms are briefly categorized, the various types of attacks are also highlighted with current state-of-the-art preventive mechanisms to overcome the attacks as proposed in research works, finally, social media intrusion detection mechanism is suggested as a second line of defense to combat cybercrime on social media networks.
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual socialization has positively influenced social bonding among social media users irrespective of one’s location in the connected global village. Human user and social bot user are the two types of social media users. While human users personally operate their social media accounts, social bot users are developed software that manages a social media account for the human user called the botmaster. This botmaster in most cases are hackers with bad intention of attacking social media users through various attacking mode using social bots. The aim of this research work is to design an intelligent framework that will prevent attacks through social bots on social media network platforms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.