Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.
Internet application technologies, such as cloud computing and cloud storage, have increasingly changed people’s lives. Websites contain vast amounts of personal privacy information. In order to protect this information, network security technologies, such as database protection and data encryption, attract many researchers. The most serious problems concerning web vulnerability are e-mail address and network database leakages. These leakages have many causes. For example, malicious users can steal database contents, taking advantage of mistakes made by programmers and administrators. In order to mitigate this type of abuse, a website information disclosure assessment system is proposed in this study. This system utilizes a series of technologies, such as web crawler algorithms, SQL injection attack detection, and web vulnerability mining, to assess a website’s information disclosure. Thirty websites, randomly sampled from the top 50 world colleges, were used to collect leakage information. This testing showed the importance of increasing the security and privacy of website information for academic websites.
With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.
Over the years, human dependence on the Internet has increased dramatically. A large amount of information is placed on the Internet and retrieved from it daily, which makes web security in terms of online information a major concern. In recent years, the most problematic issues in web security have been e-mail address leakage and SQL injection attacks. There are many possible causes of information leakage, such as inadequate precautions during the programming process, which lead to the leakage of e-mail addresses entered online or insufficient protection of database information, a loophole that enables malicious users to steal online content. In this paper, we implement a crawler mining system that is equipped with SQL injection vulnerability detection, by means of an algorithm developed for the web crawler. In addition, we analyze portal sites of the governments of various countries or regions in order to investigate the information leaking status of each site. Subsequently, we analyze the database structure and content of each site, using the data collected. Thus, we make use of practical verification in order to focus on information security and privacy through black-box testing.
Original scientific paper It is becoming increasingly common for web application and data storage services to be handled by cloud computing; therefore, more and more people are putting their private information on the internet, motivating research into cloud computing, database security and authority encryption. In the Open Web Application Security Project (OWASP) assessment, SQL injection is one of the most dangerous attack vectors in internet security. With this in mind, we have implemented a system named the website security mining system, which leverages a web crawling algorithm to analyze web URL and e-mail address leaks through black-box testing of 20 well-known universities' websites. Based on our data, academic website maintainers can be clearly informed about what kind of danger they are exposed to, which URLs are highly in danger, and the need to patch the website to protect against vulnerabilities and prevent academic resources from attacks. We hope that in the future, academic networks will gain more attention in the information security community, just like commercial and government networks today. Keywords: academic networks; black-box testing; database security; search engine; SQL injectionUvođenje i analiza sustava za probijanje sigurnosti web mjesta s primjenom na sveučilišne akademske mreže Izvorni znanstveni članak Sve je uobičajenije za web aplikacije i poslužitelje za pohranu podataka rukovanje putem programskog rješenja u oblaku; stoga je sve veći broj ljudi koji svoje privatne podatke stavljaju na internet, motivirajući istraživanje mogućnosti programskog rješenja u oblaku, sigurnosti baza podataka i kodiranih nadležnosti. U procjeni Open Web Application Security Project (OWASP)-a, ubacivanje SQL-a jedan je od najopasnijih napadnih vektora na sigurnost interneta. Imajući to u vidu, uveli smo sustav nazvan sustav za probijanje sigurnosti web mjesta, koji pokreće algoritam za pretraživanje weba kako bi analizirao propuste na zaštiti URL-a i adresa e-pošte ispitivanjem crnih kutija web mjesta 20 poznatih sveučilišta. Na temelju naših podataka, održavatelji akademskih web mjesta mogu saznati kakvoj su opasnosti izloženi, kojim URL-ovima prijeti veća opasnost i što učiniti kako bi uredili web stranicu za zaštitu od ranjivosti i sprijećili napade na akademske resurse. Nadamo se da će se u budućnosti veća pažnja posvetiti sigurnosti informacija na akademskim mrežama, kako se to danas čini s komercijalnim i vladinim mrežama. Ključne
Original scientific paper Under the delay tolerant network, high mobility of the node and the transmission distance make it impossible to keep a durable and regular data routing path between two nodes. As a result, such failure affects the function of packet routing mechanism. Therefore, in order to improve the efficacy of data transmission, conventional delay tolerant routing adopts more packet replication, or makes opportunistic on-line with encountered nodes and selects advantageous ones to increase packet arrival rate or reduce transmission delay rate. However, excessive increase of packet replication or excessive records for selected transmission nodes may result in internet traffic or a waste of resources. It may also lead to a lower level of the routing protocol or a complicated operation. Thus, conventional delay tolerant routing is not satisfying. This research intends to design an optimized forward strategy on the basis of different routing algorithm. This strategy is based on adaptive socially aware and aims at improving solving problems of delay tolerant networks routing. Keywords: Delay Tolerant Networks; routing algorithm; forward strategy; socially awareNovi pristup adaptivnog društveno svjesnog algoritma za prijenos podataka u mrežama koje dopuštaju zastoj Izvorni znanstveni članak U mreži koja tolerira zastoj, ograničenoj visokom mobilnošću čvora i prijenosnom udaljenosti, teško je održati trajnu i redovitu putanju prijenosa podataka (ruting) između dva čvora. Zbog toga, ovakvo zatajenje utječe na funkciju mehanizma za prenošenje paketa. Stoga, da bi se povećala učinkovitost prijenosa podataka, uobičajeni ruting koji tolerira zastoj prihvaća više replikacija paketa ili stvara oportunistički on-line s čvorovima na koje nailazi te izabire povoljnije kako bi ubrzao dolazak paketa ili smanjio veličinu zastoja u prijenosu. Međutim, prekomjerno povećanje replikacija paketa ili prevelik broj zapisa za izabrane čvorove prijenosa može rezultirati prometom na internetu ili gubitkom resursa. Može također dovesti do niže razine ruting protokola ili složene operacije. Prema tome, uobičajeni ruting koji tolerira zastoj ne zadovoljava. Cilj je ovoga istraživanja projektirati optimiziranu naprednu strategiju na temelju različitog ruting algoritma. Ta se strategija zasniva na adaptivnoj društvenoj osviještenosti i teži poboljšanju rješavanja problema prijenosa podataka u mrežama koje dopuštaju zastoj.
Abstract:Mobile communication and Internet are the most thriving industries in the 21st century. They tend to integrate recently. Human beings are used to construct a beautiful dream in communication: An internet service which can be enjoyed by a mobile and dexterous device. This article explores the demand of 3G cell phone consumers in Taiwan from the angle of technical management. Here we use the method of statistical theory and electrical machinery communication background to explain it. We also make the further market classification for the consumer. The findings have classified three clusters, VIP gold customer group possesses 34% most races grouping in earlier period which emphasized for the technical management. This cluster has a quantity demand to network, also is highly relative in each kind of function demands. We should pay attention to the degree of satisfaction from the consumer of this cluster. The population variable in this cluster, which the proportion is high in the transaction officer and the housekeeper, the age between 18∼34 year-old, the scholarship is college, the incomes each month is above NT$50,000, the female possess the most proportion, therefore, by higher proportion to these variables, we could propose the special marketing project and the cell phones with the corresponding functions. By taking the chance, we can construct the 3G communication tyrant industry.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.