Discipline: Technology and Engineering
Subcategory: Computer Science & Information Systems
Kiana Hermes - Texas Southern University
Co-Author(s): Dr. Wei Li
This research is an initial investigation of current epidemic cyber-attacks in how to understanding various security works. Cyber Security generally refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals. One of DoD’s research objectives is to seek assuring and defending military operations and related functions within and through cyberspace, amid sophisticated adversary threats and the actions of unwitting third parties. There are many challenges. Adversaries exploit severe asymmetric advantages in cyberspace, and a single vulnerability may enable widespread compromises. Cyber is a man-made world, therefore it can be altered, redirected, and interrupted by anyone with sufficient knowledge; Cyber-attacks is currently an on-going problem. There are several ways to approach this, the first is to understand that there is a difference between deceiving machines versus deceiving people (Network and User Behavioral Analysis) this is because machines are programmed to perform certain tasks in a certain manner making it easier to misdirect. However, when dealing with people (attacker) there are metrics to be considered because people may react to defensive techniques differently time elapsed, failed attempts, location, etc. Moreover, tracking activity, avoiding codes with backdoors, reverse engineering, understanding network spoofing, etc.
Most of cyber security focuses on developing deceptive techniques often against artificial intelligence, much like the existing honeypot a program divided into two sectors: high and low interaction. Honeypots with high interaction are usually set to mimic the entire system and what the system serves while monitoring the system using virtual machines (it is harder to detect and costly). Unlike the low interaction honeypots that are based on passed attacks and simply mimic what has been affected before, it requires less coding making it easier to compromise. This helps with not only intensifying the detection of breaches but also strategizing the response to the breach. An attacker simply waits for a vulnerable system, meaning attackers continuously scan the internet until they find open ports and exploit the network traffic once they do. The most misunderstood concept is that cyber security is built to stop attacks from happening, which is not true. No network is ever completely secure and that is not to ever be taken lightly.
Funder Acknowledgement(s): This work was partially supported by the National Science Foundation under grant NSF-1137732.
Faculty Advisor: Dr. Wei Wayne Li, liww@tsu.edu
Not SubmittedFunder Acknowledgement(s): This work was partially supported by the National Science Foundation under grant NSF-1137732.
Faculty Advisor: Dr. Wei Li, liww@tsu.edu
Role: Most of the research was done by me.