SACM - United States of America

Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9668

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    ItemRestricted
    Moving Target Detection and Prediction towards Cyber Agile Cellular Networks
    (Alotaibi, Saad, 2019-04-29) Alotaibi, Saad; Song, Houbing
    Agile networks such as cellular networks are often prone to attacks emanating from various loopholes. The security loopholes increase the vulnerability of a network whereby the attackers are able to utilize the attack surface to execute an attack. One of the best approach of eliminating the security loopholes is to reduce the attack surface that in the network. An approach known as Moving Target Defense (MTD) is a robust mechanism aimed at reducing the attack surface in a cyber-agile network. This paper proposes the development of an MTD framework aimed at reducing the attack surface in a cloud- based network. The approach aims to formulate how multiple virtual machines can be migrated from one network layer to another with the aim of minimizing the chances of an attacker exploiting the network vulnerabilities. The proposed framework also addresses the mechanism of transforming the I.P addresses of the virtual machines after successful migration to the new network layer. The framework is simulated with the OpenStack platform whereby the network layer is implemented using nova- compute while the hardware is implemented using neuron framework. The algorithmic framework is further supported and implemented using Python programming platform. The experimental results indicate that the migration process is attained within a maximum duration of 0.3 seconds, which is adequate enough to prevent an attacker from executing an attack on the network. The proposed MTD framework is capable of improving the security of a cyber-agile network by minimizing the attack surface. For enhancing the security of the system, the IP mutation methodology has also been proposed along with MTD. For checking the efficiency of proposed IP mutation methodology, two metrics were defined i.e. assurance and avoidance. The results for IP mutation methodology suggested that it uses flexible and elastic characteristics of SDN and helps to enhance the security of the system.
    14 0
  • Thumbnail Image
    ItemRestricted
    Internet of Things Supply Chain Risks and Defences
    (Alotaibi, Saad, 2019-04-29) Alotaibi, Saad; Song, Houbing
    The unprecedented emergence of network preinstalled devices which are designed to connect to the internet by default, promises convenience by recurrent and consistent advancement every day. It also has a promise of better security and efficient functionality. But even the lat- est gadget launched in the market to consumers comes with potential security flaws which later skilled hackers, who al- ways seem to a step ahead of executive security technicians, exploit these weak spots, infect the system with malicious malware and penetrate with ease in the private and wide area networks. These tech-savvy devices are collectively called internet of things or simply IOT. They are the tradition non-networking devices aside from personal computers, laptops, tablets, and smartphones. Some of them are in our house vicinity such, electric cars, kettles, LED light bulbs, electric kettles, Bluetooth speakers and many more. While others are in the industrial scale, such as the execution of tasks in robotic factory assembly and artificial intelligence used in war and commercial planes such as autopilot systems. Due to these rapid modifications and avid application IOT in the industrial sector, most early adopters of the technology have ways attempted to get the upper hand over their business rivals. There are various objectives while undertaking IOT projects at an industrial scale, but mainly advanced customer support and smooth ground operations and as a source of new Streams incomes top the priorities of the majorities of industrial giants and conglomerate corporations. IOT security cannot be discriminated rather be the major priority of the IOT system at every level, and must support the safety, data privacy, high standards of confidentiality and a reliable security system. There is a notable convergence of the operating system and the information technology sector which contends with a cultural clash, but always be accompanied by trustworthiness. The need to countermeasure these emerging challenges led to the Industrial Internet Consortium (IIC). It was founded in 2014 to make way for realizing the monetary value in IIOT and tackle the threats that face those that depend and live proximal to the IOT systems.
    19 0

Copyright owned by the Saudi Digital Library (SDL) © 2025