A new architecture for impact projection of cyber-attacks based on high level information fusion in cyber command and control
Koroush
Dadash Tabar Ahmadi
PhD student, Malik Ashtar University of Technology
author
Ali Jabbar
Rashidi
Associate Professor, Electrical and Electronics University Complex, Malik Ashtar University of Technology
author
Mortaza
Barari
Assistant Professor, University Complex of Information Technology, Communication and Security, Malik Ashtar University of Technology
author
text
article
2015
per
Efficient and sustainable command and control networks have appropriate management and securitypolicies and strong security components. In this kind of networks, even professional invaders for access tosensitive files or compromising entities such as host, user, service and network, require the implementationof multi-stage attacks. Therefore using multi-stage information fusion and impact projection of cyberattacks,it is possible to prevent from interruption in network tasks and lose of important data at very earlystages of them. In this paper, while providing a new architecture of the impact projection of cyber-attacks,with simulation of different patterns of this architecture in simulation environment specified for randomprocesses, it will be shown how this architecture using high level information fusion led to improve cybersituational awareness. For simulation of random processes in the environment will be shown how this architectureusing high level data integration led to the recovery of knowledge positions will be backed cyber.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
2
v.
4
no.
2015
1
14
https://ecdj.ihu.ac.ir/article_200069_c9ef071bec19bef88f4a8a2a20081e56.pdf
Online Collaborative Planning in Complex Environment
Saeideh
Sadati
Master's student, Malik Ashtar University of Technology
author
Mahdi
Naqian Fesharaki
Associate Professor, Malik Ashtar University of Technology
author
Amir Hossein
Momeni Azandariani
Instructor, Malik Ashtar University of Technology
author
text
article
2015
per
Although existing Planning methods can plan under uncertainty and decentralize situation, most ofthem malfunction in some complicated conditions of command and control scenarios such as real time decisionmaking, need accurate planning, bounded communication between agents, dynamic worlds and partiallyobservable environments. Among suitable models for these situations, we can consider extended modelsof DEC-POMDPs such as MAOP-COMM that can handle these conditions. It is possible to improveMAOP-COMM model to do planning for agents with double precision. In this paper we have improved thealgorithm of MAOP-COMM model by upgrading value function heuristic and using "two steps lookahead" inthe strategy of finding best policy and making correct decision. Improved algorithm performs online planningfor agents in a multi agent system in uncertain condition with better performance and high percent ofcorrect decision making. We experiment resulted algorithm on Grid Soccer benchmark. The results obtainedprove efficiently of proposed improvements.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
2
v.
4
no.
2015
15
23
https://ecdj.ihu.ac.ir/article_200070_fbc3d44fb38126b68ad9d468d9a709b7.pdf
Utilizing Port-Knocking as first defensive layer at defense-in-depth strategies using hybrid of the Internet Control Message Protocol features, Internet Addresses and Tunneling
Mehran
Pour Vahhab
Senior Expert in Information Technology Engineering - Computer Networks, Gilan University Campus, Rasht, Iran
author
Reza
Ebrahimi Atani
Assistant Professor, Department of Computer Engineering, Gilan University, Rasht, Iran
author
text
article
2015
per
The computer networks are always vulnerable to various attacks and these attacks are typicallyinclude identification attacks, acquire attacks and disabling services attacks. At identification attacks, theattackers attempt to gather information and identify running services, in order to achieve damage, acquiringor disabling services. Port-Knocking (PKn) is a unique method to prevent detection and exploiting vulnerableservices by the attackers and in facts the aim of PKn is hiding the services from attacker's view andcombat identifying attacks, while the authenticated users are allowed to access these hidden services. In thisarticle, a new method to establish simplicity and use of existing tools at the most operating systems to eliminatespecific programs for running processes and open ports PKn at any time and anywhere have been introduced.This novel PKn can create more complexity at Knock operation utilizing the specific ICMP andsynchronizing by the use of web browsers, to reduce of replay attacks and eliminate the risk of DoS attacksby hidden the services. To insure the efficiency and capabilities of the proposed method, this technique issuccessfully implemented and ran on a MikroTik RouterOS operation system.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
2
v.
4
no.
2015
25
40
https://ecdj.ihu.ac.ir/article_200071_71c6f7c91a12f32346828158f32ece41.pdf
A novel architecture for database outsourcing in cloud computing with regard to data life cycle
Seyed Kamiar
Eizadi
Assistant Professor of Shahid Beheshti University of Tehran
author
Mojtaba
Rafiei Korkvandi
Senior expert of Shahid Beheshti University of Tehran
author
Abolfazl
Khosh Sefat
Senior expert of Shahid Beheshti University of Tehran
author
text
article
2015
per
The increasing amount of information as well as lack of existence of sufficient computational facilitiesand storage in organizations have caused various management problems. These problems on the one handand the rapid expansion of storage services on the other hand have made different organizations to usecloud storage service providers in order to store and manage their organizational information. Using suchservices, causes organizational information to be stored outside of the organization environment and thereforethe owner have less control over its information. Therefore, security concerns will be raised. Many securitysolutions are proposed to deal with these security concerns, but most of these solutions have focusedon a particular aspect of data life cycle such as storage phases. Understanding and considering the datalife cycle as well as the challenges and the opportunities facing organizations leads to provide appropriatesolutions to overcome security concerns. This paper aims at discussing and analyzing the challenges andopportunities facing organizations using data outsourcing services, and then a new architecture for the databaseoutsourcing with regards to the data life cycle will be presented.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
2
v.
4
no.
2015
41
54
https://ecdj.ihu.ac.ir/article_200072_23fab5558853c7cc3be84dcf3d3e1b20.pdf
A Combined Improved Algorithm to Estimating The delay of Sky waves In Loran c Receiver
Meysam
Bayat
Doctoral student, Malik Ashtar University of Technology and instructor, Shahid Sattari Aviation University of Tehran, Faculty of Electrical Engineering
author
Mohammad Hossein
Madani
Assistant Professor, Malik Ashtar University of Technology, Tehran, Faculty of Communication
author
Seyed Mohammad Javad
Razavi
Assistant Professor, Malik Ashtar University of Technology, Tehran, Faculty of Communication
author
text
article
2015
per
Use of the LORAN C system is well considered due to it's protection against gamming. the main parameterof error in this system is sky wave interference. Frequency Estimation Algorithm for estimation skywave as the frequency estimation Algorithm (TOA) and time division of arrival are applied. Through thefrequency estimation algorithm the music algorithm has the performance in the presence of noise. For performanceimprovement and increasing the accuracy an algorithm is proposed which is combination of TOAand TDOA. this method has less error compared to TOA and TDOA. With respect to results, it is shown thatthe proposed method has considerable improvement in the accuracy of estimation of sky waves the proposedmethod improves 12.9 percent and 8.9 percent the system performance compared to TOA and TDOArespectively.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
2
v.
4
no.
2015
55
63
https://ecdj.ihu.ac.ir/article_200073_3dcbaa8e61a80c815afff0bb1dd264f8.pdf
A new approach for static detection of security vulnerabilities in web applications
Maedeh
Sadeqi Yakhdani
Senior Expert in Information Technology Engineering, Faculty of Electrical and Computer Engineering, Yazd University
author
Mahdi Aqa
Saram
Assistant Professor, Faculty of Electrical and Computer Engineering, Yazd University
author
Fazlollah
Adib Nia
Assistant Professor, Faculty of Electrical and Computer Engineering, Yazd University
author
text
article
2015
per
Nowadays, due to the increased use of web-based applications and storage and exchange of sensitiveinforamtion by this category of programs, it is necessary to detect security vulnerabilities and remove themto keep them secure against the misuse of intrusions. In most cases, the Static Analysis is especially valuablein security assurance and detection of security vulnerabilities, while dynamic analysis goal is findingand debugging the errors. In this paper, we present a new approach that detects common vulnerabilities inweb applications by Probable Data Flow Analysis on Vulnerability Probability Graph. VPG is designed toconsider the points with more probable to vulnerability and PDF Analysis is designed for the increase ofaccuracy in vulnerability detection. The proposed approach was tested on a few web applications and theresults were compared with a few other tools that we observed improvement in performance in some cases.
Electronic and Cyber Defense
Imam Hussein University
2322-4347
2
v.
4
no.
2015
65
74
https://ecdj.ihu.ac.ir/article_200074_5428514f5611672f218ad40e5787c6f9.pdf