International Journal of Computer Networks and Communications Security

Volume 6, Issue 12, December 2018

 

 

The Silent Art of Reconnaissance: The Other Side of the Hill
 

The Silent Art of Reconnaissance: The Other Side of the Hill

Pages: 250-263 (14) | [Full Text] PDF (752 KB)
UA Dar, A Iqbal
Georgian College, IT Department, Barrie, L4M3X9, Canada

Abstract -
The Internet has grown exponentially in the past 3 decades. This communication system includes networks owned by government, private parties, academia and individual networks. Any malicious move or outbreaks toward these infrastructures can become the reason for threat to its operations and this results in unbearable damages. Readily available information with fast access to internet resources online not only generates huge success and resources for any business but it also makes it fragile and vulnerable to a single hacker or a group of hackers. These cyber criminals possess a unique set of highly sophisticated tools and they are capable of breaking into systems and networks. The depth of their reachability is your information and presence online. A process of acquiring such information, which assists in exploiting the systems or networks called Recon or Reconnaissance. This paper explores different kind of reconnaissance techniques that are used by an attacker or hacker to collect information regarding the target. This study further determines which recon technique gathers the most information about the target while keeping its identity hidden.
 
Index Terms - Reconnaissance, Attacks, Hacking, Information, Network, Scanning

Citation - UA Dar, A Iqbal. "The Silent Art of Reconnaissance: The Other Side of the Hill." International Journal of Computer Networks and Communications Security 6, no. 12 (2018): 250-263.

Examining the Network & Security Infrastructure of Skype Mobile Application
 

Examining the Network & Security Infrastructure of Skype Mobile Application

Pages: 264-269 (6) | [Full Text] PDF (404 KB)
S ABDULLAHI
Department of Mathematics and Computer Sciences, Faculty of Natural and Applied Sciences, Al-Qalam University, Katsina, P.M.B. 2137 Dutsinma Road, Katsina

Abstract -
Nowadays computer systems and other networking devices face sophisticated attackers who combine multiple vulnerabilities to penetrates networks with devastating impact. The overall security of a network cannot be determined by simply counting the number of vulnerabilities. To accurately assess the security of networked systems, one must understand how vulnerabilities can be combined to stage an attack. From this, risk mitigation options can be devised in terms of maximizing security in the networked environment as well as in on devices and minimizing cost in practice, vulnerabilities often remain in a network, even after they are discovered. Vendors may be slow to release software patches, or deployment may be delayed because of excessive cost or effort. Attackers often leverage even correctly functioning network services to gain new capabilities. An organization will often trade security risk for availability of services. Removing attack paths reduces options for an attacker, but at what cost to individual or organization? This paper describes various network and internet vulnerabilities/attacks and their mitigation techniques as they apply to modern packet transfer. This will help individuals and organizations in understanding how vulnerable or otherwise their data and information is to the attackers and decides on the most cost effective mitigation method (s) that suits them as individuals or organizations as they intend to send data from one devise to another via internet or network connectivity.
 
Index Terms - Network Security, Security Infrastructure, Mobile Application Security, SKYPE Mobile Application, Risk Mitigation Options

Citation - S ABDULLAHI. "Examining the Network & Security Infrastructure of Skype Mobile Application." International Journal of Computer Networks and Communications Security 6, no. 12 (2018): 264-269.

Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks
 

Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks

Pages: 262-269 (8) | [Full Text] PDF (445 KB)
TA Ahanger, A Aljumah
College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Saudi Arabia

Abstract -
Ranging from household to health to battlefield plays a significant role in many useful applications. Due to the distinctive feature of region and selforganizing, WSN (regarded as resource constraint type of network), is formed by a group of sensor nodes to detect physical phenomenon like light, heat, pressure with processing ability. Due to their resource constraint characteristics of limited memory and energy they are vulnerable to many cyber threats and attacks. The most common possible threat is DDoS. These attacks flood target with plentiful fake packets in order to drain the battery, prevent the genuine packets to pass thru and thwart the legitimate user to get the desired response. In this research article, we propose a detection and defense mechanism using packet filtration which deploys mitigation constraints to save the wireless sensor networks from the causes of DDoS.
 
Index Terms - DDoS, WSN, Cyber Attack

Citation - TA Ahanger, A Aljumah. "Detection and Defense against Distributed Denial of Service Attack Using Packet Filtration in Wireless Sensor Networks." International Journal of Computer Networks and Communications Security 6, no. 12 (2018): 262-269.