Cyber Reconnaissance: An Alarm before Cyber Attack
نویسندگان
چکیده
Today’s cyber world is more than the internet. It is interdependent networks containing telecommunication network, embedded system and critical infrastructures. Malicious attacks on critical infrastructure become a major threat to business and government operations. An easy and fast access to network makes business successful and makes sensitive information more vulnerable to cyber thieves. Today’s attacker and hacker is skillful and well equipped with various hacking tools can easily exploit a small vulnerability. Reconnaissance is a first phase of cyber-attack and we will study this phase show effective countermeasures. This paper is about the Cyber Reconnaissance and focused on Port Scanning and OS Fingerprinting attack and proposed some easy to use solutions. General Terms Cyber Security, Cyber-Recon.
منابع مشابه
An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کاملTechnical Aspects of Cyber Kill Chain
Recent trends in targeted cyber-attacks has increased the interest of research in the field of cyber security. Such attacks have massive disruptive effects on organizations, enterprises and governments. Cyber kill chain is a model to describe cyber-attacks so as to develop incident response and analysis capabilities. Cyber kill chain in simple terms is an attack chain, the path that an intruder...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملCyber Attack Detection and Classification Using Parallel Support Vector Machine
Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection and classification methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network is becoming a harder problem to solve in the fi...
متن کاملCyberRadar: A Regression Analysis Approach to the Identification of Cyber-Physical Mappings in Process Control Systems
One of the attack requirements for maximizing physical damage to digitally controlled infrastructures is the identification of a mapping between program variables in a compromised control system and physical parameters related to physical processes or physical equipment. A cyber-physical mapping is quite critical from the offensive perspective as physical parameters are affected via modificatio...
متن کامل