Deterring Hacking Strategies via Targeting Scanning Properties
نویسندگان
چکیده
Network infrastructures have played important part in most daily communications for business industries, social networking, government sectors and etc. Despites the advantages that came from such functionalities, security threats have become a daily struggle. One major security threat is hacking. Consequently, security experts and researchers have suggested possible security solutions such as Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason behind that, there is a few researches that examine the behavior of hackers. This paper formally and practically examines in details the behavior of hackers and their targeted environments. Moreover, this paper formally examines the properties of one essential pre-hacking step called scanning and highlights its importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.
منابع مشابه
Hacking as Transgressive Infrastructuring
This paper applies the theoretical lens of infrastructure to study hacking practices that take issue with large-scale communica tion networks. The paper analyzes a series of hacks targeting the Global System for Mobile Communications (i.e., networks for mobile telephony) carried out by a cluster of people af filiated or sympathetic to the German Chaos Computer Club between 2001 and 2014. Thes...
متن کاملContribution of 68Ga-PSMA PET/CT to targeting volume delineation of prostate cancer treated with conformal radiation therapy: Which SUV threshold is appropriate?
Introduction: Prostate-specific membrane antigen (PSMA) has been demonstrated as a promising tool for specific imaging of prostate cancer (PCa) via positron emission tomography-computed tomography (PET/CT) scanning. Radiation treatment planning (RTP) based on 68Ga-PSMA PET/CT scanning can also lead to some decision modifications. The specific goal o...
متن کاملWhen Governments Hack Opponents: A Look at Actors and Technology
Repressive nation-states have long monitored telecommunications to keep tabs on political dissent. The Internet and online social networks, however, pose novel technical challenges to this practice, even as they open up new domains for surveillance. We analyze an extensive collection of suspicious files and links targeting activists, opposition members, and nongovernmental organizations in the ...
متن کاملNanoparticle-based targeted gene therapy for lung cancer.
Despite striking insights on lung cancer progression, and cutting-edge therapeutic approaches the survival of patients with lung cancer, remains poor. In recent years, targeted gene therapy with nanoparticles is one of the most rapidly evolving and extensive areas of research for lung cancer. The major goal of targeted gene therapy is to bring forward a safe and efficient treatment to cancer pa...
متن کاملA Dynamic Security Model for Addressing Hacking Risk Factors
Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solution...
متن کامل