Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions

نویسندگان

  • Adnan Akhunzada
  • Mehdi Sookhak
  • Nor Badrul Anuar
  • Abdullah Gani
  • Ejaz Ahmed
  • Muhammad Shiraz
  • Steven Furnell
  • Amir Hayat
  • Muhammad Khurram Khan
چکیده

Man-At-The-End (MATE) attacks and fortifications are difficult to analyze, model, and evaluate predominantly for three reasons: firstly, the attacker is human and, therefore, utilizes motivation, creativity, and ingenuity. Secondly, the attacker has limitless and authorized access to the target. Thirdly, all major protections stand up to a determined attacker till a certain period of time. Digital assets range from business to personal use, from consumer devices to home networks, the public Internet, the cloud, and the Internet of Things – where traditional computer and network security are inadequate to address MATE attacks. MATE is fundamentally a hard problem. Much of the extant focus to deal with MATE attacks is purely technical; though security is more than just a technical issue. The main objective of the paper is to mitigate the consequences of MATE attacks through the human element of security and highlight the need for this element to form a part of a holistic security strategy alongside the necessary techniques and technologies. This paper contributes by taking software protection (SP) research to a new realm of challenges. Moreover, the paper elaborates the concept of MATE attacks, the different forms, and the analysis of MATE versus insider threats to present a thematic taxonomy of a MATE attack. The ensuing paper also highlights the fundamental concept of digital assets, and the core protection mechanisms and their qualitative comparison against MATE attacks. Finally, we present state-of-the-art trends and cutting-edge future research directions by taking into account only the human aspects for young researchers and professionals. & 2014 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending against phishing attacks: taxonomy of methods, current issues and future directions

Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people’s lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is “phishing”, in which, attackers attempt to steal the user’s credentials using fake emails or websites or both....

متن کامل

Analysis Students’ Motivation in Vocational Schools and Agricultural Training Centers in Kermanshah Province toward Studying the Field of Agriculture

Objective: Today people are aware of the important role of agriculture as a vital source in their life. Development in agriculture and making healthy food for human, needs trained man. Vocational schools and agricultural training centers provided the first stage for arriving at this purpose. One of the reasons for the weak influence of agricultural training centers in creating occupational oppo...

متن کامل

Analysis Students’ Motivation in Vocational Schools and Agricultural Training Centers in Kermanshah Province toward Studying the Field of Agriculture

Objective: Today people are aware of the important role of agriculture as a vital source in their life. Development in agriculture and making healthy food for human, needs trained man. Vocational schools and agricultural training centers provided the first stage for arriving at this purpose. One of the reasons for the weak influence of agricultural training centers in creating occupational oppo...

متن کامل

Human Computer Interaction Using Vision-Based Hand Gesture Recognition

With the rapid emergence of 3D applications and virtual environments in computer systems; the need for a new type of interaction device arises. This is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. In other words, evolution of user interfaces shapes the change in the Human-Computer Interaction (HCI). In...

متن کامل

God and Man in Freudian Psychoanalysis: A Critical Examination of Freud’s The Future of an Illusion

In this article, we have attempted to scrutinize Freud’s psychological analysis of man and God. Four different interpretations of this Freudian analysis have been examined hereunder. Freud believes that religion is the outcome of wishful thinking or fear. Freud’s views on the origin of religion have been stated in a detailed fashion in his works on psychoanalysis. His The Future of an Illus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Network and Computer Applications

دوره 48  شماره 

صفحات  -

تاریخ انتشار 2015