Combating Cyber Terrorism-Assessment of Log for Malicious Signatures
- 1 Sri Venkateswara University, India
Abstract
Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this study, a new class of cyber terrorism is addressed where mischievous and malicious behaviour is the root cause for the modification of network data stored in an open database. An attempt is made in this study to develop an algorithm that screens network, database results and detects anomalies in the input data that could have been revised by cyber-attacks, that is cyber terrorism. Combating Cyber Terrorism (CCT) Algorithm that is developed in this attempt uses multi path navigation based on six degree separation to analyze data flow inconsistency into bound and unbound values. This is the first such attempt made in this communication wherein the results presented clearly denote the reduced rate of cyber terrorism based attacks. Analysis of information in the unbound values determines whether the database value has been compromised for any attacks. Success has been achieved in reducing the false alarm rate. Future enhancement will be attempted in the entropical model for profiling the network agents for better performance.
DOI: https://doi.org/10.3844/ajassp.2013.1660.1666
Copyright: © 2013 Kamalanaban Ethala and R. Seshadri. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,280 Views
- 2,692 Downloads
- 2 Citations
Download
Keywords
- Intrusion
- IDS
- IPS
- Entropical
- Cyber Threats
- Cyber Terrorism
- Anomalies
- Signatures
- Backtrack Operating System
- Backtrack OS