Research Article Open Access

Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

Kamalanaban Ethala1 and R. Seshadri1
  • 1 Sri Venkateswara University, India

Abstract

Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this study, a new class of cyber terrorism is addressed where mischievous and malicious behaviour is the root cause for the modification of network data stored in an open database. An attempt is made in this study to develop an algorithm that screens network, database results and detects anomalies in the input data that could have been revised by cyber-attacks, that is cyber terrorism. Combating Cyber Terrorism (CCT) Algorithm that is developed in this attempt uses multi path navigation based on six degree separation to analyze data flow inconsistency into bound and unbound values. This is the first such attempt made in this communication wherein the results presented clearly denote the reduced rate of cyber terrorism based attacks. Analysis of information in the unbound values determines whether the database value has been compromised for any attacks. Success has been achieved in reducing the false alarm rate. Future enhancement will be attempted in the entropical model for profiling the network agents for better performance.

American Journal of Applied Sciences
Volume 10 No. 12, 2013, 1660-1666

DOI: https://doi.org/10.3844/ajassp.2013.1660.1666

Submitted On: 4 July 2013 Published On: 7 November 2013

How to Cite: Ethala, K. & Seshadri, R. (2013). Combating Cyber Terrorism-Assessment of Log for Malicious Signatures. American Journal of Applied Sciences, 10(12), 1660-1666. https://doi.org/10.3844/ajassp.2013.1660.1666

  • 3,280 Views
  • 2,692 Downloads
  • 2 Citations

Download

Keywords

  • Intrusion
  • IDS
  • IPS
  • Entropical
  • Cyber Threats
  • Cyber Terrorism
  • Anomalies
  • Signatures
  • Backtrack Operating System
  • Backtrack OS