As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been ...prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.
Crowdsourcing systems which utilize the human intelligence to solve complex tasks have gained considerable interest and adoption in recent years. However, the majority of existing crowdsourcing ...systems rely on central servers, which are subject to the weaknesses of traditional trust-based model, such as single point of failure. They are also vulnerable to distributed denial of service (DDoS) and Sybil attacks due to malicious users involvement. In addition, high service fees from the crowdsourcing platform may hinder the development of crowdsourcing. How to address these potential issues has both research and substantial value. In this paper, we conceptualize a blockchain-based decentralized framework for crowdsourcing named CrowdBC, in which a requester's task can be solved by a crowd of workers without relying on any third trusted institution, users’ privacy can be guaranteed and only low transaction fees are required. In particular, we introduce the architecture of our proposed framework, based on which we give a concrete scheme. We further implement a software prototype on Ethereum public test network with real-world dataset. Experiment results show the feasibility, usability, and scalability of our proposed crowdsourcing system.
This paper is concerned with the input-to-state stabilizing control problem for cyber-physical systems (CPSs) with multiple transmission channels under denial-of-service (DoS) attacks. Under the data ...update policy with bounded update interval, a new control scheme that discards the outdated information is proposed, and the stability analysis of CPSs under DoS attacks is transformed into analyzing the stability of the system under a switched controller with the help of a class of linear matrix inequalities (LMIs). Then, inspired by the techniques for switched systems, sufficient conditions on the duration and frequency of the DoS attacks, under which the stability of the closed-loop systems is still guaranteed, are proposed. Compared with the existing method for the single-channel case, the considered multiple-channel case is more challenging, and the proposed LMI-based method is more flexible.
The recent years have seen a surge of security issues of cyber-physical systems (CPS). In this paper, denial-of-service (DoS) attack scheduling is investigated in depth. Specifically, we consider a ...system where a remote estimator receives the data packet sent by a sensor over a wireless network at each time instant, and an energy-constrained attacker that cannot launch DoS attacks all the time designs the optimal DoS attack scheduling to maximize the attacking effect on the remote estimation performance. Most of the existing works concerning DoS attacks focus on the ideal scenario in which data packets can be received successfully if there is no DoS attack. To capture the unreliability nature of practical networks, we study the packet-dropping network in which packet dropouts may occur even in the absence of attack. We derive the optimal attack scheduling scheme that maximizes the average expected estimation error, and the one which maximizes the expected terminal estimation error over packet-dropping networks. We also present some countermeasures against DoS attacks, and discuss the optimal defense strategy, and how the optimal attack schedule can serve for more effective and resource-saving countermeasures. We further investigate the optimal attack schedule with multiple sensors. The optimality of the theoretical results is demonstrated by numerical simulations.
In this paper, we systematically explore the attack surface of the Blockchain technology, with an emphasis on public Blockchains. Towards this goal, we attribute attack viability in the attack ...surface to 1) the Blockchain cryptographic constructs, 2) the distributed architecture of the systems using Blockchain, and 3) the Blockchain application context. To each of those contributing factors, we outline several attacks, including selfish mining, the 51% attack, DNS attacks, distributed denial-of-service (DDoS) attacks, consensus delay (due to selfish behavior or distributed denial-of-service attacks), Blockchain forks, orphaned and stale blocks, block ingestion, wallet thefts, smart contract attacks, and privacy attacks. We also explore the causal relationships between these attacks to demonstrate how various attack vectors are connected to one another. A secondary contribution of this work is outlining effective defense measures taken by the Blockchain technology or proposed by researchers to mitigate the effects of these attacks and patch associated vulnerabilities.
DDoS in the IoT: Mirai and Other Botnets Kolias, Constantinos; Kambourakis, Georgios; Stavrou, Angelos ...
Computer (Long Beach, Calif.),
2017, Letnik:
50, Številka:
7
Journal Article
Recenzirano
The Mirai botnet and its variants and imitators are a wake-up call to the industry to better secure Internet of Things devices or risk exposing the Internet infrastructure to increasingly disruptive ...distributed denial-of-service attacks.
This paper investigates a resilient event-triggering H ∞ load frequency control (LFC) for multi-area power systems with energy-limited Denial-of-Service (DoS) attacks. The LFC design specifically ...takes the presence of DoS attacks into account. First, an area control error dependent time delay model is delicately constructed for multi-area closed-loop power systems. Second, a resilient event-triggering communication (RETC) scheme is well designed, which allows a degree of packet losses induced by DoS attacks and has the advantage of improving the transaction efficiency. Then, by using the Lyapunov theory, two stability and stabilization criteria for the multi-area power systems are derived under consideration of the energy-limited DoS attacks. In these criteria, the relationship between the allowable DoS attack duration and the resilient event-triggering communication parameters are clearly revealed. Moreover, an algorithm is also provided to obtain the RETC parameters and the LFC gains simultaneously. Finally, a case study shows the effectiveness of the proposed method.
The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service ...(DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency and duration of the DoS attacks under which input-to-state stability (ISS) of the closed-loop system can be preserved. To achieve ISS, a suitable scheduling of the transmission times is determined. It is shown that the considered framework is flexible enough so as to allow the designer to choose from several implementation options that can be used for trading-off performance versus communication resources. Examples are given to substantiate the analysis.
Existing distributed denial-of-service attack detection in software defined networks (SDNs) typically perform detection in a single domain. In reality, abnormal traffic usually affects multiple ...network domains. Thus, a cross-domain attack detection has been proposed to improve detection performance. However, when participating in detection, the domain of each SDN needs to provide a large amount of real traffic data, from which private information may be leaked. Existing multiparty privacy protection schemes often achieve privacy guarantees by sacrificing accuracy or increasing the time cost. Achieving both high accuracy and reasonable time consumption is a challenging task. In this paper, we propose Predis, which is a privacy-preserving cross-domain attack detection scheme for SDNs. Predis combines perturbation encryption and data encryption to protect privacy and employs a computationally simple and efficient algorithm k-Nearest Neighbors (kNN) as its detection algorithm. We also improve kNN to achieve better efficiency. Via theoretical analysis and extensive simulations, we demonstrate that Predis is capable of achieving efficient and accurate attack detection while securing sensitive information of each domain.