Controlling user access with scripting to mitigate cyber-attacks

IF 2.7 Q2 MULTIDISCIPLINARY SCIENCES Scientific African Pub Date : 2024-09-14 DOI:10.1016/j.sciaf.2024.e02355
{"title":"Controlling user access with scripting to mitigate cyber-attacks","authors":"","doi":"10.1016/j.sciaf.2024.e02355","DOIUrl":null,"url":null,"abstract":"<div><div>With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.</div></div>","PeriodicalId":21690,"journal":{"name":"Scientific African","volume":null,"pages":null},"PeriodicalIF":2.7000,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific African","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2468227624002977","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0

Abstract

With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用脚本控制用户访问以减轻网络攻击
随着动态数字环境中的威胁与日俱增,企业正努力通过限制用户访问大多数通信系统来应对网络攻击这一艰巨任务。本研究旨在开发一种 Linux 脚本,以积极应对组织环境中日益增多的网络攻击,防止基于用户疏忽的攻击载体。主要目的是通过脚本自动化设计出创造性的解决方案,在预定义的时间框架内限制用户访问组织网络,从而减轻潜在的网络威胁。用于定义用户访问预定义时间框架的标准包括限制用户在下班时间访问,脚本旨在解决跨站脚本 (XSS) 和 SQL 注入等网络攻击问题。为了实现本文的目标,我们采取了开发脚本所需的必要步骤和逻辑。例如,有几种合适的语言可用于编写脚本,如 Bash、Python 或 Perl。本文之所以选择 Bash,是因为它擅长为现有的命令行工具和实用程序编写脚本,是使用 Vim 文本编辑器工具自动执行任务的最佳选择。运行最终的脚本,找出一些错误,并根据需要进行修改,以确保其正常运行。这一阶段对于通过完善代码、使用高效算法和采纳最佳实践来提高脚本的性能、可读性和可维护性是必要的。最后,部署各种用户输入和场景,将脚本投入生产,用于用户访问管理。所采用的脚本指标(如脚本执行时间、资源利用率、成功率和错误率)有助于评估脚本的性能、效率和效果。脚本的执行时间为 0.032 秒,成功率为 1,错误率为 0。开发的 Linux 脚本与不同操作系统、硬件平台和网络架构的兼容性不会对适应各种组织环境产生影响。脚本没有显示出任何挑战,但实际部署可能会显示出与实施解决方案相关的一些潜在挑战和限制,如资源限制和遗留系统兼容性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Scientific African
Scientific African Multidisciplinary-Multidisciplinary
CiteScore
5.60
自引率
3.40%
发文量
332
审稿时长
10 weeks
期刊最新文献
Oil price shocks and human capital channels in Nigeria Determinants of an extended metric of agricultural commercialization in Ghana Molecular phylogenetic characterization of L-asparaginase-producing endophytic fungi inhabiting Prunus africana and Periploca linearifolia: Effect of incubation time and pH on enzyme production Improvement of the hygrothermal efficiency numerically using CFD modeling in a full-scale ventilated room with Moroccan climates Spatiotemporal climate variability and food security implications in the Central Ethiopia Region
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1