Pub Date : 2022-02-03DOI: 10.1080/19361610.2022.2031841
Ghaida Alqarawi, Bashayer Alkhalifah, N. Alharbi, Salim El Khediri
Abstract The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT have faced security breaches and threats. The IoT countermeasures have not been well-factored upon, which poses a more significant challenge to many organizations that heavily rely on this technology. In this survey, we propose a security survey that will help tackle the problems associated with IoT and offer security solutions on all the IoT layers. The results show that authentication is the most critical security measure to implement in IoT.
{"title":"Internet-of-Things Security and Vulnerabilities: Case Study","authors":"Ghaida Alqarawi, Bashayer Alkhalifah, N. Alharbi, Salim El Khediri","doi":"10.1080/19361610.2022.2031841","DOIUrl":"https://doi.org/10.1080/19361610.2022.2031841","url":null,"abstract":"Abstract The incorporation of IoT in the world has had tremendous popularity in the field of Technology. This great innovation has enabled seamless transformation in business and operation transformation. However, significant usage of this innovation also poses a security threat which has become a more critical point of concern to many businesses across the globe. Many companies that depend on IoT have faced security breaches and threats. The IoT countermeasures have not been well-factored upon, which poses a more significant challenge to many organizations that heavily rely on this technology. In this survey, we propose a security survey that will help tackle the problems associated with IoT and offer security solutions on all the IoT layers. The results show that authentication is the most critical security measure to implement in IoT.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"559 - 575"},"PeriodicalIF":1.3,"publicationDate":"2022-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47481848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-31DOI: 10.1080/19361610.2022.2031702
Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu
Abstract Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a “lure” to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.
{"title":"Reverse Social Engineering to Counter Social Engineering in Mobile Money Theft: A Tanzanian Context","authors":"Hassan Kilavo, Leonard J. Mselle, Ramadhani I. Rais, Salehe I. Mrutu","doi":"10.1080/19361610.2022.2031702","DOIUrl":"https://doi.org/10.1080/19361610.2022.2031702","url":null,"abstract":"Abstract Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the attackers plan a “lure” to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"546 - 558"},"PeriodicalIF":1.3,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42572329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-10DOI: 10.1080/19361610.2021.2024050
Swapna Tangelapalli, Pokkunuri PardhaSaradhi, R. Pandya, S. Iyer
Abstract The latest research for applying deep learning in wireless communications gives several opportunities to reduce complex signal processing. The channel estimation is important to study the nature of the varying channel and to calculate channel state information (CSI) value which is utilized at the receiver to nullify the interference which occurs during multipath transmission. In the current article, considering the massive Multiple Input Multiple Output (MIMO) channel model, a DL approach is developed with a fully connected neural network (NN) architecture which is used to estimate the channel with minimum error. The proposed DL architecture uses an openly available channel dataset. Further, using generated pilot symbols of lengths 2 and 4, the performance of DL-based Fully connected NN (DL-FCNN) is analyzed to estimate the channel in uplink massive MIMO communication. The obtained results demonstrate that the channel estimation performance was calculated in terms of normalized mean square error((NMSE) for different values of SNR added at receiver base station (BS) to the signals over the range of BS antennas. Also, the channel estimation error over a large number of BS antennas for massive MIMO scenarios is observed, and it is observed that the NMSE reduces with a greater number of antennas. Hence, it can be inferred that the DL models will be the future for most physical layer signal processing techniques such as channel estimation, modulation detection, etc. within massive MIMO networks.
{"title":"Performance Analysis of Channel Estimation for Massive MIMO Communication Using DL-Based Fully Connected Neural Network (DL-FCNN) Architecture","authors":"Swapna Tangelapalli, Pokkunuri PardhaSaradhi, R. Pandya, S. Iyer","doi":"10.1080/19361610.2021.2024050","DOIUrl":"https://doi.org/10.1080/19361610.2021.2024050","url":null,"abstract":"Abstract The latest research for applying deep learning in wireless communications gives several opportunities to reduce complex signal processing. The channel estimation is important to study the nature of the varying channel and to calculate channel state information (CSI) value which is utilized at the receiver to nullify the interference which occurs during multipath transmission. In the current article, considering the massive Multiple Input Multiple Output (MIMO) channel model, a DL approach is developed with a fully connected neural network (NN) architecture which is used to estimate the channel with minimum error. The proposed DL architecture uses an openly available channel dataset. Further, using generated pilot symbols of lengths 2 and 4, the performance of DL-based Fully connected NN (DL-FCNN) is analyzed to estimate the channel in uplink massive MIMO communication. The obtained results demonstrate that the channel estimation performance was calculated in terms of normalized mean square error((NMSE) for different values of SNR added at receiver base station (BS) to the signals over the range of BS antennas. Also, the channel estimation error over a large number of BS antennas for massive MIMO scenarios is observed, and it is observed that the NMSE reduces with a greater number of antennas. Hence, it can be inferred that the DL models will be the future for most physical layer signal processing techniques such as channel estimation, modulation detection, etc. within massive MIMO networks.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"533 - 545"},"PeriodicalIF":1.3,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41680643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-10DOI: 10.1080/19361610.2021.2024049
A. Shetty, K. V. Murthy
Abstract Card frauds are one of the most common types of banking frauds out of which card skimming contributes the major share. Investigation and prosecution of card skimming cases are mainly dependent on digital evidence requiring trained and skilled law enforcement officers. Further, a single incident of card skimming leads to collection of information from hundreds of cards and hence the identification of all the victims is the real challenge for an investigating officer. This paper discusses different issues pertaining to card skimming providing a general overview of the modus operandi, investigation process and constraints faced by law enforcement agencies.
{"title":"Investigation of Card Skimming Cases: An Indian Perspective","authors":"A. Shetty, K. V. Murthy","doi":"10.1080/19361610.2021.2024049","DOIUrl":"https://doi.org/10.1080/19361610.2021.2024049","url":null,"abstract":"Abstract Card frauds are one of the most common types of banking frauds out of which card skimming contributes the major share. Investigation and prosecution of card skimming cases are mainly dependent on digital evidence requiring trained and skilled law enforcement officers. Further, a single incident of card skimming leads to collection of information from hundreds of cards and hence the identification of all the victims is the real challenge for an investigating officer. This paper discusses different issues pertaining to card skimming providing a general overview of the modus operandi, investigation process and constraints faced by law enforcement agencies.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"519 - 532"},"PeriodicalIF":1.3,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45542977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-05DOI: 10.1080/19361610.2021.2018923
Katalin Pethő-Kiss
Abstract As drone technology advances, the potential for illicit criminal exploitation of these unmanned capabilities has been escalating. There has been an ever-growing concern about the peril posed by a drone attack delivering a biological payload into a vulnerable terrorist target. To achieve a more realistic understanding of this threat and to enhance existing national security arrangements to this scenario, this paper attempts to provide a novel approach for counter policies and procedures for the prevention, preparedness and response. With this in mind, criminal activities attempting to conduct a bioattack by means of an UAV are insightfully scrutinized. To do this, the phases of perpetration provide the basis for this discussion. In each phase of commission, the potential threat indicators of malevolent non-state actor activities are identified and accordingly, the most effective countermeasures designed.
{"title":"Addressing the Threat of a bioterrorist Attack by Means of an Unmanned Drone","authors":"Katalin Pethő-Kiss","doi":"10.1080/19361610.2021.2018923","DOIUrl":"https://doi.org/10.1080/19361610.2021.2018923","url":null,"abstract":"Abstract As drone technology advances, the potential for illicit criminal exploitation of these unmanned capabilities has been escalating. There has been an ever-growing concern about the peril posed by a drone attack delivering a biological payload into a vulnerable terrorist target. To achieve a more realistic understanding of this threat and to enhance existing national security arrangements to this scenario, this paper attempts to provide a novel approach for counter policies and procedures for the prevention, preparedness and response. With this in mind, criminal activities attempting to conduct a bioattack by means of an UAV are insightfully scrutinized. To do this, the phases of perpetration provide the basis for this discussion. In each phase of commission, the potential threat indicators of malevolent non-state actor activities are identified and accordingly, the most effective countermeasures designed.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"495 - 518"},"PeriodicalIF":1.3,"publicationDate":"2022-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45281648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-02DOI: 10.1080/19361610.2021.2006031
B. Saini, Dinesh Saini, S. Srivastava, Mayank Aggarwal
Abstract Crime prediction is an effort to cut down the crime rate and criminal activities in the society. This paper concentrates on monitoring the crime trends in India using data from 2001 to 2019. The work analyzes the crime condition in India by following a top-to bottom approach and implementing visualization and machine learning algorithms. Heat map visualization of India is done to focus on specific crime types for all states. Furthermore, various demography of human population like age-groups, sex, caste, etc., are considered to have a larger perspective of the issue. The model also suggest proactive measures based on these findings.
{"title":"A Study of Lightweight Approaches to Analyze Crime Conditions in India","authors":"B. Saini, Dinesh Saini, S. Srivastava, Mayank Aggarwal","doi":"10.1080/19361610.2021.2006031","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006031","url":null,"abstract":"Abstract Crime prediction is an effort to cut down the crime rate and criminal activities in the society. This paper concentrates on monitoring the crime trends in India using data from 2001 to 2019. The work analyzes the crime condition in India by following a top-to bottom approach and implementing visualization and machine learning algorithms. Heat map visualization of India is done to focus on specific crime types for all states. Furthermore, various demography of human population like age-groups, sex, caste, etc., are considered to have a larger perspective of the issue. The model also suggest proactive measures based on these findings.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"221 - 245"},"PeriodicalIF":1.3,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43338399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-29DOI: 10.1080/19361610.2021.2006032
Hassan Kilavo, Salehe I. Mrutu, Robert G. Dudu
Abstract This study evaluates mechanisms to secure relational databases against security vulnerabilities and utilized PostgreSQL and Microsoft SQL Server due to data breach incidences reported across the world. Emulation experiments with documentary review were employed to collect necessary study data. Identification of security features and vulnerabilities that are found to affect the data tier of the web applications were examined. The findings from the study have shown that Microsoft SQL Server is more security feature-rich in terms of Confidentiality, Integrity, and Availability compared to PostgreSQL and Microsoft SQL Server is more resilient to security attacks in its default behavior compared to PostgreSQL.
{"title":"Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL","authors":"Hassan Kilavo, Salehe I. Mrutu, Robert G. Dudu","doi":"10.1080/19361610.2021.2006032","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006032","url":null,"abstract":"Abstract This study evaluates mechanisms to secure relational databases against security vulnerabilities and utilized PostgreSQL and Microsoft SQL Server due to data breach incidences reported across the world. Emulation experiments with documentary review were employed to collect necessary study data. Identification of security features and vulnerabilities that are found to affect the data tier of the web applications were examined. The findings from the study have shown that Microsoft SQL Server is more security feature-rich in terms of Confidentiality, Integrity, and Availability compared to PostgreSQL and Microsoft SQL Server is more resilient to security attacks in its default behavior compared to PostgreSQL.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"421 - 435"},"PeriodicalIF":1.3,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45828478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-26DOI: 10.1080/19361610.2021.2006033
Roman Pačka, M. Mareš
Abstract The article examines one narrowly focused aspect of the government interagency cooperation on cyber defense that serves as a basis to achieve a cyber power. It reviews the civil-military interagency cooperation and aims to identify factors that could jeopardize it. First, it provides a theoretical background for the research and then according to interviews and surveys, the factors with the highest negative impact are recognized. Based on this research, the most significant challenges in bridging the gap between civilian and military worlds seems to be power and budget struggles and a lack of political direction on cyber matters from leaders.
{"title":"Achieving Cyber Power Through Integrated Government Capability: Factors Jeopardizing Civil-Military Cooperation on Cyber Defense","authors":"Roman Pačka, M. Mareš","doi":"10.1080/19361610.2021.2006033","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006033","url":null,"abstract":"Abstract The article examines one narrowly focused aspect of the government interagency cooperation on cyber defense that serves as a basis to achieve a cyber power. It reviews the civil-military interagency cooperation and aims to identify factors that could jeopardize it. First, it provides a theoretical background for the research and then according to interviews and surveys, the factors with the highest negative impact are recognized. Based on this research, the most significant challenges in bridging the gap between civilian and military worlds seems to be power and budget struggles and a lack of political direction on cyber matters from leaders.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"436 - 461"},"PeriodicalIF":1.3,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46099547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-26DOI: 10.1080/19361610.2021.2006034
R. Zhamiyeva, L. Arenova, A. Serikbayev, B. Zhakupov, G. Balgimbekova
Abstract The global situation with cybercrime is worsening. The study aims to investigate the concept of lawful behavior in the context of challenges facing the IT sector and from the perspective of previous and modern theoretical and legal views concerning the formation of lawful behavior. The paper outlines factors that shape the lawful behavior of digital natives. The results of the literature review suggest that a digital shift of legal relations objectively reduces the role of the socio-hierarchical factor in the formation of lawful behavior. This research is of practical interest to specialists in legal and sociological fields.
{"title":"The Concept of Lawful Behavior in the Digital Age","authors":"R. Zhamiyeva, L. Arenova, A. Serikbayev, B. Zhakupov, G. Balgimbekova","doi":"10.1080/19361610.2021.2006034","DOIUrl":"https://doi.org/10.1080/19361610.2021.2006034","url":null,"abstract":"Abstract The global situation with cybercrime is worsening. The study aims to investigate the concept of lawful behavior in the context of challenges facing the IT sector and from the perspective of previous and modern theoretical and legal views concerning the formation of lawful behavior. The paper outlines factors that shape the lawful behavior of digital natives. The results of the literature review suggest that a digital shift of legal relations objectively reduces the role of the socio-hierarchical factor in the formation of lawful behavior. This research is of practical interest to specialists in legal and sociological fields.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"462 - 474"},"PeriodicalIF":1.3,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44540818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-25DOI: 10.1080/19361610.2021.2005503
Omi Hodwitz, Seth L. King
Abstract This article examines the effects of counterterrorism policy in Canada, the United States, and the United Kingdom between 1997 and 2016. We use time series analysis and series hazard models to examine the influence of policy on (a) incidents of terrorist violence and (b) citizen perceptions of the threat of terrorism. Results indicate that counterterrorism policy is, for the most part, not related to significant changes in Canada but does report significant results for public opinion and terrorist incidents in the United States and the United Kingdom, although these effects are temporally defined.
{"title":"Modeling Public Policy: Influences on Terrorism and Public Opinion","authors":"Omi Hodwitz, Seth L. King","doi":"10.1080/19361610.2021.2005503","DOIUrl":"https://doi.org/10.1080/19361610.2021.2005503","url":null,"abstract":"Abstract This article examines the effects of counterterrorism policy in Canada, the United States, and the United Kingdom between 1997 and 2016. We use time series analysis and series hazard models to examine the influence of policy on (a) incidents of terrorist violence and (b) citizen perceptions of the threat of terrorism. Results indicate that counterterrorism policy is, for the most part, not related to significant changes in Canada but does report significant results for public opinion and terrorist incidents in the United States and the United Kingdom, although these effects are temporally defined.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"202 - 220"},"PeriodicalIF":1.3,"publicationDate":"2021-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47102047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}