• OpenAccess
    • List of Articles attack

      • Open Access Article

        1 - Cyber Threats Foresight Against Iran Based on Attack Vector
        mahdi omrani masoud shafiee siavash khorsandi
        Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of More
        Cyber ​​threats have been extraordinary increased in recent years. Cyber ​​attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber threats Foresight. This research can prepare the country for countering cyber threats based on existing and potential attack Vectors. First of all, 18 major cyber threats drivers base on attack Vectors through reviewing resources and interviewing with seven experts were identified. We use cross-impact analysis Future studies method to indicate main drivers of future cyber threats such as social engineering, Denial of service, ransomwares, spoofing and fraud and non-state actors. Mic Mac software will be used for this step. Finally, future scenarios for cyber threats were identified by using scenario-based approach. Scenario Wizard software will be used. The results of the research include two strong scenarios and 18 possible scenarios, based on the strongest scenario, ransomware, spoofing, fraud, social engineering and Denial of service are the most likely cyber threats by non-state actors through in a limited level Manuscript profile
      • Open Access Article

        2 - Stability Analysis of Networked Control Systems under Denial of Service Attacks using Switching System Theory
        Mohammad SayadHaghighi Faezeh Farivar
        With the development of computer networks, packet-based data transmission has found its way to Cyber-Physical Systems (CPS) and especially, networked control systems (NCS). NCSs are distributed industrial processes in which sensors and actuators exchange information bet More
        With the development of computer networks, packet-based data transmission has found its way to Cyber-Physical Systems (CPS) and especially, networked control systems (NCS). NCSs are distributed industrial processes in which sensors and actuators exchange information between the physical plant and the controller via a network. Any loss of data or packet in the network links affects the performance of the physical system and its stability. This loss could be due to natural congestions in network or a result of intentional Denial of Service (DoS) attacks. In this paper, we analytically study the stability of NCSs with the possibility of data loss in the feed-forward link by modelling the system as a switching one. When data are lost (or replaced with a jammed or bogus invalid signal/packet) in the forward link, the physical system will not receive the control input sent from the controller. In this study, NCS is regarded as a stochastic switching system by using a two-position Markov jump model. In State 1, the control signal/packet passes through and gets to the system, while in State 2, the signal or packet is lost. We analyze the stability of system in State 2 by considering the situation as an open-loop control scenario with zero input. The proposed stochastic switching system is studied in both continuous and discrete-time spaces to see under what conditions it satisfies Lyapunov stability. The stability conditions are obtained according to random dwell times of the system in each state. Finally, the model is simulated on a DC motor as the plant. The results confirm the correctness of the obtained stability conditions. Manuscript profile
      • Open Access Article

        3 - computer security models and proposing a new perspective: A review paper
        Hadi sadjadi Reza Kalantari
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in More
        In this article first the use of computer security models and its benefits are discussed in a novel way. Then, while briefly introducing the space of computer security encounters in the form of ontology, for the first time, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives include the view of secure models, the view of security models, and the view of the framework and system to security models. The first and third perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research is presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. In this idea, it is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, in addition, include agile patterns as well. . Manuscript profile
      • Open Access Article

        4 - Fake Websites Detection Improvement Using Multi-Layer Artificial Neural Network Classifier with Ant Lion Optimizer Algorithm
        Farhang Padidaran Moghaddam Mahshid Sadeghi B.
        In phishing attacks, a fake site is forged from the main site, which looks very similar to the original one. To direct users to these sites, Phishers or online thieves usually put fake links in emails and send them to their victims, and try to deceive users with social More
        In phishing attacks, a fake site is forged from the main site, which looks very similar to the original one. To direct users to these sites, Phishers or online thieves usually put fake links in emails and send them to their victims, and try to deceive users with social engineering methods and persuade them to click on fake links. Phishing attacks have significant financial losses, and most attacks focus on banks and financial gateways. Machine learning methods are an effective way to detect phishing attacks, but this is subject to selecting the optimal feature. Feature selection allows only important features to be considered as learning input and reduces the detection error of phishing attacks. In the proposed method, a multilayer artificial neural network classifier is used to reduce the detection error of phishing attacks, the feature selection phase is performed by the ant lion optimization (ALO) algorithm. Evaluations and experiments on the Rami dataset, which is related to phishing, show that the proposed method has an accuracy of about 98.53% and has less error than the multilayer artificial neural network. The proposed method is more accurate in detecting phishing attacks than BPNN, SVM, NB, C4.5, RF, and kNN learning methods with feature selection mechanism by PSO algorithm. Manuscript profile
      • Open Access Article

        5 - A Survey on Computer Security Patterns and Proposing a New Perspective
        Hadi sadjadi Reza Kalantari
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this fie More
        In this article, at the beginning, the use of computer security models and its benefits are discussed in a new way. Then, while briefly introducing the space of computer security encounters in the form of ontology, three perspectives in the study of patterns in this field have been identified and distinguished from each other. These three perspectives are secure models, security models, and the framework and system to security models. The first and last perspectives are briefly explained and the second perspective is studied in detail from the perspective of the organization of patterns, including the five types of organization. The five types mentioned include software-based lifecycle organization, logical-level organization-based organization, threat-based classification-based organization, attack-based classification-based organization, and application-based organization. In this type of introduction of patterns, the audience acquires a comprehensive view of the discourse of computer security patterns and acquires the necessary knowledge to make better use of these patterns. Finally, the analysis and idea of this research are presented in the form of introducing a new type of organization in order to facilitate the proper use and addressing of patterns. It is stated that the existing categories are mostly static and forward-looking and do not have the necessary dynamism and backwardness, and the idea of covering all stakeholders and security ontology can have this feature and, include agile patterns as well. Based on this idea and related analyzes, the atmosphere of future research activities will be revealed to the audience. Manuscript profile