This dissertation investigates building an automated network reconnaissance device using off-the-shelf hardware that can remotely operate on battery power. The author aims to build a device using a microcomputer with wireless networking, an LCD screen, and battery pack that is capable of performing port scans and capturing Ethernet packets anonymously from inside a network. Testing is done to evaluate the battery life of the device during operation and utilization of hardware components. Results show the device was able to operate for over 24 hours performing tasks before battery depletion.
This document discusses securing the smart grid, particularly at the edge where many small and resource-constrained devices are located. It notes that hackers have previously infiltrated nuclear power plant systems through external networks. While more complex smart devices have sufficient processing power and encryption for security, simple devices require solutions that use little code space and power. The document proposes a solution using a lightweight cipher and authentication protocol to securely transmit smart meter data along the power supply network. Key challenges in implementing security include managing a large number of keys and providing privacy and authentication without excessive processing demands. Event management and responding to situations in real time is also an issue requiring mature infrastructure.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
The latest massive IoT DDoS attack from the Mirai botnet that took major websites like Twitter and Reddit offline for hours – has already gained notoriety as one of the worst DDoS strikes in history.
In this webinar Manish Rai & Ty Powers of Great Bay Software will help you understand exactly how the enterprise IoT landscape is changing, and what it means for the assumptions organizations have been making in regards to safeguarding against IoT cyberattacks. You will:
Gain insights into how the recent IoT-based DDoS attacks were launched
How similar attacks could be launched inside enterprise networks
How to safeguard against IoT device compromises
How to reduce your risk, whose job is it anyway?
Learn about what your peers are doing for IoT device security, relevant findings from the 2016 Great Bay Software IoT Security Survey
Watch this ondemand webinar with this link: https://go.greatbaysoftware.com/owb-safeguarding-against-iot-ddos-attacks
IoT Network Attack Detection using Supervised Machine Learning
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
This document provides a summary of best practices for designing and implementing secure wireless LANs (WLANs) using elements of Cisco's SAFE (Secure Access For Enterprise) Blueprint for network security. It discusses various WLAN design options for large, medium and small networks as well as remote users. The document outlines security risks of WLANs such as unauthorized access, interference, spoofing of identities, and denial of service attacks. It also discusses weaknesses in the existing 802.11 security standards and the need for more robust authentication, encryption, and key management to secure WLANs.
The top two attack vectors for malware are email and web browsers. Watering-hole attacks conceal malware on member-based sites and phishing scams can target individuals with personal details. This PPT describes a different security approach to protect against these threats while achieving business growth, efficiency and lowered expenses. The presentation features Cisco Email, Web and Cloud Web Security and covers basic features, offers, benefits, newest features and product integrations. Watch the webinar: http://cs.co/9004BGqvy
Security Technique and Congestion Avoidance in Mesh Network
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
This document provides information for securing the wireless network of Necessary Evil, a small insurance company. Cecil Sellars proposes adjusting the wireless access point's default settings, such as changing the SSID and enabling WPA2 authentication. The project also involves physically securing the access point in a locked closet and educating employees on security best practices. Cecil researched methods used by other companies, including changing SSIDs, enabling WPA2, locking away hardware, and conducting vulnerability assessments. The project aims to protect customers' sensitive personal information by locking down the wireless network from internal and external threats.
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
The increase in the deployment of IoT networks has improved productivity of humans and organisations.
However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent
weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS
attack in IoT networks by classifying incoming network packets on the transport layer as either
“Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep
learning algorithms and two clustering algorithms were independently trained for mitigating DDoS
attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and
UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during
the experimentation phase. The accuracy score and normalized-mutual-information score are used to
quantify the classification performance of the four algorithms. Our results show that the autoencoder
performed overall best with the highest accuracy across all the datasets.
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay
the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which
included several elements to maintain a scalable and robust VPN connection. During this time of
uncertainty, best practices need to be deployed by corporations and government entities more than ever.
The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure,
reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility
requirements vary based on the end user.
This document discusses security risks associated with wireless access and mobile devices. It provides 10 steps for improving mobile security, including enforcing policies, password protection, antivirus software, encryption of files, and device lockdown. It also discusses threats like rogue wireless access, denial of service attacks, and the risks of unencrypted laptop hard drives. It recommends using mobile VPNs with encryption, authentication, and data encapsulation to secure over-the-air transmissions. Companies can also use solutions that detect and block rogue access points and wireless clients to prevent unauthorized access to networks.
Welcome to International Journal of Engineering Research and Development (IJERD)
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cognitive Threat Analytics is a technology that analyzes web requests to identify Command & Control traffic, identifying threats that are currently present in a network. It is currently available across the entire Cisco Web Security portfolio, including Cloud Web Security (CWS) and the Web Security Appliance (WSA). To learn more, watch this webinar: http://cs.co/9000BuggO
Scot-Tech Engagement's Cyber Security Conference for Scottish Business, held 30th April 2015, Edinburgh. For more information contact ray@scot-tech.com.
Please note further presentations will be added once speakers have approved
This document discusses the evolution of approaches to securing SCADA systems. Early advice based on IT security principles is subtly flawed, as it fails to prevent system compromise and physical damage cannot be undone with backups. More recent approaches focus on prevention over detection and response. The key shift is recognizing SCADA systems must remain uncompromised, as restoring operations from intrusions is impossible unlike with IT systems. Overall confidence in SCADA security remains low due to outdated approaches still in use.
El Día del Padre se originó en 1909 en Estados Unidos cuando Sonora Smart Dodd quiso homenajear a su padre viudo. En 1924, el presidente Calvin Coolidge apoyó establecer un día nacional del padre, y en 1966 el presidente Lyndon Johnson declaró el tercer domingo de junio como el Día del Padre en Estados Unidos. La mayoría de países americanos también celebran esta fecha, mientras que en España y otros países de origen católico es el 19 de marzo, festividad de San José.
O documento apresenta um relatório de uma equipe de professores da FECAP sobre o Exame de Suficiência CFC de 2013, incluindo análise das questões, comentários e estatísticas sobre os assuntos cobrados.
O documento apresenta o trabalho de uma equipe de professores da FECAP sobre as questões e respostas do Exame de Suficiência CFC de março de 2013. A equipe analisou, resolveu e divulgou as questões para auxiliar alunos, professores e interessados. O coordenador agradece aos professores que auxiliaram no trabalho, especialmente três professores nomeados.
Este documento proporciona información sobre los arándanos, incluyendo su definición, propiedades, uso para adelgazar, principales mercados de exportación y empresas exportadoras. Los arándanos son bayas pequeñas con bajo contenido de azúcar y alto contenido de antioxidantes, cultivadas principalmente en Perú para la exportación, especialmente a EE.UU., Europa y Hong Kong. La región de La Libertad en Perú es el principal exportador de arándanos peruanos. Las principales empresas exportadoras de arándanos peruanos en 2015 fuer
El documento describe diferentes tipos de impacto ambiental como los impactos a nivel mundial, los impactos de la guerra y el uso bélico, y los impactos sobre el medio social. También discute los impactos ambientales en el Perú, incluyendo la contaminación causada por la minería y proyectos de inversión para abordar la contaminación y la deforestación.
La carrera de Ciencias de la Comunicación estudia los procesos de comunicación y cómo los mensajes son diseñados para comunicar o reasegurar relaciones de poder. Los estudiantes aprenden a analizar diferentes temáticas desde una perspectiva comunicacional y desarrollan habilidades para comprender diversos puntos de vista. Los graduados cuentan con un bagaje cultural versátil que les permite desempeñarse en campos como el periodismo, la publicidad y la producción audiovisual.
O documento discute a estrutura física da internet, formas de conexão, intranet, extranet, ameaças virtuais e segurança na internet. A estrutura física da internet não tem um computador central e sim uma rede de banda larga que conecta centros de informática. Ameaças como vírus, worms e bots podem infectar computadores. É importante usar a internet de forma segura para evitar riscos como acesso a conteúdo impróprio, furto de identidade e invasão de privacidade.
Mohammad Ala'a Al Bazrawi has over 15 years of experience in sales and marketing roles in the food service industry in Saudi Arabia. He currently serves as the Head of Sales and Marketing for an FMCG food service company, where he is responsible for corporate planning, marketing strategy, revenue maximization, and resource management. Previously, he held national and regional sales management positions with other food trading companies, where he successfully grew business, developed client relationships, and exceeded sales targets. Al Bazrawi has a track record of developing and implementing strategic plans and innovative marketing initiatives to increase brand awareness and drive sales.
Md Rafi Anwar is seeking a position as a piping engineer with over 7 years of experience in mechanical design, pressure vessels, fired heaters, steel structures, and piping stress analysis. He has worked on projects in Saudi Arabia, Bahrain, India, and the USA. His areas of expertise include design, material selection, drafting, stress analysis, and familiarity with relevant codes and standards. He holds a diploma in mechanical engineering and technical qualifications in CAD, CAESAR II, PVElite, and Nevis Work.
Utilization of Encryption for Security in SCADA Networks
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
Wireless data hacking, a form of hacking that can remotely gain control of a server via RF by planting spy chips or unauthorized devices directly to the server.
WDSS is able to detect and defend against all RF attacks in real-time scans the entire frequency every second for anomalies.
Wireless Networks Security in Jordan: A Field Study
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
A new algorithm to enhance security against cyber threats for internet of thi...
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
This document discusses the importance of cryptography standards in wireless local area networks (WLANs). It begins by explaining how wireless networks are vulnerable to threats like eavesdropping, tampering, and denial of service attacks due to the open nature of wireless communication. It then examines some common wireless security protocols like WEP, WPA, and RSN and compares their features to provide insight for securing WLANs. Finally, it discusses some basic hardware requirements for setting up a local wireless network, including a wireless access point and network interface cards for devices to connect to the network securely.
This document discusses the use of firewalls as a countermeasure against threats on wireless networks. It begins by introducing wireless networks and some of the security risks they pose. It then defines what a firewall is and explains why firewalls are necessary for protecting networks from unauthorized access. Specifically, it outlines several common types of attacks on wireless networks, including IP spoofing, denial-of-service attacks, source routed traffic, and tiny fragment attacks, that firewalls can help defend against. The objective is to demonstrate how firewalls work as a countermeasure and determine their advantages and disadvantages for securing wireless networks.
- Financial institutions and digital security providers are increasingly taking a military approach to defending against cyber attacks through layered defenses. This involves implementing multiple defensive layers throughout the network like firewalls, routers, intrusion detection, and antivirus software.
- In virtualized and cloud environments, security managers can filter and police traffic at each virtual server to separate and isolate traffic by customer and type. This prevents attacks from impacting host systems and improves efficiency.
- The use of threat intelligence databases that identify dangers on the internet in real-time combined with defensive filtering and blocking at the server level provides an additional layer of security against cyber attacks.
This document provides an overview of network security. It discusses the history and need for network security. It describes common network attacks and authentication methods. The document outlines basic network security techniques like Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). It also discusses network security architecture and concludes that network security is an important field that requires ongoing improvement to address evolving threats.
This seminar covers network security from its history to modern techniques. It introduces network security, the need for it due to increased internet usage, and basic concepts like authentication and common attacks. The document outlines early security protocols and why confidentiality, availability and integrity of information were important as the internet grew. It discusses how to secure a network from outside intrusion and different authentication techniques. Specific security methods like WPA, WEP and how hackers have evolved are also summarized. The advantages and challenges of network security are presented, as well as the importance of a well-designed security architecture for an organization's network.
SpriteGuard is a WiFi security solution that prevents hacker attacks on public WiFi networks. It scans the WiFi environment and detects all wireless hotspots and connected devices. If a device connects to a fraudulent hotspot, SpriteGuard stops the connection, preventing fraud. SpriteGuard also provides analytics on WiFi network performance through a virtual client that tests download speeds, ping times, and signal strength. This helps businesses ensure optimal WiFi quality. SpriteGuard is unique in that it works independently of existing WiFi infrastructure, requires no changes, and protects all devices on a network without prior knowledge. It is a cost-effective solution developed by researchers at Liverpool University to address widespread security issues with public WiFi access.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
It Infrastructure Management PPT Centurion University of Technology And Manag...
This document summarizes information about virtual private networks (VPNs). It defines a VPN as a secure connection between devices and networks over public networks like the Internet. It describes the main types of VPNs and how they work by encrypting data and routing it through a service provider's secure servers. The document also discusses VPN security methods like firewalls and encryption. It outlines advantages like reduced costs but also disadvantages such as loss of access if the connection is down. Finally, it predicts continued growth in VPN usage and markets in the future.
Tigerspike - Cybersecurity and Mobility in the Energy Industry
Christian Glover Wilson discusses cybersecurity challenges posed by increased mobility and use of personal devices in the energy industry. The proliferation of smartphones, tablets, and internet-connected devices has led to new threats that must be addressed through best practices and technology. Mobility management and encryption are key to securing devices and data while still enabling productivity and collaboration anywhere through mobile access. The growing internet of things also increases vulnerabilities that must be protected as individual appliances could become points of failure or attack.
The document discusses Webroot's anti-fraud solutions for financial services. It notes that over 50% of online attacks target financial services users and that traditional security cannot keep up with modern threats. Webroot collects threat intelligence from billions of sources to detect malware as soon as it tries to infect users and protect all other users. It offers lightweight antivirus software, advanced online fraud prevention for PCs and mobile devices, and a mobile security SDK to embed security in mobile banking apps in order to protect banks, employees, and customers from fraud and attacks across digital channels.
Virtual private networks (VPNs) allow organizations to securely connect to a private network over a shared public infrastructure like the Internet. VPNs work by encrypting data that is sent between devices so that it can only be read by the intended recipient. This creates a secure "tunnel" to transmit data privately across a public network. VPNs provide benefits like extending a private network's reach, improving security, and reducing costs compared to traditional private leased lines. However, VPNs still face security risks such as hacking attacks, weak user authentication, client-side vulnerabilities, and virus/malware infections that could compromise the private network.
The document discusses the concept of "secure pipes", which refers to internet service providers integrating security functions directly into their network infrastructure to filter traffic before it reaches customers. This represents a paradigm shift from the traditional approach where customers were responsible for security after receiving traffic. Secure pipes involve three stages: 1) Filtering to block known bad traffic using signatures, 2) Exposing unknown malicious content through advanced analytics, and 3) Predicting future attacks by analyzing digital breadcrumbs from reconnaissance activities. The key benefits are applying security at internet speeds, gaining visibility from millions of endpoints, and allowing security teams to focus on more sophisticated threats.
Experimental analysis of intrusion detection systems using machine learning a...
Since the invention of the internet for military and academic research purposes, it has evolved to meet the demands of the increasing number of users on the network, who have their scope beyond military and academics. As the scope of the network expanded maintaining its security became a matter of increasing importance. With various users and interconnections of more diversified networks, the internet needs to be maintained as securely as possible for the transmission of sensitive information to be one hundred per cent safe; several anomalies may intrude on private networks. Several research works have been released around network security and this research seeks to add to the already existing body of knowledge by expounding on these attacks, proffering efficient measures to detect network intrusions, and introducing an ensemble classifier: a combination of 3 different machine learning algorithms. An ensemble classifier is used for detecting remote to local (R2L) attacks, which showed the lowest level of accuracy when the network dataset is tested using single machine learning models but the ensemble classifier gives an overall efficiency of 99.8%.
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
This document discusses a two-way chained packet marking technique for secure communication in wireless sensor networks. It aims to provide a scheme for detecting attacks by creating a bidirectional link between packets. Any packets found without this link information will be eliminated at network boundaries, improving security. Neighboring packets will be marked to form a chain of legitimate messages, preserving originality and mitigating attacks like jamming.
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...IJNSA Journal
Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks as well as the network able to conserve energy. A review of previous research to date in the area of security for WSNs was carried out and proposals are made based on security schemes that gather data in
an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing algorithm and dynamic based rekeying implementation.
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
This document presents a new mobile cloud infrastructure that combines mobile devices and cloud services to provide virtual mobile instances through cloud computing. It discusses possible security threats in this new infrastructure and proposes an architecture to detect abnormal behavior. Machine learning techniques like random forest algorithms are used to test the methodology. The system aims to address challenges in existing systems and provide end-to-end security and abnormal behavior detection in the mobile cloud without requiring specific software installation on user devices.
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
The instant and obvious benefits of WiFi have made WLANs a big success
in public, private, and enterprise sectors. Unfortunately, the adoption of
correct security measures for WLANs is lagging far behind the fast pace
at which these networks are being deployed. The presence of WiFi in
most laptops and handhelds, the simplicity of independently installing
WiFi networks, and the ease of exploiting wireless vulnerabilities have
together escalated the risks manifold. Even organizations that do not
own a WLAN are equally at risk.
This document discusses securing the smart grid, particularly at the edge where many small and resource-constrained devices are located. It notes that hackers have previously infiltrated nuclear power plant systems through external networks. While more complex smart devices have sufficient processing power and encryption for security, simple devices require solutions that use little code space and power. The document proposes a solution using a lightweight cipher and authentication protocol to securely transmit smart meter data along the power supply network. Key challenges in implementing security include managing a large number of keys and providing privacy and authentication without excessive processing demands. Event management and responding to situations in real time is also an issue requiring mature infrastructure.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings’ facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
The latest massive IoT DDoS attack from the Mirai botnet that took major websites like Twitter and Reddit offline for hours – has already gained notoriety as one of the worst DDoS strikes in history.
In this webinar Manish Rai & Ty Powers of Great Bay Software will help you understand exactly how the enterprise IoT landscape is changing, and what it means for the assumptions organizations have been making in regards to safeguarding against IoT cyberattacks. You will:
Gain insights into how the recent IoT-based DDoS attacks were launched
How similar attacks could be launched inside enterprise networks
How to safeguard against IoT device compromises
How to reduce your risk, whose job is it anyway?
Learn about what your peers are doing for IoT device security, relevant findings from the 2016 Great Bay Software IoT Security Survey
Watch this ondemand webinar with this link: https://go.greatbaysoftware.com/owb-safeguarding-against-iot-ddos-attacks
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
The use of supervised learning algorithms to detect malicious traffic can be valuable in designing intrusion detection systems and ascertaining security risks. The Internet of things (IoT) refers to the billions of physical, electronic devices around the world that are often connected over the Internet. The growth of IoT systems comes at the risk of network attacks such as denial of service (DoS) and spoofing. In this research, we perform various supervised feature selection methods and employ three classifiers on IoT network data. The classifiers predict with high accuracy if the network traffic against the IoT device was malicious or benign. We compare the feature selection methods to arrive at the best that can be used for network intrusion prediction.
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
This document provides a summary of best practices for designing and implementing secure wireless LANs (WLANs) using elements of Cisco's SAFE (Secure Access For Enterprise) Blueprint for network security. It discusses various WLAN design options for large, medium and small networks as well as remote users. The document outlines security risks of WLANs such as unauthorized access, interference, spoofing of identities, and denial of service attacks. It also discusses weaknesses in the existing 802.11 security standards and the need for more robust authentication, encryption, and key management to secure WLANs.
The top two attack vectors for malware are email and web browsers. Watering-hole attacks conceal malware on member-based sites and phishing scams can target individuals with personal details. This PPT describes a different security approach to protect against these threats while achieving business growth, efficiency and lowered expenses. The presentation features Cisco Email, Web and Cloud Web Security and covers basic features, offers, benefits, newest features and product integrations. Watch the webinar: http://cs.co/9004BGqvy
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
Security in wireless network is one of the prime concern in todays Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an overhead in terms of increased load in the network. Further the increased load in the network paves path to congestion which degrades the performance of the wireless network. In this paper we try to highlight various challenges pertaining to security in mesh networks and the ways of reducing security threats. We propose an improved version of AODV which has a congestion avoidance mechanism. We also use a security technique called PGP for enhanced security of Mesh network. Mankiran Kaur | Jagjit Kaur"Security Technique and Congestion Avoidance in Mesh Network" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd4690.pdf http://www.ijtsrd.com/engineering/computer-engineering/4690/security-technique-and-congestion-avoidance-in-mesh-network/mankiran-kaur
IRJET- Detection and Localization of IDS Spoofing Attack in Wireless Sensor N...IRJET Journal
This document proposes using intrusion detection systems and k-means clustering to detect and localize spoofing attacks in wireless sensor networks used in vehicular networks (VANETs). VANETs have characteristics like highly dynamic topology and frequent link changes that make performance monitoring difficult. The proposed approach uses cluster heads acting as IDS to monitor packet transmissions within clusters and detect misbehaving nodes. When an attacker is detected, an alarm is passed to the source node to eliminate the attacker. Simulation results show the method can efficiently and robustly detect and locate spoofing attackers in VANET wireless sensor networks.
This document provides information for securing the wireless network of Necessary Evil, a small insurance company. Cecil Sellars proposes adjusting the wireless access point's default settings, such as changing the SSID and enabling WPA2 authentication. The project also involves physically securing the access point in a locked closet and educating employees on security best practices. Cecil researched methods used by other companies, including changing SSIDs, enabling WPA2, locking away hardware, and conducting vulnerability assessments. The project aims to protect customers' sensitive personal information by locking down the wireless network from internal and external threats.
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMSijfls
The increase in the deployment of IoT networks has improved productivity of humans and organisations.
However, IoT networks are increasingly becoming platforms for launching DDoS attacks due to inherent
weaker security and resource-constrained nature of IoT devices. This paper focusses on detecting DDoS
attack in IoT networks by classifying incoming network packets on the transport layer as either
“Suspicious” or “Benign” using unsupervised machine learning algorithms. In this work, two deep
learning algorithms and two clustering algorithms were independently trained for mitigating DDoS
attacks. We lay emphasis on exploitation based DDOS attacks which include TCP SYN-Flood attacks and
UDP-Lag attacks. We use Mirai, BASHLITE and CICDDoS2019 dataset in training the algorithms during
the experimentation phase. The accuracy score and normalized-mutual-information score are used to
quantify the classification performance of the four algorithms. Our results show that the autoencoder
performed overall best with the highest accuracy across all the datasets.
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay
the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which
included several elements to maintain a scalable and robust VPN connection. During this time of
uncertainty, best practices need to be deployed by corporations and government entities more than ever.
The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure,
reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility
requirements vary based on the end user.
This document discusses security risks associated with wireless access and mobile devices. It provides 10 steps for improving mobile security, including enforcing policies, password protection, antivirus software, encryption of files, and device lockdown. It also discusses threats like rogue wireless access, denial of service attacks, and the risks of unencrypted laptop hard drives. It recommends using mobile VPNs with encryption, authentication, and data encapsulation to secure over-the-air transmissions. Companies can also use solutions that detect and block rogue access points and wireless clients to prevent unauthorized access to networks.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
Cognitive Threat Analytics is a technology that analyzes web requests to identify Command & Control traffic, identifying threats that are currently present in a network. It is currently available across the entire Cisco Web Security portfolio, including Cloud Web Security (CWS) and the Web Security Appliance (WSA). To learn more, watch this webinar: http://cs.co/9000BuggO
Scot-Tech Engagement's Cyber Security Conference for Scottish Business, held 30th April 2015, Edinburgh. For more information contact ray@scot-tech.com.
Please note further presentations will be added once speakers have approved
This document discusses the evolution of approaches to securing SCADA systems. Early advice based on IT security principles is subtly flawed, as it fails to prevent system compromise and physical damage cannot be undone with backups. More recent approaches focus on prevention over detection and response. The key shift is recognizing SCADA systems must remain uncompromised, as restoring operations from intrusions is impossible unlike with IT systems. Overall confidence in SCADA security remains low due to outdated approaches still in use.
El Día del Padre se originó en 1909 en Estados Unidos cuando Sonora Smart Dodd quiso homenajear a su padre viudo. En 1924, el presidente Calvin Coolidge apoyó establecer un día nacional del padre, y en 1966 el presidente Lyndon Johnson declaró el tercer domingo de junio como el Día del Padre en Estados Unidos. La mayoría de países americanos también celebran esta fecha, mientras que en España y otros países de origen católico es el 19 de marzo, festividad de San José.
O documento apresenta um relatório de uma equipe de professores da FECAP sobre o Exame de Suficiência CFC de 2013, incluindo análise das questões, comentários e estatísticas sobre os assuntos cobrados.
O documento apresenta o trabalho de uma equipe de professores da FECAP sobre as questões e respostas do Exame de Suficiência CFC de março de 2013. A equipe analisou, resolveu e divulgou as questões para auxiliar alunos, professores e interessados. O coordenador agradece aos professores que auxiliaram no trabalho, especialmente três professores nomeados.
Este documento proporciona información sobre los arándanos, incluyendo su definición, propiedades, uso para adelgazar, principales mercados de exportación y empresas exportadoras. Los arándanos son bayas pequeñas con bajo contenido de azúcar y alto contenido de antioxidantes, cultivadas principalmente en Perú para la exportación, especialmente a EE.UU., Europa y Hong Kong. La región de La Libertad en Perú es el principal exportador de arándanos peruanos. Las principales empresas exportadoras de arándanos peruanos en 2015 fuer
El documento describe diferentes tipos de impacto ambiental como los impactos a nivel mundial, los impactos de la guerra y el uso bélico, y los impactos sobre el medio social. También discute los impactos ambientales en el Perú, incluyendo la contaminación causada por la minería y proyectos de inversión para abordar la contaminación y la deforestación.
La carrera de Ciencias de la Comunicación estudia los procesos de comunicación y cómo los mensajes son diseñados para comunicar o reasegurar relaciones de poder. Los estudiantes aprenden a analizar diferentes temáticas desde una perspectiva comunicacional y desarrollan habilidades para comprender diversos puntos de vista. Los graduados cuentan con un bagaje cultural versátil que les permite desempeñarse en campos como el periodismo, la publicidad y la producción audiovisual.
O documento discute a estrutura física da internet, formas de conexão, intranet, extranet, ameaças virtuais e segurança na internet. A estrutura física da internet não tem um computador central e sim uma rede de banda larga que conecta centros de informática. Ameaças como vírus, worms e bots podem infectar computadores. É importante usar a internet de forma segura para evitar riscos como acesso a conteúdo impróprio, furto de identidade e invasão de privacidade.
Mohammad Ala'a Al Bazrawi has over 15 years of experience in sales and marketing roles in the food service industry in Saudi Arabia. He currently serves as the Head of Sales and Marketing for an FMCG food service company, where he is responsible for corporate planning, marketing strategy, revenue maximization, and resource management. Previously, he held national and regional sales management positions with other food trading companies, where he successfully grew business, developed client relationships, and exceeded sales targets. Al Bazrawi has a track record of developing and implementing strategic plans and innovative marketing initiatives to increase brand awareness and drive sales.
Md Rafi Anwar is seeking a position as a piping engineer with over 7 years of experience in mechanical design, pressure vessels, fired heaters, steel structures, and piping stress analysis. He has worked on projects in Saudi Arabia, Bahrain, India, and the USA. His areas of expertise include design, material selection, drafting, stress analysis, and familiarity with relevant codes and standards. He holds a diploma in mechanical engineering and technical qualifications in CAD, CAESAR II, PVElite, and Nevis Work.
Supervisory control and data acquisition (SCADA) are applications that collect data from a system in order to automate the monitoring and controlling of its activities. Several industrial fields such as, electric utilities, water supplies and buildings' facilities have already adopted SCADA systems to increase the efficiency and reduce cost. However, the IT community is concerned about the level of security that any applied SCADA system provides. This paper concentrates on the major security threats encountered in SCADA systems. In addition, it discusses a new proposed methodology in order to increase the system security with minimal impact on efficiency. The proposed scheme provides several security services which are mutual authentication, confidentiality, data integrity and accountability.
Wireless data hacking, a form of hacking that can remotely gain control of a server via RF by planting spy chips or unauthorized devices directly to the server.
WDSS is able to detect and defend against all RF attacks in real-time scans the entire frequency every second for anomalies.
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
The potential of wireless communications, has resulted in a wide expand of wireless networks. However, the vulnerabilities and threats that wireless networks are subjectedto resulted in higher risk for unauthorized users to access the computer networks.This research evaluates the deployed Wireless Network in Jordan as well as the use of the security setting of the systems and equipment used. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. Thestudy is carried out through field evaluation of the Wireless Local Area Network (WLAN)in light of the use of Wardriving, and proposessome measures that can be taken to improve securityof the wireless network by the users.
A new algorithm to enhance security against cyber threats for internet of thi...IJECEIAES
One major problem is detecting the unsuitability of traffic caused by a distributed denial of services (DDoS) attack produced by third party nodes, such as smart phones and other handheld Wi-Fi devices. During the transmission between the devices, there are rising in the number of cyber attacks on systems by using negligible packets, which lead to suspension of the services between source and destination, and can find the vulnerabilities on the network. These vulnerable issues have led to a reduction in the reliability of networks and a reduction in consumer confidence. In this paper, we will introduce a new algorithm called rout attack with detection algorithm (RAWD) to reduce the affect of any attack by checking the packet injection, and to avoid number of cyber attacks being received by the destination and transferred through a determined path or alternative path based on the problem. The proposed algorithm will forward the real time traffic to the required destination from a new alternative backup path which is computed by it before the attacked occurred. The results have showed an improvement when the attack occurred and the alternative path has used to make sure the continuity of receiving the data to the main destination without any affection.
This document discusses the importance of cryptography standards in wireless local area networks (WLANs). It begins by explaining how wireless networks are vulnerable to threats like eavesdropping, tampering, and denial of service attacks due to the open nature of wireless communication. It then examines some common wireless security protocols like WEP, WPA, and RSN and compares their features to provide insight for securing WLANs. Finally, it discusses some basic hardware requirements for setting up a local wireless network, including a wireless access point and network interface cards for devices to connect to the network securely.
Wireless network security threats countermeasureEdie II
This document discusses the use of firewalls as a countermeasure against threats on wireless networks. It begins by introducing wireless networks and some of the security risks they pose. It then defines what a firewall is and explains why firewalls are necessary for protecting networks from unauthorized access. Specifically, it outlines several common types of attacks on wireless networks, including IP spoofing, denial-of-service attacks, source routed traffic, and tiny fragment attacks, that firewalls can help defend against. The objective is to demonstrate how firewalls work as a countermeasure and determine their advantages and disadvantages for securing wireless networks.
- Financial institutions and digital security providers are increasingly taking a military approach to defending against cyber attacks through layered defenses. This involves implementing multiple defensive layers throughout the network like firewalls, routers, intrusion detection, and antivirus software.
- In virtualized and cloud environments, security managers can filter and police traffic at each virtual server to separate and isolate traffic by customer and type. This prevents attacks from impacting host systems and improves efficiency.
- The use of threat intelligence databases that identify dangers on the internet in real-time combined with defensive filtering and blocking at the server level provides an additional layer of security against cyber attacks.
This document provides an overview of network security. It discusses the history and need for network security. It describes common network attacks and authentication methods. The document outlines basic network security techniques like Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). It also discusses network security architecture and concludes that network security is an important field that requires ongoing improvement to address evolving threats.
This seminar covers network security from its history to modern techniques. It introduces network security, the need for it due to increased internet usage, and basic concepts like authentication and common attacks. The document outlines early security protocols and why confidentiality, availability and integrity of information were important as the internet grew. It discusses how to secure a network from outside intrusion and different authentication techniques. Specific security methods like WPA, WEP and how hackers have evolved are also summarized. The advantages and challenges of network security are presented, as well as the importance of a well-designed security architecture for an organization's network.
SpriteGuard is a WiFi security solution that prevents hacker attacks on public WiFi networks. It scans the WiFi environment and detects all wireless hotspots and connected devices. If a device connects to a fraudulent hotspot, SpriteGuard stops the connection, preventing fraud. SpriteGuard also provides analytics on WiFi network performance through a virtual client that tests download speeds, ping times, and signal strength. This helps businesses ensure optimal WiFi quality. SpriteGuard is unique in that it works independently of existing WiFi infrastructure, requires no changes, and protects all devices on a network without prior knowledge. It is a cost-effective solution developed by researchers at Liverpool University to address widespread security issues with public WiFi access.
CompTIA exam study guide presentations by instructor Brian Ferrill, PACE-IT (Progressive, Accelerated Certifications for Employment in Information Technology)
"Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53"
Learn more about the PACE-IT Online program: www.edcc.edu/pace-it
This document summarizes information about virtual private networks (VPNs). It defines a VPN as a secure connection between devices and networks over public networks like the Internet. It describes the main types of VPNs and how they work by encrypting data and routing it through a service provider's secure servers. The document also discusses VPN security methods like firewalls and encryption. It outlines advantages like reduced costs but also disadvantages such as loss of access if the connection is down. Finally, it predicts continued growth in VPN usage and markets in the future.
Christian Glover Wilson discusses cybersecurity challenges posed by increased mobility and use of personal devices in the energy industry. The proliferation of smartphones, tablets, and internet-connected devices has led to new threats that must be addressed through best practices and technology. Mobility management and encryption are key to securing devices and data while still enabling productivity and collaboration anywhere through mobile access. The growing internet of things also increases vulnerabilities that must be protected as individual appliances could become points of failure or attack.
The document discusses Webroot's anti-fraud solutions for financial services. It notes that over 50% of online attacks target financial services users and that traditional security cannot keep up with modern threats. Webroot collects threat intelligence from billions of sources to detect malware as soon as it tries to infect users and protect all other users. It offers lightweight antivirus software, advanced online fraud prevention for PCs and mobile devices, and a mobile security SDK to embed security in mobile banking apps in order to protect banks, employees, and customers from fraud and attacks across digital channels.
Virtual private networks (VPNs) allow organizations to securely connect to a private network over a shared public infrastructure like the Internet. VPNs work by encrypting data that is sent between devices so that it can only be read by the intended recipient. This creates a secure "tunnel" to transmit data privately across a public network. VPNs provide benefits like extending a private network's reach, improving security, and reducing costs compared to traditional private leased lines. However, VPNs still face security risks such as hacking attacks, weak user authentication, client-side vulnerabilities, and virus/malware infections that could compromise the private network.
The document discusses the concept of "secure pipes", which refers to internet service providers integrating security functions directly into their network infrastructure to filter traffic before it reaches customers. This represents a paradigm shift from the traditional approach where customers were responsible for security after receiving traffic. Secure pipes involve three stages: 1) Filtering to block known bad traffic using signatures, 2) Exposing unknown malicious content through advanced analytics, and 3) Predicting future attacks by analyzing digital breadcrumbs from reconnaissance activities. The key benefits are applying security at internet speeds, gaining visibility from millions of endpoints, and allowing security teams to focus on more sophisticated threats.
Experimental analysis of intrusion detection systems using machine learning a...IJECEIAES
Since the invention of the internet for military and academic research purposes, it has evolved to meet the demands of the increasing number of users on the network, who have their scope beyond military and academics. As the scope of the network expanded maintaining its security became a matter of increasing importance. With various users and interconnections of more diversified networks, the internet needs to be maintained as securely as possible for the transmission of sensitive information to be one hundred per cent safe; several anomalies may intrude on private networks. Several research works have been released around network security and this research seeks to add to the already existing body of knowledge by expounding on these attacks, proffering efficient measures to detect network intrusions, and introducing an ensemble classifier: a combination of 3 different machine learning algorithms. An ensemble classifier is used for detecting remote to local (R2L) attacks, which showed the lowest level of accuracy when the network dataset is tested using single machine learning models but the ensemble classifier gives an overall efficiency of 99.8%.
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...pharmaindexing
This document discusses a two-way chained packet marking technique for secure communication in wireless sensor networks. It aims to provide a scheme for detecting attacks by creating a bidirectional link between packets. Any packets found without this link information will be eliminated at network boundaries, improving security. Neighboring packets will be marked to form a chain of legitimate messages, preserving originality and mitigating attacks like jamming.
2. Abstract
INVESTIGATING REMOTE AND AUTOMATED ATTACK VECTORS
USING A MICROCOMPUTER FROM INSIDE A KNOWN NETWORK.
By
DEAN KAY
As the Internets’ users, devices and volumes of data expand at an ever increasing and
exponential rate, the security, authenticity, confidentiality and integrity of the data being
exchanged worldwide presents the risk of data being stolen, misused or lost. One form of
prevention to this risk of data breach occurring is to have an organisations network security
audited by a penetration tester. Penetration testing is often a high cost service which will
undoubtedly start with a reconnaissance of the network under examination. This report asks
the question; Using off the shelf hardware, is it possible to build an automated network
reconnaissance device and in completion how long can the device remotely operate on
battery power.
3. DECLARATION
I hereby certify that this dissertation constitutes my own product, that where the language of
others is set forth, quotation marks so indicate, and that appropriate credit is given where I
have used the language, ideas, expressions or writings of another.
I declare that the dissertation describes original work that has not previously been presented
for the award of any other degree of any institution.
DEAN KAY
“This dissertation contains material that is confidential and/or commercially sensitive. It is
included here on the understanding that this will not be revealed to any person not involved in
the assessment process”.
4. ACKNOWLEDGEMENTS
I would like to take this opportunity to acknowledge and thank my friends and family that have
supported me throughout my studies at the University of Bolton. I would also like thank Dr.
Robert Campbell for his support and advice as my project supervisor during the final year of
study.
11. 4
Chapter 1.
Introduction
1.1 Aim
The aim of the project is to build a device using off the shelf miniaturised single board
computing hardware, for the purpose of exploring possible automated reconnaissance
attacks. The Device must be modular allowing it to be configured and utilised dynamically,
depending on the environment it is to be used within and also be mobile powered via a
battery power pack. It will also utilise a physical keypad input and on board display allowing
pre-programmed automation to be triggered.
The aim is to discover whether or not the project is possible with the use off the shelf
hardware and also the length of time it can be being deployed remotely using only a battery
pack.
1.2 Motivation
Due to the multiple redundant miniaturised single computing devices that were already in
personal possession, plus the keen interest in the study of network security alike. The project
of this category seemed to automatically come to light, when the process of deciding on a
project was in order. Upon review of literature, it became apparent that there had not been
13. 6
• Run several tests on the battery, while the device performs a network reconnaissance
under various network loads. Once tests are complete, run further tests on the
hardware utilisation on the device under several more network loads.
• Draw a correlation between the network load and hardware utilisation when
undergoing a reconnaissance attack, allowing a forward projection of battery life on
a given load.
1.4 Further Project Enhancements Opportunities
Further project enhancements opportunities are as follows:
i. Implement an encrypted reverse http shell for back door into target network, using
the on-board physical keypad input.
ii. implement an automated port scan for a target network producing a report for later
analysis, using the on-board physical keypad input.
iii. Implement an automated anonymous inline Ethernet packet capture that will write
the information to a local file for later analysis, using the on-board physical keypad
input.
iv. Implement an automated wireless tool to crack the WEP security algorithm and
deposit the encryption key to a local file for later use, using the on-board physical
keypad input.
v. Overcome the network defence of switch port security, with an automated pre
programmable MAC spoofing script.
15. 8
1.5.1 Original Project Timeline
FIGURE 1. ORIGINAL PROJECT TIMELINE
DATE: 21
ST
SEPTEMBER
24
TH
NOVEMBER
21
ST
JANUARY
3
RD
FEBRUARY
12
TH
APRIL
20
TH
APRIL
28
TH
APRIL
6
TH
MAY
BACKGROUND
RESEARCH
LITERATURE
REVIEW
SOURCING
HARDWARE
SOURCING
SOFTWARE
POSSIBLE ATTACK
VECTORS
DESIGN AND
IMPLEMENTATION
TESTING
DATA ANALYSIS
FINAL REPORT
The original project timeline that was planned was very ambitious and in retrospect not
realistic, focus on the length and complexity of procedures was not taken seriously when
determining the project timeline. Also, various parts of the project where vastly
underestimated in terms of timescale, therefore delaying the parts that where based on the
successful completion of the previous tasks.
Additionally, the lack of technical knowledge and experience in various technologies
throughout the project, partnered with several issues concerning the python-modules that
where a fundamental and integral part of the hardware interaction. Delayed the projects
timeline even further in key areas of the build.
Due these influences, a revised project timeline was not prepared.
18. 11
for a penetration-tester to act in the manner of a rogue party. Allowing the penetration-tester
to think and operate like an attacker would, therefore granting them the necessary
knowledge in the prevention of potential attacks. Penetration-testers will try a plethora of
techniques in order to break the security of a computers network. These are referred to as
‘attack vectors’ and as the creative minds of a rogue parties devise various new methods of
exploiting known and unknown vulnerabilities within a networks security, so does the that of
the penetration-testers. Performing this type of network security assessment is a necessary
step toward the defence of the public and private data stored within the associated network.
In addition to this evolution in technological communications and security there has also
been substantial developments in the miniaturization and processing power of computer
hardware on the computer platform itself. Computers were once thought as big, bulky
systems and with the sale of a so called 'portable computer' in 1975, the IBM 5100 weighing
in at around 50 pounds, offering 16Kilobyte of storage for a price tag upward of $8,975 (IBM,
2016). It is clear to see the technological advancements made within the industry, as one can
now buy an inexpensive $25 Raspberry Pi 2 miniature computer the size of a credit card with
a multiple core processor, a gigabyte of RAM and expandable storage upwards of 100GB+
(Raspberry Pi, 2016). These relatively inexpensive computing systems allow people of all ages
and backgrounds to explore computing, specifically targeting educational facilities. It has
also prompted many hobbyists to build a multitude of projects ranging from home
automation systems collaborating a Raspberry Pi with a collection of sensors, to major
projects such as the Astro-Pi, a Raspberry Pi fitted with various sensors and that was set into
space in order to conduct numerous experiments (Astro-Pi, 2016).
19. 12
Taking the previous information into account, this prompted the question; using
inexpensive miniaturised computing hardware, would it be possible to facilitate a network
reconnaissance on a given network in order to further advance the security placed upon it
presently?
2.1 Related Work
As this is a new and seemingly niche area of research, related work is somewhat scarce
though there has been some research conducted. Jun Zheng of the New Mexico Institute
of Mining and Technology ran a similar project where he discovered the possible attacks
available using a single-board microcomputer and the detrimental effects these attacks would
have on battery life of a connected power source. Zheng used older and lower powered
hardware to perform his tests and came to the conclusion that a small single-board computer
such as the Raspberry Pi is a seriously viable threat towards the defense of an internal
network, Zheng, J. (2013).
2.2 Literature
All the original literature reviewed for this project can be found in Appendix A as this was
completed in the earlier stages of the project timeline. Also a supervisory meeting Log can
be found in appendix F.
21. 14
3.1.1 Microcomputer
Research suggested that the hardware required would be a miniaturised single-board
computer with an adequate amount of processing power and lots of I/O for additional
peripherals and connectivity tailoring to the intended modular design. A previous study
which was similar to that of which was being conducted used a Raspberry Pi version 1 model
B, this offered everything required for the project build but was an older model of the
Raspberry Pi range, luckily the company had recently just brought a new Raspberry Pi version2
model B to market which offered considerable improvements to the technical specifications
of the device. Improvements such as moving from a 700Mhz single core CPU to a 900Mhz
quad core, 512MB to 1 GB of RAM, from 2x USB 2.0 ports to 4x USB ports and both models
kept the 40 pin GPIO headers for expansion. The Raspberry Pi vesion2 hardware is also very
inexpensive in price and costs the same as the prior version, it also offers large online
community that run a plethora of heterogeneous projects leaving vast amounts of
information online to take study from should there be any problems in the development.
There are alternatives to the Raspberry Pi such as the Beaglebone Black, ODROID-C1+ and
BananaPi, they are also around the same hardware specifications and price range but their
online community is miniscule in comparison to that of the Raspberry Pi’s. It was this key
factor which clarified the decision to use a Raspberry Pi single-board computer for the project,
as should any issues occur along the timeline a large online community of help would be
available.
22. 15
3.1.2 Screen and keypad input
Though technically not required in some cases, a physical screen and keypad input was
necessary for the remote installation of the devices on a target network. Adding a screen and
keypad input allows a penetration tester to trigger automated attacks directly from the device
itself as opposed to using additional hardware/software to log into it. There were two main
types of screen and input, these where the basic RGB display with physical buttons that can
be programmed to interact with software with the use of existing Python libraries or a touch
screen unit allowing a desktop environment to be loaded and potentially use on screen
keyboard. Both technologies physically interact with the Raspberry Pi through a section of
the GPIO headers that are on the board.
Due to the nature of the project requiring automation the RGB display and keypad input
where the more useful and discrete hardware choice allowing for the pre-programmed
automation to be triggered through the on board keypad.
3.1.3 Wireless network interface
The open design of a Raspberry Pi allows the addition of lots of different hardware
collaborations and with the integration of 4x USB 2.0 ports. This allowed the use of a USB
powered device wireless dongle. The review of literature surrounding network security
suggested that the necessity of a specific chipset and drivers is required when performing
particular network penetration tests. These specific chipsets would allow the tester to
perform on the fly packet injection while monitoring the streams of wireless frequencies in
the air.
24. 17
3.1.6 Project financial cost
The following table is the parts required for the project with a source of purchase and price
at the time of sale.
FIGURE 2. PROJECT FINANCIAL COSTS
Item Source Cost
Raspberry Pi 2 Model B+ . Uk.rs-
online.com
£25
Adafruit RGB Negative 16×2 LCD+Keypad Kit for Raspberry Pi. Amazon.co.uk £25
TP-LINK TL-WN722N Wireless N150 High Gain USB Adapter, 150Mbps,
4dBi External Antenna, WPS Button.
Amazon.co.uk £8
Anker Astro E6 Power bank - 20800 mAh. Amazon.co.uk £30
TP-LINK TD-W8968 300Mbps Wireless N USB ADSL2+ Modem Router. Amazon.co.uk £29
0.5M CAT.5 UTP Patch Cable. Amazon.co.uk £3
SanDisk Mobile Ultra micro SDHC 16 GB UHS-I Class 10 Memory Card 30
MB/s.
Amazon.co.uk £8
USB to 10/100 Ethernet RJ45 Network Adapter Converter PC Laptops
Wired Connection USB Male to RJ45 Female.
Amazon.co.uk £1.75
Adafruit Raspberry Pi B+ / Pi 2 / Pi 3 Case - Smoke Base
Adafruit.com £5
Total: £134.75
3.2 Software
The following section will take a look at the software used within the project, it will look at
each individual piece, comparing it with any alternate software’s that are available and
provide the reasoning as to the the final choice which was made.
3.2.1 Operating system
There are a number of open-source Linux based penetration testing distributions, that are
specifically configured for the Raspberry Pi as it uses an ARM based CPU architecture, these
are available to download online and free. Distribution such as Kali Linux, Pwn Pi and
25. 18
Raspberry Pwn all offer a number of penetration testing tools free to install and use.
However, this project was designed to be a modular device, so it was decided that the best
operating system for the project would be Raspbian; an unofficial port of the Debian wheezy
ARMhf distribution that is available download on the Raspberry Pi website. Raspbian is
completely compatible with the Raspberry Pi and is updated frequently, so there will be no
issues regarding compatibility. Raspbian also comes with the Python programming language
pre-installed and with Python installed a program known as ‘Katoolin’ can be downloaded
and run. Katoolin offers a quick and easy way to download repositories and tools from the
Kali Linux penetration testing distribution, in order to then select and install penetration
testing tools from its suite. The tools can be installed individually as and when needed making
this a better approach to having a bloated system full of tools that are not in use.
3.2.2 Programming languages
Has there have been over 2500 computer languages created (Kinnersley B, 2016) the choice
of which language to use in the project was cumbersome. However, with the decision to use
the Adafruit RGB screen and keypad input, also came the need to use the pre-written Python
libraries for the interaction between the module and operating system. This made Python
the only viable programming language available but a valuable part of the python
programming language is the ability to run BASH commands within the code. This would be
very beneficial as the author had previously completed an academic module on UNIX and
familiar with the commands available.
29. 22
4.2.1 LCD Menu system
As there are many hobbyists who take on the Raspberry Pi for various projects,
sources such as GitHub host free open-source repositories of programming code for
individuals to upload and download from, allowing communities to collaborate and share
code. It was this source which allowed the author to discover a pre-written menu system that
had been wrote in the python computing language for the interaction between the Raspberry
Pi and Adafruit RGB display and keypad input. On parsing the code, it was revealed there was
a lot of unnecessary functions that originally where tailored for the use of its creator. These
where deemed unnecessary and the code was adapted to that of a basic menu system with
no functions. This base code would be where all later functions would be called from and
would be placed in as a script to be ran in the ‘.bashrc’ file; a file which initiates the commands
within it on the boot of the device. The Adapted menu system code for the project can be
found in Appendix C.
4.2.2 Reverse shell
The reverse shell code was taken from the penetration testing tools that are supplied with
the Kali Linux distribution. It was installed using the katoolin application referred to earlier,
the code was mildly adapted as the AES private key was changed this was done as the default
is set for everyone who wishes to use the tool and therefore it is well known making it a
security risk.
34. 27
4.3 Problems faced
After completion of the build, to run the pen testing device in a target environment research
showed it had the potential to face various issues surrounding general network security
techniques
4.3.1 Port Security
Organisations such as banks and who wish to be certified to the ISO27002 information
security standards must follow strict regulations on the access control they place on their
network and systems (ISO/IEC 27002:2013, 2013). They will apply security configurations to
their networking equipment such as port security as a physical defence against unauthorised
access to the local network. Port security is a technique of access control that consists of
MAC filtering on the physical ports of a switch, it is secured by allowing or denying a physical
connection to the network based on the MAC address of the connecting device. This can be
a problem for the reconnaissance device, has should it want to initiate a reverse shell
connection, it would require a valid MAC address from the filter list implemented to the
switch.
This problem could be overcome with a technique known as MAC spoofing (D Cardenas, E,
2003), it would require the user of the device to manually configure the device using a valid
MAC address to connect to the network.
37. 30
The initial testing was performed in 3 stages these as follows;
1. Battery consumption monitoring 10Mbps throughput
2. Battery consumption monitoring 50Mbps throughput
3. Battery consumption monitoring 100Mbps throughput
Each test was conducted using all of the same equipment, with the only variant being the bit
rate transmitted. A logical diagram of the battery life test is shown below.
FIGURE 12. LOGICAL DIAGRAM OF BATTERY LIFE TEST
4.4.1 Hardware testing
The final piece of software that was used is known as vmstat, it is also a command line tool
similar to tcpdump, but for the monitoring of a computers statistical information such as CPU,
memory, I/O, and swap, this information can be printed to screen or written to a file for
further analysis. vmstat was run on the penetration testing device alongside tcpdump, to
identify the effect on hardware as the the iperf software transmitted packets at incrementing
bandwidths of 10Mbps till it reached 100Mbps, a Logical diagram of the test is shown below
39. 32
Chapter 5. Results
and Discussion
The following section cover the results collected from tests ran in the previous chapter,
discussing the expected results and then analysing the data for further discussion. To view
the full a transcript of all the results collected refer to appendix E.
5.1 Complete battery depletion test results
The theorised expectation of the tests would be that, the higher the throughput which was
being transmitted from the iperf client software to the iperf server software and anonymously
monitored with the packet capturing application. This would theoretically be running more
processes and utilising the hardware of the penetration testing device meaning the the
battery would deplete more rapidly as the device took more energy from the battery cells.
The following Table and Figure show the results of the battery life tests.
TABLE 1. BATTERY LIFE RESULTS
Reconnaissance Attack Bit Rate (Mbps) Battery life (Hrs)
Inline Ethernet packet capture Average traffic 39.2
Inline Ethernet packet capture 100 28.9
Inline Ethernet packet capture 50 34.5
Inline Ethernet packet capture 10 37.9
43. 36
the technologies. This was aided by the understanding the author had on subjects at a
fundamental level, meaning any new concepts where built on the pre-existing knowledge.
5.3.2 Development time
The time to develop the project was reasonable and should more time be available to the
individual the project may have been completed earlier then proposed. This is also down to
the discipline of the individual for example the ability deny themselves from procrastinating.
5.3.3 The level of skills required to do the project
The level of skill required to complete the project is that of a first year university student and
low level, it does however require a lot of determination and a keen interest in the field of
network security. Areas such as UNIX and python are the most essential part of the build,
knowing their fundamentals is the basis to furthering the project.
5.3.4 Risk factors for organisations
The projects device presents a lot of risks for an organisation as the device is mobile and
proven to be capable of performing reconnaissance attacks. With the ability to remain hidden
and powered by a battery for up to 39.2 house under average users traffic, the device can
present a serious risk towards the security of an organisations network.
53. APPENDIX A
Appendix - A 3
Abbreviations
GSM - Global System for Mobile Communication
OSS - Open Source Software
List of Figures
Figure 1 PwnPlug R3 - source: pwnieexpress.com .................................................................. 6
Figure 2 RGB LCD plate with keypad – source: Adafruit.com .................................................. 6
Figure 3. Bar chart of battery lifetime - source: Exploring attack vectors facilitated by
miniaturized computers ................................................................................................... 7
1. Introduction
Due to an ever increasing number of cyber attacks against computer systems and
networks being committed across the world, companies and nations alike are taking cyber
security as a primary defence against existing and fore coming attacks.
One technique towards building stronger cyber security systems is the hiring of penetration
testers, in order to find security holes in the current computer and networks security
infrastructure of an organisation. Penetration testers are known to use a plethora of
techniques known as ‘attack vectors’, in order to break into their target systems. One rather
new technique is known as a penetration testing drop box. Whereby a computing device with
penetration testing tools pre-installed, is hidden away within a targets physical location with
potential physical access to the target network via a nearby Ethernet port or in wireless range
of an access point.
The purpose of the project is to investigate the viability of using a microcomputer combined
with keypad input and display in order to run automated attacks against a computer network.
Due to its uniqueness there is very little study been made in this area of cyber security, only
finding one main literature containing specific research conducted in the field. Broader
research was made around the subject but it was felt necessary to use the main research
already conducted and build from it.
The overall goal of performing this research carries two segments, firstly to establish whether
or not the device is at all creatable using consumer grade hardware.
This will encompass three parts.
• How the device is to be administered
This is of interest to how the device will efficiently make use of its target
environment, the main focus being the various implementations towards
interaction between the user and device.
• The fashion in which the device will interact in its environment
This represents how the device will interact with its target network. Variants
of attack vector will be considered, such as wired or wireless attacks.
55. APPENDIX A
Appendix - A 5
and wired attacks. Further unintended research into remote interaction via 3G cellular
networks arose. A study into system of cellular controlled farming management was being
used with a GSM shield attached to a Raspberry Pi microcomputer (Venkateswaran, D; Alex,
C; Jose, K.M; Sahasranamam, S, 2014). This gave the idea to possible out of band connectivity
to the device being used in the project, thus hiding the identity of commands being
communicated to and from the device, adding another layer of anonymity.
Lastly, the option of using a mains power supply or battery powered supply as an
implementation was also discovered. This allowed obscurity as the device would not need to
rely on a mains power supply to function and could be well hidden (Mortensen, C;
Winkelmaier, R; Zheng, J, 2013).
The final part of the research relates to the physical form of the device, showing the
requirements intended to meet below:
• To be compatible with all connected hardware on device.
• Mobile for instalment in target locations.
• Able to run basic network connectivity test from the device itself locally.
• Perform attacks locally and remotely.
Decisions towards the physical design will take into account, the project costs and case study
findings in order to achieve a suitable medium.
Research showed that the Raspberry Pi microcomputer was a worthy candidate in terms of
the cost of hardware and the capabilities of the hardware. Using hardware such as the
Raspberry Pi would allow the instalment of non proprietary software (Raspberry Pi, 2016).
Such as a specialised operating system known as Kali Linux, which provides a penetration
testing security suite of 250+ tools (Kali, 2016). It was evident from the research conducted
into exploring attack vectors that their device was automatically given connectivity when
placed in the network, as there was know hardware to configure the device on placement.
This gave the idea of fitting a Raspberry Pi with a LCD screen and keypad input module in
order to test basic network connectivity from the device while being placed on location.
3. Findings
Maintaining to the segmentation of the project research into three separate areas,
the following represent the findings found within each area.
Currently there already exists commercial products that include microcomputers installed
with penetration testing suites. It was found that there are various ways to interact with pen
testing hardware, with commercial products such as the PwnPlug R3 seen below.
61. APPENDIX C
1. #!/usr/bin/python
2.
3. # Created by Alan Aufderheide, February 2013
4. # Modified by Dean Kay, February 2016
5. # This provides a menu driven application using the LCD Plates
6. # from Adafruit Electronics.
7.
8. import commands
9. import subprocess
10. import os
11. import urllib
12. from string import split
13. from time import sleep, strftime, localtime
14. from datetime import datetime, timedelta
15. from xml.dom.minidom import *
16. from Adafruit_I2C import Adafruit_I2C
17. from Adafruit_MCP230xx import Adafruit_MCP230XX
18. from Adafruit_CharLCDPlate import Adafruit_CharLCDPlate
19. from ListSelector import ListSelector
20.
21. import smbus
22.
23. configfile = 'lcdmenu.xml'
24. # set DEBUG=1 for print debug statements
25. DEBUG = 0
26. DISPLAY_ROWS = 2
27. DISPLAY_COLS = 16
28.
29. # set to 0 if you want the LCD to stay on, 1 to turn off and on auto
30. AUTO_OFF_LCD = 0
31.
32. # set busnum param to the correct value for your pi
33. lcd = Adafruit_CharLCDPlate(busnum = 1)
34. # in case you add custom logic to lcd to check if it is connected (useful)
35. #if lcd.connected == 0:
36. # quit()
37.
38. lcd.begin(DISPLAY_COLS, DISPLAY_ROWS)
39. lcd.backlight(lcd.OFF)
40.
41. # commands
42. def rePortscan():
43. if DEBUG:
44. print('in rePortscan')
45. lcd.clear()
46. subprocess.call("sudo nmap -O -sV -v --reason --open -
oX /home/pi/portScans/testmap.xml 192.168.0.0/24 --stylesheet=nmap.xsl &",shell=True)
47. while 1:
48. if lcd.buttonPressed(lcd.LEFT):
49. break
50. sleep(0.25)
51. def ShowPubIP():
52. if DEBUG:
53. print('in ShowPublicIP')
54. publicIPUrl = urllib.urlopen("http://my-ip.heroku.com/")
55. pubIP = publicIPUrl.read().split()[2].translate(None, '"')
56. lcd.clear()
57. lcd.message(pubIP)
58. while 1:
59. if lcd.buttonPressed(lcd.LEFT):
60. break
61. sleep(0.25)
62.
63. def ShowDG():
64. if DEBUG:
65. print('in ShowIPGate')
66. lcd.clear()
67. lcd.message(commands.getoutput("sudo python /home/pi/getDG.py"))
68. while 1:
69. if lcd.buttonPressed(lcd.LEFT):
70. break
62. APPENDIX C
71. sleep(0.25)
72.
73. def revShell():
74. if DEBUG:
75. print('in Reverse Shell')
76. lcd.clear()
77. subprocess.call("sudo python /home/pi/testmenu/reVSHELL/shell.py 192.168.1.101 80 &",shell=Tru
e)
78. while 1:
79. if lcd.buttonPressed(lcd.LEFT):
80. break
81. sleep(0.25)
82.
83. def reWireTAP():
84. if DEBUG:
85. print('in reWireTAP')
86. lcd.clear()
87. subprocess.call("sudo /home/pi/reTools/reWireTAP/reWireTAP.sh",shell=True)
88. while 1:
89. if lcd.buttonPressed(lcd.LEFT):
90. break
91. sleep(0.25)
92.
93. def DoQuit():
94. lcd.clear()
95. lcd.message('Are you sure?nPress Sel for Y')
96. while 1:
97. if lcd.buttonPressed(lcd.LEFT):
98. break
99. if lcd.buttonPressed(lcd.SELECT):
100. lcd.clear()
101. lcd.backlight(lcd.OFF)
102. quit()
103. sleep(0.25)
104.
105. def DoShutdown():
106. lcd.clear()
107. lcd.message('Are you sure?nPress Sel for Y')
108. while 1:
109. if lcd.buttonPressed(lcd.LEFT):
110. break
111. if lcd.buttonPressed(lcd.SELECT):
112. lcd.clear()
113. lcd.backlight(lcd.OFF)
114. commands.getoutput("sudo shutdown -h now")
115. quit()
116. sleep(0.25)
117.
118. def DoReboot():
119. lcd.clear()
120. lcd.message('Are you sure?nPress Sel for Y')
121. while 1:
122. if lcd.buttonPressed(lcd.LEFT):
123. break
124. if lcd.buttonPressed(lcd.SELECT):
125. lcd.clear()
126. lcd.backlight(lcd.OFF)
127. commands.getoutput("sudo reboot")
128. quit()
129. sleep(0.25)
130.
131. def LcdOff():
132. global currentLcd
133. currentLcd = lcd.OFF
134. lcd.backlight(currentLcd)
135.
136. def LcdOn():
137. global currentLcd
138. currentLcd = lcd.ON
139. lcd.backlight(currentLcd)
140.
64. APPENDIX C
212. return curval
213.
214. def SetDateTime():
215. if DEBUG:
216. print('in SetDateTime')
217. # M D Y H:M:S AM/PM
218. curtime = localtime()
219. month = curtime.tm_mon
220. day = curtime.tm_mday
221. year = curtime.tm_year
222. hour = curtime.tm_hour
223. minute = curtime.tm_min
224. second = curtime.tm_sec
225. ampm = 0
226. if hour > 11:
227. hour -= 12
228. ampm = 1
229. curr = [0,0,0,1,1,1]
230. curc = [2,5,11,1,4,7]
231. curvalues = [month, day, year, hour, minute, second]
232. current = 0 # start with month, 0..14
233.
234. lcd.clear()
235. lcd.message(strftime("%b %d, %Y n%I:%M:%S %p ", curtime))
236. lcd.blink()
237. lcd.setCursor(curc[current], curr[current])
238. sleep(0.5)
239. while 1:
240. curval = curvalues[current]
241. if lcd.buttonPressed(lcd.UP):
242. curval += 1
243. curvalues[current] = ValidateDateDigit(current, curval)
244. curtime = (curvalues[2], curvalues[0], curvalues[1], curvalues[3], curvalues[4]
, curvalues[5], 0, 0, 0)
245. lcd.home()
246. lcd.message(strftime("%b %d, %Y n%I:%M:%S %p ", curtime))
247. lcd.setCursor(curc[current], curr[current])
248. if lcd.buttonPressed(lcd.DOWN):
249. curval -= 1
250. curvalues[current] = ValidateDateDigit(current, curval)
251. curtime = (curvalues[2], curvalues[0], curvalues[1], curvalues[3], curvalues[4]
, curvalues[5], 0, 0, 0)
252. lcd.home()
253. lcd.message(strftime("%b %d, %Y n%I:%M:%S %p ", curtime))
254. lcd.setCursor(curc[current], curr[current])
255. if lcd.buttonPressed(lcd.RIGHT):
256. current += 1
257. if current > 5:
258. current = 5
259. lcd.setCursor(curc[current], curr[current])
260. if lcd.buttonPressed(lcd.LEFT):
261. current -= 1
262. if current < 0:
263. lcd.noBlink()
264. return
265. lcd.setCursor(curc[current], curr[current])
266. if lcd.buttonPressed(lcd.SELECT):
267. # set the date time in the system
268. lcd.noBlink()
269. os.system(strftime('sudo date --set="%d %b %Y %H:%M:%S"', curtime))
270. break
271. sleep(0.25)
272.
273. lcd.noBlink()
274.
275. def ShowIPAddress():
276. if DEBUG:
277. print('in ShowIPAddress')
278. lcd.clear()
279. lcd.message(commands.getoutput("/sbin/ifconfig").split("n")[1].split()[1][5:])
280. while 1:
65. APPENDIX C
281. if lcd.buttonPressed(lcd.LEFT):
282. break
283. sleep(0.25)
284.
285. # Get a word from the UI, a character at a time.
286. # Click select to complete input, or back out to the left to quit.
287. # Return the entered word, or None if they back out.
288. def GetWord():
289. lcd.clear()
290. lcd.blink()
291. sleep(0.75)
292. curword = list("A")
293. curposition = 0
294. while 1:
295. if lcd.buttonPressed(lcd.UP):
296. if (ord(curword[curposition]) < 127):
297. curword[curposition] = chr(ord(curword[curposition])+1)
298. else:
299. curword[curposition] = chr(32)
300. if lcd.buttonPressed(lcd.DOWN):
301. if (ord(curword[curposition]) > 32):
302. curword[curposition] = chr(ord(curword[curposition])-1)
303. else:
304. curword[curposition] = chr(127)
305. if lcd.buttonPressed(lcd.RIGHT):
306. if curposition < DISPLAY_COLS - 1:
307. curword.append('A')
308. curposition += 1
309. lcd.setCursor(curposition, 0)
310. sleep(0.75)
311. if lcd.buttonPressed(lcd.LEFT):
312. curposition -= 1
313. if curposition < 0:
314. lcd.noBlink()
315. return
316. lcd.setCursor(curposition, 0)
317. if lcd.buttonPressed(lcd.SELECT):
318. # return the word
319. sleep(0.75)
320. return ''.join(curword)
321. lcd.home()
322. lcd.message(''.join(curword))
323. lcd.setCursor(curposition, 0)
324. sleep(0.25)
325.
326. lcd.noBlink()
327.
328. # An example of how to get a word input from the UI, and then
329. # do something with it
330. def EnterWord():
331. if DEBUG:
332. print('in EnterWord')
333. word = GetWord()
334. lcd.clear()
335. lcd.home()
336. if word is not None:
337. lcd.message('>'+word+'<')
338. sleep(5)
339.
340. class CommandToRun:
341. def __init__(self, myName, theCommand):
342. self.text = myName
343. self.commandToRun = theCommand
344. def Run(self):
345. self.clist = split(commands.getoutput(self.commandToRun), 'n')
346. if len(self.clist) > 0:
347. lcd.clear()
348. lcd.message(self.clist[0])
349. for i in range(1, len(self.clist)):
350. while 1:
351. if lcd.buttonPressed(lcd.DOWN):
72. APPENDIX E
Full Battery Depletion Test
Reconnaissance Attack Bit Rate (Mbps) Battery life (Hrs)
Inline Ethernet packet capture Average traffic 39.2
Inline Ethernet packet capture 100 28.9
Inline Ethernet packet capture 50 34.5
Inline Ethernet packet capture 10 37.9
31.15
39.2
28.9
34.5
37.9
Wireless Multichannel
Access Point Packet
Capture
Wired Inline Ethernet
Wire TAP general use
Wired Inline Ethernet
Wire TAP at 100Mbps
Wired Inline Ethernet
Wire TAP at 50Mbps
Wired Inline Ethernet
Wire TAP at 10Mbps
Time Till Battery Depletion (Hours)
Time Till Battery Depletion (Hours)