Biblio
Filters: Keyword is ethical hacking [Clear All Filters]
Efficient Brute-force handling methodology using Indexed-Cluster Architecture of Splunk. 2022 International Conference on Electronics and Renewable Systems (ICEARS). :697–701.
.
2022. A brute force is a Hacking methodology used to decrypt login passwords, keys and credentials. Hacks that exploit vulnerabilities in packages are rare, whereas Brute Force attacks aim to be the simplest, cheapest, and most straightforward approach to access a website. Using Splunk to analyse massive amounts of data could be very beneficial. The application enables to capture, search, and analyse log information in real-time. By analysing logs as well as many different sources of system information, security events can be uncovered. A log file, which details the events that have occurred in the environment of the application and the server on which they run, is a valuable piece of information. Identifying the attacks against these systems is possible by analysing and correlating this information. Massive amounts of ambiguous and amorphous information can be analysed with its superior resolution. The paper includes instructions on setting up a Splunk server and routing information there from multiple sources. Practical search examples and pre-built add-on applications are provided. Splunk is a powerful tool that allows users to explore big data with greater ease. Seizure can be tracked in near real-time and can be searched through logs. A short amount of time can be spent on analysing big data using map-reduce technology. Briefly, it helps to analyse unstructured log data to better understand how the applications operate. With Splunk, client can detect patterns in the data through a powerful query language. It is easy to set up alerts and warnings based on the queries, which will help alert client about an ongoing (suspected) activity and generate a notification in real-time.
Automated Student Assessment for Cybersecurity Courses. 2019 14th Annual Conference System of Systems Engineering (SoSE). :93—95.
.
2019. The need for cybersecurity knowledge and skills is constantly growing as our lives become more integrated with the digital world. In order to meet this demand, educational institutions must continue to innovate within the field of cybersecurity education and make this educational process as effective and efficient as possible. We seek to accomplish this goal by taking an existing cybersecurity educational technology and adding automated grading and assessment functionality to it. This will reduce costs and maximize scalability by reducing or even eliminating the need for human graders.