Tag Archive for: internet

Cybersecurity Threats in Global Satellite Internet


By Gizem Yılmaz, Master Expert Data Analyst, Turkcell Technology

Internet via satellite was first used for military purposes in the 1960s and became available for wide-scale commercial use in the 1990s. Current satellite internet systems typically use low-orbit satellites and provide data transmission at low speeds due to limited bandwidth. Starlink, on the other hand, is a project developed by Elon Musk’s SpaceX company and aims to provide a faster, more reliable and more comprehensive internet experience with low latency and high bandwidth through a high number of low orbit satellites.

The surge in satellite internet usage has opened up a new frontier for cybersecurity threats, ranging from sophisticated hacking attempts to disruptive denial-of-service attacks.

[1] Last year, a security researcher at KU Leuven, Lennert Wouters, unveiled potential vulnerabilities in Starlink satellites, revealing that hackers could exploit hardware weaknesses in ground-based terminals. At the Blackhat Security Conference, Wouters demonstrated the feasibility of a low-cost mod chip, priced at around $25, to execute a “fault injection attack,” bypassing Starlink’s security measures and gaining unauthorized access to its systems. Recently, the Ukrainian Security Service (SBU) issued a warning about a new malware, “Malware 4. STL,” which utilizes a person’s mobile device to remotely gather data on Starlink systems, representing a distinctive threat compared to previous concerns about direct hacking or system disruption.

Hacking Satellites: Vulnerabilities and Risks:

As satellites play a pivotal role in global communication, they become attractive targets for malicious actors seeking to compromise sensitive data or gain unauthorized access. The vulnerabilities in satellite systems can manifest in various ways, from exploiting software vulnerabilities in ground control systems to physically tampering with the satellite hardware. Potential risks associated with satellite hacking include unauthorized access to sensitive data, manipulation of satellite functions, and disruption of communication services. Attackers may exploit vulnerabilities in satellite systems, ranging from software…

Source…

Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices


In this section, the results of the simulation modeling and benchmarking study are presented and discussed. The findings of this research are discussed in the context of their impact on ensemble averaging for NIDS in heterogeneous IoT devices. Additionally, potential areas for future research in this field are highlighted.

Experiment environment

This research used a server with the following specifications: Processor 2.3 GHz 16-Core Intel(R) Xeon(R) CPU E5-2650 v3 and 128 GB memory. The operating system used was Ubuntu 22.04.2 LTS. Python version 3.10.6 and Keras version 2.12 were employed as the machine learning library for conducting the DNN experiments. Jupyter notebook version 6.5.3 was used for presenting the experiment and simulation results.

Preliminaries analysis

In this section, the explanation of results from both Scenario 1 and Scenario 2 is provided. The main objective of Scenario 1 was to assess the performance of individual DNN models constructed using device-specific traffic for the purpose of detecting botnet attacks occurring within the traffic of each respective device.

Table 7 Scenario 1 result.

The results of Scenario 1 are presented in Table 7. The findings indicate that the DNN models within each device exhibited robust performance when analyzing the traffic generated by that specific device. Notably, accuracy for each device reached 100%, signifying accurate identification of both true positive and true negative instances of botnet attacks within the corresponding device’s traffic. Precision and recall metrics also demonstrated performance exceeding 99%, implying the models’ ability to minimize misclassifications of normal traffic while accurately recognizing positive instances. Moreover, the DNN models achieved a high F1-score in detecting botnet attacks, highlighting their proficiency in both precision and recall aspects. Both training and prediction times for each model were influenced by dataset volume, with larger datasets leading to longer training and prediction durations. Remarkably, the model size remained consistent at around 70 Kb for each DNN model, indicating a stable size unaffected by variations in training data volume.

Figure 6
figure 6

Average accuracy,…

Source…

Lava lamps and pendulums: from 90’s décor to internet security


Lava lamps loving Cloudflare is a major player in content delivery networks (CDNs) and internet security.

Founded in 2009, the company has since rapidly grown to become a crucial component of the internet’s infrastructure. At first glance, the company’s portfolio has over 50,000 clients. However, its encryption technique might just blow your socks off.

Typical cybersecurity companies encrypt data by using (often predictable) computer-made algorithms and codes to design an encryption seed. Cloudflare on the other hand, uses (completely unpredictable) 90’s décor to create its seeds. This process relies heavily on random numbers, as they form the foundation for the complex algorithms that create encryption keys. The more unpredictable these random numbers are, the stronger the encryption becomes.

Kitsch is king

Among the usual office trappings of its San Francisco office, one will encounter a spectacle that seems oddly out of place: a mesmerizing wall of lava lamps, their waxy innards bubbling and churning. But this isn’t just an aesthetic choice. These lamps play a vital role in the unseen world of internet security.

Cloudflare utilises a system affectionately nicknamed “Lavarand”, where a camera continuously captures images of the ever-shifting lava flow within the lamps. These images, with their unique patterns and colour variations, translate into a stream of random data. Computers can then convert this data into numbers that contribute to the generation of encryption keys.

The beauty of lava lamps lies in their inherent randomness—the constantly changing flow ensures a virtually inexhaustible source of unpredictable data. Visitors are encouraged to gaze at the lamps—the more heat generated, the more randomized the lava lamp patterns will be.

Access the most comprehensive Company Profiles

Source…

The Hangzhou Internet Security Institute released an AI industry report., Business News


The Hangzhou Internet Security Institute released an AI industry report.

The Hangzhou Internet Security Institute published an AI industry report, systematically elucidating the prospects of the AI industry. It also offers an in-depth analysis of the latest developments and technological breakthroughs of leading AI institutions, while exploring the challenges and opportunities of AI technology in practical applications. The institute believes that, despite the significant progress made in AI technology, there are still issues related to data security and privacy protection in its practical applications, which merit global caution and attention.

On February 15, 2024(EST), OpenAI officially released the Sora video model, along with 48 generative video cases and a technical report. Users can simply input text to generate a 60-second video. The launch of Sora undoubtedly represents another significant breakthrough following the introduction of ChatGPT in 2023. Sora is considered the pinnacle of achievement in the field of artificial intelligence to date, with the AI competition seen as the forefront of the current Sino-American rivalry. Currently, the institute has heard two perspectives: Firstly, the development of AI technology will determine the future rise or fall of China and the United States. The rise and fall of great powers usually begin during periods of major technological change, and ultimately, this continuous growth advantage will translate into geopolitical and military influence. Secondly, China has already come very close to the United States in this cutting-edge technology field, even surpassing the United States in aspects such as electronic payments, 5G, and the quantity of papers and patents.

The institute believes that the launch of ChatGPT and Sora indicates that the United States holds a leading advantage in the foundational areas necessary for the development of artificial intelligence, including hardware, research and development, and talent, while China still lags behind the US in deep learning, core algorithms, and large language models. However, the institute also recognizes that China’s vast population size…

Source…