شهریاری, حمید رضا

پژوهشکده پدافند غیرعامل، دانشگاه صنعتی امیرکبیر

[ 1 ] - مروری بر امنیت سایبری سیستم‌های کنترل صنعتی

امروزه کلیه زیر‌ساخت‌های حیاتی، واحدهای صنعتی و تجهیزات مدرن شهری و کشوری از سیستم‌های کنترل و اتوماسیون مبتنی بر شبکه، برای پایش و کنترل فرآیندهای خود استفاده می‌نمایند. این سیستم‌ها امکان مدیریت، هماهنگی و بهره‌برداری ایمن، مؤثر و کارآمد از این واحدها را امکان پذیر می‌سازند. به بیان دیگر سیستم‌های کنترل و اتوماسیون نقش مغز و سیستم عصبی پیکره زیر‌ساخت‌های حیاتی و سیستم‌های صنعتی را ایفا می‌کنن...

[ 2 ] - A Survey of Anomaly Detection Approaches in Internet of Things

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

[ 3 ] - BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

[ 4 ] - Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...

[ 5 ] - A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

[ 6 ] - Prediction of user's trustworthiness in web-based social networks via text mining

In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...