Collaborative Attacks on MANETs: An Analysis of Collaborative Attacks on Mobile Ad hoc Networks

Collaborative Attacks on MANETs: An Analysis of Collaborative Attacks on Mobile Ad hoc NetworksThe security in MANET has become a significant and active topic within the research community. In spite of the several attacks aimed at specific nodes in MANET that have been uncovered, some attacks involving multiple nodes still receive little attention. Furthermore, it may also have to do with the fact that no survey or taxonomy has been done to clarify the characteristics of different multiple node attacks. This thesis addresses the aforementioned gap by providing a proper definition and categorization of collaborative attacks against MANET from the various multiple node attacks found. Simulation using OPNET Modeler was used to investigate the performance impact of a collaborative blackhole attack on a mobile ad hoc network. Network throughput, packet delivery ratio and end-to-end delay are the performance metrics used in our result analysis. Based on the analyses of performance metrics made, we realised the consequences of a collaborative blackhole attack on MANET. In order to prevent or reduce these consequences, we also discuss a number of mitigation plans to counteract the different kinds of collaborative attacks.

Price: $60.00

Click here to buy from Amazon

Wireshark & Ethereal Network Protocol Analyzer Toolkit Jay Beale Source Security

Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress' best-selling book Ethereal Packet Sniffing.

This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building Ethereal from source and will also be guided through Ethereal's graphical user interface. The following sections will teach readers to use command-line options of Ethereal as well as using Tethereal to capture live packets from the wire or to read saved capture files. This section also details how to import and export files between Ethereal and WinDump, Snort, Snoop, Microsoft Network Monitor, and EtherPeek. The book then teaches the reader to master advanced tasks such as creating sub-trees, displaying bitfields in a graphical view, tracking requests and reply packet pairs as well as exclusive coverage of MATE, Ethereal's brand new configurable upper level analysis engine. The final section to the book teaches readers to enable Ethereal to read new Data sources, program their own protocol dissectors, and to create and customize Ethereal reports.

Ethereal is the #2 most popular open source security tool, according to a recent study conducted by insecure.org

Syngress' first Ethereal book has consistently been one of the best selling security books for the past 2 years

The companion Web site for the book provides readers with dozens of open source security tools and working scripts

Price: $49.95

Click here to buy from Amazon

Dominance Over OmniDimensional Battlespace: Network Centric Warfare as Polemos

Dominance Over OmniDimensional Battlespace: Network Centric Warfare as PolemosThroughout the centuries much debate has been made over the practice of War, the procedures that create the circumstances which lead to its employment, and the questioning of its inevitability in the contemporary world. Traditional warfighting has changed in the 1990s due to the rapid development of ICTs, leading into a whole new generation of warfare. The military must adapt or fail. Exponential increases in the availability of information are leading to an era of cheap information available to anyone, anywhere and the emergence of Network Centric Operations. This will vastly change the nature of the battlespaces and the nature of war itself. This whole procedure goes under the name of “Force Transformation” and has as an utter goal the Dominance over the Full Spectrum of Operations. So, the question to ponder is “Can Transformation be managed and if yes, how?”

Price: $63.00

Click here to buy from Amazon

Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link?

Cyberwar and Cyber-attack: How is our strongest network at risk of becoming our weakest link?Cyber war and cyber-attack is an engaging review of the basic knowledge all up to date readers should have about cyber war and cyber-attacks before diving into more complex texts, as well as extra information for those already familiar with the topic. This work takes a look at general issues involving cyber vulnerability and our growing dependency on computers systems and networks. It goes beyond simple concepts such as hackers, hacktivism and espionage without neglecting them. It exposes the relevance of cyberdefence to both companies and ordinary users, giving especial attention to e-commerce platforms. At a time that many countries are employing strategies and money to prevent or minimize attacks as well as defend themselves against cyber threats this work pinpoints the key factors around the intentions behind attacks without minimizing their scale and variety. The jargon-free language and the current examples included help to set the discussion in the present day, while stressing important historical connections and pointing to how our strong network is at risk of becoming our weakest link.

Price: $2.99

Click here to buy from Amazon

A Battle in Bits and Bytes: Computer Network Attacks – The Law of Armed Conflict

A Battle in Bits and Bytes: Computer Network Attacks and the Law of Armed Conflict (The Erik Castrén Research Reports, 27/2009)

Technology is an essential part of society in the Information Age. Warfare has always had a technological dimension. In the era of information and the interconnected world, the critical infrastructure of nations has become increasingly reliant upon computer networks: by using the methods of computer network attacks many critical functions of a State could be damaged. This has raised a discussion related to States' national and economic security concerning a new battlefield, warfare in cyberspace.

This report surveys one new facet of technology: computer network attacks, from the framework of the law of armed conflict by asking if the existing law of armed conflict, the main parts of which have their origins in the legacies of two World Wars, applies to computer network attacks. Moreover, the report addresses the questions of the perpetrators of the computer network attacks in the context of the law of armed conflict, what targets can be attacked with the means and methods of computer network attacks and how these attacks should be conducted under the laws of armed conflict.

Price:

Click here to buy from Amazon