Show simple item record

dc.contributor.advisorDean, Richarden
dc.contributor.advisorMoazzami, Farzaden
dc.contributor.advisorAstatke, Yacoben
dc.contributor.authorShonubi, Felix
dc.contributor.authorLynton, Ciara
dc.contributor.authorOdumosu, Joshua
dc.contributor.authorMoten, Daryl
dc.date.accessioned2016-02-16T21:12:52Zen
dc.date.available2016-02-16T21:12:52Zen
dc.date.issued2015-10en
dc.identifier.issn0884-5123en
dc.identifier.issn0074-9079en
dc.identifier.urihttp://hdl.handle.net/10150/596435en
dc.descriptionITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NVen_US
dc.description.abstractThe implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network, analyzing the attack process from launch to detection. For this demonstration, a penetration-testing tool is used to launch the attack. This attack will be monitored to detect its signature using a network monitoring tool, and this signature will then be used to create a rule which will trigger an alert in an Intrusion Detection System. This work highlights the importance of network security in telemetry applications and is critical to current and future telemetry networks as cyber threats are widespread and potentially devastating.
dc.description.sponsorshipInternational Foundation for Telemeteringen
dc.language.isoen_USen
dc.publisherInternational Foundation for Telemeteringen
dc.relation.urlhttp://www.telemetry.org/en
dc.rightsCopyright © held by the author; distribution rights International Foundation for Telemeteringen
dc.subjectTelemetryen
dc.subjectExploiten
dc.subjectMetasploiten
dc.subjectIntrusion Detection System (IDS)en
dc.titleExploring Vulnerabilities in Networked Telemetryen_US
dc.typetexten
dc.typeProceedingsen
dc.contributor.departmentMorgan State Universityen
dc.identifier.journalInternational Telemetering Conference Proceedingsen
dc.description.collectioninformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.en
refterms.dateFOA2018-09-11T05:40:12Z
html.description.abstractThe implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network, analyzing the attack process from launch to detection. For this demonstration, a penetration-testing tool is used to launch the attack. This attack will be monitored to detect its signature using a network monitoring tool, and this signature will then be used to create a rule which will trigger an alert in an Intrusion Detection System. This work highlights the importance of network security in telemetry applications and is critical to current and future telemetry networks as cyber threats are widespread and potentially devastating.


Files in this item

Thumbnail
Name:
ITC_2015_15-17-01.pdf
Size:
438.7Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record