DNS Cache Poisoning/Honeypot Analysis Based on Data Exfiltration Using Stochastic Petri Nets Method to Enhance Cyber Security Hygiene

Authors

  • Akhigbe-Mudu Thursday Ehis Africa Institute of Science Administration and Commercial Studies Lome,Togo

DOI:

https://doi.org/10.54536/ajise.v1i1.453

Keywords:

Domain Name System, Deadlock, Exfiltration, Security Chain, Stochastic Petri nets

Abstract

According to some experts, organizations make investments of huge sum of dollars concerning firewalls, encryption, and other tightly closed access devices, yet it is all naught, considering that none regarding these solutions tackle the weakest link within the safety chain. That speech perfectly captures the present day stress experienced by skilled network protection specialists. Researchers’ threat detection techniques can pick up a lot of false positive alarms throughout the detection process; false positive alarms are accountable for company’s unneeded system lock down. A stochastic model is necessary to represent a communication system since the nature of the traffic between them is unpredictable. SPN was utilized in this study to build statistical model for networks with security chains. By permitting the formalization of both real-time and non-Markovian behavior, the new stochastic Petri net formalism improves model fidelity. This allowed us to see special structures within the stochastic processes produced by SPN models. We have applied this principle by proposing an effective simulation method that supports deadlock detection and easy-to-compute point estimates and confidence intervals. The method is novel because it can automatically detect hidden regenerative structures that do not conform to different simple conditions, and can be easily determined by analytical methods.

Downloads

Download data is not yet available.

References

Andrey Vishnevsky. Peter Klyucharev (2020). A Survey Game- Theoretic Approaches to Modeling Honeypots. Conference: Secure Information Technologies 2017 (BIT 2017): At Mouscow Russia.

Bakri, A., Alkbir, M. F. M., Awang, N., Januddi, F., Ismail, M. A., Ahmad, A. N. A., & Zakaria, I. H. (2021). Addressing the issues of maintenance management in SMEs: towards sustainable and lean maintenance approach. Emerging Science Journal, 5(3), 367-379.

Barylska, K., Koutny, M., Mikulski, Ł., & Piątkowski, M. (2018). Reversible computation vs. reversibility in Petri nets. Science of Computer Programming, 151, 48-60.

B. Camiña, R. Monroy, L. A. Trejo, and M. A. Medina-Pérez. (2016). “Temporal and Spatial Locality: an Abstraction for Masquerade Detection. IEEE Transactions on Information Forensics and Security 11(9), 2036–2051.

Balogh, Z.; Kuchárik, M.(2019). “Predicting student grades based on their usage of LMS moodle using Petri inets.” Appl. Sci., 9, 4211.

Chakraborty, S. (2019). “Analyzing Peer Specific Power Saving in IEEE802.11s Through Queuing petri nets: Some Insights and Future Research Directions”. IEEE Transactions on Wireless Communications,15(5), 3746–3754. https://ieeexplore.ieee.org/document/7404028.

Consuelo, N. (2020). “Advanced Design for Manufacturing of Integrated Sustainability “Off-Shore” and “Off-Site” Prototype - MVP “S2_HOME.”. Civil Engineering Journal, 6(9), 1752–1764.

Davison, P., Cameron, B., & Crawley, E. F., et al. (2020). Technology Portfolio Planning by Weighted Graph Analysis of System Architectures. Systems Engineering, 18(1), 45–58. https://doi.org/10.1002/sys.21287.

Dwyer, M., Cameron, B., & Szajnfarber, Z., et al. (2020). A framework for Studying Cost Growth on Complex Acquisition programs. Systems Engineering, 18(6), 568–583. https://doi.org/10.1002/sys.21328.

D.Dalla and J. Dheiba (2020). Exploration of Various Attacks and Security Measures related to the Internet of Things International Journal of recent Technology and Engineering, 9(2), 175-184

Dlamini, M.T., Venter, H.S., eloff, J.H., Eloff, M. (2020, September 8– October1). An Information Behaviour Lens. In proceeding of the Information Behavior Conference, Pretoria South Africa.

Datta D., Garg L., Srinvasan K., Inoue A., Reddy G.T., Reddy ,M.P.K., Ramesh K., Nasser N. (2021). Efficient Sound and Data Steganography Based secure Authentications System. Computers, Materials, and Continua, 67(1), 723-751. https://doi.org/10.32604/cmc.2021.014802.

Ellard D., Jones C., Manfredi V., Strayer W.T., Tapa B., Van welle M.and Jackson A. (2015). A Rebound: Decoy Routing on Symmetric Routes Via Error Messages”. In IEEE 40th Conference on Local Computer Networks (LCN) 2015, (pp. 91-99).

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Awais Rashid (2017). Data Exfiltration: A Review of External Attack Vectors and Counter Measures. International Journal of Networks and Computer Applications, 101(2). https://doi.org/10.1016/j.inea.2017.10.016

Frederick Weigang Pan and Matthew Caesar (2016).Salmon: Robust Proxy Distribution for Censorship Circumvention. Proceedings on Privacy Enhancing Technologies. 2016(4), 4-20. https://doi.org/10.1515/popsets-2016-0026.

Freeman, R.E., Phillips, R. and Sisodia, R. (2020), Tensions in Stakeholder Theory, Business and Society, 59(2), 213-231.

Gammal E.I Selim; Ezz El-Din Hemdan; Ahmed M. Shehatta; Nawal A. El-Fishawy (2021). An Efficient Machine Learning Model for Malicious Activities Recognition in Water-Based Industrial Internet of Things. Journal Security and Privacy, 4(3), 1-14. https://doi.org/10.1002/spy2.154.

Jan Komenda; Aiwen Lai; Jose Godoy-Soto; Sebastian Lahaye; Jean-Loius Boimond (2020). Modeling of Safe Time Petric Nets by Internal weighted Automata. IFAC paper online, 53 (4), 187-192. https://doi.org/10.1016/j.ifaco.2021.04.018.

Konuk, F.A. (2018). “Price fairness, satisfaction, and trust as antecedents of purchase intentions towards organic food, Journal of Consumer Behavior, 17(2),141-148

K.A. Shin (2019): Universal Forgery Attacks on remote Authentication Schemes for Wireless Body Area Networks Based on Internet of Things. IEEE Internet of Things Journal, 6(5), 9211-9212.

Liang, X.; Zhang, S.; Liu, Y.; Ma, Y.(2020). Information Propagation Formalized Representation of Micro-blog Network Based on Petri Nets. Sci. Rep., 2020(10), 1–20.

Leyi Shi; Yang Li; Haijie Feng (2018). Performance Analysis of Honeypot with Petri Nets. Information Theory and Methodology, 9(10), 245. https://doi.org/10.3390/info9100245.

Lama Alhathally; Mohammed A. Alzain; Jchad Al-Amri; Mohammed Baz; Mehedi Masud (2020). Cyber Security Attacks: Exploiting Weaknesses. International Journal of Recent Technology and Engineering (IJRTE), 8(5), 906-913.

Marcin Wojnakowski; Remiguisz Wisniewski; Grzegorz Bayzydio and Mateusz Poplawskwi (2021): “ Analysis of Safeness in a Petri Nets Based Specification of the Control Part of Cyber-physical systems. International Journal of Applied Mathematics and Computer Science, 31(4), 647-657. https://doi.org/10.34768/amcs-2021-0045.

Mohammed Y.F (2020). Network – Based detection and prevention System Against DNS-Based Attacks. https://doi.org/scholarworks.uark.etd/3970.

Manuel Cheminod; Luca Durante; Lucia Seno; Adriano Valenzano (2018). Performance Evaluation and Modelling of an Industrial Applications Layer Firewall. IEEE Transactions on Industrial Informatics, 14(5), 2159-2170. https://doi.org/10.1109/TII.2018.2802903.

Paradise, A., Shabtai, A., Puzis, R., Elyashar, A., Elovici, Y., Roshandel, M., & Peylo, C. (2017). Creation and management of social network honeypots for detecting targeted cyber attacks. IEEE transactions on computational social systems, 4(3), 65-79.

Panagiotis Radoglou-Gammaliks; Panagiotis Sariagiannidis, Eider Iturbe; Erkuden Rios, et al., (2021). Spear Siem: A security Information and Event Management System for the Smart Grid. Computer Networks, 193, 1-26. https://doi.org/10.1016/j.comnet.2021.108008.

P. Cazenave; M. Khifi-Bouassida; A. Togueyeni (2020). S3PMR Deadlock and Control with Partial Controllability and Observability. Journal of International Federation of Automatic Control. 15th IFAC Workshop on Discrete Event Systems WOOES 2020-Rio de janeiro, Brazil, 53(4), 173-179. https://doi.org/10.1016/j.ifaco.2021.04.017.

Pau Fonseca Casas; Daniel Lijia Hu: Antoni Guasch I Petit and Jaume Figueras Jove (2020). Simplifying The Verification of Simulation Models through Petri Nets to Flexsim Mapping, Applied sciences, 10(4), 1395. https://doi.org/10.3390/app10041395.

Qin M, Li ZW and Al-Ahmari AM (2015). Elementary-Siphon Based Control Policy for Flexible Manufacturing Systems with Partial Observability and Controllability of Transitions. Asian J. Control,17, 327–342.

Ruotian Liu; Rabah amour: Leonardo Brener; Isabel Demongidin (2020). Event Driven Control for Reaching a Steady State in Controlled Generalized Batches Petri nets. Journal of International Federation of Automatic Control, 53(4), 180-186. https://doi.org/10.1016/j.ifaco.2021.04.063

Sheetal Gokhale; Ashwini Dalvi and Irfan suddavatam (2020). Industrial Control Systems Honeypot: A formal Analysis of Conpot. International Journal of Computer Networks and Information Security, 12(6), 44-56. https://doi.org/10.5815/ijcnis.2020.06.04

Souravlas, S. I., & Roumeliotis, M. (2015). Petri net modeling and Simulation of Pipelined Redistributions for a Deadlock-Free System. Cogent Engineering, 2(1), 1–22.

Su, Z.; Qiu, M. (2019). Airport Surface Modeling and Simulation Based on Timed Coloured Petri net. Promet-Traffic -Traffico, 31, 479–490.

White, A., Karimoddini, A. and Karimadini, M. (2020). Resilient Fault Diagnosis Under Imperfect Observations—A need for Industry 4.0 Era, IEEE/CAA. Journal of Automat-ica Sinica, 7(5), 1279–1288

Wisniewski, R., Grobelna, I.and Karatkevich, A. (2020). Determinism in Cyber-Physical Systems Specified By interpreted Petri nets, Sensors, 1–22.

Xiaoyang Chen; Hongwei Huo; Jun Huan; Jeffrey Scott Vitter (2019). An Efficient Algorithm for Graph Edit Distance Computation. Knowledge Based Systems, 163, Retrieved 1st January 2019, 762-775. https://doi.org/10.1016/j.knosys.2018.10.002

Xia, C. and Li, C. (2021). Property Preservation of Petri Synthesis net Based Representation for Embedded Systems, IEEE/CAA. Journal of Automatica Sinica, 8(4), 905–915.

Yi-Nan Lin, Cheng-Ying Yang, Gwo-Jen Chiou, Sheng-Kuan Wang, Victor R.L. Shen, Yu-Ying Wang, Hai3 Hoang Bui & Jianzhi Wang. Caggiano Alessandra (Reviewing editor) (2022). Smart selection from petri net modeling tools for fast developing a manufacturing system, Cogent Engineering, 9(1). https://doi.org/10.1080/23311916.2021.2020609.

Yifan Hou and Kamel Barkaoui (2017). Deadlock Analysis and Control Based on Petri nets: A Siphon Approach Review. Advances in Mechanical Engineering, 9(5), 1-30. https://doi.org/10.1177/1687814017693542.

Yang, F., Wu, N., Qiao, Y., Zhou, M., Su, R. and Qu, T.(2018). Petri net-Based Efficient Determination of Optimal Schedules for Transport-Dominant Single-Arm Multi-cluster Tools, IEEE Access, 6, 355–365.

Zareef Mohammed (2022). Data Breach Recovery Areas: An Exploitation of Organization’s Recovery Strategies for Surviving Data Breaches. Organizational Cyber Security Journal, Practice, Process and People, 2(1), 41-59. https://doi.org/10.1108/OCJ.05.2021.0014

Downloads

Published

2022-08-24

How to Cite

Thursday Ehis, A.-M. . (2022). DNS Cache Poisoning/Honeypot Analysis Based on Data Exfiltration Using Stochastic Petri Nets Method to Enhance Cyber Security Hygiene. American Journal of Innovation in Science and Engineering, 1(1), 1–12. https://doi.org/10.54536/ajise.v1i1.453