Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available
(no registration required)

(529.95KB)


-- CSC-OpenAccess Policy
-- Creative Commons Attribution NonCommercial 4.0 International License
>> COMPLETE LIST OF JOURNALS

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria
A Security Architecture for Automated Social Engineering (ASE) Attacks over Fiber-Wireless (FiWi) Access Networks
Mohammad Zohirul Islam, Sarwarul Chowdhury
Pages - 233 - 243     |    Revised - 15-07-2012     |    Published - 10-08-2012
Published in International Journal of Engineering (IJE)
Volume - 6   Issue - 4    |    Publication Date - August 2012  Table of Contents
MORE INFORMATION
References   |   Abstracting & Indexing
KEYWORDS
Social Networking Sites (SNS), Automated Social Engineering (ASE), Hybrid Fiber-wireless (FiWi) Access Networks, WiMAX BS, EPON (ONU, OLT), ONU-BS
ABSTRACT
Future communication networks will integrate `SSS\' concepts such as social networking, social networking device, and social desktop. In this paper, we focus on applications over social networking sites (SNS). Due to emerging bandwidth-hungry applications over SNS, hybrid fiber-wireless (FiWi) access networks are a promising solution to mitigate the last mile bandwidth bottleneck. SNS are particularly vulnerable to Automated Social Engineering (ASE) attacks due to their powerful information gathering functionalities. We discuss how integrated FiWi access networks supporting SNS systems perform, and how they can deal with threats related to ASE. In addition, we explain how an ASE attack may be launched from different networking platforms and propose a security architecture for ASE attacks over FiWi access networks.
ABSTRACTING & INDEXING
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 TechRepublic 
5 Scribd 
6 SlideShare 
7 PdfSR 
REFERENCES
B. Potter, “Wireless Security's Future,” IEEE Security and Privacy Magazine, vol. 1,no. 4 , pp. 68-72, July/Aug. 2003.
E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. G.Anagnostakis, and E. P. Markatos, “Antisocial Networks: Turning a Social Network into a Botnet,” in Proc., 11th International Conference on Information Security, pp. 146-160,Taipei, Taiwan, Sept. 2008.
E. Dahlman, S. Parkvall, J. Skold, and P. Beming, “3G Evolution: HSPA and LTE for Mobile Broadband,” Second Edition, Academic Press, Oct. 2008.
J. Prat, “Next-Generation FTTH Passive Optical Network s: Research towards Unlimited Bandwidth Access,” Springer , 2008.
M. Hajduczenia, P. R. M. Inacio, H. J. A. Da Silva, M. M. Freire, and P. P. Monteiro, “On EPON Security Issues,” IEEE Communications Surveys and Tutorials, vol. 9, no. 1, pp. 68-83, 1st Quarter 2007.
M. Huber, “Automated Social Engineering Proof Of Concept,” Technical Report,SecLab, KTH, Stockholm, Sweden, March 2009.
M. Maier, N. Ghazisaidi, and M. Reisslein, “The Audacity of Fiber-Wireless (FiWi) Networks (Invited Paper),” in Proc., ICST ACCESSNETS, Las Vegas, NV, USA, Oct. 2008.
M. M´edard, D. Marquis, R. A. Barry, and S. G. Finn, “Security Issues in All-Optical Networks,” IEEE Network, vol. 11, no. 3, pp. 42-48, May/June 1997.
M. Nohlberg, S. Kowalski, and M. Huber, “Measuring Readi ness for Automated Social Engineering,” in Proc., 7th Security Conference, pp. 20.1-20.13, Las Vegas, NV, USA, June 2008.
N. Ghazisaidi, M. Maier, and C. M. Assi, “Fiber-Wireless (FiWi) Access Networks: A Survey,” IEEE Communications Magazine, vol. 47, no. 2, pp. 160-167, Feb. 2009.
P. D. Townsend, G. Talli, E. K. MacHale, and C. Antony, “Long-reach PONs,” in Proc., 7th International Conference on Optical Internet, pp. 1-2, Tokyo, Japan, Oct.2008.
S. Gangxiang, R. S. Tucker, and C. Chang-Joon, “Fixed Mo bile Convergence Architectures for Broadband Access: Integration of EPON and WiMAX,” IEEE Communications Magazine, vol. 45, no. 8, pp. 44-50, Aug. 2007.
S. K. Miller, “Facing the Challenge of Wireless Security ,” IEEE Computer, vol.34, no. 7, pp. 16-18, July 2001.
S. M. Devine, “Anti-social networking: exploiting the trusting environment of Web 2.0,”Network Security, vol. 2008, no. 11, pp. 4-7, Nov. 2008.
MANUSCRIPT AUTHORS
Mr. Mohammad Zohirul Islam
- Sweden
zohirul007@gmail.com
Mr. Sarwarul Chowdhury
- Canada


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS
 
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions