Wednesday, June 24, 2020
Adding security against insider - Free Essay Example
Abstract Mobile ad hoc networks are collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. Security issues are more paramount in such networks even more so than in wired networks. Despite the existence of well-known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render the traditional solutions inapplicable. In particular these networks are extremely under threat to insider attacks especially packet dropping attacks. It is very difficult to detect such attacks because they comes in the category of attacks in mobile ad hoc networks in which the attacker nodes becomes the part of the network. In this research work we have proposed a two folded approach, to detect and then to isolate such nodes which become the part of the network to cause packet dropping attacks. First approach will detect the misbehavior of nodes and will identify the malicious activity in network, and then upon identification of nodes misbehavior in network other approach will isolate the malicious node from network. OMNET++ simulator is used to simulate and verify the proposed solution. Experimental results shows that E-SAODV (Enhanced Secure Ad hoc On Demand Distance Vector protocol) performs much better than conventional SAODV (Secure Ad hoc On Demand Distance Vector Protocol) Chapter 1 Introduction Overview Mobile Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. As there is no fixed infrastructure such as base stations for mobile switching. Nodes within each others range communicate directly via wireless links while those which are far apart rely on other nodes to transmit messages. Node mobility causes frequent changes in topology. The wireless nature of communication and lack of any security infrastructure raises several security problems. The following flowchart depicts the working of any general ad-hoc network. Features of Mobile Ad hoc Networks Based on the characteristics, Mobile Ad hoc Networks has following main features. Because of the limited energy supply for the wireless nodes and the mobility of the nodes, the wireless links between mobile nodes in the Ad hoc Network are not consistent for the communication participants. Due to the continuous motion of nodes, the topology of the mobile ad hoc network changes constantly, the nodes can continuously move into and out of the radio range of the other nodes in the ad hoc network, and the routing information will be changing all the time because of the movement of the nodes. Lack of incorporation of security features in statically configured wireless routing protocol not meant for Ad hoc environments. Because the topology of the Ad hoc Networks is changing constantly, it is necessary for each pair of adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of vulnerabilities in the statically configured routing protocol. Mobile Ad hoc Network Routing Protocols Routing in Mobile Ad hoc Networks faces additional challenges when compared to routing in traditional wired networks with fixed infrastructure. There are several well-known protocols that have been specifically developed to cope with the limitations imposed by Ad hoc networking environments. The problem of routing in such environments is aggravated by limiting factors such as rapidly changing topologies, high power consumption, low bandwidth and high error rates [1]. Most of the existing routing protocols follow two different design approaches to confront the inherent characteristics of Ad hoc networks namely Proactive Routing Protocols, Reactive Routing Protocols. Proactive Routing Protocols Proactive ad hoc routing protocols maintain at all times routing information regarding the connectivity of every node to all other nodes that participate in the network. These protocols are also known as Table-driven Ad hoc Routing Protocols. These protocols allow every node to have a clear and consistent view of the network topology by propagating periodic updates [1]. Therefore, all nodes are able to make immediate decisions regarding the forwarding of a specific packet. Two main protocols that fall into the category of proactive routing protocols are Destination-Sequenced Distance-Vector (DSDV) protocol [2] and the Optimized Link State Routing (OLSR) protocol [3]. Reactive Routing Protocols An alternative approach to the one followed by Proactive Routing Protocols also known as source-initiated on-demand routing, is Reactive Routing Protocols. According to this approach a route is created only when the source node requires one to a specific destination. A route is acquired by the initiation of a route discovery function by the source node. The data packets transmitted while a route discovery is in process are buffered and are sent when the path is established. An established route is maintained as long as it is required through a route maintenance procedure. The Ad hoc On-demand Distance Vector (AODV) routing protocol [4], Temporally Ordered Routing Algorithm (TORA) [5] and the Dynamic Source Routing protocol [6] are examples of this category of protocols. Security issues in Mobile Ad hoc Routing Protocols Any routing protocol must encapsulate an essential set of security mechanisms. These are mechanisms that help prevent, detect, and respond to security attacks. We can classify these major security goals into five main categories, which need to be addressed in order to maintain a reliable and secure ad-hoc network environment. Confidentiality Confidentiality is the protection of any information from being exposed to unintended entities. In ad-hoc networks this is more difficult to achieve because intermediates nodes receive the packets for other recipients, so they can easily eavesdrop the information being routed. Availability Availability means that a node should maintain its ability to provide all the designed services regardless of the security state of it . This security criterion is challenged mainly during the denial-of-service attacks, in which all the nodes in the network can be the attack target and thus some selfish nodes make some of the network services unavailable, such as the routing protocol or the key management service. Authentication Authentication assures that an entity of concern or the origin of a communication is what it claims to be or from. Without which an attacker would impersonate a node, thus gaining unauthorized access to resource and sensitive information and interfering with operation of other nodes. Integrity Integrity guarantees the identity of the messages when they are transmitted. Integrity can be compromised through malicious and accidental altering. A message can be dropped, replayed or revised by an adversary with malicious goal, which is regarded as malicious altering while if the message is lost or its content is changed due to some failures, which may be transmission errors or hardware errors such as hard disk failure, then it is categorized as accidental altering. Non-Repudiation Non-repudiation ensures that sending and receiving parties can never deny their sending or receiving the message. In order to achieve the overall goal of Mobile Ad hoc Network security, above five mechanisms must be implemented in any ad-hoc networks so as to ensure the security of the transmissions along that network. Secure Ad hoc Routing As discussed earlier over the past decade, many Ad hoc routing protocols have been proposed in literature. Among them the most widely used are AODV (Ad hoc On Demand Distance Vector) [4] and DSR (Dynamic Source Routing) [2] which comes in the category of re-active routing protocols of Ad hoc Networks. All of these protocols have been studied extensively. But as there were no security considerations in the original design of these protocols, these protocols remain under threat from the attackers. The main assumption of these protocols was that all participating nodes do so in good faith and without maliciously disrupting the operation of the protocol. However the existence of malicious entities can not be disregarded in the systems especially the environment used for Ad hoc Networks. To overcome the security vulnerabilities in existing routing protocols, many security enhancements in these protocols have been proposed but unfortunately these secure Ad hoc Routing Protocols were eith er designed for a particular protocol or to address a specific problem operation of the protocol. For example SAODV (Secure Ad hoc On Demand Distance Vector Protocol) [7] was proposed to secure AODV (Ad hoc On Demand Distance Vector) protocol, Ariadne [10] was proposed to protect DSR (Dynamic Source Routing) protocol, ARAN [7] was proposed to protect the Ad hoc Routing in general while SEAD [8] was proposed to protect the DSDV (Destination Sequence Distance Vector Routing) protocol. The purpose of SAR [9] (Security Aware Routing) was also to protect the Routing in Ad hoc Networks. Problem definition Thus ongoing studies on MANETs pose many challenging research areas including MANETs security. Since MANETs are made up entirely of wireless mobile nodes, they are inherently more susceptible to security threats compared to fixed networks [11]. Access to wireless links is virtually impossible to control thus adverse security events such as eavesdropping, spoofing and denial of service attacks are more easily accomplished. These security risks must be reduced to an acceptable level while maintaining an acceptable Quality of Service and network performance. However, in order to work properly, the routing protocols in MANETs need trusted working environments, which are not always available. There may be situations in which the environment may be adversarial. For example some nodes may be selfish, malicious, or compromised by attackers. Most of the work done regarding network security in MANETs focuses on preventing attackers from entering the network through secure key distribution an d secure neighbor discovery [10],[12]. But these schemes become ineffective when the malicious nodes have entered the network, or some nodes in the network have been compromised. Therefore, threats from compromised nodes inside the network are far more dangerous than the attacks from outside the network. Since these attacks are initiated from inside the network by the participating malicious nodes which behave well before they are compromised, it is very hard to detect these attacks. Keeping in view the security threats faced by MANETs we focus on Packet Dropping Attack which is a serious threat to Mobile Ad hoc Networks. Although many research efforts have been put on secure routing protocols but the attacks like packet dropping is not adequately addressed. We study the packet dropping attack in which a malicious node intentionally drops the packets they received. Unlike all previous researches which attempt to tolerate Packet Dropping Attacks, our work makes the first effort to detect the malicious activity and then identify the malicious or compromised nodes in the network. Research Objective The fundamental objective of this research is to discuss the security attacks faced by Mobile Ad hoc Networks specially insider attacks and to review the security in existing routing protocols especially secure routing protocols in MANETs. We particularly focus on packet dropping attack which is a serious threat to Mobile Ad hoc Networks. A novel security enhancement scheme to address packet dropping attack has been proposed. Thesis Organization Chapter 2 provides a brief introduction of security threats faced by Mobile Ad hoc Networks and secure routing to address these attacks. Chapter 3 discusses about the related work and flaws identified in the related work. Chapter 4 presents the possible solutions to address the packet dropping attack in Mobile Ad hoc Networks. Chapter 5 includes the implementation of proposed mechanisms and Results of the proposed mechanism and the thesis is concluded in Chapter 6. Chapter 2 Security Threats and Secure Ad hoc Routing Protocols Introduction This chapter includes the threats and types of attacks faced by Mobile Ad hoc Networks. Secure Ad hoc routing protocols like SAODV [7] (Secure Ad hoc On Demand Distance Vector), SAR [16] (Security Aware Routing), and ARAN [9] (Authenticated Routing for Ad hoc Networks) etc and how these protocols are still vulnerable to attacks, are discussed in this chapter. Types of attacks in MANETs There are numerous kinds of attacks in the mobile ad hoc networks, almost all of which can be classified into two types, External Attacks and Insider Attacks. External Attacks External Attacks are those attacks, in which the attacker aims to cause congestion, propagate fake routing information or disturb nodes from providing services. External attacks are similar to the normal attacks in the traditional wired networks such that the adversary is in the proximity but not a trusted node in the network, therefore, this type of attack can be prevented and detected by the security methods such as authentication or firewall, which are relatively conventional security solutions. Internal or Insider Attacks Due to the invasive nature and open network media in the mobile ad hoc network, internal also known as insider attacks are more dangerous than the external attacks because the compromised or malicious nodes are originally the legitimate users of the Ad hoc network, they can easily pass the authentication and get protection from the security mechanisms. As a result, the adversaries can make use of them to gain normal access to the services that should only be available to the authorized users in the network, and they can use the legal identity provided by the compromised nodes to conceal their malicious behaviors. Therefore, more attention should be paid to the internal attacks initiated by the malicious insider nodes when we consider the security issues in the mobile ad hoc networks. Internal or insider nodes when become part of the network can misuse the network in the following ways Packet Dropping A malicious node can attack at its level or at lower levels. Particularly in the context of Packet Dropping Attack, within a trust level, a malicious node or any other node which aims at saving its resources or intentionally launching a attack can successfully drop packets without being noticed and can get services from other nodes for forwarding its own packets. Node Isolation An internal malicious node can prevent nodes from communicating with any other node. Route Disruption A malicious node can break down an existing route or prevent a new route from being established. Route Invasion An inside attacker adds itself between two endpoints of a communication channel. Attacks based on modification A very simplest way for a malicious node to disturb the operations of an ad-hoc network is to perform an attack based on modification. The only task the malicious or compromised node needs to perform is to announce better routes than the ones presently existing. This kind of attack is based on the modification of the metric value for a route or by altering control message fields. There are various ways to perform this type of attacks; some of them are discussed below Altering the Hop Count This attack is more specific to the AODV [4] protocol wherein the optimum path is chosen by the hop count metric. A malicious node can disturb the network by announcing the smallest hop count value to reach the compromised node. In general, an attacker would use a value zero to ensure to the smallest hop count. Changing the Route Sequence Number When a node decides the optimum path to take through a network, the node always relies on a metric of values, such as hop count delays etc. The smaller that value, the more optimum the path. Hence, a simple way to attack a network is to change this value with a smaller number than the last better value. Altering Routing Information This type of attack leads network toward Denial of Service (DoS) attack. For example in a situation where a node M wants to communicate with node S. At node M the routing path in the header would be M-N-O-P-Q-R-S. If N is a compromised node, it can alter this routing detail to M-N-O-P. But since there exists no direct route from O to P, P will drop the packet. Thus, A will never be able to access any service from P. This situation leads the network towards a DoS attack. Impersonation Attacks Impersonation is also known as spoofing. In this type of attack the malicious node hides its IP address or MAC address and uses the addresses of other nodes present in the network. Since current ad-hoc routing protocols like AODV [4] and DSR [6] do not authenticate source IP address. By exploiting this situation a malicious node can launch variety of attacks using spoofing. For example in a situation where an attacker creates loops in the network to isolate a node from the remainder of the network, the attacker needs to spoof the IP address of the node he wants to isolate from the network and then announce new route to the others nodes. By doing this, he can easily modify the network topology as he wants. Fabrication Attacks Fabrication attacks can be classified into three main categories. Detection is very difficult in all of these three cases. Routing table poisoning Routing protocols maintain tables which hold information regarding routes of the network. In routing table poisoning attacks the malicious nodes generate and send fabricated signaling traffic, or modify legitimate messages from other nodes, in order to create false entries in the tables of the participating nodes. For example, an attacker can send routing updates that do not correspond to actual changes in the topology of the ad hoc network. Routing table poisoning attacks can result in selection of non-optimal routes, creation of routing loops and bottlenecks. Route Cache Poisoning This type of attack falls in the category of passive attacks that can occur especially in DSR [6] due to the promiscuous mode of updating routing tables. This type of situation arises when information stored in routing tables is deleted, altered or injected with false information. A node overhearing any packet may add the routing information contained in that packets header to its own route cache, even if that node is not on the path from source to destination. The vulnerability of this system is that an attacker could easily exploit this method of learning routes and poison route caches by broadcast a message with a spoofed IP address to other nodes. When they receive this message, the nodes would add this new route to their cache and would now communicate using the route to reach the malicious node. Rote Error Messages fabrication This attack is very common in AODV [4] and DSR [6], because when nodes move these two protocols use path maintenance to recover the optimum path. The weakness of this architecture is that whenever a node moves, the closest node sends an error message to the other nodes so as to inform them that a route is no longer accessible. If an attacker can cause a DoS attack by spoofing any node and sending error messages to the all other nodes. As a result malicious node can separate any node quite easily. Eavesdropping Eavesdropping is another kind of attack that usually happens in the mobile ad hoc networks. The goal of eavesdropping is to obtain some confidential information that should be kept secret during the communication. This information may include the location, public key, private key or even passwords of the nodes. Because such data are very important to the security state of the nodes, they should be kept away from the unauthorized access. Secure Ad hoc Routing Protocols Many solutions have been proposed for secure routing in ad hoc networks, in order to offer protection against the attacks discussed earlier. These proposed solutions are either completely new stand-alone protocols, or in some cases incorporations of security mechanisms into existing ones (like DSR [6] and AODV [4]). In order to analyze the proposed solutions and how they are still vulnerable to attacks we classified them into two main categories based on asymmetric cryptography and symmetric cryptography. Asymmetric Cryptographic Solution Protocols that use asymmetric cryptography to secure routing in mobile ad hoc networks require the existence of a universally trusted third party. This trusted third party can be either online or offline. The trusted third party issues certificates that bind a nodes public key with a nodes persistent identifier. Authenticated Routing for Ad hoc Networks ARAN [9] falls in this category of secure Ad hoc routing protocols; many of the other protocols presented in other categories that use asymmetric cryptography operate in a similar manner and have similar requirements. Authenticated Routing for Ad hoc Networks ARAN The Authenticated Routing for Ad hoc Networks (ARAN) proposed in [9] is a standalone solution for secure routing in ad hoc networking environments. ARAN use digital certificates and can successfully operate in the managed open scenario where no infrastructure is pre-deployed. The basic mechanism used in ARAN is certification that is achieved through the existence of a trusted certification authority (CA). All nodes are supposed to know their public key from the certification authority and also the public key of server. Prior to entering into the network, each node has to apply for a certificate that is signed by the certificate server. ARAN accomplishes the discovery of routes by a broadcast message from source node which is replied in a unicast manner. This route discovery of the ARAN protocol begins with a node broadcasting to its neighbors a route discovery packet (RDP). The RDP includes the certificate of the initiating node, a nonce, a timestamp and the address of the destinat ion node. Furthermore, the initiating node signs the RDP. Each node validates the signature with the certificate, updates its routing table with the neighbor from which it received the RDP, signs it, and forwards it to its neighbors after removing the certificate and the signature of the previous node (but not the initiators signature and certificate). The signature prevents malicious nodes from injecting arbitrary route discovery packets that alter routes or form loops [13]. The destination node eventually receives the RDP and replies with a reply packet (REP). The REP contains the address of the source node, the destinations certificate, a nonce, and the associated timestamp. The destination node signs the REP before transmitting it. The REP is forwarded back to the initiating node by a process similar to the one described for the route discovery, except that the REP is unicasted along the reverse path. The source node is able to verify that the destination node sent the REP by ch ecking the nonce and the signature. Figure 2 illustrates the process of route discovery in ARAN. All messages are authenticated at each hop from source to destination as well as on the reverse path. Due to heavy computation involved with the certificates, ARAN is vulnerable to many attacks e.g. DOS attacks. In situation when there are no malicious nodes in the network the load involved in the routing process force the legitimate nodes to drop the packets in order to save their resources. Symmetric Cryptography Solutions Symmetric cryptographic solutions rely solely on symmetric cryptography to secure the function of routing in wireless ad hoc networks. The mechanisms utilized is hash functions and hash chains. A one-way hash function is a function that takes an input of arbitrary length and returns an output of fixed length [14]. As hash functions are especially lightweight when compared to other symmetric and asymmetric cryptographic operations, they have been extensively used in the context of securing ad hoc routing. Secure Ad hoc On-demand Distance Vector Protocol (SAODV) The Secure Ad hoc On Demand Distance Vector (SAODV) [7] addresses the problem of securing a MANET network. SAODV is an extension of AODV[4] routing protocol that can be used to protect the route discovery mechanism by providing security features like authentication, integrity and non-repudiation. It uses digital signatures to authenticate the non-mutable fields of the message, and hash chains to secure the hop count information (the only mutable field in message) in both RREQ and RREP messages. The SAODV scheme is based on the assumption that each node possesses certified public keys of all network nodes . In order to facilitate the transmission of the information required for the security mechanisms, SAODV defines extensions to the standard AODV message format. These SAODV extensions consist of the following fields. The hash function field identifies the one-way hash function that is used. The field max hop count is a counter that specifies the maximum number of nodes a packet is allowed to go through. The top hash field is the result of the application of the hash function max hop count times to a randomly generated number, and finally the field hash is this random number. When a node transmits a route request or a route reply AODV packet it sets the max hop count field equal to the time to live (TTL) field from the IP header, generates a random number and sets the hash field equal to it, and applies the hash function specified by the corresponding field max hop count times to the random number, storing the calculated result to the top hash field. Moreover, the node digitally signs all fields of the message, except the hop count field from the AODV header and the hash field from the SAODV extension header. An intermediate node that receives a route request or a route reply must verify the integrity of the message and the hop count AODV [4] field. The integrity requirement is accomplished by verifying the digital signature. The hop count field is verified by comparing the result of the application of the hash function max hop count minus hop count times to the hash field with the value of the top hash field. Before the packet is re-broadcasted by the intermediate node the value of the hash field is replaced by the result of the calculation of the one-way hash of the field itself in order to account for the new hop. In SAODV route error messages (RERR) that are generated by nodes that inform their neighbors that they are not going to be able to route messages to specific destinations are secured using digital signatures. A node that generates or forwards a route error message cryptographically signs the whole message, except the destination sequence numbers. Although SAODV provides reasonable security to MANETs routing, but it is still vulnerable to distance fraud attack [15] in which the forwarding node fails to increment the route metric because in SAODV there is no enforcement to do so. Further there is no method to detect the malicious nodes and DOS attacks because in SAODV it is assumed that DOS attacks are restricted to physical layer, but this assumption failed when colluding malicious nodes drop packets during the route discovery process. Security Aware Routing (SAR) SAR [16] (Security Aware Routing) is an extension to existing on demand routing protocols and used where nodes are grouped on the basis of trust level. In SAR each node has different security level which assigns them different trust levels. Two nodes can only communicate with each other if they have equal or greater trust values. If a node has lower security level it simply discards the packet. In case there is no node in the network with the desired level then communication cannot take place or we can say that, that particular packet cant be forwarded unless its security level is lowered. By exploiting this condition a malicious node can attack at its level or at lower levels. Particularly in the context of Packet Dropping Attack, within a trust level, a malicious node or any other node which aims at saving its resources or intentionally launching a attack can successfully drop packets without being noticed and can get services from other nodes for forwarding its own packets. SAR also fails in the situations of secure routing in general because it only focuses on the situations in which certain groups are assumed to be trustworthy. Conclusion From the above discussion, we observe that all Secure Ad hoc routing protocols are still vulnerable to many attacks. Although proposed techniques provide security against external attacks, insider attacks are still an open issue in MANETs. Chapter 3 Literature Review Introduction Many solutions have been proposed to prevent selfishness in MANETs. The main goal of all the schemes proposed in the literature is to make decisions regarding trustworthy entities and to encourage behavior that leads to increasing trust. In this section we discuss some of the solutions presented in the literature in order to detect the malicious nodes in the network in context of packet dropping attack. Watchdog and Pathrater In [17] Marti el al, proposed a mechanism called as watchdog and pathrater on DSR[6] to detect the misbehavior of nodes in MANETs. Nodes in this scheme operate in a promiscuous mode. The watchdog monitors one hop neighbor by overhearing the medium to check whether the next neighbor forwards the packet or not. It also maintains a buffer of recently sent packets. If a data packet remains in the buffer too long, the watchdog declares the next hop neighbor to be misbehaving. Every node that participates in the ad hoc network employs the watchdog functionality in order to verify that its neighbors correctly forward packets. When a node transmits a packet to the next node in the path, it tries to promiscuously listen if the next node will also transmit it. Furthermore, if there is no link encryption utilized in the network, the listening node can also verify that the next node did not modify the packet before transmitting it . The watchdog of a node maintains copies of recently forwarded packets and compares them with the packet transmissions overheard by the neighboring nodes. Positive comparisons result in the deletion of the buffered packet and the freeing of the related memory. If a node that was supposed to forward a packet fails to do so within a certain timeout period, the watchdog of an overhearing node increments a failure rating for the specific node. This effectively means that every node in the ad hoc network maintains a rating assessing the reliability of every other node that it can overhear packet transmissions from. A node is identified as misbehaving when the failure rating exceeds a certain threshold bandwidth. The source node of the route that contains the offending node is notified by a message send by the identifying watchdog. As the authors of the scheme note, the main problem with this approach is its vulnerability to blackmail attacks. The pathrater selects the path with the highest metric when there are multiple paths for the same destinati on node. The algorithm followed by the pathrater mechanism initially assigns a rating of 1.0 to itself and 0.5 to each node that it knows through the route discovery function. The nodes that participate on the active paths have their ratings increased by 0.01 at periodic intervals of 200 milliseconds to a maximum rating of 0.8. A rating is decremented by 0.05 when a link breakage is detected during the packet forwarding process to a minimum of 0.0. The rating of -100 is assigned by the watchdog to nodes that have been identified as misbehaving. When the pathrater calculates a path value as negative this means that the specific path has a participating misbehaving node. The authors suggest that negative node ratings should be slowly incremented in order to avoid permanent isolation of nodes that suffer from malfunctions or overloads; however such a mechanism has not been implemented. But watchdog technique may fail to detect misbehavior in the presence of ambiguous collisions, receiv er collisions , limited transmission power, false misbehavior and partial dropping [17]. CONFIDANT In [18] Buchegger proposed a protocol CONFIDENT which also attempts to detect the malicious nodes in ad hoc networks. Monitor, Reputation System, Path Manager and Trust Manager are main components of CONFIDANT protocol. Monitor observes all of its neighbors for any malicious behavior. If any one of them is misbehaving, the reputation system is invoked. The Reputation System is responsible for managing a table which holds the entries for each node and its ratings. These ratings can change according to a function that assigns different rates to the type of behavior detected. If the rating of a malicious or misbehaving node exceeds from certain threshold value then Path Manager takes action against such node. Path Manger deletes this misbehaving node and generates an ALARM to Trust Manager. ALARM messages are forwarded to other friends and route initiators. The problems in CONFIDANT protocol comes with the Trust Manager that how he will maintain the friends list and what will be the c riteria for threshold value. The attacker can also exploit this overall situation and can generate false ALARMS. Further there is no criteria if two friends declare each other misbehaving through ALARM messages. Moreover, CONFIDANT protocol only supports the negative experiences associated with a node and each entry in identified attackers list maintained by a node is associated with a timer. When this timer expires this node again becomes legitimate node in network. Conclusion From above discussion it is obvious that all the solutions proposed in the literature still lack deficiencies. Most of these approaches are either designed for a specific protocol or to address a particular problem. Further, node misbehavior in MANET environment is still an open issue. Thus, there is a strong need to pay attention in this area to mitigate node misbehavior. Chapter 4 Proposed Solution Introduction Many defense mechanism have been proposed against malicious node behavior detection, however from previous discussion it is obvious that these approaches still lack some deficiencies. Thus with our observation that all the previously discussed protocols are incapable of protecting against insider attacks such as malicious packet dropping, we propose our solution to address these kind of attacks.. This chapter discusses our proposed security mechanism that how we can detect and then isolate these kind of misbehaving nodes from the network. A two folded solution has been proposed to first detect and then to isolate the misbehaving node from the network. Proposed Methodology In this section, proposed solution to address the Packet Dropping Attack in MANETs is described. This proposed mechanism can be implemented on top of any source routing algorithm e.g. AODV [4] and SAODV [7]. With the observation that SAODV [7] is unable of protecting insider node misbehavior such as packet dropping, we propose an enhancement to SAODV routing protocol. Since in SAODV, all RREQ, RREP and RERR packets are signed by the sender so malicious node cannot forge them. The only possible attack that will substantially affect propagation of these packets is to drop the packet. Malicious activity detection and isolation The proposed solution is two folded. Malicious activity detection and Identification of malicious node. Proposed mechanism makes the first effort to detect the malicious activity in the network and then identify the malicious or compromised nodes in the network. This new mechanism does the malicious node misbehavior detection using information from the other neighboring nodes. Assumptions The assumptions of proposed scheme are, All the nodes in the network will be in promiscuous mode. Attackers do not work in the form of groups as it is assumed that there is no more than one misbehaving node on an active path. Malicious activity detection In order to find the malicious or compromised node in the network it has to be identified that is there any malicious activity took place in the network or not. Based on this malicious activity detection the other approach will identify that exactly which node is misbehaving. D-ACK In order to find a malicious or compromised node in the network we assume that there is an active route established between source node S and destination D using the intermediate nodes say N1, N2,N3 and N4 and all the necessary steps require to establish this route has been performed as shown in the figure below. Now during packet forwarding every intermediate node is responsible for con?rming that the packet was received by the next hop. In order to ensure that every intermediate node has received data packet successfully a Data Acknowledgement mechanism has been introduced which we called here D-ACK. D-ACK Operation Now when source node S forwards a packets for destination D through intermediate nodes N1,N2,N3 and N4 , source node S has no way of knowing that packet reached at destination D or not and if that packet is dropped by any intermediate node, exactly which intermediate node has dropped that packet. In our proposed mechanism when source node S forwards any data packet for destination D, all intermediate nodes will send back a D-ACK packet to its source node. For example if at first step source node forwards a packet to N1, it will send back a D-ACK packet to source node S. Further when packet will reach at N2, it will also send back an D-ACK packet to Source node S through N1. Case-I In an ideal situation when there is no malicious node present in the active route path , all intermediate nodes will send back their D-ACK packets to source node to inform that data packets has reached successfully up to that node. Thus source node S will remain updated until packet will successfully reach to its destination D. This operation is shown in figure 4.2. Case-II Suppose in a situation, when packet reaches at intermediate node N1, it sends back its D-ACK to source node S informing that data packet has reached successfully. Source node thus source node S will never receive a D-ACK packet from N2. Upon not receiving a D-ACK packet source node S will retransmit that packet after a specific interval of time which we call here T-interval. Since node N2 is behaving maliciously, it will again drop the packet. Source node S will retransmit the packet again after T-interval up to a certain threshold which we call here Tmax (maximum threshold value). After this maximum threshold value Tmax, now source node S will broadcast a packet to declare the malicious activity in the network because until now source node S upon not receiving D-ACK packet comes to know that one of its intermediate nodes is misbehaving. Scenario in which N2 drops packets and not sending its D-ACK to source node S is shown in the figure 4.3. Case III In another situation in which when a packet is forwarded to its destination D by source node S through its intermediate nodes N1, N2, N3 and N4. When this packet reaches at N1, it forwards the packet to its next hope N2and sends back its D-ACK to source node S. Node N2 receives the packet, forward it and send back its D-ACK to source node S via N1. Now source node expects D-ACK from N3 but when this packet reaches at N3 , it sends back its D-ACK for source node, at this point say node N1 starts behaving as a malicious node , it will drop the D-ACK packet of node N3 which it receives from N2. As source node was expecting D-ACK from N3, upon not receiving D-ACK he will assume that node N3 is behaving as malicious or compromised node but actually node N1 is doing this activity. Although source node S cannot confirm that exactly which node is misbehaving, it can still observe an activity that one of its intermediate node is misbehaving. This whole scenario is shown in the figure below. Discussion We have discussed three different scenarios in which a malicious or compromised node can drop a data packet or a D-ACK. Although source node S do not know that exactly which node is misbehaving , through this proposed activity detection mechanism source node S comes to know that there is some malicious activity took place in the network. Based on this activity, second approach will detect exactly which node is compromised or behaving intentionally as malicious node. Identification of malicious node Since a malicious activity has already been observed in the network, our second approach will detect exactly which node is misbehaving. Detection mechanism As all the nodes in the network are in promiscuous mode , nodes like N8, N9, N11, N19 lie in the transmission range of active route can hear all the packets coming into and out of the nodes of active route as shown in the figure below. For example as shown in Fig, there is an active route between source node S and destination D with N1, N2, N3 and N4 as intermediate nodes. Some nodes near to the active path like N8, N9,N11, N19 lie in the intersection of ranges of node N1 and N2. These nodes can receive all packets sent by N1 to N2 because they are in transmission range of N1 and can also receive every packet forwarded by N2, since they also lie in the transmission range of N2. From our assumptions that all the nodes in the network lie in promiscuous mode and will be ready to receive any packet. These nodes count number of packets coming into and going out of N2. Every node in this same range maintains a list of sent and dropped packets. Once the total number of dropped packets reaches the maximum threshold (Tmax), the monitoring node will broadcast a packet to all their neighbors. This packet contains malicious nodes id, senders id with senders signature. Broadcast message format Format of the broadcast message to declare any misbehaving node as malicious node is shown below. This message contains sender ID (i.e. monitoring node), misbehaving node ID, and monitoring node signature. Blacklist maintenance The purpose of this notification packet is to advertise a malicious node in the network and hence to make this node as Blacklisted in routing table of all its neighbor nodes. This notification message is sent to neighbors of the nodes in range, which in this case are node N8, N11 and N19. Assume node N8 found node N1 crossing the threshold of dropped packets (Td), so it sends a notification packet to all its neighbors. Similarly node N11which is also in the same range as of N8 will see the same behavior from N1 and forward a same notification packet to their neighbors. When all the neighbors of N1 receive this notification packet signed by either N8 or N11, these neighboring nodes will break their links with N1 and isolate it from the network. In future all the nodes in the network before establishing a new route will consult their blacklist to add any node into active route. Benefits of malicious activity detection Now at this stage we can justify the benefit of using malicious activity detection before using the second approach which actually detects that which node is misbehaving. Suppose in a situation when there is no malicious node is present in the path of active route, any malicious node which actually is not the part of active route but it is in the transmission range of nodes of active route can broadcast a packet to declare a legitimate node as malicious node. In this situation source node S has no way to decide and check the authenticity of that node, but in the presence of malicious activity detection mechanism, source node already knows that there is some activity took place in the network, thus if source node did not notice such activity and secondly any other node in the same range of active route did not broadcast such packet , source node S and other nodes present in the network will consider that node as malicious node. Conclusion A novel approach to detect malicious nodes in the network has been proposed. This approach makes its best effort to detect malicious activity and then isolate the malicious node from the network. Our proposed mechanism can be deployed on top of any source routing algorithm like SAODV. As digital signature and hash chain mechanism is already developed in SAODV, this approach will mitigate the threats of insider attacks e.g. packet dropping attack in MANETs. Chapter 5 Results and Analysis Introduction This chapter describes the implementation and effectiveness of our proposed scheme. The primary purpose of the simulation is to verify the contents of our proposed mechanism, described in Chapter 4. It is an important contribution for security issues in Mobile Ad Hoc Networks that will be used as a basis for further development work and experimentation on the behavior of malicious nodes present in MANETs. Simulator Several simulators are available for simulation and testing of protocols and algorithms. We discuss some of them here. Network Simulator2 (NS-2) Ns-2 is probably the most popular and network simulator; however, it does need advanced skills to perform a meaningful simulation. It focuses on the ISO/OSI model simulation. GloMoSim GloMoSim stands for Global Mobile Information Systems Simulation Library that currently provides only protocols for the simulation of pure wireless networks. SENSE SENSE is a specific simulator for the simulation of sensor networks. The simulation capacity depends on the communication pattern of the networks, which could drop to an upper limit of 500 nodes. Shawn Shawn is a new simulator developed for the simulation of large scale networks, which currently needs to be further developed, and provide more technical supports and contributed models. OMNeT++ OMNeT++ is a frequently used simulator for Mobile and Sensor networks, can run on both Microsoft Windows and Unix OS using various C++ compilers. The modular simulation model allows users to reflect the logical structure of an actual system in the flexible hierarchical modular structure. Various module parameters allow users to control every module using either the command line interface or the graphical user interface (GUI). The simulator also provides abundant base function modules called simple modules that are programmed in C++ using the simulation library. An advanced GUI makes the inside of modules and the process of simulation execution visible and controllable by users. Components of OMNeT++ simulation The following components are the basic elements to run an OMNeT++ simulation. The configuration file, usually called omnetpp.ini, is firstly processed by the program when a simulation is run. This file contains the settings needed for the execution of a simulation, values of model parameters, etc. Module and topology properties are described in .ned files, which are parameters, gates etc. Message definitions are user-defined and will be translated into C++ classes. Simple modules sources are programmed in C++ files, which are the functioning modules of a simulation. The decision to select OMNeT++ as the simulator in the present work is supported by the following considerations. Object-oriented Language C++ C++ is probably the most popular object oriented language that just caters to the concept of modular simulation; in addition, C++ is one of the fundamental computer languages, easy to start and use. Modular Simulation Structure Modular structure is highly flexible; modules from different model packages can be modified and combined to function freely, as well as your own modules. Excellent Technical Support There are abundant models on OMNeT++ website contributed by the users all over the world. The forum and the news group of OMNeT++ provide effective interaction, help and support. Free Software OMNeT++ is currently free for academic and non-profit use. The commercially supported licensed version, OMNEST, can be purchased from OMNEST Global, Inc. Simulation Methodology We simulated SAODV routing protocol with the security enhancement of our proposed mechanism to protect intermediate packet dropping attack. Simulation is carried out with 50-200 mobile nodes moving in a 500 x 500 m flat area. Each node transmission range is 250 m. The IEEE 802.11 MAC layer is used. A random way point mobility model is assumed with a maximum speed of 20 m/sec. For the communication, CBR transfers between pair of nodes. Table below summaries the parameters used for simulation. Modification The SAODV standard provides many optional operations to make the protocol as adaptable and flexible as possible. However, implementing all of the operations is complicated and unnecessary. In our simulation we modified the basic options suitable for an ad hoc network. HELLO Message HELLO messages are exchanged between neighbors to check the status. In this simulation, a self HELLO message is scheduled to initiate the simulation. ACK Message We call this ACK messages as DACK which is used to confirm the correct delivery of both DATA message, while SAODV standard uses it only for a RREP confirmation. D-ACK Message Format On successful reception of a data packet, an intermediate node replies with a DACK packet to its source node containing digital signature and sequence number informing that it has successfully received the DATA packet. Blacklist A blacklist is used to block misbehaving neighbor nodes. A node inserts a misbehaving node in the blacklist if it can not receive any acknowledgment after a number of tries. This blacklist is used as a reference in future to establish any new route. Results and Analysis We conduct several tests in order to analyze the effectiveness of proposed mechanism. Total dropped packets At first we carried out a simulation to determine the amount of packets that are dropped by malicious nodes from the total number of packets. Packet drop ratio with no malicious nodes In scenario-I, we simulated standard SAODV, with no malicious nodes present in the network. Simulation is carried out with the variation of different time intervals. Packet delivery ratio vs simulation time graph shows that almost all the packets delivered to their destination successfully. Packet drop ratio with malicious nodes In scenario-II, we simulated standard SAODV in the presence of malicious nodes present in the network. Traffic analysis was done for both TCP and UDP. UDP achieved better results as compared to TCP because there is no form of flow control or error correction. Performance analysis of SAODV and E-SAODV In scenario III , we compared percentage of packet loss after implementing our security enhancement to SADOV. Below graph shows the packets received after the proposed security mechanisms are incorporated in the routing protocol. Since routing protocol detects the misbehaving nodes and isolates them from the network, most of the active paths will be free of malicious nodes and hence packet transfer will be done effectively till the destination. There is a clear decrease in percentage of packet loss in E-SAODV (Enhanced SAODV) as compared to standard SAODV. Throughput In scenario IV, comparison for throughput between standard SAODV with no malicious nodes present in the network, SAODV in the presence of malicious nodes and E-SAODV in the presence of malicious nodes is performed. Graph below shows that E-SAODV performs much better than standard SAODV in the presence of malicious nodes in term of throughput. Conclusion With above experiments, it can be seen that the performance of our proposed mechanism is more effective as compared to traditional SAODV in terms packet loss ratio and through put. The addition of control overhead is justified by successfully transmitting data packets. This also proves that these security extensions are not expensive to implement over a routing protocol. Chapter 6 Conclusion and Future Work Overview This research was aimed at to study the insider attacks in Mobile Ad hoc Networks. The objective was to address the packet dropping attack in MANETs and to modify current Ad hoc routing protocol like SAODV to make Ad hoc Networks more resilient against these types of attacks. This contribution has identified unique challenge offered by MANETs environment. A comprehensive analysis of Packet Dropping Attack was made to develop a security module that would meet the security goal. Achievements In this thesis, effective and practicable improvements have been proposed to SAODV to challenge the packet dropping attack. Unlike other approaches proposed in the literature which attempt to tolerate the packet dropping attacks, a comprehensive approach to detect and then to isolate the malicious nodes present in the network have been proposed. Proposed DACK (Data Acknowledgement) mechanism successfully detects the malicious activity in the network and then upon detection of malicious activity, second approach with the collaboration of other nodes in the network detects that exactly which node was misbehaving. A black list is maintained, to keep track misbehaving nodes for future reference. Black list is checked before allowing any node to be a part of active route. We have successfully implemented our proposed mechanism in OMNET++ to show the effectiveness of our security enhancement against packet dropping attack. Previous chapter depicts different scenarios like performance of SAODV with and with out the presence of malicious nodes in the network. Further comparison of standard SAODV and E-SAODV (Enhanced SAODV) is performed to show the effectiveness of proposed mechanism. This research work presents initial work in detecting misbehaving nodes and isolating such nodes from ad hoc networks. The success of MANETs in many applications demand adequate security for routing protocols. This contribution has identified unique challenge offered by MANETs environment. A comprehensive analysis of Packet Dropping Attack was made to develop a security module that would meet the security goal. Limitations The proposed mechanism has been tested on OMNET++. Due to higher node mobility and hardware costs, it is practically not possible to test these implementations on a large network testbed. However, the baseline protocol has vastly been researched for performance and scalability by many researchers. Secondly, being a novel approach E-SAODV (Enhanced SAODV) works with one malicious node per active route. Simulation results also shows that there is always possibility of false detection, consequently, a node can immediately accuse another node as selfish when detecting that a packet has been dropped. So the value of threshold must be chosen in a careful manner to avoid this situation. Future Work During the course of this work a number of future directions have been identified. As perspective, we plan to improve the solution and decrease its overhead. We also plan to improve our research work for partial dropping and increasing the number of malicious nodes per active route. Further research can be completed by giving a rigorous definition to the tolerance threshold, defining actions that have to be taken when a node is accused as a selfish, and proposing a mechanism allowing nodes to exchange their knowledge regarding nodes that behave selfishly. More simulations are also planned in our future work to determine optimal values to increase throughput in different scenarios. Bibliography E.M. Royer, and C.-K. Toh, A Review of Current Routing Protocols for Ad hoc Mobile Wireless Networks, IEEE Personal Communications, vol. 2, no. 6, April 1999, pp. 46-55. C.E. Perkins, and P. Bhagwat, Highly Dynamic Destination-Sequenced Distance-Vector (DSDV) for Mobile Computers, Proc. ACM Conf. Communications Architectures and Protocols (SIGCOMM94), London, UK, August 1994, pp. 234-244. T. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol Evaluation Through Experiments and Simulation, Proc. 4th Intl. Symp. Wireless Personal Multimedia Communications, Aalborg, Denmark, September 2001, 6 pp. C.E Perkins, and E.M. Royer, Ad hoc On-Demand Distance Vector Routing, Proc. 2nd IEEE Workshop Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100. V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, In Proc. Of IEEE INFOCOM, Japan, Apr. 1997. D.B. Johnson, D.A Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad hoc Networks, Ad Hoc Networking, C.E. Perkins, Ed., Addison-Wesley, 2001, 139-172. M.Zapata, N.Asokan, Securing Ad Hoc Routing Protocols, ACMWiSe,2002. Y.C.Hu, D.B.Johnson, A.Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks, IEEE WMCSA,2002. K.Sanzgiri, B.Dahill, B.N.Levine, C.Shields, E.M.Belding-Royer. A Secure Routing Protocol for Ad hoc Networks. Proceeding of the 10th IEEE International Conference on Network Protocols (ICNP), November 2002. Y.C.Hu, D.B.Johnson, Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks, ACM MOBICOM,2002. Zhou, Lidong and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network, November-December 1999. P. Papadimitratos and Z. Haas, Secure Routing for Mobile Ad hoc Networks, in SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), Jan 2002. K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields and E.M. Royer, A Secure Routing Protocol for Ad hoc Networks, Proc. 10th IEEE Intl. Conf. Network Protocols (ICNP02), IEEE Press, 2002, pp. 78-87. B. Schneier, Applied Cryptography Protocols, Algorithms and Source Code in C, 2nd Ed., John Wiley Sons, Inc., 1996. Y.-C. Hu, A. Perrig, and D. B. Johnson, Efficient Security Mechanism for Routing Protocols. Network and Distributed System Security Symposium, NDSS 03, San Diego, USA, 2003, 57-73. Seung Yi, Prasad Naldrug, Robin Kravets: A Security-Aware Routing Protocol for Wireless Ad hoc Networks. 6th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, Florida, USA, 2002. S. Marti, T.Giuli, K. Lai, and M.Baker, Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks, proc of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), August 2000. S. Buchegger and J-Y. Le Boudec. Performance Analysis of the CONFIDANT protocol: Cooperation of Nodes, Fairness In Dynamic Ad-hoc Networks , Proc of the IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), June 2002. H. Miranda and L. Rodrigues, Preventing Selfishness in Open Mobile Ad Hoc Networks, Proc. of the Seventh CaberNet Radicals Workshop, October 2002. N. Pissinou, T. Ghosh, and K. Makki, Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks. Third International IFIP-TC6 Networking Conference, Athens, Greece, 2004, LNCS 3042, 1446-1451. H. Deng, W. Li, and D. P. Agrawal, Routing Security in Wireless Ad Hoc Networks, IEEE Communications Magazine, 40(10), Oct 2002, 70- 75. J. Deng, R. Han, and S. Mishra Security, privacy, and fault tolerance in Wireless Sensor Networks, book chapter in Wireless Sensor Networks, pp. 215-234: Artech House, July 2005. Danial J. Bernstein, The Salsa 20 Family of Stream Ciphers, LNCS 4986, pp. 84-97, 2007. https://www.cryptopp.com B. Schneier, Applied Cryptography, second ed.: John Wiley Sons, Inc. 1996.
Wednesday, May 20, 2020
Senior Level Course For College Level Courses - 915 Words
Persuasive Like many other colleges, Austin Community College has reasonable rules, policies, and procedures which students and faculty must abide by. However there is one policy I feel should be completely revised or discarded. ACC requires students who did not score high enough on the Mathematics and English sections of the SAT or TAKS test to either enroll in a remedial course or to take the TSI placement exam and test into a college level course. The issue that concerns me is there are students who have credibility from their high school career which proves they have the ability to learn and do well in college level courses. ACCââ¬â¢s policy requires them to overlook important information that could not only save the student from being undermined but also save them a great amount of time and money. The score on a standardized or placement test should never be used when determining if a student has the intelligence level to enroll in college level courses. From a perspective of someone, who like many others, struggles with the issue of test anxiety, colleges need to have a more in depth look at how well the student performed in a specific area throughout high school as opposed to how they performed during a standardized or placement test. However the issue of not being an exceptional test taker isnââ¬â¢t the only difficulty when it comes to the TSI. I had the opportunity to get feedback from other students who also struggled with the exam. A majority of them emphasized how theShow MoreRelatedFreshmen And Senior Participation At University Level Courses1673 Words à |à 7 Pagesfreshmen and senior participation in university level courses. Does the seniority of students in universities effect their overall rate of success in one-hundred level courses? Therefore, are seniors less engaged than freshmen in these classes, and what is effecting their success? Throughout this process, participants were observed and later seen in intervie ws and focus groups to scope out and answer the hypothesis created for this study. Seniors who are taking one-hundred level courses will studyRead MoreHow High School English Courses Prepare Students for College English1187 Words à |à 5 PagesScaling Research This scaling study was to determine how well high school English courses prepare high school students for college English writing and writing research assignments for their college courses. It was to determine how well students understood the difference between what are scholarly sources for information and what is not considered to be scholarly sources. According to St Marys University (What is a Scholarly Journal?), a scholarly journal is also called a peer-reviewed, academicRead MoreDual Credit Classes At Carrizo Springs High School896 Words à |à 4 Pagesfor the workload and expectations of this college level class. Consequently, many of these students end up dropping the course after the first semester and find themselves in overcrowded ââ¬Å"regularâ⬠English classes. If these students had received proper preparation and instruction in writing prior to their senior year and enrollment in ENGL 1301 Composition and Rhetoric, they would have been more successful in dua l credit English, upper division courses, and future careers. Instead of focusingRead MoreThe College Success Course646 Words à |à 3 Pagesgo to college but the lack of higher education affects the entire community as a whole. Without a bachelorââ¬â¢s degree, students are less likely to be employed, more likely to live in poverty, and are less active citizens of their community. Students with a low level of education are also more likely of welfare dependency and crime. In order to raise the 12% college educated citizens in Bogalusa, high school juniors and seniors of Bogalusa High School should be required to complete a college successRead MoreHow Many Students Graduate From College In The Standard1491 Words à |à 6 Pages How many students graduate from college in the standard four years? The Four-Year Myth Report, executed by Complete College America, states, ââ¬Å"At most public universities, only 19 percent of full-time students earn a bachelorââ¬â¢s degree in four years, the report found. Even at state flagship universities ââ¬â selective, research-intensive institutions ââ¬â only 36 percent of full-time students complete their bachelorââ¬â¢s degree on time.â⬠Colleges have been aware of the issue of time and money within theirRead MoreSenior Year, By Sarah Butrymowicz And Scott Elliot897 Words à |à 4 Pages The senior year, a year that has many faces. With only one year of school a student can possibly learn so much, but is this statement still true when it is senior year? Senior year is infamous for being the lazy year, and often many students have fallen prey to senioritis or a lack of motivation. As a senior myself, the thought about if senior year is necessary has been on my mind. In their article ââ¬Å"Skip senior year and go straight to college?â⬠From the Hechinger Report, Sarah Butrymowicz andRead MoreCapstone Project : Nursing Simulation Essay1487 Words à |à 6 Pagesbaccalaureate level nursing students at WKU. Proposed Capstone Project The proposed capstone project included the creation and application of a rubric for nursing simulation activities held within the baccalaureate program of nursingââ¬â¢s Senior Practicum course at WKU. The nursing program at WKU utilizes high-fidelity simulation as an educational method providing the opportunity for students to practice nursing skills in a safe, realistic environment. During the fall 2015 semester the Senior PracticumRead MoreEvaluation And Evaluation Of A Rubric For Nursing Simulation Essay1486 Words à |à 6 Pagesbaccalaureate level nursing students at WKU. Proposed Capstone Project The proposed capstone project included the creation and application of a rubric for nursing simulation activities held within the baccalaureate program of nursingââ¬â¢s Senior Practicum course at WKU. The nursing program at WKU utilizes high-fidelity simulation as an educational method providing the opportunity for students to practice nursing skills in a safe, realistic environment. During the fall 2015 semester the Senior PracticumRead MoreThe American High School System Handicaps Its Students1192 Words à |à 5 Pagessystem handicaps its students academically. High school lacks the academic tools to properly prepare high school students for the college setting. Students who are accustomed to the high school teaching style will have a hard time adjusting to college educators. High school students most likely will be uncomfortable with a college educators strict rules during a course. Today, school students struggle with basic reading and mathematics. They aren t challenging themselves in reading. High school studentsRead MoreCompare and Contrast High School versus College Essay examples1054 Words à |à 5 PagesEvery student typically has a great high school career. Classes are not very difficult; AP courses are an exception. Student workload is minimal, obtaining good grades is not much of a struggle, and exams are typically easy to pass. Course load outside the class is no more then a few hours of homework each week. Teachers and faculty help facilitate a moderately laid back culture to learning. The school system supports students to make sure their performance in classes in adequate to move
Monday, May 18, 2020
Character Relations and Literary Elements in Alice in...
Go on a journey, And roam the streets. Cant see the way out, And so use the stars. She sits for eternity, And then climbs out. These lyrics, taken from Sigur Rà ³s Glà ³sà ³li, depict a sort of awakening or beginning of new life. In the novel Alices Adventures In Wonderland and Through The Looking-Glass And What She Found There by Lewis Carroll, Alice undergoes a kind of awakening or embarkation on a life journey when she enters Wonderland because she learns many things about life there that she would not have in the real world. When Alice meets the Caterpillar, the Queen of Hearts, and the Mock Turtle, she learns a lot about life, etiquette, and peoples personalities outside of her childish rules and learned manners. Alice matures andâ⬠¦show more contentâ⬠¦Life is a vast sea of information and opportunity; a Wonderland of sorts if you will. The Queen turned crimson with fury, and, after glaring at her for a moment like a wild beast, screamed ÃâOff with her head! OffÃâ "Ãâ ÃâNonsense! said Alice, very loudly and decidedly, and the Queen was silent (Carroll 61). If one imagines themselves in this situation, Im sure they would not shout, Nonsense! as they are speaking to a Queen. Alices ignorance allows her to intimidate the King, who nervously consoles his wife that Alice is only a child. This allowed the Queen to tolerate Alice more through her stay in Wonderland. Alices mannerisms, had she learned them above-ground, would not have prevailed in this account, for she disrespectfully spoke outward to an authority figure, an act most certainly not tolerated by her real world peers and betters. Significantly, most of her rules consist of Ãâdonts, obviously laid down by adults and now taken on complete faith by this literal-minded and priggish child (Rackin 64). This proves Alice has not yet reached a stage in her life where she is taught to respect authority, because in every other aspect of the book, Alice remembers what she learns above-gr ound and uses that information to help her in Wonderland. In Wonderland, Alice is intimidated by the characters she meets, as the reader has seen throughout the book. Alice is constantly reminded she is a foreigner in Wonderland, and is constantly alienated for it. It seems almostShow MoreRelatedMimesis in Alice in Wonderland2678 Words à |à 11 Pagesmimesis in Alice in Wonderland and Through the Looking Glass A quest in search for the elements which consitute a new notion of mimesis in Carrolls Alices Adventures in Wonderland and Through the Looking-Glass Mimà ©sis ve svÃâºtovà © literatuÃ
â¢e/Klà ¡ra Kolà nskà ¡, ÃÅ¡terà ½ 10:50 ââ¬â 12:25 ââ¬Å"Who in the world am I?â⬠Ah, thatââ¬â¢s the great puzzle.[1] This question, asked by Alice herself at the beginning of Alices Adventures in Wonderland, anticipatesRead More Lewis Carrolls Through the Looking Glass Essay3377 Words à |à 14 Pagesit was so, it might be; and if it were so, it would be; but as it isnââ¬â¢t, it ainââ¬â¢t. Thatââ¬â¢s logic,â⬠according to Tweedledee, a character in Lewis Carrollââ¬â¢s famous childrenââ¬â¢s work Through the Looking Glass (Complete Works 181). Of course, Lewis Carroll is most well known for that particular book, and maybe even more so for the first Alice book, Aliceââ¬â¢s Adventures in Wonderland. The connection between Lewis Carroll and logic is less obvious for most people. In reality, Lewis Carroll is the nom de guerreRead MoreUse of Food in Aliceââ¬â¢s Adventures in Wonderland, by Lewis Carroll2931 Words à |à 12 Pagesbe tracked down in paintings, poems and literary works originated in a lmost all parts of the planet. From Homerââ¬â¢s great feasts in The Iliad to Harry Potterââ¬â¢s lonely suppers in a cupboard under the stairs; literature of any genre originated in any period and any cultural tradition can be analysed concerning the aspect of food (Keeling 4). In his essay ââ¬Å"Food and Powerâ⬠, Nicholson points out, that food in literature always has a symbolic function as ââ¬Å"characters [â⬠¦] do not eat to live, since they arenââ¬â¢tRead MoreHow to Read Lit Like a Prof Notes3608 Words à |à 15 PagesWhen in Doubt, Itââ¬â¢s from Shakespeareâ⬠¦ a. Writers use what is common in a culture as a kind of shorthand. Shakespeare is pervasive, so he is frequently echoed. b. See plays as a pattern, either in plot or theme or both. Examples: i. Hamlet: heroic character, revenge, indecision, melancholy nature ii. Henry IVââ¬âa young man who must grow up to become king, take on his responsibilities iii. Othelloââ¬âjealousy iv. Merchant of Veniceââ¬âjustice vs. mercy v. King Learââ¬âaging parent, greedy children, a wise foolRead MoreHow I Read Literature Like A Professor Notes3177 Words à |à 13 Pagesâ⬠¢ The real reason for a quest is self-knowledge Chapter 2- Acts of Communion â⬠¢ Whenever characters eat or drink- communion!!! â⬠¢ COMMUNION IS- o Sharing/ peace o May not be holy o Personal and shared o Shows how well characters do or donââ¬â¢t get along o Allows characters to overcome an obstacle â⬠¢ Communion allows readers to empathize with characters â⬠¢ A meal means mortality â⬠¢ Food communion shows what characters have in common/ their bond â⬠¢ We all eat to live, we all die. We all live, we all die ChapterRead MoreLiterary Tendency of Victorian Literature: Special Reference to Lord Alfred Tennyson and Robert Browning3101 Words à |à 13 PagesLiterary tendency of Victorian literature: special reference to Lord Alfred Tennyson and Robert Browning 1.1 An Introduction to Victorian Period: The Victorian era is generally agreed to stretch through the reign of Queen Victoria (1837-1901). It was a tremendously exciting period when many artistic styles, literary schools, as well as, social, political and religious movements flourished. It was a time of prosperity, broad imperial expansion, and great political reform. It was also a time, whichRead MoreModifying the Story Summer Solstice Through the Screenplay Tatarin4949 Words à |à 20 Pagesis to come up with a clear justification on the reasons why screenwriters and filmmakers would modify books. It should be understood that the book and the film are two different subject matters. But the film would not exist without the help of the elements from the book. Thus it is safe to assert that the film Tatarin is a by-product of the work of Nick Joaquin, but nonetheless not the actual short story, Summer Solstice. A focus interview shall be conducted in order to prove that the scriptwriter-Read MoreVictorian Novel9605 Words à |à 39 Pagesthat aspect is change. Nearly every institution of society was affected by rapid and unforeseeable changes.à As some writers greeted them with fear and others embraced the progress, this essay will guide a reader through an important era in English literary history and introduce with the voices that influenced its shape and development. It was the novel that was the leading form of literature in the 19th century England. The term ââ¬Ënovelââ¬â¢ itself was a simple narrative form, which in opposition to itsRead MoreShortening of Words and Their Features9064 Words à |à 37 Pagesthe essential difference between the shortening of words and the usual process of word-formation (such as affixation, compounding, etc.) should be pointed out. It will be recalled that words built by affixation, for instance, are of a more complex character both structurally and semantically, cf. teachââ¬âteacher, developââ¬âs- development, usual-unusual, etc. It is not the case with word-shortening; shortened words are structurally simple words and, as was mentioned above, in most cases have the same lexicalRead MoreEssay about Summary of History of Graphic Design by Meggs14945 Words à |à 60 Pageslanguage system. - Chinese language is purely visual, and not alphabetical. - Chinese is thought to have been invented by Tsang Chieh, who was inspired to invent writing after studying the claw marks of birds. - Chinese characters are logograms meaning that each character represents an entire word (like $ = dollar). - Paper, a Chinese invention, is attributed with the high government official Tsââ¬â¢ai Lun. - Tsââ¬â¢ai Lunââ¬â¢s method of making paper was unchanged until nineteenth century England.
Wednesday, May 6, 2020
Positive Reinforcement Is More Effective Than Punishment...
When it comes to inspiring behavioral changes positive reinforcement is more effective than punishment in terms of changing the behavior in the long term. How effectively positive reinforcement affects behavioral changes is closely tied to how behavioral changes are incentivized and rewards bestowed. The case is similar for the application of negative reinforcement. However, rewards and punishments must significantly affect a personââ¬â¢s current situation--for better or worse--in order to inspire change. Letââ¬â¢s look at how positive reinforcement typically results in long-term behavioral change more effectively than punishment overall. The National Council of Juvenile and Family Court Judges have recently discussed their methodology of how to respond to compliance and noncompliance with incentives and sanctions that are designed to reinforce or modify the behavior of youth and their families. As one would assume, similar concepts, different approaches. The juvenile drug court takes a lot into perspective when using behavior modification strategies. If there is a desirable and an undesirable behavior in the same period, the JDC places weight on each of the behaviors. Recognizing the youthââ¬â¢s progress and accomplishments with praise, and responding to the infraction. Where the focus lies, whether on the infraction or progress, depends on where the youth is in the program, and the significance of the behavior. JDC says that our intentions donââ¬â¢t matter- it is the perception of theShow MoreRelatedCorporal Punishment and the Effects of Its Usage757 Words à |à 3 PagesCorporal Punishment and the effects of its usage Corporal punishment is the ability to make physical contact as a form of punishment for reprimanding ones behavior. Corporal punishment versus positive reinforcement while they both serve their purpose corporal punishment is known to be more effective. The most common form of disciplining has always been either a spanking, corporal punishment has been dated all the way back to biblical times. Now the corporal punishment that occurred during biblicalRead MoreReinforcement And Punishment On Children1535 Words à |à 7 PagesReinforcement and Punishment are used in the classroom as well as many homes for small children. Reinforcement is the technique of inspiring or authorizing a pattern of behavior which may lead to a reward. Many children do what is right because of the positive reinforcements they may receive. In the learning environment, children look forward to reinforcement such as candy, snacks, as well as stickers or other fun activities. If positive reinforcement is used in c hildrenââ¬â¢s households, the childrenRead MorePositive Reinforcement1630 Words à |à 7 PagesThe concept of positive reinforcement is the most powerful and practical tool ever devised in the history of applied psychology. Positive reinforcement is defined precisely in keeping with how it works. Its definition is actually as straight forward and simple as it isà counterintuitive (Cappa amp; Kahn, 2011). Positive reinforcement in my opinion cant fail to profile and maintain positive behavior and to replace negative or problem behavior. If parents dont harness this simple but powerful techniqueRead MoreClassical Conditioning And Operant Conditioning1249 Words à |à 5 Pageslearning is a voluntary behavior that is learned through positive or negative consequences (Ciccarelli, 2012). Edward Thorndike developed the law of effect theory which was later analyzed and derived in the development of operant conditioning. Law of effect refers to ââ¬Å"the likelihood of the repetition of an action is dependent upon the initial consequenceâ⬠(Ciccarelli, 2012). Operant learning is where behavior(s) are controlled by a positive or negative consequence. There are three main elements toRead MoreClassical Processing : The Theory Of Classical Conditioning945 Words à |à 4 Pagesmaintained by its consequencesâ⬠(Hockenbury, page 198). There are two types of reinforcement, positive and negative, and they both affect how people will act in the future (Hockenbury, page 198). ââ¬Å"Positive reinforcement involves that leads to a reinforcing or rewarding eventâ⬠(Hockenbury, page 198). An example would be, a teacher gives her students a homework pass for every A they make on a test. ââ¬Å"In contrast, negative reinforcement involves behavior that leads to the avoidance of or escape from an adverseRead MoreThe Skinner s Theory Of Behaviorism And Controls Behavior Essay1020 Words à |à 5 PagesBurrhus Frederic Skinner, also known as B.F Skinner was born on 1904 in Pennsylvania. He was an American ancient psychologist who known for his work on development of behavior and the theory of reinforcements, also known as operant conditioning. Along with being the most influential psychologist he was also a professor of psychology at Harvard University. During his course of study at Harvard, he conducted a study of behavior which led him to develop the prototype of the famous Skinner Box. His encounterRead MoreEssay on Proven Methods Of Child Discipline1465 Words à |à 6 Pagesreasoning, positive and negative reinforcement, and observational learning one can effectively discipline their children without risking damage to the childââ¬â¢s social and moral development. Research has shown that using reasoning as a method for discipline more often helps develop a childââ¬â¢s ability to conform to the standards of what is considered right or just behaviour. Discipline derives from the Latin word ââ¬Å"disciplinareâ⬠meaning ââ¬Å"to teachâ⬠. Thus, reasoning can be used as an effective tool to teachRead MoreMorgan Hamill. Educ 2120. Dalton State College. March 23,1590 Words à |à 7 Pagesbehaviors are learned, and thus they can be unlearned and replaced by new behaviors. This theory is vitally important in the education world because it helps teachers to better instruct their students with the help of positive and negative punishment and positive and negative reinforcement. Biographical Background of B.F. Skinner B.F. Skinner or Burrhus Fredrick Skinner, was an American psychologist and he was born in 1904 in Susquehanna, Pennsylvania and died of leukemia in 1990. He went to HarvardRead MoreThe Theory Of Criminal Behavior955 Words à |à 4 Pagescriminal behavior and delinquency the best would be the Differential Reinforcement Theory, reviewed by Robert Burgess and Ronald Akers after it was criticized by C.R. Jeffery. Burgess and Akers argued against Sutherlandââ¬â¢s work by using what he had used already and adding operant conditioning and modeling/condition in order to explain criminal behavior more clearly. They offered seven propositions to summarize the Differential Reinforcement Theory, which was a justification of Sutherlandââ¬â¢s none principlesRead MoreReinforcement Theory Vs. Operant Conditioning1513 Words à |à 7 PagesThere has been concern if the effects of certain types of reinforcement (such as positive and negative) can effectively change an individualââ¬â¢s behavi or. There is evidence to suggest that certain types of positive and negative reinforcement can motivate an individual far beyond his potential, while punishment, on the other hand, is completely different from negative reinforcement, but it is very often associated with it. Both forms of reinforcement are designed to have a desired behavior learned and repeated
The Final Months Of The Civil War Essay Example For Students
The Final Months Of The Civil War Essay The Final Months of the Civil WarThe Civil War was one of momentous proportion. It was disastrous in terms of human life, because more Americans died in this war that any other war in history. This paper is mainly about and around those involved on the battlefield in the final months of the civil war. It will also refer to the leading men behind the Union and Confederate forces. The war was coming to an end by January of 1865. At that time, Federal, Union, armies were spread throughout the Confederacy and the Confederate Army had greatly shrunk in size. The year before the North had suffered a huge loss of lives, but had more than enough to lose in comparison to the South. General Ulysses S. Grant became known as the ?Butcher? and many wanted him removed. (Grant, Ulysses S., Personal Memoirs of U. S. Grant. New York: Charles L. Webster Co., 1894.) The war continued as Lincoln stood firm with his General. This paper will cover the events between the winter of 1864-1865 and the surrender of the Confederate States of America and will show that April 9, 1865 was indeed the end of a great tragedy. General William T. Sherman and his army cleared the civilian population of the city of Atlanta in September of 1864, then took a brief rest. It was from Atlanta that General Sherman and his army began the famous ?march to the sea?. The great march was 400 miles long and 60 miles wide. No news was heard of Sherman for 32 days. His men lived on whatever they could get from the area of the country through which they passed, as Sherman had cut himself off from his base and any supplies. Although, the army destroyed anything and everything that was in their path, they were not seen as the enemy. In view of this destruction, it is understandable that Sherman quoted, ?War is hell!? (Sherman, William T., Memoirs of General William T. Sherman. Westport, Conn.: Greenwood Press, 1972.) Shermans men reached the city of Savannah on December 20, and from there Sherman telegraphed to President Lincoln: ?I beg to present you as a Christmas gift the city of Savannah, with 150 heavy guns and plenty of ammunition, and also about 25,000 bales of cotton.? (Sherman, William T., Memoirs of General William T. Sherman. Westport, Connecticut: Greenwood Press, 1972.)Grants decision that the only way to win and finish the war was to crunch with numbers. He knew that the federal forces held more than a modest advantage in terms of men and supplies. Grant directed Sherman to turn around and head back toward Virginia with this in mind. He immediately began making preparations to provide assistance to Sherman on the journey. General John M. Schofield and his men had just defeated the Confederates in Nashville and were to disengage from the Army of the Cumberland and then proceed toward North Carolina. His final destination was to be Goldsboro which was roughly half the distance between Savannah and Richmond. He was to meet Sherman and his troops of 50,000 there with his troop of 20,000. Sherman began moving north in mid January of 1865. The only hope of Confederate resistance would be supplied by General P. G. T. Beauregard. He was putting together an army with every means possible but was only able to assemble about 30,000 men. This would be no challenge to the combined forces of Schofield and Sherman. Shermans plan was to march through South Carolina while confusing the opponent the entire time. His men would march in two ranks. One would travel northwest to give the impression of a press against Augusta, and the other would march northeast toward Charleston. Shermans force arrived in Columbia on February 16. Great controversary arose as the city was burned to the ground. The Confederates claimed that Shermans men had set the fires ?deliberately, systematically, and atrociously?. Sherman claimed that the fires were already burning when they had arrived. Cotton bales were set on fire by the Confederate Calvary to prevent the Federal Army from getting to them and th e high winds quickly spread the fire. The controversary was short lived as no proof was ever presented. After Columbia, Charleston and Augusta had fallen, Sherman continued his move north toward Goldsboro. His progress was delayed not by the Confederate army but by the runaway slaves. The slaves joined the Union columns. They numbered in the thousands by the time they had reached North Carolina. (Barrett, John G., Shermans March through the Carolinas. Chapel Hill: The University of North Carolina Press, 1956.) Shermans force pushed on and finally met up with Schofield in Goldsboro on March 23rd. Immediately leaving Goldsboro, Sherman was to travel to City Point to meet Grant and discuss plans of an attack. Upon arriving, not only did he find Grant, but Admiral David Porter as well. They would all wait to meet with President Lincoln. The three soldiers met with Lincoln on the morning of March 28th on the river boat ?River Queen? to discuss a strategy against General Lee and General J ohnston of the Confederate Army. Lincoln asked several times, ?Cant this last battle be avoided (Angle and Miers. Tragic Years, II.) However, both Generals expected the Rebels, Confederate Soldiers, to put up at least one more fight. All were sure of a surrender, it was to be decided how to handle the Rebels in regard to the upcoming surrender. Lincoln made his intentions very clear: ?I am full of bloodshed. You need to defeat the opposing armies and get the men composing those armies back to their homes to work on their farms and in their shops.? (Sherman, William T., Memoirs of General William T. Sherman. Westport, Conn.: Greenwood Press, 1972.) The meeting lasted for a number of hours. Near the end of the meeting Lincoln made his orders clear, ?Let them once surrender and reach their homes, they wont take up arms again. They will at once be guaranteed all their rights as citizens of a common country. I want no one punished, treat them liberally all around. We want those people to return to their allegiance to the Union and submit to the laws.? (Porter, David D., Campaigning with Grant. New York: The Century Co., 1897.) The Generals and Admirals now knew what had to be done. Sherman returned to Goldsboro by steamer and Grant and Porter left by train to go back up north. Shermans course would be to continue north with Schofields men and meet Grant in Richmond. This would not happen as Lee would surrender to Grant before Sherman could ever get there. Online Shopping Vs. Market Shopping EssayThe final battle began when the Confederate battle line was formed to the west of Appomattox at daybreak. The Union soldiers were in position in front of the line with cannons. When the Federal cannons commenced to fire, the Confederate signal for attack was sounded and the troops charged. One soldier later remarked, ? It was my fortune to witness several charges during the war, but never one so magnificently executed as this one.? (McCarthy, Carlton, Detailed Minutiae of Soldier Life in the Army of Northern Virginia 1861-1865. Richmond: Carlton McCarthy, 1882.) This Confederate advance only lasted from about 7:00 am to 9:00 am, at which time the Rebels were forced back. The Confederates could no longer hold their lines and Lee sent word to Grant to meet at 1:00 pm to discuss surrender. The two men met at the now famous McLean House and a surrender was agreed upon. It was 2:00 pm on April 9, 1865. Johnstons army surrendered to General Sherma n on April 26, in North Carolina. General Taylor of Mississippi/Alabama and General Smith of the trans Mississippi/Texas surrrendered in May ending the war completely. The Civil War was a tragic event. A war in which thousands died in their home country over nothing more than a difference in opinion. Although slavery was the cause of the Civil War half of the country thought it was wrong and the other half just couldnt free them. The war was fought in probably 10,000 different places and the monetary and property loss cannot be calculated. The Union soldiers that died numbered 360,222 and only 110,000 of them died in battle. Confederate dead were estimated at 258,000 including 94,000 that actually died on the battlefield. The Civil War was a waste in terms of human lives and possible accomplishment. Tragedy had struck a new country and tarnished it for eternity. The Civil War will never be forgotten and will live on in the hearts and minds of Americans forever. BibliographyCasdorph, Paul D. Lee and Jackson Confederate Chieftains. New York: Paragon House, 1992. Catton, Bruce. A Stillness at Appomattox. New York: Doubleday, 1963. Davis, Burke. Shermans March. New York: Random House, 1980. Foote, Shelby. The Civil War. Vol 3. New York: Random House, 1974. Garraty, John Arthur. The American Nation: A History of the United States to 1877. Vol. 1, Eighth Edition. New York: Harper Collins College Publishers, 1995. Korn, Jerry. Pursuit to Appomattox, The Last Battles. Virginia: Time-Life Books, 1987. Leone, Bruno, ed. The Civil War Opposing Viewpoints. American History Series. California: Greenhaven Press, Inc., 1995. Mathless, Paul, ed. Voices of the Civil War. Vicksburg. Virginia, Time-Life Books, 1997. Miers, Earl Schenck. The Last Campaign. Philadelphia: J. B. Lippincott Co., 1972. BibliographyIncluded above. American History Essays
Detailed Report On Cyber Attack In Premera Blue Cross
Question: Discuss about a Report On Cyber Attack In Premera Blue Cross? Answer: Introduction The term Cyber attack refers to as the politically or socially influenced attack, which a person do with the help of Internet. It is also an intentional exploitation of technology-oriented enterprises, computer systems, and networks. The cyber attacker target the national or international organizations and the public, and accordingly they carry out the spreading of the malicious programs, deploys unauthorized web access and fake websites for stealing the personal or organizational information from the targets of attacks. Premera Blue Cross is an important healthcare service provider in the United States which experiences a cyber attack in their organization and due to which they suffer from several unwanted consequences. This report will discuss in short about the background of the company. This report is going to talk about the cyber crime in details. Then it is going to reflect the study of the overall situation that the Premera Blue Cross faced because of Cyber attack in their organization, and a necessary recommendation will be there to overcome such type of exploitation in future. Finally, a conclusion will be there based on the comprehensive report. Background of Premera Blue Cross Premera Blue Cross is headquartered in Mountlake Terrace, Washington, United States. It is an essential healthcare service provider and serving more than 1.9 million people, which includes individuals and families of Fortune 100 employer categories. The primary mission of Premera Blue Cross is giving the best healthcare services to their customers (Gray, Citron Rinehart, 2013). Figure 1: Logo of Premera Blue Cross (Source: Liginlal, 2015, pp 680) Premera Blue Cross is well known as the biggest health plans in the regions of Pacific Northwest, and they are providing tailored and complete healthcare services to their customers staying in Alaska and Washington. The services that Premera Blue Cross are providing comprises of innovative programs relating to the prevention, wellness, patient safety, and disease administration (Clough, 2015). Brief Description of Cyber Attack With the progression of the Internet facilities, the cyber crime is increasing day by day. These cyber crimes include phishing, illegal way of downloading, credit card frauds, scams, cyber terrorism, child pornography, children kidnapping through chat rooms, and distribution of spam and viruses (Halder, Jaishankar Jaishankar, 2012). Cyber attack is a politically or socially enhanced attack that is happening through the Internet. Cyber attack targets the average people or corporate organizations and which occurs due to the spreading of malicious programs, forming fake websites, and various ways of stealing the organizational and personal information through targets of attacks. Cyber crime causes enormous damage to the overall infrastructure of the whole organization (Herr Romanosky, 2015). Cyber attacks can be classified into four different parts, which includes: Targeted Attacks: Targeted attacks are the part of Cyber attacks, which is related to the stealing of information from any particular organization or an individual. It also consists of cyber crime occurring on intellectual assets for the purpose of monetary gain or vandalism (Sahu, Maheshwari Sahu, 2015). Advanced Persistent Threat: It is a type of targeted attack focuses on a particular entity, which is going on persistently and repeatedly with the help of various ways for gaining access to the target. The advanced persistent threat is further divided into the following: Attacks using public websites available in the Internet. Attacks against the users with the help of social engineering of target users by sending some malicious programs. Denial of Service attack: It is the type of cyber attack which focuses on the disruption of the services provided by an individual or organization. Distributed Denial of Service attack: This type of cyber attack is carried out in a distributed environment (Dawson, 2015). Detailed Report on Cyber Attack in Premera Blue Cross On 17th of March, 2015 Premera Blue Cross announced about the cyber attack that happened in their organization. After the initial investigation, the management of Premera Blue Cross came to know that the cyber attackers had implemented a sophisticated attack for gaining the unauthorized access to their Information Technology infrastructure (Luna et al. 2015). The in-depth investigation of Premera Blue Cross revealed that the cyber attackers initially struck on May 5, 2014. The managing director of Premera Blue Cross notified that the FBI is supporting the Bureaus investigation regarding this cyber attack. Premera Blue Cross had also involved Mandiant, which is one of the worlds leading cyber security organizations for performing a comprehensive research on the issues. It also concentrates on the removal of the unwanted malicious programs from the IT systems. Also, with all these steps, Premera Blue Cross also took initiatives and additional actions to cleanse, strengthen, and increase the security of their IT infrastructure (Mutchler Warkentin, 2015). This cyber crime attack damaged the Premera Blue Cross Shield of Alaska, Premera Blue Cross and their connected brands named as Vivacity and Connexion Insurance Solutions. According to the preliminary investigation it was determined that the cyber attackers might have got an unauthorized access to the personal information of members and applicants, and which comprised of members name, addresses, date of birth, email address, telephone numbers, Social Security based numbers, banking details, member identification numbers, claims information, and the clinical based information. This event also affected the members of the other Blue Cross Blue Shield plans those who were opting for getting treatment in Alaska or Washington (Kozminski, 2015). Few individuals had done business with Premera Blue Cross, and they had provided their personal bank account number, email address, and the social security number. Due to this cyber attack incident, they also suffered the same way (Torborg, 2013). After the thorough investigation by those security-providing groups, they were unable to determine whether any data was removed from the systems or not. Premera Blue Cross also had no evidence regarding the inappropriate use of those valuable data. Another group is present known as National Healthcare Information Sharing and Analysis Center, which provides support to share breach information. The ways that the cyber criminals attacked Premera Blue Cross includes the particular type of malware, which was not shared and declassified (Kumar, Odame Yeboah, 2015). Due to the occurrence of this overall critical situation in Premera Blue Cross, they have planned to offer free identity theft protecting services and free credit controlling to all the customers those who were affected due to this unwanted cyber attack. For protecting the personal information of the customers, the Premera Blue Cross also focuses on the implementation of the cyber security firm named as FireEye for removing the infected software from their computing system (Wechsler, 2016). Questions regarding the Cyber-Attack in Premera Blue Cross After the thorough research and investigation about the Cyber-Attack, some issues arose in the minds of the customers and ordinary people who are concern about this cyber attack. What happened at Premera Blue Cross due to this Cyber-Attack? The sophisticated cyber attackers aimed Premera Blue Cross as their target, and they somehow obtained the unauthorized access to their IT infrastructure. The overall investigation was unable to judge whether any data information was removed from their IT systems or not (Williams, 2012). No evidence is there until date regarding the inappropriate usage of data and personal information of the customers. The safety and privacy of their customer's information are the chief concern of Premera Blue Cross, and they are taking preventive measures to overcome this conflict of cybercrime attack (Bocek, 2015). Has the information on the customers been accessed? According to the investigation by FBI and Mandiant, it is evident that the cyber attackers might get the unauthorized access to the personal information of the customers, but they were not sure whether any information was deleted from the IT system or not. Premera Blue Cross understands the situation and mailed letters to all the victims whose information was corrupted because of this cyber attack (McHale Officer, 2015). What information had been accessed by the Cyber Attacker? Depending on the relationship between Premera Blue Cross and the customers, various personal information is available with Premera, which includes name, address, telephone number, date of birth, email ids, social security related number, medical claim data, member identification number and also the banking details. Premera Blue Cross are not involved in storing the credit card information of the members and hence the credit card data does not get affected by this cyber attack (Omidiji, 2015). What is that the customer needs to do for protecting their personal information? Premera does not make unsolicited phone calls or email to their clients in any situation. Therefore, the customers need to be more aware, and they shall not provide their personal information in response to an unsolicited phone call or fake email id. The customers need to review their Explanation of Benefits (EOB) statements after receiving it (Stachel, DeLaHaye, 2015). Was the data encrypted which the cyber attacker accessed? The data of Premera Blue Cross was encrypted but still the cyber attackers got the access to the IT system in an unauthorized manner and obtained all the personal information of the customers (Tschider, 2015). Recommendation to overcome Cyber Attack in future Premera Blue Cross need to follow the proposed recommendations to overcome these types of Cyber attacks in future. The recommendations are as follows: All the Blue Cross and Blue Shield Company need to share and gather only the minimum customer information which is essential to manage the overall process of the healthcare. It will ensure the health professionals with information, tools, and resources for providing the best quality of patient care (Gaughan, 2015). Premera Blue Cross needs to deploy active and context-aware access management mechanism for overcoming the potential damage which occurs due to stealing the network credentials. If any user gets connected to an application or server from an unknown location, then their rights to access those servers need to be removed completely (Cheema, 2015) Premera needs to restrict the access of Personal Health Information to only the authorized users. Not everyone in the organization needs to access the patient records and hence putting some strict controls on the resources and applications of the patients can reduce the cyber attacks in Premera Blue Cross (Liginlal, 2015). Encryption and classification of the personal health information need to be there for bringing security to the information. The data breaches in the organization need to be taken into account for bringing security as the employees fail to work securely, and sometimes they perform some dishonesty activities. Due to this irresponsibility by the employees, the cyber attackers gets the advantage of using the personal information for malicious purposes (Grimm et al. 2015). A context level security such as encryption needs to be there related to applications and networks. High-risk information like personal health information calls is required by the Premera Blue Cross health care organization for bringing a multi-level protection and which in turn create difficult for the hackers to perform the cyber crime (Fenner, G. M. (2013). Log all and track access need to be implemented to the personal health information and in addition to it the chief compliance officer who plays a crucial role in the prevention of cyber attack need to determine and focus on Premera Blue Crosss overall security chain. This particular activity can reduce the vulnerability towards the cyber attack (Kusumanegara, 2015). Conclusion Based on the analysis of the cyber attack issue in Premera Blue Cross it can be concluded that the cyber attack occurs due to political or social influence which a cyber attacker do with the help of Internet facilities. The primary targets of the cyber attacker include the normal public and the national as well as international organizations. The cybercrime is happening due to the responsiveness and dishonesty of the employees working for Premera Blue Cross. This cyber crime attack results in a significant loss to the organization as well as their customers. This report concluded that FBI and a leading cyber security group named Premera Blue Cross performed the thorough investigation to find the actual truth about this attack. They concentrated on the removal of malicious programs from the IT systems of the organization. Due to this cyber attack in Premera Blue Cross, the management of this healthcare organization decided to provide free of cost identity theft protection services and free credit controlling to all the affected customers. Finally, the report brought some recommendations, which will be beneficial for Premera Blue Cross to overcome these conflict situations of cyber attacks. References Bocek, K. (2015). Is HTTPS enough to protect governments?.Network Security,2015(9), 5-8. Cheema, S. P. K. (2015). Grandma Gone Wired: The Pros, Cons, and Alternatives of Medically Monitoring the Elderly.J. Int'l Aging L. Pol'y,8, 211. Clough, J. (2015).Principles of cybercrime. Cambridge University Press. Dawson, M. (Ed.). (2015).New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global. Fenner, G. M. (2013). Admissibility of Web-Based Evidence, The.Creighton L. Rev.,47, 63. Gaughan, A. J. (2015). A DELICATE BALANCE: LIBERTY AND SECURITY IN THE AGE OF TERRORISM.Drake L. Rev.,63, 1015-1201. Gray, D. C., Citron, D. K., Rinehart, L. C. (2013). Fighting Cyber-Crime After United States v. Jones.Journal of Criminal Law and Criminology,103(3). Grimm, H., Paul, W., Esq, Z., Michael, V., Esq, M., Alexander, W. (2015). Back to the Future: Lorraine v. Markel American Insurance Co. and New Findings on the Admissibility of Electronically Stored Information.Akron Law Review,42(2), 2. Halder, D., Jaishankar, K., Jaishankar, K. (2012).Cyber crime and the victimization of women: laws, rights and regulations. Information Science Reference. Herr, T., Romanosky, S. (2015). Cyber Crime: Security Under Scarce Resources.American Foreign Policy Council Defense Technology Program Brief, (11). Kozminski, K. G. (2015). Biosecurity in the age of Big Data: a conversation with the FBI.Molecular biology of the cell,26(22), 3894-3897. Kumar, M. M., Odame, M. S., Yeboah, T. (2015). Migration Model for unsecure Database driven Software System to Secure System using Cryptography.health. Kusumanegara, A. O. (2015). Applying Hierarchical Clustering and Weighted Apriori to Investigate the Examinees' Re-Coming Association Rules. Liginlal, D. (2015). HIPAA and Human Error: The Role of Enhanced Situation Awareness in Protecting Health Information. InMedical Data Privacy Handbook(pp. 679-696). Springer International Publishing. Luna, R., Myhra, M., Rhine, E., Sullivan, R., Kruse, C. S. (2015). Cyber threats to health information systems: A systematic review.Technology and health care: official journal of the European Society for Engineering and Medicine. McHale, D., Officer, C. L. (2015). Be Cybersecure: Protect Patient Records, Avoid Fines, and Safeguard Your Reputation.Michigan medicine. Mutchler, L. A., Warkentin, M. (2015, June). How Direct and Vicarious Experience Promotes Security Hygiene. In10th Annual Symposium on Information Assurance (ASIA15)(p. 2). Omidiji, T. (2015). The Future Challenges of CyberSecurity. Sahu, B., Maheshwari, D., Sahu, N. (2015). Simulation Model for Cyber Crime Reduction.Simulation,115(21). Stachel, R. D., DeLaHaye, M. (2015). SECURITY BREACHES IN HEALTHCARE DATA: AN APPLICATION OF THE ACTOR-NETWORK THEORY.Issues in Information Systems,16(2). Torborg, D. S. (2013). Dark Side of the Boom: The Peculiar Dilemma of Modern False Claims Act Litigation, The.JL Health,26, xx. Tschider, C. A. (2015). Experimenting with Privacy: Driving Efficiency Through a State-Informed Federal Data Breach Notification and Data Protection Law.Tulane Journal of Technology and Intellectual Property, Forthcoming. Wechsler, P. (2016). Issue: Cybersecurity Short Article: China's Unit 61398 Pulled From the Shadows. Williams, B. W. (2012). Better Exchange: Some States, Including Washington, Control Their Health Care Markets While Most Surrender Autonomy to Resist Reform, A.Gonz. L. Rev.,48, 595.
Thursday, April 23, 2020
Protecting Our Children Essays - Behavior, Human Behavior
Protecting Our Children Protecting Our Children The overlap between domestic violence and child abuse has been well documented; where one form of family violence exists, there is a likelihood the other does as well. Child abuse and domestic violence often occur in the same family and are linked in several ways that have serious consequences for the safety of children. First domestic violence may directly result in physical and/or psychological harm to the child. Second, even though a child may not sustain physical injuries, domestic violence can interfere with parenting to the point that the child is neglected. Third, if child abuse and domestic violence are present in a home, both problems must be addressed to effectively intervene. Children can be injured as a direct result of domestic violence. Batterers may physically, emotionally, and sexually abuse children in order to control the actions of their spouse. Children may also be injured by objects or weapons used to attack their mother. Assaults on younger children may occur if the mother is holding the child while being attacked. Older children who try to break up violent disputed between parents may also sustain injuries. Children of all ages are affected by domestic violence. Infants exposed to violence may not develop the attachments to their caretakers which are critical to their development. Preschool children regress developmentally and suffer sleep disturbances. Schoolage children who are exposed to violence may exhibit depression, anxiety, and violence towards peers. Later in life, these children are at risk for incorporating violence into their own relationships. There is also evidence that children exposed to domestic violence are at greater risk for abusing drugs and alcohol and for committing violent crimes. The most effective way to help mothers and children is to combine child protective and domestic violence programs. This way both victims are protected. However, the abused can only be helped if they make others aware of the problem. Victims of domestic violence and child abuse need support from others. They should confide in someone they trust and seek the help of police and domestic violence programs. Together a safety plan for the mother and children can be developed. Victims of domestic violence and child abuse need support from others. They should confide in someone they trust and seek the help of police and domestic violence programs. Together a safety plan for the mother and children can be developed. Psychology Essays
Subscribe to:
Posts (Atom)