Persistent Link:
http://hdl.handle.net/10150/596435
Title:
Exploring Vulnerabilities in Networked Telemetry
Author:
Shonubi, Felix; Lynton, Ciara; Odumosu, Joshua; Moten, Daryl
Advisor:
Dean, Richard; Moazzami, Farzad; Astatke, Yacob
Affiliation:
Morgan State University
Issue Date:
2015-10
Rights:
Copyright © held by the author; distribution rights International Foundation for Telemetering
Collection Information:
Proceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.
Publisher:
International Foundation for Telemetering
Journal:
International Telemetering Conference Proceedings
Abstract:
The implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network, analyzing the attack process from launch to detection. For this demonstration, a penetration-testing tool is used to launch the attack. This attack will be monitored to detect its signature using a network monitoring tool, and this signature will then be used to create a rule which will trigger an alert in an Intrusion Detection System. This work highlights the importance of network security in telemetry applications and is critical to current and future telemetry networks as cyber threats are widespread and potentially devastating.
Keywords:
Telemetry; Exploit; Metasploit; Intrusion Detection System (IDS)
Sponsors:
International Foundation for Telemetering
ISSN:
0884-5123; 0074-9079
Additional Links:
http://www.telemetry.org/

Full metadata record

DC FieldValue Language
dc.language.isoen_USen
dc.titleExploring Vulnerabilities in Networked Telemetryen_US
dc.contributor.authorShonubi, Felixen
dc.contributor.authorLynton, Ciaraen
dc.contributor.authorOdumosu, Joshuaen
dc.contributor.authorMoten, Darylen
dc.contributor.advisorDean, Richarden
dc.contributor.advisorMoazzami, Farzaden
dc.contributor.advisorAstatke, Yacoben
dc.contributor.departmentMorgan State Universityen
dc.date.issued2015-10en
dc.rightsCopyright © held by the author; distribution rights International Foundation for Telemeteringen
dc.description.collectioninformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.en
dc.publisherInternational Foundation for Telemeteringen
dc.description.abstractThe implementation of Integrated Network Enhanced Telemetry (iNET) in telemetry applications provides significant enhancements to telemetry operations. Unfortunately such networking brings the potential for devastating cyber-attacks and networked telemetry is also susceptible to these attacks. This paper demonstrates a worked example of a social engineering attack carried out on a test bed network, analyzing the attack process from launch to detection. For this demonstration, a penetration-testing tool is used to launch the attack. This attack will be monitored to detect its signature using a network monitoring tool, and this signature will then be used to create a rule which will trigger an alert in an Intrusion Detection System. This work highlights the importance of network security in telemetry applications and is critical to current and future telemetry networks as cyber threats are widespread and potentially devastating.en
dc.subjectTelemetryen
dc.subjectExploiten
dc.subjectMetasploiten
dc.subjectIntrusion Detection System (IDS)en
dc.description.sponsorshipInternational Foundation for Telemeteringen
dc.identifier.issn0884-5123en
dc.identifier.issn0074-9079en
dc.identifier.urihttp://hdl.handle.net/10150/596435en
dc.identifier.journalInternational Telemetering Conference Proceedingsen
dc.typetexten
dc.typeProceedingsen
dc.relation.urlhttp://www.telemetry.org/en
All Items in UA Campus Repository are protected by copyright, with all rights reserved, unless otherwise indicated.