A Failure to Communicate: Security Vulnerabilities in the GridStreamX Edgeware Application

被引:0
|
作者
Brooks, Tyson [1 ]
Kaarst-Brown, Michelle [1 ]
Caicedo, Carlos [1 ]
Park, Joon [1 ]
McKnight, Lee [1 ]
机构
[1] Syracuse Univ, Sch Informat Studies iSch, Syracuse, NY 13244 USA
关键词
wireless grids; Edgeware; vulnerabilities; cyber-attacks; workplace-as-a-service; hacking; cloud computing; virtuaiization; grid computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStrearnX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to ' worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.
引用
收藏
页码:516 / 523
页数:8
相关论文
共 50 条
  • [1] Security Issues and Vulnerabilities in Web Application
    Anumotu, Sitara
    Jha, Kushagra
    Balhara, Amit
    Chawla, Pronika
    NEXT GENERATION OF INTERNET OF THINGS, 2023, 445 : 103 - 114
  • [2] A Study on Web Application Security and Detecting Security Vulnerabilities
    Kumar, Sandeep
    Mahajan, Renuka
    Kumar, Naresh
    Khatri, Sunil Kumar
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 451 - 455
  • [3] Security Vulnerabilities and Mitigation Strategies for Application Development
    Romero M, Brunil D.
    Haddad, Hisham M.
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 235 - +
  • [4] Internet of Things (IoT): Application Systems and Security Vulnerabilities
    Ahamed, Jinesh
    Rajan, Amala V.
    2016 5TH INTERNATIONAL CONFERENCE ON ELECTRONIC DEVICES, SYSTEMS AND APPLICATIONS (ICEDSA), 2016,
  • [5] IoT Networks: Security Vulnerabilities of Application Layer Protocols
    Lalit, Mohit
    Chawla, Sunil Kumar
    Rana, Arun Kumar
    Nisar, Kashif
    Soomro, Tariq Rahim
    Khan, Muhammad Asghar
    2022 14TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS), 2022,
  • [6] Remediation of application-specific security vulnerabilities at runtime
    Bowen, TF
    Segal, ME
    IEEE SOFTWARE, 2000, 17 (05) : 59 - +
  • [7] EIP Security Analysis: Application Program Standards, Attack Events, and Security Vulnerabilities
    Tang, Xueyan
    Du, Yuying
    Wang, Zhengyang
    Chong, Shawn
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1239 - 1244
  • [8] Maintaining Security Concerns to Cloud Services and Its Application Vulnerabilities
    Reddy, Lakkireddy Venkateswara
    Viswanath, Vajragiri
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, CIDM 2016, 2017, 556 : 227 - 236
  • [9] A Failure to Communicate
    Feldman, Mitchell D.
    JOURNAL OF GENERAL INTERNAL MEDICINE, 2015, 30 (04) : 379 - 380
  • [10] Security vulnerabilities in computer software testing technology and its application
    Lan, Jiang
    INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 541 - 545