A Failure to Communicate: Security Vulnerabilities in the GridStreamX Edgeware Application

被引:0
|
作者
Brooks, Tyson [1 ]
Kaarst-Brown, Michelle [1 ]
Caicedo, Carlos [1 ]
Park, Joon [1 ]
McKnight, Lee [1 ]
机构
[1] Syracuse Univ, Sch Informat Studies iSch, Syracuse, NY 13244 USA
关键词
wireless grids; Edgeware; vulnerabilities; cyber-attacks; workplace-as-a-service; hacking; cloud computing; virtuaiization; grid computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStrearnX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to ' worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.
引用
收藏
页码:516 / 523
页数:8
相关论文
共 50 条
  • [31] SECURITY SYSTEM VULNERABILITIES
    Constantinescu, Nicolae
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (02): : 175 - 179
  • [32] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [33] Moodle Security Vulnerabilities
    Galan Hernandez, Juan Carlos
    Leon Chavez, Miguel Angel
    2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 199 - 204
  • [34] Security Vulnerabilities in LoRaWAN
    Yang, Xueying
    Karampatzakis, Evgenios
    Doerr, Christian
    Kuipers, Fernando
    2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2018, : 129 - 140
  • [35] Enforcing application security-Fixing vulnerabilities with aspect oriented programming
    Wang, Jinfu
    Bigham, John
    SAFETY, RELIABILITY AND RISK ANALYSIS: THEORY, METHODS AND APPLICATIONS, VOLS 1-4, 2009, : 3109 - 3115
  • [36] A security feature framework for programming languages to minimize application layer vulnerabilities
    Khwaja, Amir A.
    Murtaza, Muniba
    Ahmed, Hafiz F.
    SECURITY AND PRIVACY, 2020, 3 (01):
  • [37] Web Application Security Vulnerabilities Detection Approaches: a Systematic Mapping Study
    Rafique, Sajjad
    Humayun, Mamoona
    Hamid, Bushra
    Abbas, Ansar
    Akhtar, Muhammad
    Iqbal, Kamil
    2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 469 - 474
  • [38] TipTracer: Detecting Android Application Vulnerabilities Based on the Compliance with Security Guidance
    Zhang L.
    Yang Z.
    Li M.
    Yang M.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (11): : 2315 - 2329
  • [39] CAVAS: Neutralizing Application and Container Security Vulnerabilities in the Cloud Native Era
    Torkura, Kennedy A.
    Sukmana, Muhammad I. H.
    Cheng, Feng
    Meinel, Christoph
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 471 - 490
  • [40] OUR FAILURE TO COMMUNICATE
    LEWIS, CL
    DATA MANAGEMENT, 1984, 22 (08): : 6 - 6