Controlling user access with scripting to mitigate cyber-attacks

被引:0
|
作者
Nyarko-Boateng, Owusu [1 ]
Nti, Isaac Kofi [1 ]
Mensah, Anastasia Akyamaa [2 ]
Gyamfi, Emmanuel Kojo [1 ]
机构
[1] Univ Cincinnati, Cincinnati, OH 45221 USA
[2] Univ Energy & Nat Resources, Sunyani, Ghana
关键词
Cybersecurity automation; Linux scripting; User access control; Cyber threat mitigation and attack surface; reduction;
D O I
10.1016/j.sciaf.2024.e02355
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Turkish national cyber-firewall to mitigate countrywide cyber-attacks
    Sari, Arif
    COMPUTERS & ELECTRICAL ENGINEERING, 2019, 73 : 128 - 144
  • [2] Present Cyber Threat Management (Methodologies to mitigate evolving cyber-attacks)
    Mawudor, Bright Gameli
    2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 115 - 121
  • [3] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [4] Artificial Intelligence techniques to mitigate cyber-attacks within vehicular networks: Survey?
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [5] Cyber-attacks and banking intermediation
    Boungou, Whelsy
    ECONOMICS LETTERS, 2023, 233
  • [6] Predicting Consequences of Cyber-Attacks
    Datta, Prerit
    Lodinger, Natalie
    Namin, Akbar Siami
    Jones, Keith S.
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 2073 - 2078
  • [7] Cyber-attacks and international law
    Grove, GD
    Goodman, SE
    Lukasik, SJ
    SURVIVAL, 2000, 42 (03) : 89 - +
  • [8] Staying ahead of cyber-attacks
    Green, John
    Network Security, 2015, 2015 (02) : 13 - 16
  • [9] The Impact of US Cyber Policies on Cyber-Attacks Trend
    Kumar, Sumeet
    Benigni, Matthew
    Carley, Kathleen M.
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 181 - 186
  • [10] Impact Of Cyber-Attacks On Critical Infrastructure
    Thakur, Kutub
    Ali, Md Liakat
    Jiang, Ning
    Qiu, Meikang
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 183 - 186