saeid ghasemshirazi
In a supply chain, zero trust means securing materials, information, and financial flows. Fourth, zero trust promotes the shift from perimeter-based security to zero trust security. For an IT network, the perimeter of the enterprise was traditionally defined by a firewall,
در این ارائه با پارادایم اعتماد صفر در زنجیره تامین آشنا می شین
با سلام و عرض ادب
اسلایدهای پیش رو، مربوط به دوره آموزشی هکر اخلاقی می باشد که بخش هایی از آن هم اکنون در اختیار شما قرار داده شده است.
شما می توانید جهت تهیه کلیه اسلایدهای دوره هکر اخلاقی که به صورت فارسی تهیه شده است با ما در ارتباط باشید.
کلیه حقوق مربوط به این فایل مربوط به وب سایت دنیای امنیت به آدرس زیر می باشد:
http://securityworld.ir/
Telegram ID: @ENITP
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement perspectives, we analyze how the botnet emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. Our measurements serve as a lens into the fragile ecosystem of IoT devices. We argue that Mirai may represent a sea change in the evolutionary development of botnets—the simplicity through which devices were infected and its precipitous growth, demonstrate that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. To address this risk, we recommend technical and nontechnical interventions, as well as propose future research directions.
All Things Considered: An Analysis of IoT Devices on Home NetworksSaeidGhasemshirazi
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world homes by leveraging data collected from user-initiated network scans of 83M devices in 16M households. We find that IoT adoption is widespread: on several continents, more than half of households already have at least one IoT device. Device types and manufacturer popularity vary dramatically across regions. For example, while nearly half of North American homes have an Internet-connected television or streaming device, less than three percent do in South Asia where the majority of devices are surveillance cameras. We investigate the security posture of devices, detailing their open services, weak default credentials, and vulnerability to known attacks. Device security similarly varies geographically, even for specific manufacturers. For example, while less than 17% of TP-Link home routers in North America have guessable passwords, nearly half do in Eastern Europe and Central Asia. We argue that IoT devices are here, but for most homes, the types of devices adopted are not the ones actively discussed. We hope that by shedding light on this complex ecosystem, we help the security community develop solutions that are applicable to today's homes.
Understing the mirai botnet and the impact on iot securitySaeidGhasemshirazi
Understanding the Mirai Botnet
This presentation is for IoT Security Class.
The Mirai botnet grew to a peak of 600k infections within a seven-month period, causing DDoS attacks on various victims. It represents a significant shift in the development of botnets
Saeid Ghasemshirazi
2024
ارزیابی امنیتی قرارداد های هوشمند با استفاده از ماشین لرنینگ
A Novel Aprroach for smart contract audit
روشی نوین با استفاده از یادگیری عمیق برای تشخیص آسیب پذیری
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesSaeidGhasemshirazi
Title:IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesAuthors with Affiliation:Ghazaleh Shirvani , Department of Computer Engineering Iran University of Science and Technology
Saeid Ghasemshirazi , Department of Industrial Engineering Iran University of Science and TechnologyBehzad Beigzadeh , Department of Electrical and Computer Engineering Tarbiat Modares UniversityPresenter :Ghazaleh Shirvani11th Smart Grid Conference (SGC 2021)
So Today I’m going to talk about a novel DdoS detection approach for IoT devices
But before I get to that out I’ll share with you some of the work that have been done in this area.
تامین امنیت در قراردادهای هوشمند | Smart Contract SecuritySaeidGhasemshirazi
تامین امنیت در قراردادهای هوشمند سمینار
بررسی انواع آسیب پذیری های مرتبط با بلاکچین و قراردادهای هوشمند
smart contract security presentation
سعید قاسم شیرازی
saeid ghasemshirazi
با سلام و عرض ادب
اسلایدهای پیش رو، مربوط به دوره آموزشی هکر اخلاقی می باشد که بخش هایی از آن هم اکنون در اختیار شما قرار داده شده است.
شما می توانید جهت تهیه کلیه اسلایدهای دوره هکر اخلاقی که به صورت فارسی تهیه شده است با ما در ارتباط باشید.
کلیه حقوق مربوط به این فایل مربوط به وب سایت دنیای امنیت به آدرس زیر می باشد:
http://securityworld.ir/
Telegram ID: @ENITP
The Mirai botnet, composed primarily of embedded and IoT devices, took the Internet by storm in late 2016 when it overwhelmed several high-profile targets with massive distributed denial-of-service (DDoS) attacks. In this paper, we provide a seven-month retrospective analysis of Mirai’s growth to a peak of 600k infections and a history of its DDoS victims. By combining a variety of measurement perspectives, we analyze how the botnet emerged, what classes of devices were affected, and how Mirai variants evolved and competed for vulnerable hosts. Our measurements serve as a lens into the fragile ecosystem of IoT devices. We argue that Mirai may represent a sea change in the evolutionary development of botnets—the simplicity through which devices were infected and its precipitous growth, demonstrate that novice malicious techniques can compromise enough low-end devices to threaten even some of the best-defended targets. To address this risk, we recommend technical and nontechnical interventions, as well as propose future research directions.
All Things Considered: An Analysis of IoT Devices on Home NetworksSaeidGhasemshirazi
In this paper, we provide the first large-scale empirical analysis of IoT devices in real-world homes by leveraging data collected from user-initiated network scans of 83M devices in 16M households. We find that IoT adoption is widespread: on several continents, more than half of households already have at least one IoT device. Device types and manufacturer popularity vary dramatically across regions. For example, while nearly half of North American homes have an Internet-connected television or streaming device, less than three percent do in South Asia where the majority of devices are surveillance cameras. We investigate the security posture of devices, detailing their open services, weak default credentials, and vulnerability to known attacks. Device security similarly varies geographically, even for specific manufacturers. For example, while less than 17% of TP-Link home routers in North America have guessable passwords, nearly half do in Eastern Europe and Central Asia. We argue that IoT devices are here, but for most homes, the types of devices adopted are not the ones actively discussed. We hope that by shedding light on this complex ecosystem, we help the security community develop solutions that are applicable to today's homes.
Understing the mirai botnet and the impact on iot securitySaeidGhasemshirazi
Understanding the Mirai Botnet
This presentation is for IoT Security Class.
The Mirai botnet grew to a peak of 600k infections within a seven-month period, causing DDoS attacks on various victims. It represents a significant shift in the development of botnets
Saeid Ghasemshirazi
2024
ارزیابی امنیتی قرارداد های هوشمند با استفاده از ماشین لرنینگ
A Novel Aprroach for smart contract audit
روشی نوین با استفاده از یادگیری عمیق برای تشخیص آسیب پذیری
IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesSaeidGhasemshirazi
Title:IoT-Shield: A Novel DDoS Detection Approach for IoT-Based DevicesAuthors with Affiliation:Ghazaleh Shirvani , Department of Computer Engineering Iran University of Science and Technology
Saeid Ghasemshirazi , Department of Industrial Engineering Iran University of Science and TechnologyBehzad Beigzadeh , Department of Electrical and Computer Engineering Tarbiat Modares UniversityPresenter :Ghazaleh Shirvani11th Smart Grid Conference (SGC 2021)
So Today I’m going to talk about a novel DdoS detection approach for IoT devices
But before I get to that out I’ll share with you some of the work that have been done in this area.
تامین امنیت در قراردادهای هوشمند | Smart Contract SecuritySaeidGhasemshirazi
تامین امنیت در قراردادهای هوشمند سمینار
بررسی انواع آسیب پذیری های مرتبط با بلاکچین و قراردادهای هوشمند
smart contract security presentation
سعید قاسم شیرازی
saeid ghasemshirazi
Virtual sports club Presentation(Startup idea)
this is about presenting my startup idea in pitch deck style with a business model canvas
saeid ghasemshirazi
In this presentation, we talk about sdn based 5g network security with a machine learning approach
Title: Security in sdn/nfv and 5 g network
Saeid Ghasemshirazi
saeid ghasemshirazi
Business model canvas of Airbnb,digikala,skype
در این اراعه به مثال هایی از بوم مدل کسب و کار پرداخته می شود مثل دیجیکالا اسکایپ و ایربی اند بی
Title: Positive and Negative Relationships (Chapter 5)
Book: Networks, Crowds, and Markets
Reasoning about a Highly Connected World
Presenter: Saeid Ghasemshirazi
Virtual sports club Presentation(Startup idea)
this is about presenting my startup idea in pitch deck style with a business model canvas
saeid ghasemshirazi
In this presentation, we talk about sdn based 5g network security with a machine learning approach
Title: Security in sdn/nfv and 5 g network
Saeid Ghasemshirazi
saeid ghasemshirazi
Business model canvas of Airbnb,digikala,skype
در این اراعه به مثال هایی از بوم مدل کسب و کار پرداخته می شود مثل دیجیکالا اسکایپ و ایربی اند بی
Title: Positive and Negative Relationships (Chapter 5)
Book: Networks, Crowds, and Markets
Reasoning about a Highly Connected World
Presenter: Saeid Ghasemshirazi
The zero trust supply chain | پارادایم اعتماد صفر در زنجیره تامین
1. Title:
The zero trust supply chain: Managing supply
chain risk in the absence of trust
Publication:
International Journal of Production Research
2021
saeid ghasemshirazi