A Deep Dive into Attacker Models, From Network-Based Strikes to Application-Based Intricacies

In the ever-evolving landscape of cybersecurity, understanding the intricacies of potential threats is paramount. This article serves as an exploration into the description of primary attacker models.

Attacker models are systematically categorized based on diverse factors such as motivations, capabilities, and tactics. ENISA's Threat Landscape 2023 report, a reputable source in the field, offers a comprehensive list of common attacker models, shedding light on the dynamic nature of cybersecurity threats. This article  specifically focuses on two recently frequently used attacker models: network-based attacks and application-based attacks, providing readers with valuable insights into the multifaceted dimensions of potential cyber threats. As we navigate the digital realm, an in-depth understanding of attacker models becomes an essential tool in devising effective strategies to safeguard against evolving cybersecurity challenges.

Network-based attacks are a category of cyber threats that target vulnerabilities within computer networks, aiming to compromise the confidentiality, integrity, or availability of data and systems. These attacks exploit weaknesses in the network infrastructure itself, seeking unauthorized access or disruption of network services.

Some common examples of network-based attacks include:

  • Distributed Denial of Service (DDoS): Large-scale attacks flooding victim systems, impacting availability.
  • DNS Attack: Exploiting domain name translation to reroute users to malicious IP addresses.
  • Sniffer Attack: Intercepting and monitoring data packets on a network, potentially exposing sensitive information.

In 2023, Denial of Service (DoS) attacks proved pervasive across industries, with the public administration sector bearing the brunt at 46%. Notable attack shares also affected the media/entertainment sector (25%), transport sector (11%), and the digital infrastructures sector (5%). The prevalence of attacks on public administration stems from retaliatory actions amid ongoing conflicts, making countries expressing support vulnerable targets. The online media/entertainment sector, often an early focus in military conflicts, experiences disruptions aimed at controlling narratives and silencing opposition voices. The effectiveness of these tactics, extending beyond mere disruption to instigate fear and uncertainty, remains uncertain.

Regarding the DNS attacks, in the first half of 2023, there was a notable increase in DNS floods, raising concerns about their potential impact on digital infrastructures. DNS Floods are application-layer attacks that overwhelm a server's capacity to handle DNS requests, and their scale has been on the rise since the fourth quarter of 2022. The largest attack, recorded in Q2 2023, reached a critical rate of 1.29 million DNS queries per second. This escalation highlights the heightened sophistication and intensity of cyber threats. It emphasizes the need for increased vigilance and the implementation of robust cybersecurity measures to protect against the evolving landscape of malicious activities targeting online systems.

Lastly, wireless sniffing attacks involve the practice of eavesdropping on communications within a wireless network through the use of specialized software or hardware tools. This technique, more intrusive than wireless stumbling, extends beyond merely detecting the presence of wireless networks; it delves into intercepting and capturing data exchanged over Wi-Fi connections. The security risks are associated with wireless sniffing, citing its potential for hackers to clandestinely monitor online activities, leading to the unauthorized capture of sensitive information such as passwords and emails. Understanding these threats is the first step in fortifying one's defenses against potential cyber threats.

Application-based attacks refer to a category of cyber threats that specifically target vulnerabilities or weaknesses in software applications. These attacks aim to exploit flaws, bugs, or design weaknesses within an application to compromise the confidentiality, integrity, or availability of the targeted system or data. Unlike attacks that focus on the overall network infrastructure, application-based attacks zoom in on individual software programs or applications running on a system.

Examples of application-based attacks are:

  • Cookie Tampering: Exploiting web application cookies to gain unauthorized access.
  • Backdoor and Debug: Leveraging code vulnerabilities left by developers or debug options for unauthorized access.
  • SQL Injection: Inserting malicious SQL code into input fields to manipulate or extract data from databases.
  • Cross-Site Scripting (XSS): Injecting malicious scripts into web applications to compromise user information.
  • Remote Code Execution (RCE): Executing arbitrary code on a target system from a remote location.

In 2023, a surge in sophisticated app-based hacker attacks posed significant threats to digital security. Attackers targeted web applications through various methods, leveraging code weaknesses or debug options left by developers. SQL Injection attacks aimed at manipulating databases through input fields were prevalent, along with Cross-Site Scripting (XSS) tactics that injected malicious scripts into web applications. Remote Code Execution (RCE) posed a serious risk, allowing cybercriminals to execute arbitrary code on target systems from remote locations. These diverse and advanced techniques underscored the importance of robust cybersecurity measures, urging organizations and developers to stay vigilant, update systems regularly, and employ secure coding practices to defend against such evolving threats.

Recent research reveals that, on average, applications in production have been subjected to over 13,000 attacks per month in the past year alone. The implications of application security risks and successful attacks are multifaceted, ranging from operational disruptions to critical data breaches and ransom demands, all of which can severely impact businesses. Moreover, such incidents can also lead to the erosion of brand reputation and trust among customers and stakeholders. As organizations increasingly rely on digital applications for various functions, ensuring robust security measures becomes paramount to safeguard against these threats.

In the rapidly evolving landscape of cybersecurity, a good comprehension of potential threats is imperative.  In this article network-based attacks and application-based attacks are distinguished, providing valuable insights into the multifaceted dimensions of potential cyber threats. As we navigate the digital realm, understanding attacker models remains an essential tool in devising effective strategies against evolving cybersecurity challenges.

Defending against application-based and network-based attacks is important for several reasons. Firstly, attacks on applications can lead to data theft, disruption of company operations, and even loss of control over the system. Additionally, network attacks can allow hackers to access confidential information, compromise data integrity, or block access to network resources. As a result, defending against these types of attacks is crucial to ensuring security, operational continuity, and data protection for the company.

 

 

Keywords: Attacker Models, Network-Based Attacks, Application-Based Attacks, Malware, DDoS, DNS Attack, Sniffer Attack, Cookie Tampering, Backdoor and Debug, SQL Injection, Cross-Site Scripting, Remote Code Execution.

 

 

Source:

ENISA THREAT LANDSCAPE FOR DoS ATTACKS, November 2023

COREnext Deliverable 2.2 – Definition and Impact of Trustworthiness

www.radware.com/blog/ddos-protection/2023/10/dns-under-siege-real-world-dns-flood-attacks

What is Wireless Sniffing? (with pictures) (easytechjunkie.com)


Understanding Trustworthiness in the COREnext Platform: Security Aspects

Trustworthiness is a critical component in any service, and its importance is magnified in the context of the COREnext platform. To comprehend its significance, a deep understanding of potential adversaries seeking to exploit vulnerabilities is crucial. 

This article delves into the multifaceted security aspects integral to trustworthiness in the COREnext platform, encompassing authentication, confidentiality, component isolation, data integrity, and service availability.

In 2024, the paramount importance of prioritizing security aspects cannot be overstated, with a particular focus on authentication. Guaranteeing secure access to platform services hinges on robust user identification processes, ensuring that only authorized individuals can interact with sensitive systems. Additionally, confidentiality remains a critical pillar in safeguarding valuable information, permitting access exclusively to authorized entities and preventing unauthorized breaches. The need to enhance security, maintainability, and reliability by segregating software and hardware components, requires to isolate components. The emphasis on component isolation further underscores the significance of enhancing security. Data integrity emerges as a pivotal concern, necessitating a commitment to ensuring the accuracy and reliability of data throughout its lifecycle while fortifying defenses against unauthorized alterations. Finally, service availability takes center stage, emphasizing the need to design systems that function sea mlessly even in the face of hardware or software faults. These security measures collectively form a robust defense strategy against evolving threats in the dynamic landscape of 2024.

In short, the COREnext platform places a premium on trustworthiness, emphasizing the above key security aspects:

  1. Authentication Identity: Ensuring secure access to platform services through fundamental user identification processes.
  2. Confidentiality: Safeguarding sensitive information, permitting access only to authorized entities.
  3. Component Isolation: Enhancing security, maintainability, and reliability by segregating software/hardware components.
  4. Data Integrity: Ensuring accuracy and reliability of data throughout its lifecycle, guarding against unauthorized changes.
  5. Service Availability: Designing the system to function seamlessly even in the presence of hardware or software faults.

Summarizing, trustworthiness must become a key European differentiator, and thus COREnext addresses trustworthiness also on an architectural level, where it must be balanced with efficiency goals. In summary, trustworthiness of the entire system will only be as strong as its weakest link. Thus, COREnext takes an end-to-end approach from considering trustworthy analogue components to trustworthy integration of digital components. COREnext will develop a trustworthy-by-design platform and thus answer the need for European capabilities for B5G/6G computing based on a new computing architecture for base stations. This architecture efficiently and securely integrates third-party accelerators capable of supporting even the most demanding 5G/6G processes in cloud servers, base stations, and client-side devices. The platform will be released in 2026.

 

Read more about the project:

About COREnext – COREnext

Use Cases – COREnext

https://corenext.eu/2023/04/11/ensuring-trustworthiness-the-crucial-role-of-privacy-in-automotive-infrastructure/

https://corenext.eu/2023/10/30/vulnerabilities-lurking-in-todays-digital-world/

 


Interview with Manuela Neyer: Exploring the Intersection of Science and Project Management

Manuela Neyer, whose academic journey in physics has led her to a dynamic career in project management and coordination at Infineon Technologies, decided to answer a few of our questions on her professional journey. Her passion for science was ignited by childhood dreams of space exploration, inspired by the historic moon landing during the year of her birth. However, as she navigated her scientific path, Manuela discovered that while physics presented its challenges, it was the complexities of human interaction that truly tested her skills...

COREnext: What initially motivated you to pursue a career in science?

Manuela Neyer: Curiosity and the childhood dream to become an astronaut; In the year I was born, the first man was on the moon.

COREnext: Has that motivation evolved? If so, how?

Manuela Neyer: I realized life has its „new learnings every day”. Physics is the easy part, its difficult once it comes to people.

COREnext: Can you share one or more highlights of  your scientific career?

Manuela Neyer: Highlight of my career was an assignment abroad in Asia for 7 years.

COREnext: As a successful woman scientist, what advice would you give to younger generations or women aspiring to enter the field of science, particularly in overcoming challenges or barriers they may face?

Manuela Neyer: Make sure the family load is shared equally with your partner/ family. You need to grow before you put your fist on the table.

COREnext: In your experience, what strategies have you found most effective in fostering diversity and inclusion within scientific communities, and how do you believe these efforts contribute to advancements in scientific research?

Manuela Neyer: Living abroad yourself makes you aware of what integration means and costs and it will make you value „the others”. We humans have always strived to understand the world, hopefully we are willing to limit ourselves where necessary; this battle (global warming) is unfortunately not yet won, and this time I don't think science will save us.

COREnext: What do you envision for the future of women in science, and what steps do you believe are essential for creating a more equitable and supportive environment for women pursuing careers in STEM fields?

Manuela Neyer: I envision, there finally will be more women in science; once we are like 30% it will feel normal, promotions of women will be normal, there will be more women in leading and decision making positions. First of all, we have to overcome traditional patterns. More girls need to study STEM subjects, the degree programmes are open to all.


Breaking Barriers and Designing the Future: An Interview with Frida Strömbeck, Pioneering Integrated Circuit Designer

We had the privilege to get to know Frida Strömbeck, a remarkable figure in the world of science and technology. As a Postdoctoral Researcher at Chalmers University of Technology, Frida's journey is a testament to her passion for integrated circuit design, particularly in the realm of high data rate millimeter wave communication.

Her career trajectory is a captivating blend of curiosity, determination, and groundbreaking achievements. In this interview, Frida shares insights into her motivations, highlights from her scientific career, and invaluable advice for aspiring scientists, especially women navigating the challenges of STEM fields. Join us as we delve into the fascinating world of science through the lens of Frida Strömbeck's remarkable experiences and perspectives.

COREnext: What initially motivated you to pursue a career in science? Has that motivation evolved? If so, how?

Frida Strömbeck: I have always liked figuring out how things work and solving problems. I studied engineering physics at university because space is really cool. Somehow, I ended up taking a course in integrated circuit design, and then I was hooked.

What motivates me today is still my passion for circuit design and the challenges we have to overcome. There is so much to do and explore in the future.

COREnext: Can you share one or more highlights of  your scientific career?

Frida Strömbeck: Measuring my first integrated circuit that I had designed, waiting eight months for it to get fabricated and realising that it actually worked in real life and not only simulations.

Finally reaching data rátes above 100 Gbps over a one meter polymer microwave fiber (PMF), which was a goal that we worked towards a very long time, that almost felt impossible in the beginning.

COREnext: As a successful woman scientist, what advice would you give to younger generations or women aspiring to enter the field of science, particularly in overcoming challenges or barriers they may face?

Frida Strömbeck: Make sure you do it for the right reasons, because that will be the motivation that drives you when things are difficult. Things will fail, you will get rejected and questioned a lot. That’s part of being a researcher. If things never fails, you haven’t taken enough risks. It’s from the failures we learn.

COREnext: In your experience, what strategies have you found most effective in fostering diversity and inclusion within scientific communities, and how do you believe these efforts contribute to advancements in scientific research?

Frida Strömbeck: Expect to be treated the same as everyone else. Excluding someone due to their gender/ethnicity/sexual preference etc is extreamly stupid and narrow-minded, and we really don’t need narrow-minded people doing scientific research.

COREnext: What do you envision for the future of women in science, and what steps do you believe are essential for creating a more equitable and supportive environment for women pursuing careers in STEM fields?

Frida Strömbeck: Role models (top researchers) standing up against sexism. I am very lucky working in a great team where we trust and support each other, which is why we are succesful. Hopefully this attitude will spred to other groups.


Empowering Women in Science: Insights from Vanessa Daccache in the COREnext Project

February and March mark the celebration of both Women in Science Day and International Women’s Day, highlighting the achievements and contributions of women in various fields, including science and technology. To shed light on the remarkable journey of women scientists, we sat down with Vanessa Daccache, HW Test SW Engineer at Nokia, to discuss her experiences and insights.

COREnext: What initially motivated you to pursue a career in science, and has that motivation evolved over time?
Vanessa Daccache: Initially, as a woman, pursuing a career in science presented itself as an unusual and challenging choice. However, my motivation has evolved into a curiosity that propels me to explore the vast realm of science. This evolution led me to make the decision to relocate to Germany to pursue my master’s degree in communications technology. Along the way, I have found continuous inspiration from other women leaders in the scientific field, whether encountered in my work environment or through social media.

COREnext: Can you share one or more highlights of your scientific career?
Vanessa Daccache: There have been several standout moments in my scientific career. One highlight was the opportunity to collaborate with Nokia on my master's thesis. Delving into data transmission using cutting-edge technologies within high-speed digital systems significantly expanded my knowledge. Additionally, visiting Nokia's factory in Finland left a lasting impression and instilled in me a newfound appreciation for the industry. More recently, joining COREnext has marked a significant milestone for me. Engaging with esteemed experts in the field and participating in collaborative meetings has enriched my expertise and fostered a sense of community.

COREnext: As a successful woman scientist, what advice would you give to younger generations or women aspiring to enter the field of science, particularly in overcoming challenges or barriers they may face?
Vanessa Daccache:: My advice would be not to fear asking questions or stepping outside of one's comfort zone. It's important to recognize that each of us is on a continuous learning journey, regardless of our experience level. The field of science offers numerous opportunities for women, now more than ever. Embrace these opportunities, persevere through challenges, and let curiosity be your guiding force.

As Vanessa continues supporting and contributing to the formulation of the 6G network architecture in the COREnext project, her dedication and passion serve as a beacon of inspiration for women in science everywhere. Through her unwavering commitment to innovation and excellence, she is paving the way for future generations of women in STEM.

 


COREnext 2nd Plenary Meeting in Athens: project highlights

In the heart of ancient Athens, where history and modernity coalesce, the COREnext team recently convened for the 2nd Plenary Meeting, setting the stage for an enriching two days of collaboration, innovation, and strategic planning. This gathering not only marked a moment of reflection on past achievements but also laid the groundwork for the future trajectory of the COREnext project.

The meeting commenced with a holistic status check, providing an insightful overview of the current state of the COREnext project. Milestones achieved were celebrated, providing a comprehensive understanding of the journey thus far. This introspective analysis served as a catalyst for envisioning future breakthroughs. As the Project Coordinator, Michael Roitzsch from the Barkhausen Institute claimed:

The COREnext project has met in Athens to plan its second year. Hosted by WINGS, we were greeted by nice weather and the Athens Parthenon looking over our meeting location. After having defined an architecture for trustworthy 6G networks in 2023, this year COREnext will build key components to realize this architecture. We brainstormed about research efforts, publications, and demonstrators. A lot of exciting work lies ahead of us!

Platform Architecture Recap

The very essence of COREnext was revisited with a detailed Platform Architecture Recap. Team members delved into the foundational elements, reinforcing the importance of a robust architecture that fosters seamless collaboration and operational efficiency. This session reinforced the commitment to building a technological infrastructure that stands the test of innovation.

The corenext consortium will develop a trustworthy-by-design platform based on a new computing architecture for base stations to push european capabilities in b5g/6g to the next level.

Advancing Use Cases

The meeting showcased tangible progress as the team explored advancements in COREnext's use cases. From ideation to implementation, the project is transforming innovative ideas into tangible solutions that will impact 6G real-world scenarios. This commitment to practical applications reinforces COREnext's role as a driving force in technological advancements.

COREnext, through the use cases, will help define trustworthiness and processing efficiency based on the paramount importance of reliability, availability, security, privacy and integrity for a society based on European values of privacy and data protection.

Strategic Mapping

Eyes set on the future, strategic discussions unfolded as the team mapped out the trajectory for COREnext's ascent to new heights of innovation. These forward-thinking dialogues ensure that the project remains at the forefront of technological advancement, continually pushing boundaries and exploring new frontiers in XR, manufacturing, and automotive.

Global Resonance Through Outreach

COREnext is not merely a local endeavor—it's a global vision. The team unveiled plans for comprehensive outreach activities, ensuring that the project's vision resonates across the tech landscape in Europe. The upcoming white paper, 'Trustworthiness: The Key to Europe's Digital Future,' promises to usher in a new era of insights for the industry, providing a strategic roadmap for cultivating trust in Europe's digital landscape. This strategic approach aims to amplify the European presence of COREnext, fostering collaboration and knowledge exchange on a wider scale.

 


COREnext Cyber Security Campaign 2023: Unveiling the Growing Threats Across Industries

In an era dominated by technology, the manufacturing industry finds itself at the forefront of an escalating wave of cyber threats. Recent research sheds light on the most pressing concerns facing the sector in the first half of 2023. Here's an overview of some key findings and a few recommendations to navigate the complex cyber landscape.

 

Manufacturing: A Prime Target

The manufacturing industry is a lucrative target for cybercriminals, hacktivists, and nation-state-aligned attackers. Cybercriminals and hacktivists are drawn to manufacturing due to its low tolerance for outages – disrupting IT services often halts production, resulting in missed revenue. Additionally, state-aligned groups target manufacturing organizations for their links to critical national infrastructure and potential intellectual property treasures.

Nation-state-aligned groups pose a significant threat, exemplified by the China-based advanced persistent threat group Volt Typhoon targeting U.S. critical national infrastructure, specifically manufacturing, in May 2023. Hacktivist group Killnet, aligned with Russia, remains a prominent risk, targeting the aerospace subsector and posing a continued threat in the second half of 2023.

European manufacturing sector accounted 14% of the global incidents, and it’s the 2nd place in the world in 2023. The 1st position belongs to Asia-Pacific region where 61% cases were reported.

 

Ransomware Reigns Supreme

Ransomware emerges as another significant threat to the manufacturing sector. Cyber attacks surged across all manufacturing sub-groups from the second half of 2022 to the first half of 2023:

  • Industrial goods and services organizations faced a 24% increase.
  • Aerospace organizations witnessed a staggering 195% surge.
  • Chemicals organizations experienced a 92% rise.
  • Automobiles and parts organizations encountered a 53% increase.

The Clop ransomware cybercriminals continued its data-theft campaign into the second half of 2023, emphasizing the persistence of this threat. Manufacturing organizations are urged to prioritize measures against ransomware, including regular system patching, data backup, secure storage practices, and proactive threat hunting.

Ransomware dominated the European cybersecurity landscape, constituting 26% of all attacks on the continent. Following closely were server access attacks at 12% and data theft at 10%, ranking as the subsequent prevalent attack types.

 

Operational Technology Security at Risk

The convergence of operational technology (OT) with traditional IT systems introduces new vulnerabilities. While integrating OT with IT systems enhances performance, it also escalates cyber risk. Attackers target OT systems by exploiting vulnerabilities commonplace across sectors, including unpatched vulnerabilities, weak credentials, and exposed remote services.

The Oldsmar water treatment plant (Florida, USA) incident in 2021 exemplifies the potential consequences. Attackers compromised the network through a dormant TeamViewer remote access account, highlighting the ease with which common IT weaknesses can be exploited to interfere with critical OT systems.

The overarching trend in Europe over the past decade has been the surge in cybercrime, marked by increased tool availability, easier exploit acquisition, and heightened motivation among cybercriminals. Ransomware and extortion campaigns, in particular, have emerged as prominent tools causing significant harm to organizations. Within Operational Technology, there has been an alarming 87% surge in ransomware attacks against industrial organizations, accompanied by a 35% increase in the number of threat groups in 2021.

Strengthening IT/OT Resilience

To enhance resilience against evolving threats, manufacturing organizations are advised to:

  • Conduct regular security assessments of OT systems.
  • Implement continuous vulnerability assessment and triage.
  • Ensure timely updates for key components of the OT network.
  • Deploy endpoint detection and response (EDR) solutions for timely threat detection.
  • Enhance incident prevention, detection, and response skills through dedicated OT security training.

The interconnected nature of global infrastructure necessitates a proactive, collaborative approach to cybersecurity. By understanding and addressing the evolving threat landscape, manufacturing organizations can fortify their defenses, safeguard critical assets, and contribute to a more secure digital ecosystem.

 

Source:

https://www.kaspersky.com/about/press-releases/2023_attacks-on-industrial-sector-hit-record-in-second-quarter-of-2023

https://www.picussecurity.com/resource/blog/regions-and-industries-at-risk-august-2023

https://www.reliaquest.com/blog/cyber-threats-to-manufacturing-industry-1h-2023/

6 Industries Most Vulnerable to Cyber Attack in 2023 (potomac.edu)

The Latest Cyber Crime Statistics (updated October 2023) | AAG IT Support (aag-it.com)

Understanding the evolution and growth of the European operational technology threat landscape – Intelligent CISO

 

 


Vulnerabilities Lurking in Today's Digital World

In our world of growing interconnectivity and digital reliance, where smartphones are our constant companions and the internet serves as our primary channel for information and communication, the need for technology to be dependable and reliable has never been more vital. COREnext is a European-funded project to explore and enhance trustworthiness in the context of 5G and 6G technologies. But why is this so important? Let's delve into some basic vulnerabilities in today's systems and society, which COREnext aims to address. 

We've heard of hacking, phishing, and spoofing, but what do all these, and others, mean? These issues are like dark clouds looming over our digital lives, threatening to disrupt the sunny days of convenience and connectivity. When vulnerabilities are exploited, the consequences can be far-reaching.  

Hacking 

Imagine someone picking the lock to your front door, but instead of your home, they're trying to access your personal data. That's what hacking is: a digital break-in. These cybercriminals exploit weaknesses in software or systems to gain unauthorized access. They can steal sensitive information, disrupt services, or even hold your data hostage for a ransom. 

Phishing  

Phishing is similar to someone pretending to be your trusted friend or family member only to trick you into revealing sensitive information like passwords or credit card details. These ambiguous emails or messages often appear genuine, making it challenging to distinguish them from the real deal. 

Spoofing 

Imagine receiving a phone call from your best friend, only to find out later it was an imposter. Spoofing means someone hides behind a stolen or made-up identity in communication, which can lead to confusion, deception, or even financial loss. 

E-theft 

Electronic theft happens when someone steals things from the internet, like personal information, money, or identity. It's like a digital pickpocket. To protect yourself, be careful with your passwords, and don't share them with anyone. Also, watch out for suspicious emails or websites, and always keep your computer and devices updated with the latest security updates. E-theft is a sneaky crime, but simple steps can keep your online world safe. 

Data leakage 

Data leakage occurs when valuable information, such as your personal data or confidential details, ends up in the wrong hands, either by accident or on purpose. Think of it like a leak in a container holding your information. To safeguard against data leakage, exercise caution when sharing sensitive data online, and always use secure websites and apps. Additionally, be selective about who you trust with your private information. Just as you take care of your personal belongings, it's crucial to protect your data from falling into the wrong hands. 

Malware 

Malware is harmful software that can attack your computer, steal your data, and cause problems. It comes in various forms like viruses, ransomware, and spyware. To protect yourself, keep your software updated, use good antivirus software, be careful when clicking on unfamiliar links, and regularly back up your data. Learning about cybersecurity is also important to stay safe online.  

DDoS - Distributed Denial-of-Services 

Sounds complicated? A DDoS attack, normally targeting companies, floods a website or network with so much traffic that it collapses causing financial and reputational damage. Be ready to scale up your network during an attack and consider working with DDoS protection services to detect and mitigate threats quickly. 

Cyber Extortion  

Cyber extortion happens when bad people use the internet to threaten or pressure others into doing something they don't want. It's like a digital bully who tries to scare you into giving them money or sensitive information. To stay safe from cyber extortion, be cautious about sharing personal information online, and don't respond to threats or demands from strangers on the internet. If you ever feel threatened or pressured online, you must talk to a trusted adult or report it to the authorities. Remember, online safety is just as important as safety in the real world. 

So why is COREnext important? 

COREnext understands that trust and security are the base of our digital society. Our mission is to fortify the foundations of technology by addressing existing vulnerabilities, to prevent the attacks mentioned above. Through innovative research and development, they aim to create secure, resilient, and trustworthy systems for the 5G and 6G era. COREnext aims to ensure that our digital future remains bright and secure in a world of ever-evolving digital threats. 


Safeguarding Trust and Enhancing Resilience in B5G/6G Networks

The landscape of communication in the future will be shaped by the emergence of 6G technology and its architectural innovations, presenting substantial prospects for amplifying and enriching human capabilities. As we move towards the future of wireless communication, the demands on network infrastructure are becoming increasingly complex and diverse. 

In that sense, COREnext envisions trustworthiness as a fundamental element. Enhancements to trustworthiness will facilitate the seamless integration of equipment from diverse vendors by service providers. Similarly, hardware and system providers will be empowered to supply and incorporate components into a system that embodies trustworthiness, aligning with European principles of privacy and data protection. The project will emphasise the importance of resilience, availability, security, privacy, integrity, and more; all encapsulated under the umbrella of trustworthiness. These elements will form the bedrock of any forthcoming digital infrastructure, including B5G/6G.

Resilient network infrastructure in the context of B5G/6G refers to a telecommunications framework that is exceptionally robust, adaptable, and capable of withstanding various challenges and disruptions while providing reliable and high-performance connectivity. 

Availability refers to the consistent and reliable accessibility of network services and resources to users and devices. It emphasises the network's ability to remain operational and provide seamless connectivity, even in challenging or demanding conditions. 

Building trust relies on integrating security and privacy safeguards within the network's signalling and data transmission. A resilient network infrastructure can preemptively recognise potential threats and vulnerabilities, promptly responding with corrective measures in instances of attacks or unforeseen calamities.

In summary, a trustworthy-by-design platform is proposed by COREnext to increase the network's resilience by preventing threats, detecting and mitigating attacks, protecting data, establishing resilient communication channels, ensuring redundancy, and enabling rapid recovery. Trustworthiness enhances the overall robustness and dependability of network infrastructure, leading to improved resilience in the face of challenges and disruptions.

 

Sources:

Security and trust in the 6G era

Follow the journey to 6G

Resilience and Security

D2.1 Use Cases and Requirements


Exploring the Advantages of Smart Cities

A smart city is an urban environment that leverages digital solutions to enhance the efficiency of conventional networks and services (like transportation networks, energy, water & waste management), benefiting residents and businesses. These digital solutions surpass the adoption of digital technologies to improve resource utilization and reduce emissions by encompassing intelligent urban transport systems, modernized water supply and waste management facilities, and optimized methods for lighting and heating buildings. Moreover, a smart city entails an interactive and responsive city administration, prioritizes the safety of public spaces, and caters to the evolving requirements of an ageing population.

In this article, we will address the advantages of smart city applications, which have revolutionized the way cities operate and significantly improved citizens' quality of life. These applications leverage the power of IoT devices, data analytics, and artificial intelligence (AI) to optimize various urban operations, making cities more efficient, sustainable, and safer.

One crucial aspect of smart city applications is public safety systems. Smart cities can detect and respond to public safety incidents using data analytics and AI in real time. For instance, video analytics can be employed to monitor public spaces and identify suspicious behaviour or incidents of violence. The system can automatically alert law enforcement or emergency services when such activities are detected, allowing rapid and proactive responses.

Another significant advantage is Intelligent transportation systems (ITS). These systems integrate various technologies to enhance transportation efficiency, reduce congestion, and improve safety. IoT devices like connected vehicles and traffic sensors collect real-time data on traffic flow, parking availability, and road conditions. This data is then analyzed to optimize traffic management, provide accurate travel information to commuters, and even enable autonomous vehicle operations. Smart cities can reduce travel times, minimize fuel consumption, and improve mobility by optimising transportation networks.

Waste management is another area where smart city applications have significantly impacted. By implementing IoT devices and data analytics, cities can monitor waste levels in real time and optimize collection routes accordingly. Smart bins with sensors can provide information on fill levels, allowing waste management teams to plan efficient collection schedules and reduce costs and environmental impact. By deploying AI algorithms, cities can also analyze historical data to identify patterns and optimize waste disposal practices.

Another example is water management systems, which are vital in ensuring the efficient use and conservation of water resources in smart cities. IoT devices like smart water meters and sensors can collect real-time data on water consumption, leak detection, and water quality. This information is then analyzed to identify areas of high consumption or potential leaks, enabling proactive maintenance and conservation efforts. AI algorithms can optimize water distribution networks, detect anomalies, and predict future water demand, ensuring efficient water usage and reducing water wastage.

Lastly, energy management systems are crucial for creating sustainable and energy-efficient cities. Smart city applications enable the integration of renewable energy sources, such as solar panels and wind turbines, with traditional power grids. IoT devices and data analytics help monitor energy consumption, identify areas of high energy usage, and suggest strategies for energy conservation. AI algorithms can optimize energy distribution, balance supply and demand, and predict potential power outages. Smart cities can reduce their carbon footprint and promote cleaner and more sustainable energy practices by utilising these systems.

In a Smart City, many IoT devices provide information for AI algorithms. In this scenario, the trustworthiness of the devices that provide the information is crucial to avoid a malicious attack. Similarly, the transmitted information must be protected and not accessible from external unauthorized entities.  

In summary, smart city applications transform urban landscapes by leveraging IoT devices, data analytics, and AI technologies. These applications enhance various aspects of urban life, including public safety, transportation, waste management, energy usage, and water conservation. By utilizing these intelligent management systems, cities can optimize their operations, improve the quality of life for citizens, and work towards a sustainable and resilient future.

 

SOURCES:

D2.1 Use cases and requirements 

Smart Cities

WHAT IS A SMART CITY – TECHNOLOGIES, APPLICATIONS, BENEFITS, AND EXAMPLES

Applications of IoT in Smart Cities

 


Subscribe to our newsletter

Horizon Europe – Grant Agreement number 101092598
Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union. The European Union cannot be held responsible for them