• List of Articles Attacks

      • Open Access Article

        1 - HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
        Bita Amirshahi Ali Ahangari
      • Open Access Article

        2 - Comparison of Cognitive - Behavioral Therapy, Desensitization with Eye Movements and Biofeedback on Migraine Attacks, Anxiety Sensitivity, Quality of Sleep and Life
        Elahe Mehrmanesh fariba hafezi parvin ehteshamzadeh saeed bakhtiarpour
        Introduction: Considering the negative psychological consequences of migraine, this study was conducted with the aim of comparing cognitive-behavioral therapy, desensitization with eye movements and biofeedback on migraine attacks, anxiety sensitivity, and quality of sl More
        Introduction: Considering the negative psychological consequences of migraine, this study was conducted with the aim of comparing cognitive-behavioral therapy, desensitization with eye movements and biofeedback on migraine attacks, anxiety sensitivity, and quality of sleep and life of women with migraine. Methods: The present research was semi-experimental with a pretest, posttest and follow-up design with a control group. The research population was all women suffering from migraine headaches who referred to Ayandeh Chashmandaz Clinic of Tehran city in 2020 year, which number of 60 people of them were selected by simple random sampling and randomly assigned to four equal groups. The cognitive-behavioral therapy group received 11 sessions of 90 minutes as a group, the eye movement desensitization and reprocessing group received 12 sessions of 90 minutes as an individual, the biological feedback group received 15 sessions of 45 minutes as an individual, and during this time the group did not receive training. The data were collected with headache diary note form, anxiety sensitivity inventory, Pittsburgh sleep quality index and quality of life questionnaire and were analyzed by multiple variance analysis method in SPSS version 25 software. Results: The findings showed that in both posttest and follow-up stages in number and intensity of migraine attacks the effect of all three intervention methods was greater than the control group, and the effect of cognitive-behavioral therapy was greater than eye movement desensitization and reprocessing and biological feedback (P<0.05), but there was no significant difference between the two methods of eye movement desensitization and reprocessing and biological feedback (P>0.05). In during migraine attacks the effect of all three intervention methods was greater than the control group, and the effect of cognitive-behavioral therapy was greater than eye movement desensitization and reprocessing and biological feedback, and the effect of eye movement desensitization and reprocessing was greater than biological feedback (P<0.05). Also, in both posttest and follow-up stages in anxiety sensitivity and sleep quality the effect of all three intervention methods was greater than that control group (P<0.05), but there was no significant difference between the methods (P>0.05). In addition, in both posttest and follow-up stages in quality of life the effect of all three intervention methods was greater than the control group, and the effect of cognitive-behavioral therapy was greater than eye movement desensitization and reprocessing and biological feedback (P<0.05), but there was no significant difference between the two methods of eye movement desensitization and reprocessing and biological feedback (P>0.05). Conclusion: According to the results of the current research, health therapists and professionals can be use all three methods of cognitive-behavioral therapy, with eye movement desensitization and reprocessing and biological feedback, especially cognitive behavioral therapy to improve migraine attacks, anxiety sensitivity, sleep quality and quality of life of women with Migraine. Manuscript profile
      • Open Access Article

        3 - Analyses the land use zoning based on provide passive defense approach (case study: district 11 of Tehran city)
        حسن حسینی امینی صالح اسدی مهدی برنافر طاها ربانی
        Introduction and purpose of research: Wanted or unwanted wares mixed with life and livelihood of the human kind and it seemed that is some case there is no way to escape it. During the war, Cities as centers of capital and human accumulation can be become a major More
        Introduction and purpose of research: Wanted or unwanted wares mixed with life and livelihood of the human kind and it seemed that is some case there is no way to escape it. During the war, Cities as centers of capital and human accumulation can be become a major goal for enemy thus attacked to them can be cause a lot of damage .So the discussion of passive defense can amount to considerably reduce the damage caused by the war. So one of the discussion of passive defense that can amount to considerably reduce the damage caused by the war is appropriate urban land use zoning. The purpose of the zoning is rational use of urban land in the long term future. Urban in Land Use zoning, observation of neighborhood and lack of risk in urban areas can reduce the effects of potential threats. Research method:  in this Research land use zoning of the (11 district of Tehran) was investigated to provide general guidelines for reducing the vulnerability of the military attacks. Type of the study is descriptive study of practice and the method of the study is descriptive-analytic method. Results: According to the conducted analysis, signified that urban and trans-national performance caused to certain zoning. Mixed residential and transnational performance zone of this region can be cause of vulnerabilities of  this area in  military attack. Manuscript profile
      • Open Access Article

        4 - A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks
        Abbasgholi Pashaei Mohammad Esmaeil Akbari Mina Zolfy Lighvan Asghar Charmin
      • Open Access Article

        5 - Adversarial Attacks in a text sentiment Analysis model
        Sahar Mokarrami Sefidab Seyed Abolghasem Mirroshandel hamidreza Ahmadifar Mahdi Mokarrami
        Background and Purpose: Recently some researchers have shown that deep learning models, despite their high accuracy, can be vulnerable through some manipulations of their input samples. This manipulation leads to the production of new samples called Adversarial examples More
        Background and Purpose: Recently some researchers have shown that deep learning models, despite their high accuracy, can be vulnerable through some manipulations of their input samples. This manipulation leads to the production of new samples called Adversarial examples. These samples are very similar to the original ones, so humans cannot differentiate between these samples and the original, and cannot remove them from the dataset before predicting the model and preventing model errors. Various types of research have been done to generate malicious samples and inject them into the model, among which, the production of text samples has its own difficulties due to the discrete nature of the text. In this research, we tried to reach the highest level of vulnerability by providing a method with the least manipulation of the input data, and by testing the proposed method, we were able to bring the accuracy of CNN and LSTM models to less than 10%.Methods: In this research, for making malicious samples, first, a word that can increase the amount of error in the classification prediction is selected from the word dictionary as a candidate word for replacement by using Taylor expansion and then considering the importance of each word in the calculated cost of the corresponding candidate word, we proposed an arrangement for substitution between words. Finally, we moved the words in the specified order until the output of the model changed.Results: The evaluation of the presented method on two sentiment analysis models, LSTM and CNN, has shown that the proposed method has been very effective in reducing the accuracy of both models to less than 10% with a small number of replacements and this indicates the success of the proposed method compared to some other similar methods.Conclusion: As mentioned, most of the attention of science and industry is on the production of different systems using deep learning methods, so their security of them is also important. It is important to increase the strength of the models against adversarial examples. In this research, a method with the least amount of manipulation was presented to produce textual conflict samples. It seems that in the future it will be possible to use different methods of making natural texts to produce samples that, in addition to the apparent similarity to the original sample, are also comprehensible in terms of content. Manuscript profile
      • Open Access Article

        6 - The function of regional organizations in cyber wars
        Tajmohammad Sadeghi Leila raisi Alireza ansari mahyari
        With the expansion of the cyber space, a new arena of threats has been created for governments in the form of cyber threats, and it has affected various aspects of national security, including social, economic, military and political security. It has affected internatio More
        With the expansion of the cyber space, a new arena of threats has been created for governments in the form of cyber threats, and it has affected various aspects of national security, including social, economic, military and political security. It has affected international and regional security, which requires the necessary solutions to minimize the damage caused by this type of threats and maintain international security. Therefore, this article examines the role of regional organizations in preventing cyber-attacks by using the descriptive-analytical method, The hypothesis proposed in this research is that since governments are increasingly focused on unilateral policies and initiatives to deal with cyber threats, regional organizations should play an active role in shaping cooperation among members in the form of approaches focused on International and regional cooperation in the field of cyber security and prevention of cyber threats and the development of the global cyber security system. The findings of the research show that regional organizations such as NATO, the European Union, Shanghai, ASEAN, the Organization for Security and Cooperation in Europe and the Organization of American States have taken measures to reduce damages caused by cybercrimes and counter cyber-attacks, including They have started to increase knowledge and establish cyber laws, regional cooperation, information sharing, infrastructure strengthening and trust building Manuscript profile
      • Open Access Article

        7 - Security in the Internet of Things (IoT): A review of the status, challenges and future issues )
        Alireza Zamani
      • Open Access Article

        8 - Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
        Reza Abbasgolizadeh Habib Izadkhah ramin meshkabadi
      • Open Access Article

        9 - Taxonomy of Threats and Attacks in IoT
        Maryam Shamsadini Ali Ghaffari
      • Open Access Article

        10 - Investigation of the Ways to Reduce Cyberattacks from the Perspective of the International Humanitarian Law
        hadi mahmoodi Alireza Ansari mahyari
        Human progress in various political and social fields creates new opportunities and challenges.  One of such challenges is cyber-attacks which are considered as a threat to human life due to the increasing development of technology and the development of virtual sp More
        Human progress in various political and social fields creates new opportunities and challenges.  One of such challenges is cyber-attacks which are considered as a threat to human life due to the increasing development of technology and the development of virtual space in different parts of the world. The purpose of the present article is to examine the ways to reduce cyber-attacks from the perspective of the International Humanitarian Law. This article is conducted employing descriptive-analytical method. The results of the investigations led the authors to reach the conclusion that the rules and regulations of International Humanitarian law do not cover the entire framework of cyber war and cyber-attack but, due to the existential philosophy of humanitarian law, it covers civilian protection as well as other principles such as the Principles of Proportionality and Distinction and, therefore, these principles and regulations still remain applicable and, wherever there are no regulations, it is necessary to refer to the Customary International Humanitarian Law, and in particular situations, the International Humanitarian Law itself must be implemented and applied. On the other hand, due to the lack of consensus of the international community and ambiguity in implementation of some of these principles and rules, with the gradual development in the field of current contractual and customary rules, even the existing ambiguities can also be resolved Manuscript profile
      • Open Access Article

        11 - Possible Responses to Cyber Attacks from the perspective of International Law
        Azar Givkey
        Cyber-attacks, while as easy as pushing a button, can have devastating and possibly catastrophic consequences such as the destruction, disabling or malfunctioning of critical infrastructure. Such an inevitable action certainly has to be timely and appropriately responde More
        Cyber-attacks, while as easy as pushing a button, can have devastating and possibly catastrophic consequences such as the destruction, disabling or malfunctioning of critical infrastructure. Such an inevitable action certainly has to be timely and appropriately responded by the affected states. Although the issue of international responsibility of states, as a broad concept of cyber-attacks, faces many challenges, assuming that the aggrieved State is able to identify the source of the cyber-attack and also able to attribute the same to a country, the question that arises is: what legal solutions exist for the aggrieved government in order to respond appropriately and realize its right. In this article, which has employed library studies and analytical and descriptive methodology, we intend to examine the types of possible responses to cyber-attacks by the aggrieved governments and the conditions for using each of the possible responses. Manuscript profile
      • Open Access Article

        12 - Challenges of Applying the Principles of Armed Conflict to Cyber Attacks Case Study: Observance of the Principle of Prohibition of the Use of Force and the Principle of Distinction in Cyber Attacks
        Zohre Sadeghi MohammadJavad Arabian
        Due to the many advantages of cyber attacks as a new method of warfare compared to the conventional and traditional methods of war, the attention of different countries has been drawn to this phenomenon over the recent years. Furthermore, noting the point that the effor More
        Due to the many advantages of cyber attacks as a new method of warfare compared to the conventional and traditional methods of war, the attention of different countries has been drawn to this phenomenon over the recent years. Furthermore, noting the point that the efforts of some countries and international assemblies to systematize the tools, methods and effects of this style of attack and conflict still face a lack of consensus and, as a consequence, have not resulted in creation of an international document, the international lawyers have faced many challenges in dealing with this phenomenon and its destructive effects on the important and vital infrastructure of countries and defending the rights of nations against cyber attacks.There are now many legal rules governing the situations in which states can resort to force as well as the point as how they can resort to force in armed conflicts. Some of these rules do not apply specifically to cyber attacks including the rules related to the protection of the Wounded, Sick and Shipwrecked. Other rules include general principles that apply to cyberattacks. Nevertheless, it seems that the gap between conventional weapons such as biological and chemical weapons and methods of cyber-attack can be very large. This article addresses the Principle of Prohibition of the Use of Force and the Principle of Distinction and examines the challenges of applying the same to the cyber attacks. Manuscript profile
      • Open Access Article

        13 - The Scope of the Principle of Non-Use of Force in Cyber Attacks in the Framework of the United Nations Charter
        Peyman Hakimzade Khoei Reyhane Derogari
        The global interconnectedness created through information technology provides a potentially powerful weapon for states and non-state actors to remotely disable or destroy military defense networks. Sending excessive data requests to an internet website, "server or route More
        The global interconnectedness created through information technology provides a potentially powerful weapon for states and non-state actors to remotely disable or destroy military defense networks. Sending excessive data requests to an internet website, "server or router" can be used as a weapon to destroy major information networks or to infiltrate private networks. The present study, employing descriptive-analytical methods, investigates the possibility of applying the Principle of Non-recourse to Force as an absolute rule of international law in relation to cyber-attacks and existing legal challenges. The questions that arise are: can the cyber attacks be prohibited according to the Principle of Non-recourse to Force in the light of the Article 4 of the Paragraph 4 of the Charter? If so, can the cyber attack allow the use of military in legitimate defence as per the Article 51 of the charter? The findings show that although cyber-attacks may not cause physical damage, and in other words, they do not violate Article 2, Clause 4 of the Charter but, the principle of non-intervention, as a powerful international legal tool, can be used by states to protect and counter cyber-attacks Manuscript profile
      • Open Access Article

        14 - Right to “Self-Defense” against Cyber-attacks with an Emphasis on the Attacks of the United States of America
        Saeid Eid koshayesh Hossein Sorayaii Azar jahangir bagheri
        Hostile actions and resorting to coercive force in the cyberspace fields are very important issues that could challenge fundamental principles of the international law. Many States consider the cyberspace as a battlefield and intend to inflict damages through it to thei More
        Hostile actions and resorting to coercive force in the cyberspace fields are very important issues that could challenge fundamental principles of the international law. Many States consider the cyberspace as a battlefield and intend to inflict damages through it to their opponent states. United States is considered an avant-garde in these issues. The United States possess many advanced technologies in cyberspace field. In this respect, the necessity of self-defense (legitime defense) against cyber-attacks seems inevitable, although from “treaty law” point of view it lacks the basic internationally supported legislations. It remains to be clarified whether the 51th Article of the United Nations Charter could be used as a legal base for cyber self-defense or not and if that could be entitled self-defense or not. This study employs descriptive-analytical method through data analyzing system. Findings of this study indicate that in the event of a cyber-attack by a State or its agents, a cyber-self-defense could be legally justifiable provided that the legal conditions of the self-defense such as compatibility of self-defense with the attacks and some other international law principles (principle of non-use of force for example) are met, Of course, in the path of self-defense, the principle of proportionality must be observed as the main rule, and as soon as the Security Council effectively intervenes in the crisis, the defense must be terminated. Manuscript profile
      • Open Access Article

        15 - Reducing the impact of SYN flood attacks by improving the accuracy of the PSO algorithm by adaptive effective filters
        Mohammad Momeny Sorayya Gharravi Fateme Hourali
        TCP connection management is susceptible to a classic attack called SYN-flooding. In this attack, the source sends a large number of SYN segments to the victim system, without completing the third step of the three-step handshaking algorithm. This lead to consuming the More
        TCP connection management is susceptible to a classic attack called SYN-flooding. In this attack, the source sends a large number of SYN segments to the victim system, without completing the third step of the three-step handshaking algorithm. This lead to consuming the resources allocated to communicate with under attack system and bandwidth of the network quickly and, as a result, system cannot continue to work and engage in unnecessary requests. This paper models the attacked system using quadratic theory and maps the problem of defense against SYN-flooding attacks into an optimization problem. Then, using an effective adaptive filter combination with the PSO algorithm, it presents its proposed method and solves this problem. The simulation results show that the proposed defense mechanism has a significant performance in terms of the amount of blocked requests, the likelihood of success in communication, the likelihood of success of the attacker, and the optimal use of the dedicated buffer. Manuscript profile
      • Open Access Article

        16 - Combined Intrusion Detection System to deal with Cyber- Attacks in Industrial Control Systems with a Dedicated Network
        Mohammad Safari Elham Parvinnia Alireza Keshavarz Haddad
        Most control systems use a dedicated communication network with specific protocols. Intrusion detection systems developed based on network traffic with standard protocols, or existing datasets can not detect significant threats on these control systems. New sophisticate More
        Most control systems use a dedicated communication network with specific protocols. Intrusion detection systems developed based on network traffic with standard protocols, or existing datasets can not detect significant threats on these control systems. New sophisticated malicious codes usually attacked these systems by sending known and understandable commands to the control systems and ultimately sabotaging the physical process. These attacks do not alter network traffic, so they are not detectable with standard network-based intrusion detection systems. In this paper, we proposed an innovative combined method for identifying different types of attacks on control systems with a dedicated network. We have provided a combination of methods for detecting semantic or stealth attacks and identifying attacks that affect the traffic of the control system network. For the first time in practice, the effect of common types of attacks on a control system with a specific network has been investigated, and the rules for detecting these attacks have been obtained. Experimental results in this study show that the extracted rules identify 100% of the already known attacks. The proposed new approach, based on identifying the control system commands from the extracted network records, also thoroughly detects semantic attacks. The process data behavioral method used in this study can detect about 99% of semantic attacks using classification algorithms base on Data set which is created in this study. Manuscript profile
      • Open Access Article

        17 - Intrusion Response System for SIP based Applications with Engineered Feature Set
        Hassan Asgharian Ahmad Akbari Bijan Raahemi
      • Open Access Article

        18 - Cyber attacks and the need to respect the basic principles of humanitarian law in them
        Azar Givkey Mohammad Ali Kafaeifar Mohammad Taghi Rezaei
        Along with the increasing progress of communication sciences and information technology, we are witnessing the change of battlefields, from land to its traditional sense to land in the virtual sense, and the use of force and hostile actions in cyberspace through cyber a More
        Along with the increasing progress of communication sciences and information technology, we are witnessing the change of battlefields, from land to its traditional sense to land in the virtual sense, and the use of force and hostile actions in cyberspace through cyber attacks. Cyber-attacks, like other attacks in traditional ways, have been identified as a manifestation of the coercion of countries against each other, and given their destructive and sometimes catastrophic effects, the need to adhere to the principles and rules of international humanitarian law seems clear. Arrives. In this research, an attempt has been made to describe the basic principles of international humanitarian law in relation to cyber attacks and wars from a descriptive-analytical point of view, after defining the basic principles of international humanitarian law and reviewing Tallinn's guidelines as a document. Non-binding In order to customize the international law related to cyber attacks, the necessity of observing these principles has been proven according to the predictable conditions in cyber attacks and to generalize these basic principles to cyber attacks. Manuscript profile
      • Open Access Article

        19 - Consequences of the policymaker's reaction to speculative attacks in the foreign exchange market: The role of the quality of political institutions
        Shahram Jafarzadeh Gollo Hossein Abbasinejhad Teymour rahmani Sajjad Barkhordari
        Abstract Monetary policymakers can choose between intervention or non-intervention to defend the national currency against speculative attacks in the foreign exchange market. Given the incomplete information of the central bank about the severity of the attack, it is n More
        Abstract Monetary policymakers can choose between intervention or non-intervention to defend the national currency against speculative attacks in the foreign exchange market. Given the incomplete information of the central bank about the severity of the attack, it is necessary to be aware of the relative consequences of each of the reactions in the unit of economic indicators as a result of each of its possible responses. This study examines these consequences in the unit of changes in GDP and inflation for developing and emerging countries and in the period 1960 to 2018 examines the role of the quality of political institutions between selected countries. The results obtained from the instantaneous reaction functions for GDP and inflation as a result of three possible types of central bank responses including intervention with success, intervention with failure and non-intervention in the foreign exchange market show that in the absence of quality indicators of political institutions Low cost will not face a clear and unequivocal answer. In terms of the quality of political institutions, intervention in the foreign exchange market is preferred in the group of countries with high quality political institutions due to the increasing reputation and credibility of the policies announced by the Independent Central Bank. Findings show that in the group of countries with moderate quality of political institutions, non-intervention of policymakers in the foreign exchange market is associated with increased GDP growth and low inflation and is preferable to intervention in the foreign exchange market. In the group of countries with low quality political institutions, intervention in the foreign exchange market is less risky than non-intervention, and the low-cost response is to defend the national currency. Manuscript profile
      • Open Access Article

        20 - Comparing Study of Strategies of the EU and U.S. in relation to Combat with Terrorism
        Ardeshir Sanaie
        Up sep.11, 2011 terrorist attacks to world trade organization (WTO) as most effective terrorist attacks which was regarded as turning point at international relations: the issue of terrorism was changed into security agenda. In fact sep.11,2001 terrorist attacks: the More
        Up sep.11, 2011 terrorist attacks to world trade organization (WTO) as most effective terrorist attacks which was regarded as turning point at international relations: the issue of terrorism was changed into security agenda. In fact sep.11,2001 terrorist attacks: the issue of terrorism was changed into factor in the way of formation to foreign policy of some countries and in the field of international policy: each country based on its values and norms fight against asymmetric threats and terrorism and selected specific strategy. In his way following up sep.11, 2011 terrorist attacks in U.S.A the doctrine of war against terrorism and combat with mass destruction weapons was compiled by neoconservative party. E.U. approved strategy of combat with mass destruction weapons: which resulted in coalition of great worlds powers against terrorism. In the way of combat with terrorism, Sep.11, 2011 terrorist attacks prepared suitable grounds for attacks of U.S.A to Afghanistan in year 2001 and following up attack to Iraq in year 2003 without accompany of EU countries such as: France and Germany and regardless to U.N. which resulted in great gap between relations of EU beyond Atlantic region and U.S.A in the field of combat with terrorism. In the present research it is dealt with this question that: What is similarity and difference among strategies of EU and U.S.A in relation to combat with terrorism?  Manuscript profile
      • Open Access Article

        21 - A Mechanism for Detecting and Identifying DoS attack in VANET
        Keyvan Khajavi Navid Hajhassan