Iustin Priescu | American Association for the Advancement of Science (AAAS) (original) (raw)
Papers by Iustin Priescu
Journal of Applied Quantitative …, 2006
Abstract: Managing the security of enterprise information systems has become a critical issue in ... more Abstract: Managing the security of enterprise information systems has become a critical issue in the era of Internet economy. As any other process, security can not be managed, if it can not be measured. The need for metrics is important for assessing the current security status, to develop operational best practices and also for guiding future security research. The topic is important at a time when companies are coming under increasing compliance pressures that require them to demonstrate due diligence when protecting their data assets. Metrics give companies a way to prioritize threats and vulnerabilities and the risks they pose to enterprise information assets based on a quantitative or qualitative measure. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their information systems security process. Key words: system security, security metrics, vulnerabilities, security manageme...
As the Internet grows at a phenomenal rate email systems has become a widely used electronic form... more As the Internet grows at a phenomenal rate email systems has become a widely used electronic form of communication. Everyday, a large number of people exchange messages in this fast and inexpensive way. With the excitement on electronic commerce growing, the usage of email will increase more exponential. In this paper we present our research in developing general method for intrusion detection in email system Internet-based. The main ideas are to use data mining techniques to discover consistent and useful patterns of email system that can recognize anomalies and known intrusions.
Journal of Marine Science and Engineering, 2021
The underwater robot is part of a project with “terrestrial–maritime” collaborative robots, whose... more The underwater robot is part of a project with “terrestrial–maritime” collaborative robots, whose mission is recognition and rescue. From a structural point of view, some small changes were made in this study to the original robot. These changes consisted of making supports to hold the two plexiglass tubes, since the tube containing the battery system is larger. A larger tube was chosen because the aim was to increase the travel autonomy of the mini remotely operated vehicle (ROV). The mini submarine will move in an unstructured environment and will be able to reach a depth of 100 m. The purpose of the article is to present a point of view regarding the effect of the behavior of the mini ROV on tensions produced by the forced assembly of the sealing cover of the cylinder containing its command-and-control system. Both the gripping elements and the sealing lids are made using 3D printing technology, and the material used is polylactic acid (PLA). For the numerical analysis, the finit...
Several Internet-scale incidents from the recent years have demonstrated the ability of self-prop... more Several Internet-scale incidents from the recent years have demonstrated the ability of self-propagating code, also known as "network worms", to infect large numbers of hosts, exploiting vulnerabilities in the largely deployed operating systems and applications. Capable of infecting a substantial portion of the hosts within several minutes, and impacting the world-wide network opera- tions by generating a distributed denial of service (DDoS) attack on the whole Internet, network worms are considered a major security threat. So, a better understanding of the worms' propagation means will help to implement a more efficient detection and defense. Recent worm incidents have indicated a lot of interest in implementing a variety of scanning strategies to increase the worms' spreading speed and de- feat security defense measures. In this paper, we present some mathematical models to analyze various scanning strategies that attackers have already used or might use in the f...
Applied Sciences
Today, terrestrial robots are used in a multitude of fields and for performing multiple missions.... more Today, terrestrial robots are used in a multitude of fields and for performing multiple missions. This paper introduces the novel development of a family of crawling terrestrial robots capable of changing very quickly depending on the missions they have to perform. The principle of novelty is the use of a load-bearing platform consisting of two independent propulsion systems. The operational platform, which handles the actual mission, is attached (plug and play) between the two crawler propulsion systems. The source of inspiration is the fact that there are a multitude of intervention robots in emergency situations, each independent of the other. In addition to these costs, there are also problems with the specialization of a very large number of staff. The present study focused on the realization of a simplified, modular model of the kinematics and dynamics of the crawler robot, so that it can be easily integrated, by adding or removing the calculation modules, into the software us...
Procedia - Social and Behavioral Sciences, 2012
Procedia - Social and Behavioral Sciences, 2012
Active worms have been a persistent security threat on the Internet since the Morris worm in 1988... more Active worms have been a persistent security threat on the Internet since the Morris worm in 1988. Automatically spreaded worms or active worms, like Code Red and Nimda, can flood large part of Internet hosts in a very short amount of time. Modeling the spread of such worms can help understand how they multiply and also help monitoring and defending effectively against the propagation of worms. In this paper, we present a mathematical model which characterizes the propagation of worms that are using random scanning in wide and local area networks. We also present Code Red v2 worm as an example, giving a quantitative analysis for monitoring, detecting and defending against worms of this type.
Nowadays, the electronic communications market is in a high development, and this trend will not ... more Nowadays, the electronic communications market is in a high development, and this trend will not be diminished even by the newly world economic crisis. Studies show a significant growth in people’s interest for Information Society (IS) services, with emphasize on the mobility of the resources. On the other hand, Internet has become more than a “network of networks”, but a way of life, and user’s addict to computer systems and IS services often reveal interesting aspects and controversial in the same time. Modern forms of electronic communications rely more and more on the wireless Internet connections (Wi Fi), and this conclusion could be eventually based on the following realities: 1) Users continue to migrate to wireless technology; 2) Users prefer wireless connectivity; 3) Users are attracted by costless Internet connections; 4) Users are fascinated by the possibility of hiding their online activity and behaviour. Although certain security measures can be easily applied in order ...
Vulnerability scanning employs software that seeks out security flaws based on a database of know... more Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the networks security.In august 2010, a network perimeter security was conducted by Outpost24 together with Titu Maiorescu University for 22 Romanian e-commerce companies, as participants to the event E-Commerce Award 2010 - 5th edition 1. GPeC is an annual event dedicated to e-commerce companies where 80 criteria are used to different tests by users and specialts and the best in different domains are rewarded. The study was facilitating by Link2commerce, organizer of the event, and results had been presented during the Award Gala, on September 02, 2010.
2009 International Association of Computer Science and Information Technology - Spring Conference, 2009
ABSTRACT Denial-of-service attacks are the second most costly type of computer crime, after virus... more ABSTRACT Denial-of-service attacks are the second most costly type of computer crime, after viruses, according to the 2008 Computer Security Institute survey of security professional's at large organizations. Until recently, denial-of-service attacks were usually weapons used by novice attackers in vendettas against enemies. But like other types of malicious activity on the Internet, attackers increasingly appear to be members of criminal enterprises with financial motives. This paper focuses on techniques that can be used to identify the attackers based on tracing back flows.
Signal Processing: Image Communication, 2014
ABSTRACT Recently, the hyperchaotic maps have been investigated in order to develop more secure e... more ABSTRACT Recently, the hyperchaotic maps have been investigated in order to develop more secure encryption schemes. In this paper we propose a new hyperchaotic map derived from parametric equations of the serpentine curve. Its complex behavior was proven theoretically and numerically, using Lyapunov exponents, bifurcation diagram and correlation dimension of the attractor. The proposed map is then used in a new image encryption scheme with a classic bi-modular architecture: a diffusion stage, in which the pixels of the plain image are shuffled using a random permutation generated with a new algorithm, and a confusion stage, in which the pixels are modified with a XOR–scheme based on the proposed map. The results of its statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for image encryption.
2009 International Conference …, 2009
... Sebastian Nicolaescu Verizon Business New York, USA e-mail: sebastian.nicolaescu@ verizonbusi... more ... Sebastian Nicolaescu Verizon Business New York, USA e-mail: sebastian.nicolaescu@ verizonbusiness.com ... These innovative network security solutions include honey pots or decoys, air gaps, exit controls, self-healing tools and denial-of-service defenses. ...
… of the 7th conference on USENIX Security …, 1998
Nowadays, the electronic communications market is in a high development, and this trend will not ... more Nowadays, the electronic communications market is in a high development, and this trend will not be diminished even by the newly world economic crisis. Studies show a significant growth in people's interest for Information Society (IS) services, with emphasize on the mobility of the resources. On the other hand, Internet has become more than a "network of networks", but a way of life, and user's addict to computer systems and IS services often reveal interesting aspects and controversial in the same time. Modern forms of electronic communications rely more and more on the wireless Internet connections (Wi-Fi), and this conclusion could be eventually based on the following realities: 1) Users continue to migrate to wireless technology; 2) Users prefer wireless connectivity; 3) Users are attracted by costless Internet connections; 4) Users are fascinated by the possibility of hiding their online activity and behaviour. Although certain security measures can be easily...
Journal of Applied Quantitative …, 2006
Abstract: Managing the security of enterprise information systems has become a critical issue in ... more Abstract: Managing the security of enterprise information systems has become a critical issue in the era of Internet economy. As any other process, security can not be managed, if it can not be measured. The need for metrics is important for assessing the current security status, to develop operational best practices and also for guiding future security research. The topic is important at a time when companies are coming under increasing compliance pressures that require them to demonstrate due diligence when protecting their data assets. Metrics give companies a way to prioritize threats and vulnerabilities and the risks they pose to enterprise information assets based on a quantitative or qualitative measure. This paper presents a framework for ranking vulnerabilities in a consistent fashion, and some operational metrics used by large enterprises in managing their information systems security process. Key words: system security, security metrics, vulnerabilities, security manageme...
As the Internet grows at a phenomenal rate email systems has become a widely used electronic form... more As the Internet grows at a phenomenal rate email systems has become a widely used electronic form of communication. Everyday, a large number of people exchange messages in this fast and inexpensive way. With the excitement on electronic commerce growing, the usage of email will increase more exponential. In this paper we present our research in developing general method for intrusion detection in email system Internet-based. The main ideas are to use data mining techniques to discover consistent and useful patterns of email system that can recognize anomalies and known intrusions.
Journal of Marine Science and Engineering, 2021
The underwater robot is part of a project with “terrestrial–maritime” collaborative robots, whose... more The underwater robot is part of a project with “terrestrial–maritime” collaborative robots, whose mission is recognition and rescue. From a structural point of view, some small changes were made in this study to the original robot. These changes consisted of making supports to hold the two plexiglass tubes, since the tube containing the battery system is larger. A larger tube was chosen because the aim was to increase the travel autonomy of the mini remotely operated vehicle (ROV). The mini submarine will move in an unstructured environment and will be able to reach a depth of 100 m. The purpose of the article is to present a point of view regarding the effect of the behavior of the mini ROV on tensions produced by the forced assembly of the sealing cover of the cylinder containing its command-and-control system. Both the gripping elements and the sealing lids are made using 3D printing technology, and the material used is polylactic acid (PLA). For the numerical analysis, the finit...
Several Internet-scale incidents from the recent years have demonstrated the ability of self-prop... more Several Internet-scale incidents from the recent years have demonstrated the ability of self-propagating code, also known as "network worms", to infect large numbers of hosts, exploiting vulnerabilities in the largely deployed operating systems and applications. Capable of infecting a substantial portion of the hosts within several minutes, and impacting the world-wide network opera- tions by generating a distributed denial of service (DDoS) attack on the whole Internet, network worms are considered a major security threat. So, a better understanding of the worms' propagation means will help to implement a more efficient detection and defense. Recent worm incidents have indicated a lot of interest in implementing a variety of scanning strategies to increase the worms' spreading speed and de- feat security defense measures. In this paper, we present some mathematical models to analyze various scanning strategies that attackers have already used or might use in the f...
Applied Sciences
Today, terrestrial robots are used in a multitude of fields and for performing multiple missions.... more Today, terrestrial robots are used in a multitude of fields and for performing multiple missions. This paper introduces the novel development of a family of crawling terrestrial robots capable of changing very quickly depending on the missions they have to perform. The principle of novelty is the use of a load-bearing platform consisting of two independent propulsion systems. The operational platform, which handles the actual mission, is attached (plug and play) between the two crawler propulsion systems. The source of inspiration is the fact that there are a multitude of intervention robots in emergency situations, each independent of the other. In addition to these costs, there are also problems with the specialization of a very large number of staff. The present study focused on the realization of a simplified, modular model of the kinematics and dynamics of the crawler robot, so that it can be easily integrated, by adding or removing the calculation modules, into the software us...
Procedia - Social and Behavioral Sciences, 2012
Procedia - Social and Behavioral Sciences, 2012
Active worms have been a persistent security threat on the Internet since the Morris worm in 1988... more Active worms have been a persistent security threat on the Internet since the Morris worm in 1988. Automatically spreaded worms or active worms, like Code Red and Nimda, can flood large part of Internet hosts in a very short amount of time. Modeling the spread of such worms can help understand how they multiply and also help monitoring and defending effectively against the propagation of worms. In this paper, we present a mathematical model which characterizes the propagation of worms that are using random scanning in wide and local area networks. We also present Code Red v2 worm as an example, giving a quantitative analysis for monitoring, detecting and defending against worms of this type.
Nowadays, the electronic communications market is in a high development, and this trend will not ... more Nowadays, the electronic communications market is in a high development, and this trend will not be diminished even by the newly world economic crisis. Studies show a significant growth in people’s interest for Information Society (IS) services, with emphasize on the mobility of the resources. On the other hand, Internet has become more than a “network of networks”, but a way of life, and user’s addict to computer systems and IS services often reveal interesting aspects and controversial in the same time. Modern forms of electronic communications rely more and more on the wireless Internet connections (Wi Fi), and this conclusion could be eventually based on the following realities: 1) Users continue to migrate to wireless technology; 2) Users prefer wireless connectivity; 3) Users are attracted by costless Internet connections; 4) Users are fascinated by the possibility of hiding their online activity and behaviour. Although certain security measures can be easily applied in order ...
Vulnerability scanning employs software that seeks out security flaws based on a database of know... more Vulnerability scanning employs software that seeks out security flaws based on a database of known flaws, testing systems for the occurrence of these flaws and generating a report of the findings that an individual or an enterprise can use to tighten the networks security.In august 2010, a network perimeter security was conducted by Outpost24 together with Titu Maiorescu University for 22 Romanian e-commerce companies, as participants to the event E-Commerce Award 2010 - 5th edition 1. GPeC is an annual event dedicated to e-commerce companies where 80 criteria are used to different tests by users and specialts and the best in different domains are rewarded. The study was facilitating by Link2commerce, organizer of the event, and results had been presented during the Award Gala, on September 02, 2010.
2009 International Association of Computer Science and Information Technology - Spring Conference, 2009
ABSTRACT Denial-of-service attacks are the second most costly type of computer crime, after virus... more ABSTRACT Denial-of-service attacks are the second most costly type of computer crime, after viruses, according to the 2008 Computer Security Institute survey of security professional's at large organizations. Until recently, denial-of-service attacks were usually weapons used by novice attackers in vendettas against enemies. But like other types of malicious activity on the Internet, attackers increasingly appear to be members of criminal enterprises with financial motives. This paper focuses on techniques that can be used to identify the attackers based on tracing back flows.
Signal Processing: Image Communication, 2014
ABSTRACT Recently, the hyperchaotic maps have been investigated in order to develop more secure e... more ABSTRACT Recently, the hyperchaotic maps have been investigated in order to develop more secure encryption schemes. In this paper we propose a new hyperchaotic map derived from parametric equations of the serpentine curve. Its complex behavior was proven theoretically and numerically, using Lyapunov exponents, bifurcation diagram and correlation dimension of the attractor. The proposed map is then used in a new image encryption scheme with a classic bi-modular architecture: a diffusion stage, in which the pixels of the plain image are shuffled using a random permutation generated with a new algorithm, and a confusion stage, in which the pixels are modified with a XOR–scheme based on the proposed map. The results of its statistical analysis show that the proposed image encryption scheme provides an efficient and secure way for image encryption.
2009 International Conference …, 2009
... Sebastian Nicolaescu Verizon Business New York, USA e-mail: sebastian.nicolaescu@ verizonbusi... more ... Sebastian Nicolaescu Verizon Business New York, USA e-mail: sebastian.nicolaescu@ verizonbusiness.com ... These innovative network security solutions include honey pots or decoys, air gaps, exit controls, self-healing tools and denial-of-service defenses. ...
… of the 7th conference on USENIX Security …, 1998
Nowadays, the electronic communications market is in a high development, and this trend will not ... more Nowadays, the electronic communications market is in a high development, and this trend will not be diminished even by the newly world economic crisis. Studies show a significant growth in people's interest for Information Society (IS) services, with emphasize on the mobility of the resources. On the other hand, Internet has become more than a "network of networks", but a way of life, and user's addict to computer systems and IS services often reveal interesting aspects and controversial in the same time. Modern forms of electronic communications rely more and more on the wireless Internet connections (Wi-Fi), and this conclusion could be eventually based on the following realities: 1) Users continue to migrate to wireless technology; 2) Users prefer wireless connectivity; 3) Users are attracted by costless Internet connections; 4) Users are fascinated by the possibility of hiding their online activity and behaviour. Although certain security measures can be easily...