{"title":"利用脚本控制用户访问以减轻网络攻击","authors":"","doi":"10.1016/j.sciaf.2024.e02355","DOIUrl":null,"url":null,"abstract":"<div><div>With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.</div></div>","PeriodicalId":21690,"journal":{"name":"Scientific African","volume":null,"pages":null},"PeriodicalIF":2.7000,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Controlling user access with scripting to mitigate cyber-attacks\",\"authors\":\"\",\"doi\":\"10.1016/j.sciaf.2024.e02355\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.</div></div>\",\"PeriodicalId\":21690,\"journal\":{\"name\":\"Scientific African\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":2.7000,\"publicationDate\":\"2024-09-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Scientific African\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2468227624002977\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MULTIDISCIPLINARY SCIENCES\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scientific African","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2468227624002977","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MULTIDISCIPLINARY SCIENCES","Score":null,"Total":0}
引用次数: 0
摘要
随着动态数字环境中的威胁与日俱增,企业正努力通过限制用户访问大多数通信系统来应对网络攻击这一艰巨任务。本研究旨在开发一种 Linux 脚本,以积极应对组织环境中日益增多的网络攻击,防止基于用户疏忽的攻击载体。主要目的是通过脚本自动化设计出创造性的解决方案,在预定义的时间框架内限制用户访问组织网络,从而减轻潜在的网络威胁。用于定义用户访问预定义时间框架的标准包括限制用户在下班时间访问,脚本旨在解决跨站脚本 (XSS) 和 SQL 注入等网络攻击问题。为了实现本文的目标,我们采取了开发脚本所需的必要步骤和逻辑。例如,有几种合适的语言可用于编写脚本,如 Bash、Python 或 Perl。本文之所以选择 Bash,是因为它擅长为现有的命令行工具和实用程序编写脚本,是使用 Vim 文本编辑器工具自动执行任务的最佳选择。运行最终的脚本,找出一些错误,并根据需要进行修改,以确保其正常运行。这一阶段对于通过完善代码、使用高效算法和采纳最佳实践来提高脚本的性能、可读性和可维护性是必要的。最后,部署各种用户输入和场景,将脚本投入生产,用于用户访问管理。所采用的脚本指标(如脚本执行时间、资源利用率、成功率和错误率)有助于评估脚本的性能、效率和效果。脚本的执行时间为 0.032 秒,成功率为 1,错误率为 0。开发的 Linux 脚本与不同操作系统、硬件平台和网络架构的兼容性不会对适应各种组织环境产生影响。脚本没有显示出任何挑战,但实际部署可能会显示出与实施解决方案相关的一些潜在挑战和限制,如资源限制和遗留系统兼容性。
Controlling user access with scripting to mitigate cyber-attacks
With the growing threats in the dynamic digital landscape, organizations are grappling with the difficult task of managing cyber-attacks by restricting user accessibility to most communication systems. This study aimed to develop a Linux script as a proactive response to the growing of cyber-attacks in organizational settings to prevent attacking vectors based on user negligence. The primary objective was to devise inventive solutions through script automation to restrict user access to the organizational network within predefined time frames, thereby mitigating potential cyber threats. The criteria used to define predefined time frames for user access, include the restriction of users on off duty times, The scripting seeks to address cyber-attacks targeted such as cross-site scripting (XSS) and SQL injection. To achieve the goal of this paper, the necessary steps and logic required to develop the scripts were taken. For instance, there are several suitable languages such as Bash, Python, or Perl, that can be used to write script. The paper selected Bash because it excels at scripting existing command-line tools and utilities, making it a great choice for automating tasks by using Vim text editor tool. The final scripts were run, some errors were identified, and modified as needed to ensure it worked correctly. This phase was necessary to improve the script's performance, readability, and maintainability by refining code, using efficient algorithms, by incorporating best practices. Finally, the various user inputs and scenarios were deployed to put the script into production for user access management. The adopted script metrics deployed such as Script Execution Time, Resources Utilization, Success Rate and Error Rate helped in evaluating the performance, efficiency, and effectiveness of the scripts. The implementation of the script achieved an executive time of 0.032 s, success rate was 1 and error rate was 0. The practical implementation in organizations can be scaled up or down depending on the organization's size and infrastructure. The compatibility of the developed Linux script with different operating systems, hardware platforms and network architectures will have no impact in adapting to various organizational environments. The script did not show any challenges, but real-world deployment may exhibit some potential challenges and limitations that may be associated with implementing the solution, such as resource constraints and legacy system compatibility.