DocumentCode :
3410705
Title :
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application
Author :
Brooks, Todd ; Kaarst-Brown, Michelle ; Caicedo, Carlos ; Joon Park ; McKnight, Lee
Author_Institution :
Sch. of Infonnation Studies (iSchool), Syracuse Univ., Syracuse, NY, USA
fYear :
2013
fDate :
9-12 Dec. 2013
Firstpage :
516
Lastpage :
523
Abstract :
Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker´s attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStrearnX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to ´worst case scenario´ emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.
Keywords :
business communication; cloud computing; computer crime; computer network reliability; computer network security; data communication; data integrity; grid computing; radio networks; resource allocation; GridStrearnX Edgeware application; Syracuse University Wireless Grid Innovation Testbed; WiGiT; computer information infrastructure; criminal hacker attack; data communication vehicle; distributed wireless resource; emergency response wireless grid resource; ensemble aggregation; enterprise network catastrophe; enterprise network failure; heterogeneous wireless resource; laboratory experiment; network attack; quantitative research method; security vulnerabilities; shared wireless resource; technical vulnerability exploitation; transparent services; unauthorized information system access; wireless grid Edgeware technology model; wireless grid availability; wireless grid confidentiality; wireless grid integrity; Computer crime; Media; Mobile communication; Routing protocols; Software; Edgeware; cloud computing; cyber-attacks; grid computing; hacking; virtualization; vulnerabilities; wireless grids; workplace-as-a-service;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for
Conference_Location :
London
Type :
conf
DOI :
10.1109/ICITST.2013.6750254
Filename :
6750254
Link To Document :
بازگشت