The Combination of Cyber Security, Excessive Programming, and Available Technology to Create an Effective Weapon

Main Article Content

Osamah Ibrahim Mohammed Mohammed

Abstract

This research presents a model for designing a military terrestrial drone from available technology by using Raspberry Pi, the proposed model should fulfill the general requirements by providing a secure remote connection, a camera control application with a reliable targeting system, and motion control. We suggested SSH connection with cyber-attack simulation by Ettercap and sslstrip tool to test its reliability, and mark vulnerabilities if exist, as for the camera application and targeting system, python was our main language to write it and we used the SSD object detection method of machine learning for the camera to be able to identify and track objects it sees, python libraries like Tkinter along with PIL library was used to create the application GUI interface and its functions along with OpenCV to provide algorithms for video stream processing and displaying, we used OpenCV also for object detection algorithms writing, and socket was used to create a client-server connection on raspberry pi and windows controlling machine to transfer the targeting control signal, as for the controlling of motion functions its done through SSH PutTTY app and the python curses library. The research’s goal is to prove a theory regarding the military technology in the Middle East of mostly using available and civilian-accessed technology provided in stores to manufacture weapons that could show great performance on the battlefield, we improvised this principle in drone manufacture due to its significant role in modern days war.

Downloads

Download data is not yet available.

Article Details

How to Cite
The Combination of Cyber Security, Excessive Programming, and Available Technology to Create an Effective Weapon (Osamah Ibrahim Mohammed Mohammed , Trans.). (2024). International Journal of Emerging Science and Engineering (IJESE), 12(11), 23-30. https://doi.org/10.35940/ijese.D4054.12111024
Section
Articles

How to Cite

The Combination of Cyber Security, Excessive Programming, and Available Technology to Create an Effective Weapon (Osamah Ibrahim Mohammed Mohammed , Trans.). (2024). International Journal of Emerging Science and Engineering (IJESE), 12(11), 23-30. https://doi.org/10.35940/ijese.D4054.12111024
Share |

References

H. H. Alsaadi, M. Aldwairi, M. Al Taei, M. AlBuainain, M. AlKubaisi. Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2, 2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2018. https://doi.org/10.1109/NTMS.2018.8328710

I. H. Huang, W. J. Tzeng, S. W. Wang, C. Z. Yang, “Design and Implementation of a Mobile SSH Protocol,” TENCON 2006 - 2006 IEEE Region 10 Conference, 2006. https://doi.org/10.1109/TENCON.2006.343956

T.Sunitha, Dr. G.Lavanya, “A Novel Approach for Object Detection using Integrated Approach,” 2022 International Conference on Electronics and Renewable Systems (ICEARS), 2022. https://doi.org/10.1109/ICEARS53579.2022.9752373

X. Wua, , D. Sahoo b, S. Hoi, “Recent advances in deep learning for object detection,” Neurocomputing, Vol. 396, pp. 39-64, 2020. https://doi.org/10.1016/j.neucom.2020.01.085

A. Ornaghi M. Valleri, “Man in the middle attacks,” 2003 Blackhat Conference Europe, 2003

K. A. Radhika, B. L. Raksha, B. R. Sujatha, U. Pruthviraj, K. V. Gangadharan, “IoT Based Joystick Controlled Pibot Using Socket Communication,” 2018 IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), 2018. https://doi.org/10.1109/DISCOVER.2018.8674130

S. González, Á. Herrero, J. Sedano, U. Zurutuza, E. Corchado, “Different approaches for the detection of SSH anomalous connections Different approaches for the detection of SSH anomalous connections,” Logic Journal of the IGPL, Vol. 24, no. 1, pp. 104-114, 2016. https://doi.org/10.1093/jigpal/jzv047

O. Gasser, R. Holz, G. Carle, “A deeper understanding of SSH: Results from Internetwide scans,” 2014 IEEE Network Operations and Management Symposium (NOMS), 2014. https://doi.org/10.1109/NOMS.2014.6838249

F. Callegati, W. Cerroni, M. Ramilli “Man-in-the-Middle Attack to the HTTPS Protocol” IEEE Security & Privacy, Vol. 7, no. 1, pp. 78-81, 2009. https://doi.org/10.1109/MSP.2009.12

D. Fairweather, H. Mozer, S. Rinehart, D. Shin, “An Enhanced Approach To Preventing the SSLstripping Attack,” 2015 International Conference on Information and Communication Technology Convergence (ICTC), South Korea, 2015. https://doi.org/10.1109/ICTC.2015.7354559

Z. Guo, T. Okuyama, M. Finley, “A New Trust Model for PKI Interoperability,” Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05), 2005. https://doi.org/10.1109/CSITSS54238.2021.9683011

A. Shariff, R. Bhatia, R. Kuma, S. Jha, “Vehicle Number Plate Detection Using Python and Open CV,” 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), India, 2021.

R. G. Kummar, S.J. Shetty, S. N. Vishwas, P J. Upadhya, J. R Munavalli, “Edu-bot: An AI based Smart Chatbot for Knowledge Management System,” 2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), 2021.

Y. Pan, F. Dong, “Suppression and Enhancement of Overlapping Bounding Boxes Scores in Object Detection,” 2019 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), United Arab Emirates, 2019. https://doi.org/10.1109/ISSPIT47144.2019.9001826

W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. Reed, C. Fu, A. Berg, “SSD: Single Shot MultiBox Detector,” arXiv platform. Computer Vision and Pattern Recognition, pp. 21-36, 8 Dec 2015. https://doi.org/10.1007/978-3-319-46448-0_2

N. Hossain, M. Kabir, T. Rahman, M. Hossen, F. Salauddin, “A Real-time Surveillance Mini-rover Based on OpenCV-Python-JAVA Using Raspberry Pi 2,” 2015 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), Malaysia, 2015. https://doi.org/10.1109/ICCSCE.2015.7482232

R. K. Megalingam, S. Tantravahi, H. Tammana, N. Thokala, H. Puram, N. Samudrala, “Robot Operating System Integrated robot control through Secure Shell (SSH),” 2019 3rd International Conference on Recent Developments in Control, Automation & Power Engineering (RDCAPE), India, 2019.

R. Williams, E. McMahon, S. Samtani, M. Patton, H. Chen “Identifying Vulnerabilities of Consumer Internet of Things (IoT) Devices,” 2017 IEEE International Conference on Intelligence and Security Informatics (ISI), Beijing, 2017. https://doi.org/10.1109/ISI.2017.8004904

M. Shah, M. Junaid, S. Ahmed, H. Khan, K. Saeed, A. rehman, “Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool,” 2019 2nd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 2019. https://doi.org/10.1109/ICOMET.2019.8673520

J. A. Clark “Pillow (PIL) fork 9.4.0 documentation,” 2023. [Online]. FAvailable: https://pillow.readthedocs.io/en/stable/index.html. [Accessed Jan 20 2023].

S. Annotate “Introduction to the COCO Dataset,” 2021. [Online]. Available: https://opencv.org/introduction-to-the-coco-dataset/ . [Accessed Jan 20 2023].

Wei Lin. “Extracting Coefficients of OpenCV Face Detection DNN model. towards data science,” 2020. [Online]. Available: https://towardsdatascience.com/extractingcoefficients-of-opencv-face-detection-dnn-model-7f3d944898b9 . [Accessed 13 Feb 2023].

B. Liu, R. Rajasekar, A. Shukla, A. Solomon, L. Xu, Integrating “Natural Language Processing and Computer Vision into an Interactive Learning Platform,” 2020 IEEE MIT Undergraduate Research Technology Conference (URTC), 2020. https://doi.org/10.1109/URTC51696.2020.9668869

A. Kuchling. A. Belopolsky, G. Brandl, A. Kuchling, and E. Melotti. “Unicode how to,”2023.[Online].Available:https://docs.python.org/3/howto/unicode.html#:~:text=UT F%2D8%20is%20one%20of,used%20 than%20UTF%2D8.) . [Accessed 20 Feb 2023].

G. Satyanarayana, D. Chakraborty, S. Das, “Application Oriented Sensor Database System,” 2017 International Conference on Networking and Network Applications (NaNA), Nepal, 2017. https://doi.org/10.1109/NaNA.2017.64

N. Singh, V. Mahajan, A. Aniket, S. Pandya, R. Panchal, U. Mudgal, M. Bhatt, “Identification and Prevention of Cyber Attack in Smart Grid Communication Network,” International Conference on Information and Communications Technology (ICOIACT), Indonesia, 2019.

A. Kuchling, E. Raymond, “Curses Programming with Python,” 2023, [Online]. Available:https://docs.python.org/3/howto/curses.html#:~:text=Before%20doing%20a ny. [Accessed 20 Feb 2023].

B. Pingle, A. Mairaj, A. Javaid, “Real-world Man-in-the-middle (MITM) Attack Implementation Using Open-Source Tools for Instructional Use,” 2018 IEEE International Conference on Electro/Information Technology (EIT), 2018 https://doi.org/10.1109/EIT.2018.8500082

Kalra, Y., Upadhyay, S., & Patheja, Dr. P. S. (2020). Advancements in Cyber Attacks and Security. In International Journal of Innovative Technology and Exploring Engineering (Vol. 9, Issue 4, pp. 1520–1528). https://doi.org/10.35940/ijitee.d1678.029420

Alhathally, L., AlZain, M. A., Al-Amri, J., Baz, M., & Masud, M. (2020). Cyber security Attacks: Exploiting weaknesses. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 5, pp. 906–913). https://doi.org/10.35940/ijrte.e4876.018520

Altwairqi, A. F., AlZain, M. A., Soh, B., Masud, M., & Al-Amri, J. (2019). Four Most Famous Cyber Attacks for Financial Gains. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 2, pp. 2131–2139). https://doi.org/10.35940/ijeat.b3601.129219

Onome, Dr. O. A. (2022). Advanced Cyber Exploitation and Mitigation Methodology. In International Journal of Emerging Science and Engineering (Vol. 10, Issue 4, pp. 8–15). https://doi.org/10.35940/ijese.c2525.0310422

Balasubramanian, Dr. K., Arun, M., & Sekar, Dr. K. R. (2022). An Improved RSA Algorithm for Enhanced Security. In Indian Journal of Cryptography and Network Security (Vol. 2, Issue 2, pp. 1–4). https://doi.org/10.54105/ijcns.b1421.112222

Most read articles by the same author(s)

<< < 1 2 3 4 5 > >>