29 resultados para Honeypots indentification


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A new method to perform TCP/IP fingerprinting is proposed. TCP/IP fingerprinting is the process of identify a remote machine through a TCP/IP based computer network. This method has many applications related to network security. Both intrusion and defence procedures may use this process to achieve their objectives. There are many known methods that perform this process in favorable conditions. However, nowadays there are many adversities that reduce the identification performance. This work aims the creation of a new OS fingerprinting tool that bypass these actual problems. The proposed method is based on the use of attractors reconstruction and neural networks to characterize and classify pseudo-random numbers generators

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Callionymidae, along with the Draconettidae and Gobiesocidae, previously were placed in the order Gobiesociformes (Allen, 1984). Recently, Nelson (1994) placed the Callionymidae and Draconettidae in the percifonn suborder Callionymoidei. The family is represented by three species in the western central North Atlantic Ocean, Diplogrammus pauciradiatus, Paradiplogrammus bairdi and Foetorepus agassizi (Davis, 1966; Robins and Ray, 1986). A detailed review ofthe family including early life history infonnation is given by Houde (1984) and Watson (1996). (PDF contains 11 pages)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A novel Ca^(2+)-binding protein with Mr of 23 K (designated p23) has been identified in avian erythrocytes and thrombocytes. p23 localizes to the marginal bands (MBs), centrosomes and discrete sites around the nuclear membrane in mature avian erythrocytes. p23 appears to bind Ca^(2+) directly and its interaction with subcellular organelles seems to be modulated by intracellular [Ca^(2+)]. However, its unique protein sequence lacks any known Ca^(2+)-binding motif. Developmental analysis reveals that p23 association to its target structures occurs only at very late stages of bone marrow definitive erythropoeisis. In primitive erythroid cells, p23 distributes diffusely in the cytoplasm and lacks any distinct localization. It is postulated that p23 association to subcellular structures may be induced in part by decreased intracellular [Ca^(2+)]. In vitro and in vivo experiments indicate that p23 does not appear to act as a classical microtubule-associated protein (MAP) but p23 homologues appear to be expressed in MB-containing cells of a variety of species from different vertebrate classes. It has been hypothesized that p23 may play a regulatory role in MB stabilization in a Ca^(2+)-dependent manner.

Binucleated (bnbn) turkey erythrocytes were found to express a truncated p23 variant (designated p21) with identical subcellular localization as p23 except immunostaining reveals the presence of multi-centrosomes in bnbn cells. The p21 sequence has a 62 amino acid deletion at the C-terminus and must therefore have an additional ~40 amino acids at the N-terminus. In addition, p21 seems to have lost the ability to bind Ca^(2+) and its supramolecular interactions are not modulated by intracellular [Ca^(2+)]. These apparent differences between p23 and p21 raised the possibility that the p23/p21 allelism could be the Bn/bn genotype. However, genetic analysis suggested that p23/p21 allelism had no absolute correlation with the Bn/bn genotype.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though collaborative consumption (CC) is gaining economic importance, research in CC is still in its infancy. Consumers’ reasons for participating have already been investigated but little research on consequences of participation has been conducted. This article examines whether interactions between customers in peer-to-peer CC services influence the willingness to coproduce service outcomes. Drawing on social exchange theory, it is proposed that this effect is mediated by consumers’ identification with the brand community. Furthermore, continuance intention in CC is introduced as a second stage moderator. In a cross-sectional study, customers of peer-to-peer accommodation sharing are surveyed. While customer-to-customer interactions were found to have a positive effect on brand community identification, brand community identification did not positively affect co-production intention. Surprisingly, the effect of brand community identification on co-production intention was negative. Moreover, continuance intention of customers did not moderate this relationship. Bearing in mind current challenges for researchers and companies, theoretical and managerial implications are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification is a radical technology that is being experimented in hospitals commonly for tracking high value equipment, in order to maximize the efficiency of processes. RFID deployment and integration is mostly vendor and business driven, and hence its potential is not maximized. In this chapter, we propose a strategic framework to develop a process model, that will assist in maximizing the potential of RFID in hospitals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (doctoral)--Ruprecht-Karls-Universitat, Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this poster we presented our preliminary work on the study of spammer detection and analysis with 50 active honeypot profiles implemented on Weibo.com and QQ.com microblogging networks. We picked out spammers from legitimate users by manually checking every captured user's microblogs content. We built a spammer dataset for each social network community using these spammer accounts and a legitimate user dataset as well. We analyzed several features of the two user classes and made a comparison on these features, which were found to be useful to distinguish spammers from legitimate users. The followings are several initial observations from our analysis on the features of spammers captured on Weibo.com and QQ.com. ¦The following/follower ratio of spammers is usually higher than legitimate users. They tend to follow a large amount of users in order to gain popularity but always have relatively few followers. ¦There exists a big gap between the average numbers of microblogs posted per day from these two classes. On Weibo.com, spammers post quite a lot microblogs every day, which is much more than legitimate users do; while on QQ.com spammers post far less microblogs than legitimate users. This is mainly due to the different strategies taken by spammers on these two platforms. ¦More spammers choose a cautious spam posting pattern. They mix spam microblogs with ordinary ones so that they can avoid the anti-spam mechanisms taken by the service providers. ¦Aggressive spammers are more likely to be detected so they tend to have a shorter life while cautious spammers can live much longer and have a deeper influence on the network. The latter kind of spammers may become the trend of social network spammer. © 2012 IEEE.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article describes a Matlab toolbox for parametric identification of fluid-memory models associated with the radiation forces ships and offshore structures. Radiation forces are a key component of force-to-motion models used in simulators, motion control designs, and also for initial performance evaluation of wave-energy converters. The software described provides tools for preparing non-parmatric data and for identification with automatic model-order detection. The identification problem is considered in the frequency domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

[EN] Pierre Urte wrote Grammaire cantabrique circa 1714, when he was exiled in England. In this article we want to prove that the main source for Urte’s work was the socalled “Lily’s grammar”, which was the oficial grammar to learn Latin language in England from the 16th to the 19th century. The indentification of that source allows us to support the claim that Urte’s grammar must be included in the tradition of language teaching, as was already pointed out by Oyharçabal (1989). In this article, we first offer a brief history of Lily’s grammar. Then, we provide some clues in order to identify the exact edition used by Urte. Finally, in the main section of the article, we confront the two grammatical works; our aim is to ensure Urte’s debt to Lily’s grammar, and to show in detail the principal parts which Urte took from his source (mainly grammatical clasifications and examples).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Viral infections remain a serious global health issue. Metagenomic approaches are increasingly used in the detection of novel viral pathogens but also to generate complete genomes of uncultivated viruses. In silico identification of complete viral genomes from sequence data would allow rapid phylogenetic characterization of these new viruses. Often, however, complete viral genomes are not recovered, but rather several distinct contigs derived from a single entity are, some of which have no sequence homology to any known proteins. De novo assembly of single viruses from a metagenome is challenging, not only because of the lack of a reference genome, but also because of intrapopulation variation and uneven or insufficient coverage. Here we explored different assembly algorithms, remote homology searches, genome-specific sequence motifs, k-mer frequency ranking, and coverage profile binning to detect and obtain viral target genomes from metagenomes. All methods were tested on 454-generated sequencing datasets containing three recently described RNA viruses with a relatively large genome which were divergent to previously known viruses from the viral families Rhabdoviridae and Coronaviridae. Depending on specific characteristics of the target virus and the metagenomic community, different assembly and in silico gap closure strategies were successful in obtaining near complete viral genomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The authors describe a reflection amplifier adapted to have both a reflection and a transmission port. The amplifier uses a single silicon bipolar transistor and demonstrates a reflection gain of 13 dB, transmission gain of 10 dB and 3.4 dB noise figure at 5.25 GHz. The added feature of transmission gain in the reflection amplifier permits practical implementation of full duplex microwave radiofrequency indentification (RFID) tag operation. By using a simple subcarrier modulation scheme full duplex RFID operation utilising this amplifier is demonstrated. These results indicate that for 27 dBm (0.5 W) effective isotropic radiated power (EIRP) transmit power it should be possible to obtain approximately 8 m downlink range and 25 m uplink range