50 resultados para MAFIC INTRUSION


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many places the expansion of urban areas has brought recreationists into close proximity to nature conservation areas, sometimes leading to conflict where recreation and sensitive environmental or natural values are incompatible. An important first step in managing these conflicts is to assess the degree and nature of the problem. We describe the application, and methodological considerations, associated with the use of an innovative, low-cost, practical technique to monitor human intrusions into a wetland reserve which has been designated as ‘off-limits’ to the general public. The use of seven frequently monitored sand pads over 13 weeks enabled us to determine that intrusions occurred in every week (3–14 per sand pad), deep inside the reserve during most weeks, and also identified the key access points. Most intrusions occurred during holiday periods and were by walkers or cyclists. We also conducted a series of simple experiments to examine the utility of sand pads. Our sand pads maintained their shape well and held footprints for over 1 month, they were rarely avoided by people and provided reliable indices of the level of human activity. Sand hardness varied with rainfall, and hardened sand was frequent (53.8% of 26 days) and potentially prevented detection of people. We conclude that the sand pad technique is an effective and efficient tool to measure recreational use of off-limits areas and other conservation and recreation areas, provided human traffic is not too intense, and that checks are made reasonably frequently.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis examines the use of a structured design methodology in the design of asynchronous circuits so that high level constructs can be specified purely in terms of signal exchanges and without the intrusion of lower level concepts. Trace theory is used to specify a multi-processor Forth machine at a high level then part of the design is further elaborated using trace theory operations to (insure that the behaviours of the lower level constructs will combine to give the high level specified behaviour without locking or other hazards. A novel form of threaded language to take advantage of the machine architecture is developed. At suitable points the design is tested by simulation. The stack element which is designed is reduced to an electric circuit which is itself tested by simulation to verify the design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this thesis is to establish, from a historical and religious perspective, that the Presbyterian ethos and environment in which John Buchan was reared was the predominating influence in the writing of his novels. Presbyterianism was not the only influence on Buchan that determined the character of his stories. Buchan was by temperament a romantic, and this had considerable influence on his literature. His novels are romances, peopled by romantic figures who pursue romantic adventures. There are the signs of Buchan's romantic nature in the contents of the novels: creative imagination, sensitivity to nature, and expectations of the intrusion of other worlds, with destiny-determining events to follow. But Buchan had also an acquired classicism. His studies at Glasgow and Oxford Universities brought him in touch with a whole range of the master-pieces of classical literature, especially the works of Plato and Virgil. This discipline gave him clarity and conciseness in style, and balanced the romantic element in him, keeping his work within the bounds of reason. At the heart of Buchan's life and work, however, was his deeply religious nature and this, while influenced by romanticism and classicism, was the dominant force behind his work. Buchan did not accept in its entirety the Presbyterian doctrine conveyed to him by his father and his Church. He was moderate by temperament and shrank from excesses in religious matters, and, being a romantic, he shied away from any fixed creeds. He did embrace the fundamentals of Christianity, however, which he learned from his father and his Church, even if he did put aside the Rev. John's orthodox Calvinism. The basic Christianity which underlies all Buchan's novels has the stamp of Presbyterianism upon it, and that stamp is evident in his characters and their adventures. The expression of Christianity which Buchan embraced was the Christian Platonism of seventeenth century theologians, who taught and preached at Cambridge University, They gave prominence to the place of reason and conscience in man's search for God, They believed that reason and conscience were the ‘candle of the Lord’ which was existed every one. It was their conviction that, if that light was followed, it would lead men and women to God. They were against superstition and fanaticism in religion, against all forms of persecution for religious beliefs, and insisted that God could only be known by renouncing evil and setting oneself to live according to God’s will. This teaching Buchan received, but the stamp of his Presbyterianism was not obliterated. The basic doctrines which arose from his father's Presbyterianism and are to be found in Buchan's novels are as follows: a. the fear (or awe) of God, as life's basic religious attitude; b. the Providence of God as the ultimate determinative force in the outcome of events; c. the reality, malignity and universality of evil which must be forcefully and constantly resisted; d. the dignity of human beings in bearing God's image; e. the conviction that life has meaning and that its ultimate goal, therefore, is a spiritual one - as opposed to the accumulation of wealth, the achieving of recognition from society, and the gaining access to power; f. the necessity of challenge in life for growth and fulfilment, and the importance of fortitude in successfully meeting such challenge; g. the belief that, in the purpose of God, the weak confound the strong. These emphases of Presbyterianism are to be found in all Buchan's novels, to a greater or lesser degree. All his characters are serious people, with a moral purpose in life. Like the pilgrims of the Bible, they seek a country: true fulfilment. This quest becomes more spiritual and more dearly defined as Buchan grows in age and maturity. The progress is to be traced from his early novels, where fulfilment is sought in honour and self-approving competence, as advocated by classicism; to the novels of his middle years, where fulfilment is sought in adventures suggested by romanticism. In his final novel Sick Heart River. Buchan appears to have moved somewhat from his earlier classicism and his romanticism as the road to fulfilment. In this novel, Buchan expresses what, for him, is ultimate fulfilment: a conversion to God that produces self-sacrificing love for others. The terminally-ill Edward Leithen sets out on a romantic adventure that will enable him to die with dignity, and so, in classic style, justify his existence. He has a belief in God, but in a God who is almighty, distant and largely irrelevant to Leithen's life. In the frozen North of Canada, where he expects to find his meagre beliefs in God's absolute power confirmed by the icy majesty of mountain and plain, he finds instead God's mercy and it melts his heart. In a Christ-like way, he brings life to others through his death, believing that, through death, he will find life. There is sufficient evidence to give plausibility to the view that Buchan is describing in Leithen his own pilgrimage. If so, it means that Buchan found his way back to the fundamental experience of the Christian life, conversion, so strongly emphasised in his orthodox Presbyterianism home and Church. However, Buchan reaches this conclusion in a Christian Platonist way, through the natural world, rather than through the more orthodox pathway of Scripture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The argument of this article is framed by a debate between the principle of humanity and the principle of justice. Whereas the principle of humanity requires us to care about others and to want to help them meet their vital needs, and so to be partial towards those others, the principle of justice requires us to consider their needs without the intrusion of our subjective interests or emotions so that we can act with impartiality. I argue that a deep form of caring lies behind both approaches and so unites them. In the course of the argument, I reject Michael Slote’s sentimentalist form of an ethics of care, and expound Thomas Nagel’s moral theory, which seems to lie at the opposite end of a spectrum ranging from moral sentiments to impersonal objectivity. Nevertheless, Nagel’s theory of normative realism provides unexpected support for the thesis that a deep and subjective form of caring lies at the base of even our most objective moral reasons.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bangladesh exemplifies the complex challenges facing densely populated coastal regions. The
pressures on the country are immense: around 145 million people live within an area of just 145,000 sq-km at
the confluence of three major river systems: the Ganges, the Brahmaputra and the Meghna. While progress
has been made, poverty remains widespread, with around 39% of children under five malnourished. Most of
its land-mass lies below 10m above sea level with considerable areas at sea level, leading to frequent and
prolonged flooding during the monsoons. Sea level rise is leading to more flooding as storm surges rise off
higher sea levels, pushing further inland. Higher sea levels also result in salt-water intrusion into freshwater
coastal aquifers and estuaries, contaminating drinking water and farmland. Warmer ocean waters are also
expected to lead to an increase in the intensity of tropical storms.
Bangladesh depends on the South Asian summer monsoon for most of its rainfall which is expected to
increase, leading to more flooding. Climate scientists are also concerned about the stability of monsoon and
the potential for it to undergo a nonlinear phase shift to a drier regime. Bangladesh faces an additional
hydrological challenge in that the Ganges and Brahmaputra rivers both rise in the Himalaya-Tibetan Plateau
region, where glaciers are melting rapidly. The Intergovernmental Panel on Climate Change (IPCC)
concluded that rapid melting is expected to increase river flows until around the late-2030s, by which time
the glaciers are expected to have shrunk from their 1995 extent of 500,000 sq-km to an expected 100,000 sqkm.
After the 2030s, river flows could drop dramatically, turning the great glacier-fed rivers of Asia into
seasonal monsoon-fed rivers. The IPCC concluded that as a result, water shortages in Asia could affect more
than a billion people by the 2050s. Over the same period, crop yields are expected to decline by up to 30% in
South Asia due to a combination of drought and crop heat stress. Bangladesh is therefore likely to face
substantial challenges in the coming decades.
In order to adequately understand the complex, dynamic, spatial and nonlinear challenges facing Bangladesh,
an integrated model of the system is required. An agent-based model (ABM) permits the dynamic
interactions of the economic, social, political, geographic, environmental and epidemiological dimensions of
climate change impacts and adaptation policies to be integrated via a modular approach. Integrating these
dimensions, including nonlinear threshold events such as mass migrations, or the outbreak of conflicts or
epidemics, is possible to a far greater degree with an ABM than with most other approaches.
We are developing a prototype ABM, implemented in Netlogo, to examine the dynamic impacts on poverty,
migration, mortality and conflict from climate change in Bangladesh from 2001 to 2100. The model employs
GIS and sub-district level census and economic data and a coarse-graining methodology to allow model
statistics to be generated on a national scale from local dynamic interactions. This approach allows a more
realistic treatment of distributed spatial events and heterogeneity across the country. The aim is not to
generate precise predictions of Bangladesh’s evolution, but to develop a framework that can be used for
integrated scenario exploration. This paper represents an initial report on progress on this project. So far the
prototype model has demonstrated the desirability and feasibility of integrating the different dimensions of
the complex adaptive system and, once completed, is intended to be used as the basis for a more detailed
policy-oriented model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many policy decisions for agricultural management in the coastal region closely depend on the extent of intrusion of sea water. In this study, Artificial Neural Network (ANN) is used to model the spatial variation of Electrical Conductivity to determine the extent of sea water intrusion in the coastal area of Brisbane, Australia. Quarterly EC data obtained from the observation (monitoring) wells located along the coast is used for training ANN architecture. The study demonstrates that ANN is able to model the spatial variation of EC with very good accuracy (even with very less training records) when some spatial information is used as one of the inputs in the network training. The results considerable improvement when compared with the network trained without the distance information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

 Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Virtual property theft is a serious problem that exists in virtual worlds. Legitimate users of these worlds invest considerable amounts of time, effort and real-world money into obtaining virtual property, but unfortunately, are becoming victims of theft in high numbers. It is reported that there are over 1 billion registered users of virtual worlds containing virtual property items worth an estimated US$50 billion dollars. The problem of virtual property theft is complex, involving many legal, social and technological issues. The software used to access virtual worlds is of great importance as they form the primary interface to these worlds and as such the primary interface to conduct virtual property theft. The security vulnerabilities of virtual world applications have not, to date, been examined. This study aims to use the process of software inspection to discover security vulnerabilities that may exist within virtual world software – vulnerabilities that enable virtual property theft to occur. Analyzing three well know virtual world applications World of Warcraft, Guild Wars and Entropia Universe, this research utilized security analysis tools and scenario testing with focus on authentication, trading, intruder detection and virtual property recovery. It was discovered that all three examples were susceptible to keylogging, mail and direct trade methods were the most likely method for transferring stolen items, intrusion detection is of critical concern to all VWEs tested, stolen items were unable to be recovered in all cases and lastly occurrences of theft were undetectable in all cases. The results gained in this study present the key problem areas which need to be addressed to improve security and reduce the occurrence of virtual property theft.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the significant growth of botnets, application layer DDoS attacks are much easier to launch using large botnet, and false negative is always a problem for intrusion detection systems in real practice. In this paper, we propose a novel application layer DDoS attack tool, which mimics human browsing behavior following three statistical distributions, the Zipf-like distribution for web page popularity, the Pareto distribution for page request time interval for an individual browser, and the inverse Gaussian distribution for length of browsing path. A Markov model is established for individual bot to generate attack request traffic. Our experiments indicated that the attack traffic that generated by the proposed tool is pretty similar to the real traffic. As a result, the current statistics based detection algorithms will result high false negative rate in general. In order to counter this kind of attacks, we discussed a few preliminary solutions at the end of this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile agents have been proposed for key applications such as forensics analysis, intrusion detection, e-commerce, and resource management. Yet, they are vulnerable to various security threats by malicious hosts or intruders. Conversely, genuine platforms may run malicious agents. It is essential to establish a truly secure framework for mobile agents to gain trust of clients in the system. Failure to accomplish a trustworthy secured framework for Mobile Agent System (MAS) will limit their deployment into the key applications. This chapter presents a comprehensive taxonomy of various security threats to Mobile Agent System and the existing implemented security mechanisms. Different mechanisms are discussed, and the related security deficiencies are highlighted. The various security properties of the agent and the agent platform are described. The chapter also introduces the properties, advantages, and roles of agents in various applications. It describes the infrastructure of the system and discusses several mobile agent frameworks and the accomplished security level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The problem of extracting infrequent patterns from streams and building associations between these patterns is becoming increasingly relevant today as many events of interest such as attacks in network data or unusual stories in news data occur rarely. The complexity of the problem is compounded when a system is required to deal with data from multiple streams. To address these problems, we present a framework that combines the time based association mining with a pyramidal structure that allows a rolling analysis of the stream and maintains a synopsis of the data without requiring increasing memory resources. We apply the algorithms and show the usefulness of the techniques. © 2007 Crown Copyright.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SQL injection vulnerabilities poses a severe threat to web applications as an SQL Injection Attack (SQLIA) could adopt new obfuscation techniques to evade and thwart countermeasures such as Intrusion Detection Systems (IDS). SQLIA gains access to the back-end database of vulnerable websites, allowing hackers to execute SQL commands in a web application resulting in financial fraud and website defacement. The lack of existing models in providing protections against SQL injection has motivated this paper to present a new and enhanced model against web database intrusions that use SQLIA techniques. In this paper, we propose a novel concept of negative tainting along with SQL keyword analysis for preventing SQLIA and described our that we implemented. We have tested our proposed model on all types of SQLIA techniques by generating SQL queries containing legitimate SQL commands and SQL Injection Attack. Evaluations have been performed using three different applications. The results show that our model protects against 100% of tested attacks before even reaching the database layer.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. Current techniques reported in literature lack the capability of detecting zero-day malware with the required accuracy and efficiency. In this paper, we have proposed and evaluated a novel method of employing several data mining techniques to detect and classify zero-day malware with high levels of accuracy and efficiency based on the frequency of Windows API calls. This paper describes the methodology employed for the collection of large data sets to train the classifiers, and analyses the performance results of the various data mining algorithms adopted for the study using a fully automated tool developed in this research to conduct the various experimental investigations and evaluation. Through the performance results of these algorithms from our experimental analysis, we are able to evaluate and discuss the advantages of one data mining algorithm over the other for accurately detecting zero-day malware successfully. The data mining framework employed in this research learns through analysing the behavior of existing malicious and benign codes in large datasets. We have employed robust classifiers, namely Naïve Bayes (NB) Algorithm, k−Nearest Neighbor (kNN) Algorithm, Sequential Minimal Optimization (SMO) Algorithm with 4 differents kernels (SMO - Normalized PolyKernel, SMO – PolyKernel, SMO – Puk, and SMO- Radial Basis Function (RBF)), Backpropagation Neural Networks Algorithm, and J48 decision tree and have evaluated their performance. Overall, the automated data mining system implemented for this study has achieved high true positive (TP) rate of more than 98.5%, and low false positive (FP) rate of less than 0.025, which has not been achieved in literature so far. This is much higher than the required commercial acceptance level indicating that our novel technique is a major leap forward in detecting zero-day malware. This paper also offers future directions for researchers in exploring different aspects of obfuscations that are affecting the IT world today.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents experimental results devoted to a new application of the novel clustering technique introduced by the authors recently. Our aim is to facilitate the application of robust and stable consensus functions in information security, where it is often necessary to process large data sets and monitor outcomes in real time, as it is required, for example, for intrusion detection. Here we concentrate on the particular case of application to profiling of phishing websites. First, we apply several independent clustering algorithms to a randomized sample of data to obtain independent initial clusterings. Silhouette index is used to determine the number of clusters. Second, we use a consensus function to combine these independent clusterings into one consensus clustering . Feature ranking is used to select a subset of features for the consensus function. Third, we train fast supervised classification algorithms on the resulting consensus clustering in order to enable them to process the whole large data set as well as new data. The precision and recall of classifiers at the final stage of this scheme are critical for effectiveness of the whole procedure. We investigated various combinations of three consensus functions, Cluster-Based Graph Formulation (CBGF), Hybrid Bipartite Graph Formulation (HBGF), and Instance-Based Graph Formulation (IBGF) and a variety of supervised classification algorithms. The best precision and recall have been obtained by the combination of the HBGF consensus function and the SMO classifier with the polynomial kernel.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

 The issue of virtual property theft in virtual worlds is a serious problem which has ramifications in both the real and virtual world. Virtual world users invest a considerable amount of time, effort and often money to collect virtual property items, only to have them stolen by thieves. Many virtual property thefts go undetected, with thieves often stealing virtual property items without resistance, leaving victims to discover the theft only after it has occurred. This paper presents the design of a detection framework that uses an algorithm for identifying virtual property theft at two key stages: account intrusion and unauthorized virtual property trades. Initial tests of this framework on a synthetic data set show an 80% detection rate with no false positives. This framework can allow virtual world developers to tailor and extend it to suit their specific virtual world software and provide an effective way of detecting virtual property theft while being a low maintenance, user friendly and cost effective.