79 resultados para malicious gossip


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Western research, cruelty to animals in childhood has been associated with comorbid conduct problems and with interpersonal violence in later life. However, there is little understanding of the etiology of cruelty to animals, and what in the child's life may require attention if the chain linking animal cruelty and later violence is to be broken. The study reported in this paper investigated the association between parent-reported cruelty to animals, and parent- and self-reported psychological strengths and weaknesses in a sample of 379 elementary school children in an Eastern context, Malaysia. No gender differences were found in relation to cruelty to animals or psychological problems, as assessed with the Strengths and Difficulties Questionnaire (SDQ). However, there were different predictors of cruelty to animals for boys and girls. Regression analyses found that for boys, parent-reported hyperactivity was a unique predictor of Malicious and Total Cruelty to animals. For girls, self-reported conduct problems was a unique predictor of Typical Cruelty to animals. Parent-reported total difficulties were associated with Typical, Malicious, and Total Cruelty to animals. We suggest that routine screening of children with an instrument such as the SDQ may help to detect those children who may need to undergo further assessment and perhaps intervention to break the chain linking childhood cruelty to animals and later conduct problems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed Denial of Service attacks is one of the most challenging areas to deal with in Security. Not only do security managers have to deal with flood and vulnerability attacks. They also have to consider whether they are from legitimate or malicious attackers. In our previous work we developed a framework called bodyguard, which is to help security software developers from the current serialized paradigm, to a multi-core paradigm. In this paper, we update our research work by moving our bodyguard paradigm, into our new Ubiquitous Multi-Core Framework. From this shift, we show a marked improvement from our previous result of 20% to 110% speedup performance with an average cost of 1.5 ms. We also conducted a second series of experiments, which we trained up Neural Network, and tested it against actual DDoS attack traffic. From these experiments, we were able to achieve an average of 93.36%, of this attack traffic.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the contemporary world, the latter interpretation is by far the more common (although persons belonging to the former category of hacker would seek to more accurately define the latter group, particularly those with a malicious intent, as ‘crackers’). Hackers are by no means a new threat and have routinely featured in news stories during the last two decades. Indeed, they have become the traditional ‘target’ of the media, with the standard approach being to present the image of either a ‘teenage whiz kid’ or an insidious threat. In reality, it can be argued that there are different degrees of the problem.
Donn Parker (Parker, 1976) highlighted that the individuals involved in computer crime in the 1960’s and 1970’s were employed as key punch operators or clerks in EDP organisations and the crimes were crimes of opportunity. In the 1980’s with the development of cheaper home microcomputers and modems, a new generation of younger computer users emerged. One of the features of this younger group was a keen interest in the technologies that lead to the development of hackers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Childhood cruelty to animals is a symptom of conduct disorder that has been linked to the perpetration of violence in later life. Research has identified several factors associated with its etiology, including social factors. However, no cross-cultural studies on this phenomenon have been reported. This study investigated childhood cruelty to animals in Japan, Australia and Malaysia. Parents of 1,358 children between the ages of 5 and 13 years completed the Children’s Attitudes and Behaviours towards Animals questionnaire (CABTA) which assesses Typical and Malicious Cruelty to animals. Analyses revealed no overall differences between children from these countries on either scale. However, younger boys were more likely to be cruel than younger girls in each country, and younger children in Australia and Japan were more likely to be cruel that older children in those countries. The findings are discussed in relation to previous research, and recommendations for future studies are suggested.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Guided by the feminist intention of reasserting the importance of neglected female writers, I have used this work to re-examine the lives and texts of eighteenth-century diarists Hester Thrale-Piozzi and Frances Burney. Adopting an interdisciplinary methodology, I draw on both literary and non-literary material to examine the effect of familial and social patriarchy in eighteenth-century England. Using the diaries, journals and letters of Hester and Frances, I ask why female conformity to masculine domination was expected, and how violence was used to extract subserviant behaviour from women. Beginning with gossip, and encompassing social, editorial and physical abuse, I use the medical profession's manipulation of female vulnerability to exemplify the way society legitimates violence to ensure female ductility. Moving beyond this physical aspect, I then examine the psychical, and question the existence of a ‘self’ which is vulnerable to external manipulation. By diverging from the influence of Freudian psychology, and developing a form of Jungian feminism, I propose the existence of an essential female Self which transcends the constraints of societal expectations and physical violence. In this work, both Hester and Frances emerge as physically and psychically strong entities who were forced to adopt socially conformist personae to survive.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an innovative fusion based multi-classifier email classification on a ubiquitous multi-core architecture. Many approaches use text-based single classifiers or multiple weakly trained classifiers to identify spam messages from a large email corpus. We build upon our previous work on multi-core by apply our ubiquitous multi-core framework to run our fusion based multi-classifier architecture. By running each classifier process in parallel within their dedicated core, we greatly improve the performance of our proposed multi-classifier based filtering system. Our proposed architecture also provides a safeguard of user mailbox from different malicious attacks. Our experimental results show that we achieved an average of 30% speedup at the average cost of 1.4 ms. We also reduced the instance of false positive, which is one of the key challenges in spam filtering system, and increases email classification accuracy substantially compared with single classification techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Classifying malware correctly is an important research issue for anti-malware software producers. This paper presents an effective and efficient malware classification technique based on string information using several wellknown classification algorithms. In our testing we extracted the printable strings from 1367 samples, including unpacked trojans and viruses and clean files. Information describing the printable strings contained in each sample was input to various classification algorithms, including treebased classifiers, a nearest neighbour algorithm, statistical algorithms and AdaBoost. Using k-fold cross validation on the unpacked malware and clean files, we achieved a classification accuracy of 97%. Our results reveal that strings from library code (rather than malicious code itself) can be utilised to distinguish different malware families.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents an innovative fusion-based multi-classifier e-mail classification on a ubiquitous multicore architecture. Many previous approaches used text-based single classifiers to identify spam messages from a large e-mail corpus with some amount of false positive tradeoffs. Researchers are trying to prevent false positive in their filtering methods, but so far none of the current research has claimed zero false positive results. In e-mail classification false positive can potentially cause serious problems for the user. In this paper, we use fusion-based multi-classifier classification technique in a multi-core framework. By running each classifier process in parallel within their dedicated core, we greatly improve the performance of our multi-classifier-based filtering system in terms of running time, false positive rate, and filtering accuracy. Our proposed architecture also provides a safeguard of user mailbox from different malicious attacks. Our experimental results show that we achieved an average of 30% speedup at an average cost of 1.4 ms. We also reduced the instances of false positives, which are one of the key challenges in a spam filtering system, and increases e-mail classification accuracy substantially compared with single classification techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Modeling network traffic has been a critical task in the development of Internet. Attacks and defense are prevalent in the current Internet. Traditional network models such as Poisson-related models do not consider the competition behaviors between the attack and defense parties. In this paper, we present a microscopic competition model to analyze the dynamics among the nodes, benign or malicious, connected to a router, which compete for the bandwidth. The dynamics analysis demonstrates that the model can well describe the competition behavior among normal users and attackers. Based on this model, an anomaly attack detection method is presented. The method is based on the adaptive resonance theory, which is used to learn the model by normal traffic data. The evaluation shows that it can effectively detect the network attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The continuous growth of the users pool of Social Networking web sites such as Facebook and MySpace, and their incessant augmentation of services and capabilities will in the future, meet and compare in contrast with today's Content distribution Networks (CDN) and Peer-to-Peer File sharing applications such as Kazaa and BitTorrent, but how can these two main streams applications, that already encounter their own security problems cope with the combined issues, trust for Social Networks, content and index poisoning in CDN? We will address the problems of Social Trust and File Sharing with an overlay level of trust model based on social activity and transactions, this can be an answer to enable users to increase the reliability of their online social life and also enhance the content distribution and create a better file sharing example. The aim of this research is to lower the risk of malicious activity on a given Social Network by applying a correlated trust model, to guarantee the validity of someone's identity, privacy and trustfulness in sharing content.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes a scalable approach for distinguishing malicious files from clean files by investigating the behavioural features using logs of various API calls. We also propose, as an alternative to the traditional method of manually identifying malware files, an automated classification system using runtime features of malware files. For both projects, we use an automated tool running in a virtual environment to extract API call features from executables and apply pattern recognition algorithms and statistical methods to differentiate between files. Our experimental results, based on a dataset of 1368 malware and 456 cleanware files, provide an accuracy of over 97% in distinguishing malware from cleanware. Our techniques provide a similar accuracy for classifying malware into families. In both cases, our results outperform comparable previously published techniques.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) system is a remote identification technology which is taking the place of barcodes to become electronic tags of an object. However, its radio transmission nature is making it vulnerable in terms of security. Recently, research proposed that an RFID tag can contain malicious code which might spread viruses, worms and other exploits to middleware and back-end systems. This paper is proposing a framework which will provide protection from malware and ensure the data privacy of a tag. The framework will use a sanitization technique with a mutual authentication in the reader level. This will ensure that any malicious code in the tag is identified. If the tag is infected by malicious code it will stop execution of the code in the RFIF system. Here shared unique parameters are used for authentication. It will be capable of protecting an RFID system from denial of service (DOS) attack, forward security and rogue reader better than existing protocols. The framework is introducing a layer concept on a smart reader to reduce coupling between different tasks. Using this framework, the RFID system will be protected from malware and also the privacy of the tag will be ensured.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mass-marketed teen chick lit has become a publishing phenomenon and has begun to attract critical interest among children’s literature scholars. Much of this critical work, however, has shied away from robust critical assessment of the postfeminist conditions informing the production and reception of young adult series like Private, Gossip Girl and Choose Your Own Destiny. Existing analyses may nod to the origins of the genre in women’s chick lit, but do not investigate how the postfeminist construction of ‘empowered’ female (hetero) sexuality translates into chick lit for young adults. Paying particular attention to these issues, this paper draws on feminist critiques of postfeminism to interrogate the implications of the way these novels position readers to understand their sexuality. In doing so, it poses postfeminist criticism as an unconsidered yet significant framework to evaluate novels for teenage girls.