980 resultados para COORDINATION NETWORKS
Resumo:
Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.
Resumo:
Despite the increased offering of online communication channels to support web-based retail systems, there is limited marketing research that investigates how these channels act singly, or in combination with online channels, to influence an individual' s intention to purchase online. If the marketer's strategy is to encourage online transactions, this requires a focus on consumer acceptance of the web-based transaction technology, rather than the purchase of the products per se. The exploratory study reported in this paper examines normative influences from referent groups in an individual's on and offline social communication networks that might affect their intention to use online transaction facilities. The findings suggest that for non-adopters, there is no normative influence from referents in either network. For adopters, one online and one offline referent norm positively influenced this group's intentions to use online transaction facilities. The implications of these findings are discussed together with future research directions.
Resumo:
Objective: There is a paucity of information regarding cases of multi-victim sexual assault of children. The reported incidence suggests that these cases are rare. The aim of this paper is to provide practitioners with information about effective intervention strategies arising out of the direct experience of managing a case of multi-victim sexual assault in an Australian rural community. --------- Method: A descriptive, case-report methodology summarizing the investigation and intervention in a case of multi-victim sexual assault is reported. A community based intervention arising out of the disclosures of 21 male children is described. The intervention occurred at an individual, group, and community level using a coordinated multi-disciplinary team and natural helping networks. ---------- Results: The coordination of police and welfare services increased the communication flow to victims, their families, and the community. The case also demonstrated the utility in regularly briefing political and bureaucratic authorities as well as local officials about emergent issues. Coordinating political and bureaucratic responses was essential in obtaining ongoing support and sufficient researching to enable the effective delivery of services. ---------- Conclusions: Interventions were focused at an individual, group, and community level using a coordinated multi-disciplinary team and natural helping networks. This provided a choice of services which were sensitive to the case setting. Recommendations are offered for practitioners who are confronted with similar events. While this paper describes an approach for intervening in a case of multi-victim sexual assault, further empirical research is needed to enable service deliverers to efficaciously target interventions which offer choice to victims and their families.