928 resultados para malicious users


Relevância:

30.00% 30.00%

Publicador:

Resumo:

In 2014 over 70% of people in Great Britain accessed the Internet every day. This resource is an optimal vector for malicious attackers to penetrate home computers and as such compromised pages have been increasing in both number and complexity. This paper presents X-Secure, a novel browser plug-in designed to present and raise the awareness of inexperienced users by analysing web-pages before malicious scripts are executed by the host computer. X-Secure was able to detect over 90% of the tested attacks and provides a danger level based on cumulative analysis of the source code, the URL, and the remote server, by using a set of heuristics, hence increasing the situational awareness of users browsing the internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research on social networking sites like Facebook is emerging but sparse. This exploratory study investigates the value users derive from self-described ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend applications to their friends. The concepts of value and cool are explored in a social networking context. Our qualitative data reveals consumers derive a combination of functional value along with either social or emotional value from the applications. Female Facebook users indicate self-expression as important motivators, while males tend to use Facebook applications to socially compete. Three broad categories emerged for application features; symmetrical features can both encourage or discourage recommendation, polar features where different levels of the same feature encourage or discourage, and uni-directional features only encourage or discourage but not both. Recommending or not recommending an application tends to be the result of a combination of features and context, rather than one feature in isolation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Relations between brands and their users continue to be affected by a traditional perspective that sees the producers and consumers of goods and services as inherently different animals. In the emerging information and knowledge economy, and especially in online contexts, this model is no longer sustainable. Instead, spearheaded by the Web 2.0 phenomenon, there is a trend towards the fusing of production and usage as a new, hybrid process of produsage. This presentation presents the key characteristics driving produsage processes, and describes four guiding principles for businesses as they share their brand with users: * Be open. * Seed community processes by providing content and tools. * Support community dynamics and devolve responsibilities. * Don't exploit the community and its work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reviews the main development of approaches to modelling urban public transit users’ route choice behaviour from 1960s to the present. The approaches reviewed include the early heuristic studies on finding the least cost transit route and all-or-nothing transit assignment, the bus common line problem and corresponding network representation methods, the disaggregate discrete choice models which are based on random utility maximization assumptions, the deterministic use equilibrium and stochastic user equilibrium transit assignment models, and the recent dynamic transit assignment models using either frequency or schedule based network formulation. In addition to reviewing past outcomes, this paper also gives an outlook into the possible future directions of modelling transit users’ route choice behaviour. Based on the comparison with the development of models for motorists’ route choice and traffic assignment problems in an urban road area, this paper points out that it is rewarding for transit route choice research to draw inspiration from the intellectual outcomes out of the road area. Particularly, in light of the recent advancement of modelling motorists’ complex road route choice behaviour, this paper advocates that the modelling practice of transit users’ route choice should further explore the complexities of the problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background - This study examined demographic profile, continuation rates and reasons for removal among Implanon® users accessing two family planning clinics in Queensland, Australia. Study Design - A retrospective chart audit of 976 women who attended for implant insertion over a 3-year period between May 2001 and May 2004. Results - Continuation rates showed that at 6 months after insertion, 94% of women continued, 74% continued at 1 year and 50% continued at 2 years. Metropolitan women were more likely than rural women to discontinue use because of dissatisfaction with bleeding patterns. Cox regression analysis showed that those attending the regional clinic experienced significantly shorter time to removal. Conclusions - Implanon® continuation rates and reasons for removal differ between clinics in metropolitan and rural locations. A cooling-off period did not affect the likelihood of continuation with Implanon®. Preinsertion counselling should emphasize potential changes in bleeding patterns.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many older adults have difficulty using modern consumer products due to their complexity both in terms of functionality and interface design. It has been observed that older people also have more problems learning new systems. It was hypothesised that designing technological products that are more intuitive for older people to use can solve this problem. An intuitive interface allows a user’s to employ prior knowledge, thus minimizing the learning needed for effective interaction. This paper discusses an experiment investigating the effectiveness of redundancy in interface design. The primary objective of this experiment was to find out if using more than one modality for a product’s interface improves the speed and intuitiveness of interactions for older adults. Preliminary analysis showed strong correlation between technology familiarity and time on tasks, but redundancy in interface design improved speed and accuracy of use only for participants with moderate to high technology familiarity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Methamphetamine (MA) use is associated with hostility, aggression, and positive psychotic symptoms. However, little is known of the processes or mechanisms that underlie this relationship. The present research was designed to investigate putative mediating and moderating variables between MA dependence and hostility in a sample of injecting MA users (N=237). Both positive symptoms of psychosis and higher levels of impulsivity functioned as mediators and moderators of this relationship. This pattern of findings suggests that MA use leads to greater hostility by increasing positive psychotic symptoms that contribute to a perception of the environment as a hostile and threatening place as well as by increasing impulsivity. Those who were high in positive symptoms and high in impulsivity were the most hostile. Individual differences in impulsivity and positive psychotic symptoms should be taken into account in the assessment and management of MA dependence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effectively assisting benzodiazepine users to cease use requires a greater understanding of general practitioners’ (GPs)and benzodiazepine users’ views on using and ceasing benzodiazepines. This paper reports the findings from a qualitative study that examined the views of 28 GPs and 23 benzodiazepine users (BUs) in Cairns, Australia. A semistructured interview was conducted with all participants and the information gained was analysed using the Consensual Qualitative Research Approach, which allowed comparisons to be made between the views of the two groups of interviewees. There was commonality between GPs and BUs on reasons for commencing benzodiazepines, the role of dependence in continued use, and the importance of lifestyle change in its cessation. However, several differences emerged regarding commencement of use and processes of cessation. In particular, users felt there was greater need for GPs to routinely advise patients about non-pharmacological management of their problems and potential adverse consequences of long-term use before commencing benzodiazepines. Cessation could be discussed with all patients who use benzodiazepines for longer than 3 months, strategies offered to assist in management of withdrawal and anxiety, and referral to other health service providers for additional support. Lifestyle change could receive greater focus at all stages of treatment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Buffer overflow vulnerabilities continue to prevail and the sophistication of attacks targeting these vulnerabilities is continuously increasing. As a successful attack of this type has the potential to completely compromise the integrity of the targeted host, early detection is vital. This thesis examines generic approaches for detecting executable payload attacks, without prior knowledge of the implementation of the attack, in such a way that new and previously unseen attacks are detectable. Executable payloads are analysed in detail for attacks targeting the Linux and Windows operating systems executing on an Intel IA-32 architecture. The execution flow of attack payloads are analysed and a generic model of execution is examined. A novel classification scheme for executable attack payloads is presented which allows for characterisation of executable payloads and facilitates vulnerability and threat assessments, and intrusion detection capability assessments for intrusion detection systems. An intrusion detection capability assessment may be utilised to determine whether or not a deployed system is able to detect a specific attack and to identify requirements for intrusion detection functionality for the development of new detection methods. Two novel detection methods are presented capable of detecting new and previously unseen executable attack payloads. The detection methods are capable of identifying and enumerating the executable payload’s interactions with the operating system on the targeted host at the time of compromise. The detection methods are further validated using real world data including executable payload attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motorised countries have more fatal road crashes in rural areas than in urban areas. In Australia, over two thirds of the population live in urban areas, yet approximately 55 percent of the road fatalities occur in rural areas (ABS, 2006; Tziotis, Mabbot, Edmonston, Sheehan & Dwyer, 2005). Road and environmental factors increase the challenges of rural driving, but do not fully account for the disparity. Rural drivers are less compliant with recommendations regarding the “fatal four” behaviours of speeding, drink driving, seatbelt non-use and fatigue, and the reasons for their lower apparent receptivity for road safety messages are not well understood. Countermeasures targeting driver behaviour that have been effective in reducing road crashes in urban areas have been less successful in rural areas (FORS, 1995). However, potential barriers to receptivity for road safety information among rural road users have not been systematically investigated. This thesis aims to develop a road safety countermeasure that addresses three areas that potentially affect receptivity to rural road safety information. The first is psychological barriers of road users’ attitudes, including risk evaluation, optimism bias, locus of control and readiness to change. A second area is the timing and method of intervention delivery, which includes the production of a brief intervention and the feasibility of delivering it at a “teachable moment”. The third area under investigation is the content of the brief intervention. This study describes the process of developing an intervention that includes content to address road safety attitudes and improve safety behaviours of rural road users regarding the “fatal four”. The research commences with a review of the literature on rural road crashes, brief interventions, intervention design and implementation, and potential psychological barriers to receptivity. This literature provides a rationale for the development of a brief intervention for rural road safety with a focus on driver attitudes and behaviour. The research is then divided into four studies. The primary aim of Study One and Study Two is to investigate the receptivity of rural drivers to road safety interventions, with a view to identifying barriers to the efficacy of these strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information and communication technologies (particularly websites and e-mail) have the potential to deliver health behavior change programs to large numbers of adults at low cost. Controlled trials using these new media to promote physical activity have produced mixed results. User-centered development methods can assist in understanding the preferences of potential participants for website functions and content, and may lead to more effective programs. Eight focus group discussions were conducted with 40 adults after they had accessed a previously trialed physical activity website. The discussions were audio taped, transcribed and interpreted using a themed analysis method. Four key themes emerged: structure, interactivity, environmental context and content. Preferences were expressed for websites that include simple interactive features, together with information on local community activity opportunities. Particular suggestions included online community notice boards, personalized progress charts, e-mail access to expert advice and access to information on specific local physical activity facilities and services. Website physical activity interventions could usefully include personally relevant interactive and environmentally focused features and services identified through a user-centered development process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the role of intuition in the way that people operate unfamiliar devices. Intuition is a type of cognitive processing that is often non-conscious and utilises stored experiential knowledge. Intuitive interaction involves the use of knowledge gained from other products and/or experiences. Two initial experimental studies revealed that prior exposure to products employing similar features helped participants to complete set tasks more quickly and intuitively, and that familiar features were intuitively used more often than unfamiliar ones. A third experiment confirmed that performance is affected by a person's level of familiarity with similar technologies, and also revealed that appearance (shape, size and labelling of features) seems to be the variable that most affects time spent on a task and intuitive uses during that time. Age also seems to have an effect. These results and their implications are discussed.