814 resultados para Peer-to-Peers Networks
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay network. The AIS uses the negative selection algorithm for the selection of detectors (e.g., vectors of features such as CPU utilization, memory usage and network activity). For better detection performance, selection of all possible detectors for a node is desirable but it may not be feasible due to storage and computational overheads. Limiting the number of detectors on the other hand comes with the danger of missing attacks. We present a scheme for the controlled and decentralized division of detector sets where each IDS is assigned to a region of the feature space. We investigate the trade-off between scalability and robustness of detector sets. We address the problem of self-organization in CIDS so that each node generates a distinct set of the detectors to maximize the coverage of the feature space while pairs of nodes exchange their detector sets to provide a controlled level of redundancy. Our contribution is twofold. First, we use Symmetric Balanced Incomplete Block Design, Generalized Quadrangles and Ramanujan Expander Graph based deterministic techniques from combinatorial design theory and graph theory to decide how many and which detectors are exchanged between which pair of IDS nodes. Second, we use a classical epidemic model (SIR model) to show how properties from deterministic techniques can help us to reduce the attack spread rate.
Resumo:
As we race towards a new era, rapid change of conventional models has become the norm. Just as technology has etched itself to the core of society, the sheer quantity of student devices connecting to university networks presents a sector wide challenge coinciding almost perfectly with many universities creating technology rich learning spaces. New fears include future proofing. It is not just a matter of technology becoming outdated. In seeking to accommodate the teaching styles and experience of staff across diverse faculties, is this technology simply too vanilla to meet their needs as they become increasingly skilled and inspired by technology’s potential? Through the early findings of a study into staff use of technology within Queensland University of Technology's next generation collaborative learning spaces, this paper explores whether the answers lie in a model presented by students equipping themselves with the tools they need to learn in the 21st century.
Resumo:
With approximately half of Australian university teaching now performed by sessional academics, there has been growing recognition of the contribution they make to student learning. At the same time, sector-wide research and institutional audits continue to raise concerns about academic development, quality assurance, recognition and belonging. In response, universities have increasingly begun to offer academic development programs for sessional academics. However, such programs may be centrally delivered, generic in nature, and contained within the moment of delivery, while the Faculty contexts and cultures that sessional academics work within are diverse, and the need for support unfolds in ad-hoc and often unpredictable ways. In this paper we present the Sessional Academic Success (SAS) program–a new framework that complements and extends the central academic development program for sessional academic staff at Queensland University of Technology. This program recognises that experienced sessional academics have much to contribute to the advancement of learning and teaching, and harnesses their expertise to provide school-based academic development opportunities, peer-to-peer support, and locally contextualized community building. We describe the program’s implementation and explain how Sessional Academic Success Advisors (SASAs) are employed, trained and supported to provide advice and mentorship and, through a co-design methodology, to develop local development opportunities and communities of teaching practice within their schools. Besides anticipated benefits to new sessional academics in terms of timely and contextual support and improved sense of belonging, we explain how SAS provides a pathway for building leadership capacity and academic advancement for experienced sessional academics. We take a collaborative, dialogic and reflective practice approach to this paper, interlacing insights from the Associate Director, Academic: Sessional Development who designed the program, and two Sessional Academic Success Advisors who have piloted it within their schools.
Resumo:
This paper presents a new framework for distributed intrusion detection based on taint marking. Our system tracks information flows between applications of multiple hosts gathered in groups (i.e., sets of hosts sharing the same distributed information flow policy) by attaching taint labels to system objects such as files, sockets, Inter Process Communication (IPC) abstractions, and memory mappings. Labels are carried over the network by tainting network packets. A distributed information flow policy is defined for each group at the host level by labeling information and defining how users and applications can legally access, alter or transfer information towards other trusted or untrusted hosts. As opposed to existing approaches, where information is most often represented by two security levels (low/high, public/private, etc.), our model identifies each piece of information within a distributed system, and defines their legal interaction in a fine-grained manner. Hosts store and exchange security labels in a peer to peer fashion, and there is no central monitor. Our IDS is implemented in the Linux kernel as a Linux Security Module (LSM) and runs standard software on commodity hardware with no required modification. The only trusted code is our modified operating system kernel. We finally present a scenario of intrusion in a web service running on multiple hosts, and show how our distributed IDS is able to report security violations at each host level.
Resumo:
The purpose of the Rural Health Education, Training and Research Network is to support the education and training of rural health practitioners and research in rural health through the optimum use of appropriate information and communication technologies to link and inform all individuals and organisation involved in the teaching, planning and delivery of health care in rural and remote Queensland. The health care of people in rural areas has the potential to be enhanced, through providing the rural and remote health professionals in Queensland with the same access to educational and training opportunities as their metropolitan colleagues. This consultative, coordinated approach should be cost-effective through both increasing awareness and utilisation of existing and developing networks, and through more efficient and rational use of both the basic and sophisticated technologies which support them. Technological hardware, expertise and infrastructure are already in place in Queensland to support a Rural Health Education, Training and Research Network, but are not being used to their potential, more often due to a lack of awareness of their existence and utility than to their perceived costs. Development of the network has commenced through seeding funds provided by Queensland Health. Future expansion will ensure access by health professionals to existing networks within Queensland. This paper explores the issues and implications of a network for rural health professionals in Queensland and potentially throughout Australia, with a specific focus on the implications for rural and isolated health professional.
Resumo:
This chapter gives an overview of the smartphone app economy and its various constituent ecosystems. It examines the role of the app store model and the proliferation of mobile apps in the shift from value chains controlled by network operators and handset manufacturers, to value networks – or ecosystems – focused around operating systems and apps. It outlines some of the benefits and disadvantages for developers of the app store model for remuneration and distribution. The chapter concludes with a discussion of recent research on the size and employment effects of the app economy.
Resumo:
There has been growing recognition of the contribution that Sessional Academics make to student learning in higher education; with recent studies concluding that around half Australian university teaching is now performed by casual staff [Red Report 2008; May, 2013]. However, sector-wide research and institutional audits continue to raise concerns about academic development and quality assurance, as well as the recognition and retention of Sessional Academics. In response, universities offer academic development programs. However, while such centrally offered programs are undoubtedly useful, they are necessarily generic and cannot address the local contexts of faculties or provide ‘on the ground’ support. This paper presents a new, distributed model of academic support and development for Sessional academics at Queensland University of Technology. Entitled the Sessional Academic Success program, it employs the principles of distributed leadership. Experienced Sessional academics are trained and supported to assume roles as Sessional Academic Success Advisors within their schools. Complementing our central programs, they design bespoke, locally situated, peer-to-peer academic development for new Sessional teachers; provide ‘just in time’, safe and reliable advice; and build supportive communities of teaching practice in their local contexts. This distributed model re-envisages the forms and places of academic development and support. It helps ensure that new Sessional Academics are embraced by faculty life. And, recognizing that experienced Sessional Academics have much to contribute to the advancement of learning and teaching, it builds their capacity through leadership opportunities. As the designer/facilitator of the program and a Sessional Academic Success Advisor, the authors take a dialogic approach and together describe the design, implementation and outcomes of the program.
Resumo:
We report on an alternative OCGM interface for a bulletin board, where a user can pin a note or a drawing, and actually shares contents. Exploiting direct and continuous manipulations, opposite to discrete gestures, to explore containers, the proposed interface supports a more natural and immediate interaction. It manages also the presence of different simultaneous users, allowing for the creation of local multimedia contents, the connection to social networks, providing a suitable working environment for cooperative and collaborative tasks in a multi-touch setup, such as touch-tables, interactive walls or multimedia boards
Resumo:
The participatory turn, fuelled by discourses and rhetoric regarding social media, and in the aftermath of the dot.com crash of the early 2000s, enrols to some extent an idea of being able to deploy networks to achieve institutional aims. The arts and cultural sector in the UK, in the face of funding cuts, has been keen to engage with such ideas in order to demonstrate value for money; by improving the efficiency of their operations, improving their respective audience experience and ultimately increasing audience size and engagement. Drawing on a case study compiled via a collaborative research project with a UK-based symphony orchestra (UKSO) we interrogate the potentials of social media engagement for audience development work through participatory media and networked publics. We argue that the literature related to mobile phones and applications (‘apps’) has focused primarily on marketing for engagement where institutional contexts are concerned. In contrast, our analysis elucidates the broader potentials and limitations of social-media-enabled apps for audience development and engagement beyond a marketing paradigm. In the case of UKSO, it appears that the technologically deterministic discourses often associated with institutional enrolment of participatory media and networked publics may not necessarily apply due to classical music culture. More generally, this work raises the contradictory nature of networked publics and argues for increased critical engagement with the concept.
Resumo:
In this chapter, the role of State Estimation (SE) in smart power grids is presented. The trend of SE error with respect to the increasing of the smart grids implementation investigated. The observability analysis as a prior task of SE is demonstrated and an analytical method to consider the impedance values of the branches is developed and discussed by examples. Since most principles of smart power grids are appropriate to distribution networks, the Distribution SE (DSE)considering load correlation is argued and illustrated by an example. The main features of smart grid SE, which is here named as “Smart Distributed SE” (SDSE), are discussed. Some characteristics of proposed SDES are distributed, hybrid, multi-micro grid and islanding support, Harmonic State Estimation (HSE), observability analysis and restore, error processing, and network parameter estimation. Distribution HSE (DHSE) and meter placement for SDSE are also presented.
Resumo:
Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C & C) channel. There are three main C & C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C & C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
Resumo:
Objective To examine the relationship between pubertal timing and physical activity. Study design A longitudinal sample of 143 adolescent girls was assessed at ages 11 and 13 years. Girls' pubertal development was assessed at age 11 with blood estradiol levels, Tanner breast staging criteria, and parental report of pubertal development. Girls were classified as early maturers (n = 41) or later maturers (n = 102) on the basis of their scores on the 3 pubertal development measures. Dependent variables measured at age 13 were average minutes/day of moderate to vigorous and vigorous physical activity as measured by the ActiGraph accelerometer. Results Early-maturing girls had significantly lower self-reported physical activity and accumulated fewer minutes of moderate to vigorous and vigorous physical activity and accelerometer counts per day at age 13 than later maturing girls. These effects v.-ere independent of differences in percentage body fat and self-reported physical activity at age 11. Conclusion Girls experiencing early pubertal maturation at age 11 reported lower subsequent physical activity at age 13 than their later maturing peers. Pubertal maturation, in particular early maturation relative to peers, may lead to declines in physical activity among adolescent girls.
Resumo:
Interaction topologies in service-oriented systems are usually classified into two styles: choreographies and orchestrations. In a choreography, services interact in a peer-to-peer manner and no service plays a privileged role. In contrast, interactions in an orchestration occur between one particular service, the orchestrator, and a number of subordinated services. Each of these topologies has its trade-offs. This paper considers the problem of migrating a service-oriented system from a choreography style to an orchestration style. Specifically, the paper presents a tool chain for synthesising orchestrators from choreographies. Choreographies are initially represented as communicating state machines. Based on this representation, an algorithm is presented that synthesises the behaviour of an orchestrator, which is also represented as a state machine. Concurrent regions are then identified in the synthesised state machine to obtain a more compact representation in the form of a Petri net. Finally, it is shown how the resulting Petri nets can be transformed into notations supported by commercial tools, such as the Business Process Modelling Notation (BPMN).
Resumo:
The Australian Government has proposed Internet Service Providers (ISPs) monitor and punish Australians who download and infringe copyright. In a discussion paper circulated by Attorney-General George Brandis, and leaked by Crikey last Friday, the government proposes a sweeping change to Australian copyright law. If implemented, it would force ISPs to take steps to prevent Australians from infringing copyright. What these steps might be is very vague. They could include blocking peer-to-peer traffic, slowing down internet connections, passing on warnings from industry groups, and handing over subscriber details to copyright owners.