35,434 research outputs found

    SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources

    Get PDF
    SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of these attacks continues to increase. Traditional defense strategies often involve static, signature-based IDS (Intrusion Detection System) rules which are mostly effective only against previously observed attacks but not unknown, or zero-day, attacks. Much current research involves the use of machine learning techniques, which are able to detect unknown attacks, but depending on the algorithm can be costly in terms of performance. In addition, most current intrusion detection strategies involve collection of traffic coming into the web application either from a network device or from the web application host, while other strategies collect data from the database server logs. In this project, we are collecting traffic from two points: the web application host, and a Datiphy appliance node located between the webapp host and the associated MySQL database server. In our analysis of these two datasets, and another dataset that is correlated between the two, we have been able to demonstrate that accuracy obtained with the correlated dataset using algorithms such as rule-based and decision tree are nearly the same as those with a neural network algorithm, but with greatly improved performance

    Implementing PRISMA/DB in an OOPL

    Get PDF
    PRISMA/DB is implemented in a parallel object-oriented language to gain insight in the usage of parallelism. This environment allows us to experiment with parallelism by simply changing the allocation of objects to the processors of the PRISMA machine. These objects are obtained by a strictly modular design of PRISMA/DB. Communication between the objects is required to cooperatively handle the various tasks, but it limits the potential for parallelism. From this approach, we hope to gain a better understanding of parallelism, which can be used to enhance the performance of PRISMA/DB.\ud The work reported in this document was conducted as part of the PRISMA project, a joint effort with Philips Research Eindhoven, partially supported by the Dutch "Stimuleringsprojectteam Informaticaonderzoek (SPIN)

    CO-OPERATING TO COMPETE IN HIGH VELOCITY GLOBAL MARKETS: THE STRATEGIC ROLE OF FLEXIBLE SUPPLY CHAIN ARCHITECTURES

    Get PDF
    Continued value creation is paramount for the survival of firms competing in today's high velocity global business environment. This paper presents a conceptual framework for understanding how firms can create and capture value within a highly volatile and uncertain business environment by exploiting both performance gaps and opportunity gaps through the development and use of flexible supply chain architectures. The choice of flexible organizational architecture allows for the continued reconfiguration of the independent modular components of the supply chain so as to achieve optimal leverage of both the firms core competencies as well as their collaborative partners complementary resources. The case of "Cellars of Canterbury," a New Zealand based International wine marketing and distribution cooperative enterprise provides empirical support. Keywords: value creation, flexible supply chain architectures, leverage, core competencies.value creation, flexible supply chain architectures, leverage, core competencies., Industrial Organization, Marketing,

    Distributed Access Control for Web and Business Processes

    Get PDF
    Middleware influenced the research community in developing a number of systems for controlling access to distributed resources. Nowadays a new paradigm for the lightweight integration of business resources from different partners is starting to take hold – Web Services and Business Processes for Web Services. Security and access control policies for Web Services protocols and distributed systems are well studied and almost standardized, but there is not yet a comprehensive proposal for an access control architecture for business processes. So, it is worth looking at the available approaches to distributed authorization as a starting point for a better understanding of what they already have and what they still need to address the security challenges for business processes

    Affect and believability in game characters:a review of the use of affective computing in games

    Get PDF
    Virtual agents are important in many digital environments. Designing a character that highly engages users in terms of interaction is an intricate task constrained by many requirements. One aspect that has gained more attention recently is the effective dimension of the agent. Several studies have addressed the possibility of developing an affect-aware system for a better user experience. Particularly in games, including emotional and social features in NPCs adds depth to the characters, enriches interaction possibilities, and combined with the basic level of competence, creates a more appealing game. Design requirements for emotionally intelligent NPCs differ from general autonomous agents with the main goal being a stronger player-agent relationship as opposed to problem solving and goal assessment. Nevertheless, deploying an affective module into NPCs adds to the complexity of the architecture and constraints. In addition, using such composite NPC in games seems beyond current technology, despite some brave attempts. However, a MARPO-type modular architecture would seem a useful starting point for adding emotions

    CO-OPERATING TO COMPETE IN HIGH VELOCITY GLOBAL MARKETS: THE STRATEGIC ROLE OF FLEXIBLE SUPPLY CHAIN ARCHITECTURES

    Get PDF
    Continued value creation is paramount for the survival of firms competing in today's high velocity global business environment. This paper presents a conceptual framework for understanding how firms can create and capture value within a highly volatile and uncertain business environment by exploiting both performance gaps and opportunity gaps through the development and use of flexible supply chain architectures. The choice of flexible organizational architecture allows for the continued reconfiguration of the independent modular components of the supply chain so as to achieve optimal leverage of both the firms core competencies as well as their collaborative partners complementary resources. The case of Cellars of Canterbury, a New Zealand based International wine marketing and distribution cooperative enterprise provides empirical support.Industrial Organization, International Relations/Trade,
    • …
    corecore