13,696 research outputs found

    Applications of Machine Learning to Threat Intelligence, Intrusion Detection and Malware

    Get PDF
    Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection. Threat intelligence, especially attack attribution, can benefit from the use of ML classification. False positives from rule-based intrusion detection systems can be reduced with the use of ML models. Malware analysis and classification can be made easier by developing ML frameworks to distill similarities between the malicious programs. Adversarial machine learning will also be discussed, because while ML can be used to solve problems or reduce analyst workload, it also introduces new attack surfaces

    The MetaCapitalism Cult.

    Get PDF
    Qu’il s’agisse de notre vie professionnelle ou de notre vie personnelle, la promesse d’immortalitĂ© exerce le mĂȘme pouvoir de sĂ©duction. La promesse de salut dĂ©livrĂ©e Ă  l’entreprise ne diffĂšre guĂšre de la promesse faite aux ĂȘtres humains. Cet idĂ©al de salut, qui a exercĂ© sa fascination sur toutes les Ă©poques, les religions ont promis de le rĂ©aliser. Les entreprises de conseil s’inscrivent dans la mĂȘme logique, dans la mesure oĂč elles constituent, pour les entreprises, l’équivalent contemporain d’une expĂ©rience religieuse. Les prophĂštes du conseil s’emploient Ă  gĂ©nĂ©rer ce genre de sentiments en utilisant tout un vocabulaire symbolique tel que « reconfiguration des processus », « meilleures pratiques », etc, dans un rituel baptisĂ© MĂ©taCapitalisme, impliquant une communautĂ© de croyants, en l’occurrence leurs clients. Ce rituel, par le biais du Culte du conseil, a des consĂ©quences qui vont bien au-delĂ  des seules entreprises clientes et affectent de maniĂšre importante de nombreux groupes de personnes et d’institutions dans notre sociĂ©tĂ© devenue globale. Ce constat justifie de procĂ©der Ă  un examen critique de ses mĂ©rites. Notre recherche explore la performance du MĂ©taCapitalisme, un terme forgĂ© par le gĂ©ant du conseil, Price Waterhouse Coopers (PWC), pour dĂ©crire sa vision de la « nouvelle Ă©conomie », qui traite de l’utilisation des e-markets, des Ă©changes en ligne et des communautĂ©s d’affaires en rĂ©seau, et a eu pour effet de dĂ©multiplier l’impact des dĂ©veloppements technologiques et des principales amĂ©liorations de la vie des affaires issues des annĂ©es 1990. Le MĂ©taCapitalisme peut ĂȘtre apprĂ©hendĂ© en analysant la conversion des leaders du MĂ©taCapitalisme au modĂšle prĂŽnĂ©. Notre Ă©tude, en appliquant des techniques de rĂ©gression Ă  un certain nombre d’indicateurs clĂ©s, identifie les tendances relatives Ă  la performance de ces leaders et les compare avec les tendances observĂ©es pour les 100 premiĂšres entreprises du groupe Fortune. Il en ressort que les entreprises du MĂ©taCapitalisme ont Ă©tĂ© incapables de maintenir la transformation apparemment brillante qu’elles avaient opĂ©rĂ©e en 1999 et que sur de nombreux points, les tendances prĂ©sentent des retournements imprĂ©vus par rapport au maintien de la structure idĂ©ale du MĂ©taCapitalisme. Une Ă©valuation critique de ces observations est effectuĂ©e de maniĂšre Ă  valider la possibilitĂ© de gĂ©nĂ©ralisation du modĂšle, afin d’ĂȘtre en mesure d’éviter une expĂ©rimentation sociale continue et prĂ©judiciable. En conclusion, la stratĂ©gie du MĂ©taCapitalisme prĂ©sente d’indĂ©niables similitudes avec les cultes religieux, ce qui amĂšne Ă  la question suivante : le MĂ©taCapitalisme aura-t-il le mĂȘme destin que la plupart de ces cultes, Ă  savoir, le dĂ©senchantement est liĂ© Ă  des espĂ©rances déçues ?

    Moving Target Defense Using Live Migration of Docker Containers

    Get PDF
    abstract: Today the information technology systems have addresses, software stacks and other configuration remaining unchanged for a long period of time. This paves way for malicious attacks in the system from unknown vulnerabilities. The attacker can take advantage of this situation and plan their attacks with sufficient time. To protect our system from this threat, Moving Target Defense is required where the attack surface is dynamically changed, making it difficult to strike. In this thesis, I incorporate live migration of Docker container using CRIU (checkpoint restore) for moving target defense. There are 460K Dockerized applications, a 3100% growth over 2 years[1]. Over 4 billion containers have been pulled so far from Docker hub. Docker is supported by a large and fast growing community of contributors and users. As an example, there are 125K Docker Meetup members worldwide. As we see industry adapting to Docker rapidly, a moving target defense solution involving containers is beneficial for being robust and fast. A proof of concept implementation is included for studying performance attributes of Docker migration. The detection of attack is using a scenario involving definitions of normal events on servers. By defining system activities, and extracting syslog in centralized server, attack can be detected via extracting abnormal activates and this detection can be a trigger for the Docker migration.Dissertation/ThesisMasters Thesis Computer Science 201

    Assessing Public Opinions Through Web 2.0: A Case Study on Wal-Mart

    Get PDF
    The recent advancement of Web 2.0 enables people to exchange their opinions on a variety of topics. Among these discussions, the opinions of employees, customers, and investors are of great interest to companies. Insight into such perspectives can help managers make better decisions on business policies and strategy. However, assessing online opinions is a nontrivial task. The high volume of messages, casual writing style, and the significant amount of noise require the application of sophisticated text mining techniques to digest the data. Previous research has successfully applied sentiment analysis to assess online opinions on specific items and topics. In this research, we propose the integration of topic analysis with sentiment analysis methods to assess the public opinions expressed in forums with diverse topics of discussion. Using a Wal- Mart-related Web forum as an example, we found that combining the two types of analysis can provide us with improved ability to assess public opinions on a company. Through further analysis on one cluster of discussions, several abnormal traffic and sentiment patterns were identified related to Wal-Mart events. The case study validates the propose framework as an IT artifact to assess online public opinion on companies of interest. Our research promotes further efforts to combine topic and sentiment analysis techniques in online research supporting business decision making

    Efficient Load Balancing for Cloud Computing by Using Content Analysis

    Get PDF
    Nowadays, computer networks have grown rapidly due to the demand for information technology management and facilitation of greater functionality. The service provided based on a single machine cannot accommodate large databases. Therefore, single servers must be combined for server group services. The problem in grouping server service is that it is very hard to manage many devices which have different hardware. Cloud computing is an extensive scalable computing infrastructure that shares existing resources. It is a popular option for people and businesses for a number of reasons including cost savings and security. This paper aimed to propose an efficient technique of load balance control by using HA Proxy in cloud computing with the objective of receiving and distributing the workload to the computer server to share the processing resources. The proposed technique applied round-robin scheduling for an efficient resource management of the cloud storage systems that focused on an effective workload balancing and a dynamic replication strategy. The evaluation approach was based on the benchmark data from requests per second and failed requests. The results showed that the proposed technique could improve performance of load balancing by 1,000 request /6.31 sec in cloud computing and generate fewer false alarm
    • 

    corecore