291,768 research outputs found

    Graffiti Networks: A Subversive, Internet-Scale File Sharing Model

    Full text link
    The proliferation of peer-to-peer (P2P) file sharing protocols is due to their efficient and scalable methods for data dissemination to numerous users. But many of these networks have no provisions to provide users with long term access to files after the initial interest has diminished, nor are they able to guarantee protection for users from malicious clients that wish to implicate them in incriminating activities. As such, users may turn to supplementary measures for storing and transferring data in P2P systems. We present a new file sharing paradigm, called a Graffiti Network, which allows peers to harness the potentially unlimited storage of the Internet as a third-party intermediary. Our key contributions in this paper are (1) an overview of a distributed system based on this new threat model and (2) a measurement of its viability through a one-year deployment study using a popular web-publishing platform. The results of this experiment motivate a discussion about the challenges of mitigating this type of file sharing in a hostile network environment and how web site operators can protect their resources

    Watermarking techniques for mobile application: A review

    Get PDF
    This paper reviewed mobile applications schemes for image watermarking techniques used to secure user media files. Due to the increase in number of smartphones and Internet usage especially in today’s life, cybercrime rate seems to be increasing too. Thus, an efficient and suitable watermarking scheme for mobile devices needs to be studied and developed. Digital watermarking is an example of a data hiding technique used by researchers. From the analysis, almost all schemes implement Android Operating System for different techniques and media file types. This paper provides an overview and comparison of various mobile applications for image watermarking techniques

    Peer to Peer Information Retrieval: An Overview

    Get PDF
    Peer-to-peer technology is widely used for file sharing. In the past decade a number of prototype peer-to-peer information retrieval systems have been developed. Unfortunately, none of these have seen widespread real- world adoption and thus, in contrast with file sharing, information retrieval is still dominated by centralised solutions. In this paper we provide an overview of the key challenges for peer-to-peer information retrieval and the work done so far. We want to stimulate and inspire further research to overcome these challenges. This will open the door to the development and large-scale deployment of real-world peer-to-peer information retrieval systems that rival existing centralised client-server solutions in terms of scalability, performance, user satisfaction and freedom

    The effectiveness of the creativity trigger module in achieving higher levels of creative thinking among prospective teachers

    Get PDF
    The unoptimised level of creative thinking is seen as an issue among Semester 8 prospective teachers in Malaysian Teacher-Education Institutes (IPG). This could impede their teaching of creative thinking as one of the four components of 21st century skills in schools. In relation to this, this study sets out to investigate prior creativity levels of IPG prospective teachers and develop the Creativity Trigger Module (CTM) as a training module for enhancing their creativity. The Torrance Tests of Creative Thinking (TTCT) was used to compare the prior creativity levels of four respondent groups and test the effectiveness of the CTM on five dimensions of figural creativity, namely fluency, originality, elaboration, resistance to premature closure, abstractness of titles, and their overall creativity. A two-stage cluster sampling technique identified two IPGs with 68 respondents in the state of Johor namely, IPG-Kampus Tun Hussein Onn, Batu Pahat (IPGKTHO) as the control group site (34 respondents), and IPG- Kampus Temenggong Ibrahim, Johor Bahru (IPGKTI) as the treatment group site (34 respondents). Mathematics (MT) and Design and Technology (RBT) are the only two specialist subject combinations that provided enough sample size at both test sites. A quasi-experimental research design was used and this involved intact classes. Data analysis was carried out as follows: ANOVA, ANCOVA, and Wilcoxon Signed Rank Test analysis for TTCT scores while data analysis based on the NVivo software was used for the focus group interviews. Findings on prior creativity levels showed average or low creativity levels among all 4 test groups with IPGKTHO and RBT options having significantly higher posttest marks as compared to IPGKTI and MT option respectively. The CTM was found to improve significantly respondents’ posttest marks for the treatment group in all the five dimensions of figural creativity and, their overall creativity. Feedback from respondents revealed positive support for the CTM. In conclusion, the prior creativity of IPG prospective teachers was at an unoptimised level before treatment but the CTM has been successfully developed as an effective resource for enhancing the creative thinking levels among IPG prospective teachers

    Quality of Service over Specific Link Layers: state of the art report

    Get PDF
    The Integrated Services concept is proposed as an enhancement to the current Internet architecture, to provide a better Quality of Service (QoS) than that provided by the traditional Best-Effort service. The features of the Integrated Services are explained in this report. To support Integrated Services, certain requirements are posed on the underlying link layer. These requirements are studied by the Integrated Services over Specific Link Layers (ISSLL) IETF working group. The status of this ongoing research is reported in this document. To be more specific, the solutions to provide Integrated Services over ATM, IEEE 802 LAN technologies and low-bitrate links are evaluated in detail. The ISSLL working group has not yet studied the requirements, that are posed on the underlying link layer, when this link layer is wireless. Therefore, this state of the art report is extended with an identification of the requirements that are posed on the underlying wireless link, to provide differentiated Quality of Service

    Stealthy Plaintext

    Get PDF
    Correspondence through email has become a very significant way of communication at workplaces. Information of most kinds such as text, video and audio can be shared through email, the most common being text. With confidential data being easily sharable through this method most companies monitor the emails, thus invading the privacy of employees. To avoid secret information from being disclosed it can be encrypted. Encryption hides the data effectively but this makes the data look important and hence prone to attacks to decrypt the information. It also makes it obvious that there is secret information being transferred. The most effective way would be to make the information seem harmless by concealing the information in the email but not encrypting it. We would like the information to pass through the analyzer without being detected. This project aims to achieve this by “encrypting” plain text by replacing suspicious keywords with non-suspicious English words, trying to keep the grammatical syntax of the sentences intact

    Honey Sheets: What Happens to Leaked Google Spreadsheets?

    Get PDF
    Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper, we present a system able to monitor user activity on Google spreadsheets. We populated 5 Google spreadsheets with fake bank account details and fake funds transfer links. Each spreadsheet was configured to report details of accesses and clicks on links back to us. To study how people interact with these spreadsheets in case they are leaked, we posted unique links pointing to the spreadsheets on a popular paste site. We then monitored activity in the accounts for 72 days, and observed 165 accesses in total. We were able to observe interesting modifications to these spreadsheets performed by illicit accesses. For instance, we observed deletion of some fake bank account information, in addition to insults and warnings that some visitors entered in some of the spreadsheets. Our preliminary results show that our system can be used to shed light on cybercriminal behavior with regards to leaked online documents
    corecore