8 research outputs found

    Behavioural correlation for malicious bot detection

    Get PDF
    Over the past few years, IRC bots, malicious programs which are remotely controlled by the attacker, have become a major threat to the Internet and its users. These bots can be used in different malicious ways such as to launch distributed denial of service (DDoS) attacks to shutdown other networks and services. New bots are implemented with extended features such as keystrokes logging, spamming, traffic sniffing, which cause serious disruption to targeted networks and users. In response to these threats, there is a growing demand for effective techniques to detect the presence of bots/botnets. Currently existing approaches detect botnets rather than individual bots. In our work we present a host-based behavioural approach for detecting bots/botnets based on correlating different activities generated by bots by monitoring function calls within a specified time window. Different correlation algorithms have been used in this work to achieve the required task. We start our work by detecting IRC bots' behaviours using a simple correlation algorithm. A more intelligent approach to understand correlating activities is also used as a major part of this work. Our intelligent algorithm is inspired by the immune system. Although the intelligent approach produces an anomaly value for the classification of processes, it generates false positive alarms if not enough data is provided. In order to solve this problem, we introduce a modified anomaly value which reduces the amount of false positives generated by the original anomaly value. We also extend our work to detect peer to peer (P2P) bots which are the upcoming threat to Internet security due to the fact that P2P bots do not have a centralized point to shutdown or traceback, thus making the detection of P2P bots a real challenge. Our evaluation shows that correlating different activities generated by IRC/P2P bots within a specified time period achieves high detection accuracy. In addition, using an intelligent correlation algorithm not only states if an anomaly is present, but it also names the culprit responsible for the anomaly

    Behavioural correlation for malicious bot detection

    Get PDF
    Over the past few years, IRC bots, malicious programs which are remotely controlled by the attacker, have become a major threat to the Internet and its users. These bots can be used in different malicious ways such as to launch distributed denial of service (DDoS) attacks to shutdown other networks and services. New bots are implemented with extended features such as keystrokes logging, spamming, traffic sniffing, which cause serious disruption to targeted networks and users. In response to these threats, there is a growing demand for effective techniques to detect the presence of bots/botnets. Currently existing approaches detect botnets rather than individual bots. In our work we present a host-based behavioural approach for detecting bots/botnets based on correlating different activities generated by bots by monitoring function calls within a specified time window. Different correlation algorithms have been used in this work to achieve the required task. We start our work by detecting IRC bots' behaviours using a simple correlation algorithm. A more intelligent approach to understand correlating activities is also used as a major part of this work. Our intelligent algorithm is inspired by the immune system. Although the intelligent approach produces an anomaly value for the classification of processes, it generates false positive alarms if not enough data is provided. In order to solve this problem, we introduce a modified anomaly value which reduces the amount of false positives generated by the original anomaly value. We also extend our work to detect peer to peer (P2P) bots which are the upcoming threat to Internet security due to the fact that P2P bots do not have a centralized point to shutdown or traceback, thus making the detection of P2P bots a real challenge. Our evaluation shows that correlating different activities generated by IRC/P2P bots within a specified time period achieves high detection accuracy. In addition, using an intelligent correlation algorithm not only states if an anomaly is present, but it also names the culprit responsible for the anomaly

    Electrochemical oxidation of H 2, CO gas mixtures in polymer-electrolyte-membrane fuel cells

    Get PDF
    Magdeburg, Univ., Fak. für Verfahrens- und Systemtechnik, Diss., 2014von Sebastian Kirsc

    Persuasion in the context of a psychic reading

    Get PDF
    This thesis considers the claim that although there is little reason on the basis of experimental evidence to believe that psychic readers have paranormal access to information about their clients, nevertheless individuals are persuaded that such claimants have demonstrated that they possess psychic abilities. A random sample survey of 1,000 residents of Edinburgh district did find support for the claim that the general population is sympathetic to the claims made by psychics. These findings are reconciled with reference to Pseudopsychics' claimed ability to simulate psychic abilities through the use of a technique known as cold reading. A model is proposed, informed by a review of pseudopsychic literature and a pilot study with a known cold reader, which suggests that cold reading actually consists of a number of discrete but interdependent techniques. Central to the model is that much of the reading is dependent on the Bamum effect for success. Experimental work assessed the previously untested assertion that pseudopsychic statements are capable of inducing Barnum acceptance, and found that such items perform in a similar manner to classical Barnum statements. These statements were used to expand the Barnum pool so that the nature and causes of Barnum acceptance could be studied more systematically. One study explored those properties inherent in Barnum statements which are regarded as contributing to their ready acceptance as true of Ss. It was found that acceptance of items could be predicted on the basis of independent judges' ratings of eight statement properties.Two further studies presented Bamum items as pseudo-feedback from an ostensible psychic reading. These were conducted to explore a proposed model which suggested that Ss accept items because of an artifact of cognitive processing, whereby Barnum statements are not assessed for accuracy in their given form, but rather are interpreted by the client in terms of their own particular circumstances and concerns. Predictions were made on the basis of the artifact model about Ss' recall for the content of the reading, and provided some support for this characterisation of the effect. A final study was conducted to assess the contention that experimental tests of psychic readers misrepresent the function of the reading, and makes the suggestion that with regard to psychic functioning, the client may actually be an active participant. The implications of these results for testing and evaluating psychic readers are discussed

    TRIZ Future Conference 2004

    Get PDF
    TRIZ the Theory of Inventive Problem Solving is a living science and a practical methodology: millions of patents have been examined to look for principles of innovation and patterns of excellence. Large and small companies are using TRIZ to solve problems and to develop strategies for future technologies. The TRIZ Future Conference is the annual meeting of the European TRIZ Association, with contributions from everywhere in the world. The aims of the 2004 edition are the integration of TRIZ with other methodologies and the dissemination of systematic innovation practices even through SMEs: a broad spectrum of subjects in several fields debated with experts, practitioners and TRIZ newcomers

    Renaissance Texts, Medieval Subjectivities: Vernacular Genealogies of English Petrarchism from Wyatt to Wroth

    Get PDF
    This dissertation investigates the symbolic presence of medieval forms of textual selfhood in early modern English Petrarchan poetry. Undertaking a systematic re-reading of a significant body of English Petrarchism through the prism of late medieval English poetry, it argues that medieval poetic texts inscribe in the vernacular literary imaginary (i.e. a repository of discursive forms and identities available to early modern writers through antecedent and contemporaneous literary utterances) a network of recognizable and iterable discursive structures and associated subject positions; and that various linguistic and ideological traces of these medieval discourses and selves can be discovered in early modern English Petrarchism. Each of the four chapters traces medieval genealogies of a distinct scenario of subjectivity deployed by English Renaissance Petrarchism. The first chapter considers the significance of William Langland’s poetics of meed (reward) for the anti-laureate and anti-courtly identities assumed by Thomas Wyatt in his Petrarchan poems and by Edmund Spenser in the Amoretti. The second chapter examines the persistence of vernacular melancholy (encapsulated in Geoffrey Chaucer’s Book of the Duchess) in the verse of Henry Howard, earl of Surrey and in Philip Sidney’s Astrophil and Stella. The poetics of melancholy engenders a fragmented subjectivity that manifests itself through a series of quasi-theatrical performances of identity, as well as an ambivalent form of poetic discourse in which the production of Petrarchism is carried out alongside its radical critique. The focus of chapter three is the master trope of royal incarceration and its function as a mechanism of subject formation in the poetry of James I Stewart, Charles of Orleans, Mary Stewart, and Lady Mary Wroth. As the dissertation argues, the figure of an imprisoned sovereign is a crucial ideologeme of the pre-modern English political and literary imaginary, underwriting the poetics and politics of royal identity from Sir John Fortescue to James VI/I. Lastly, the fourth chapter investigates medieval genealogies of the subject afflicted with a malady of desire in Shakespeare’s sonnets, by tracing its inchoate vernacular precedents back to the poems of Thomas Hoccleve (La Male Regle) and Robert Henryson (The Testament of Cresseid).1 yea
    corecore