44,067 research outputs found

    Computer Networks Security Models - A New Approach for Denial-of-Services Attacks Mitigation

    Get PDF
    Computer networks are a critical factor for the performance of a modern company. Managing networks is as important as managing any other aspect of the company’s performance and security. There are many tools and appliances for monitoring the traffic and analyzing the network flow security. They use different approaches and rely on a variety of characteristics of the network flows. Network researchers are still working on a common approach for security baselining that might enable early watch alerts. This research focuses on the network security models, particularly the Denial-of-Services (DoS) attacks mitigation, based on a network flow analysis using the flows measurements and the theory of Markov models. The content of the paper comprises the essentials of the author’s doctoral thesis

    Dynamic 3D Network Data Visualization

    Get PDF
    Monitoring network traffic has always been an arduous and tedious task because of the complexity and sheer volume of network data that is being consistently generated. In addition, network growth and new technologies are rapidly increasing these levels of complexity and volume. An effective technique in understanding and managing a large dataset, such as network traffic, is data visualization. There are several tools that attempt to turn network traffic into visual stimuli. Many of these do so in 2D space and those that are 3D lack the ability to display network patterns effectively. Existing 3D network visualization tools lack user interaction, dynamic generation, and intuitiveness. This project proposes a user-friendly 3D network visualization application that creates both dynamic and interactive visuals. This application was built using the Bablyon.js graphics framework and uses anonymized data collected from a campus network

    Quantitative analysis of comprehension and skill acquisition of engineering students from the cybersecurity virtual internship program

    Get PDF
    Cybersecurity is a vital part of a secure digital world. This paper is about quantitative analysis of the case study of the 8-week virtual internship program in Cyber Security recognized by AICTE and NASSCOM. The program\u27s main objective was to train future professionals to possess good knowledge and skills in cyber security, specifically applying the skills to real-time scenarios. The internship constituted for Cisco Networking Academy institutions’ 2nd & 3rd year engineering students for the academic year 2020-21. Students completed the instructor-led, online self-paced courses: Introduction to Cyber Security (1.5 weeks), Introduction to Packet Tracer (1.5 weeks), and Cyber Security Essentials (2 weeks). Further, the students were invited to attend 5 sessions (1 week) conducted by industry experts to help students become career-ready and understand the career path in the cyber security industry. Furthermore, students worked on a project under the guidance of their instructor to design a secure network for their institution on the Packet Tracer simulation tool (2 weeks). On completion and submission of their project work, students completed the final quiz. Eligible 72 students who completed all the criteria received a virtual internship certificate from AICTE, NASSCOM, and Cisco. Students were evaluated before and after every step of the internship process. It was evident that there is a significantly positive effect of this internship on students’ skill acquisition (98.5%) and comprehension (92.2%) of network topology, (98.2%) of the students acquired a significant level of skills (software initiation skill - 98.7%; configuration skill - 92.3%; redirection skill - 93.1%; simulation skill - 98.7%; and connection skill 95.2- %) and students’ comprehension of network topology and cyber security concept was averagely high (98.8.5 %). The analysis concluded that the cyber security internship activity is a pertinent mechanism for stimulating students’ skills acquisition and comprehension of cyber security concepts, while also recommending that educators should use the Cisco packet tracer to allow students to gain practical and cognitive skills in the areas of computer networks and cyber securit

    Preparing for GDPR:helping EU SMEs to manage data breaches

    Get PDF
    Over the last decade, the number of small and medium (SME) businesses suffering data breaches has risen at an alarming rate. Knowing how to respond to inevitable data breaches is critically important. A number of guidelines exist to advise organisations on the steps necessary to ensure an effective incident response. These guidelines tend to be unsuitable for SMEs, who generally have limited resources to expend on security and incident responses. Qualitative interviews were conducted with SMEs to probe current data breach response practice and to gather best-practice advice from SMEs themselves. The interviews revealed no widespread de facto approach, with a variety of practices being reported. A number of prevalent unhelpful-practice themes emerged from the responses, which we propose specific mitigation techniques to address. We therefore propose a SME-specific incident response framework that is simple yet powerful enough to inform and guide SME responses to data breach incidents

    Instant messaging clients - Relaxed, free & enjoyable English learning and training tools

    Get PDF
    In a demanding world of using English as a second language, computer technology and the internet are being dominantly used as they provide an incredible boost to language learning environment. At present, we can experience a more exciting way of learning a language by taking the advantages of the Instant Messaging Networks widely available online. This latest incarnation of the online chat is one of the communication methods that has proven to be a very good complement to the ways in which we communicate, both privately and professionally. These brilliantly invented instruments such as Skype, Yahoo Messenger and et cetera are a godsend to those who like to seek knowledge and to improve their English. This paper aims to examine the effectiveness of these so called ‘eclectic communicators’ in second language learning; focusing more on their functions as relaxing, and enjoyable language learning tools in a higher educational setting. This qualitative paper begins by highlighting current literature in the area of computer mediated communication (CMC) learning environments in second language use and development. It also discusses some of the issues and challenges related to this matter. In conclusion, this paper provides an overview of the benefits and drawbacks of instant messaging in educational settings especially in second language learning environment

    Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor

    Get PDF
    Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C. porosus in captivity is important because the data obtained may contribute for conservation and the safety for handlers and visitors. Thus, this study focuses on C. porosus in captivity to describe systematically the agonistic behaviour of C. porosus in relation to feeding time, daytime or night and density per pool. This study was carried out for 35 days in two different ponds. The data was analysed using Pearson’s chi-square analysis to see the relationship between categorical factors. The study shows that C. porosus was more aggressive during daylight, feeding time and non-feeding time in breeding enclosure (Pond C, stock density =0.0369 crocodiles/m2) as compared to non-breeding pond (Pond B, stock density =0.3317 crocodiles/m2) where it is only aggressive during the nighttime. Pond C shows the higher domination in the value of aggression in feeding and non-feeding time where it is related to its function as breeding ground. Chi-square analysis shows that there is no significant difference between ponds (p=0.47, χ2= 2.541, df= 3), thus, there is no relationship between categorical factors. The aggressive behaviour of C. porosus is important for the farm management to evaluate the risk in future for the translocation process and conservation of C. porosus generally

    Employment Retention Essentials

    Get PDF
    Employment retention is one of the critical challenges facing the workforce field today. For any organization that seeks to improve retention services, "Employment Retention Essentials" is an invaluable resource. User-friendly and filled with practical ideas, this guide offers concrete tools for keeping people working, including tips on how to involve employers, build relationships and stay in contact with participants

    Maksullisten ja ilmaisten virustorjuntaohjelmien suojauksen tehokkuuden vertailu

    Get PDF
    Opinnäytetyön tavoitteena oli verrata maksullisten ja ilmaisten virustorjuntaohjelmien suojauksen tehokkuutta ja ottaa selvää, kummat suojaisivat konetta paremmin. Aihe liittyy tietoturvaan, joka voidaan määritellä viidellä käsitteellä: luottamuksellisuus, eheys, käytettävyys, kiistämättömyys ja pääsynvalvonta. Käsitteillä pyritään esitte-lemään tietoturva mahdollisimman kattavasti. Virustorjuntaohjelmat suojaavat haittaohjelmilta, jotka yrittävät levitä koneesta toiseen internetin kautta. Pääs-tessään koneelle ne saattavat aiheuttaa uhrilleen vahinkoa. Yleisimpiä haittaohjelmia ovat troijalaiset ja Bot-verkot. Nykyään tietokoneissa täytyy olla myös palomuuri, joka estää epäilyttävän liikenteen tietokoneen lähi-verkon ja internetin väliltä. Muita hyödyllisiä ohjelmia ovat etsintäohjelmat ja selainlaajennukset. Työssä testattiin kolmea ilmaista ja kolme maksullista virustorjuntaohjelmaa. Testattavat ohjelmat olivat F-Secure Internet Security 2014, Norton Internet Security 2014, Kaspersky PURE 3.0, Avast! Free Anti-Virus, Avira Free Anti-Virus ja Microsoft Security Essential. Testaus tapahtui Oracle VM VirtualBox -ohjelman kautta ajettavassa virtuaalisessa tietokoneessa. Testausten jälkeen verrattiin saadut tuloksia keskenään. Vertailussa il-meni, ettei ilmaisten ja maksullisten ohjelmien suojauksen tehokkuudessa suuria eroja. Norton, Kaspersky ja Microsoft Security Essential torjuivat parhaiten testivirukset. Kuitenkin ilmaisilla ohjelmilla pystyy turvaamaan helposti kotikäyttöisen tietokoneen, mutta käyttäjän kannattaa ensiksi varmistua ohjelman luotettavuudesta.The aim of this thesis was to compare the protection effectiveness of paid and free anti-virus programs and find out which one is better for protecting computers. The topic is related to information security, which can be defined with five concepts: confidentiality, integrity, availability, non-repudiation, and access control. The aim is to present the concepts of security as comprehensively as possible. Anti-virus software protects against malware that tries to spread from one computer to another through the Internet. When malware gets into a computer, it may cause damage to it. The most common types of malware are Trojans and Bot networks. Nowadays computers must also have a firewall that blocks suspicious traffic between the computer’s local network and the Internet. Other useful programs are malware scanners and browser extensions. Three paid and three free anti-virus programs were used in the tests. The programs were tested with F -Secure Internet Security 2014, Norton Internet Security 2014, Kaspersky PURE 3.0, Avast! Free Anti- Virus, Avira Free Anti-Virus and Microsoft Security Essentials. The testing took place in a virtual computer executed by Oracle VM VirtualBox. After the testing the results were compared with each other. The comparison showed that there were no major differences between the free and paid programs in protection. Norton, Kaspersky and Microsoft Security Essential were the best for rejecting the test viruses. However, you can secure a home com-puter with free software, but the user should first ascertain the reliability of the program
    corecore