52 research outputs found

    Modeling Deception for Cyber Security

    Get PDF
    In the era of software-intensive, smart and connected systems, the growing power and so- phistication of cyber attacks poses increasing challenges to software security. The reactive posture of traditional security mechanisms, such as anti-virus and intrusion detection systems, has not been sufficient to combat a wide range of advanced persistent threats that currently jeopardize systems operation. To mitigate these extant threats, more ac- tive defensive approaches are necessary. Such approaches rely on the concept of actively hindering and deceiving attackers. Deceptive techniques allow for additional defense by thwarting attackers’ advances through the manipulation of their perceptions. Manipu- lation is achieved through the use of deceitful responses, feints, misdirection, and other falsehoods in a system. Of course, such deception mechanisms may result in side-effects that must be handled. Current methods for planning deception chiefly portray attempts to bridge military deception to cyber deception, providing only high-level instructions that largely ignore deception as part of the software security development life cycle. Con- sequently, little practical guidance is provided on how to engineering deception-based techniques for defense. This PhD thesis contributes with a systematic approach to specify and design cyber deception requirements, tactics, and strategies. This deception approach consists of (i) a multi-paradigm modeling for representing deception requirements, tac- tics, and strategies, (ii) a reference architecture to support the integration of deception strategies into system operation, and (iii) a method to guide engineers in deception mod- eling. A tool prototype, a case study, and an experimental evaluation show encouraging results for the application of the approach in practice. Finally, a conceptual coverage map- ping was developed to assess the expressivity of the deception modeling language created.Na era digital o crescente poder e sofisticação dos ataques cibernéticos apresenta constan- tes desafios para a segurança do software. A postura reativa dos mecanismos tradicionais de segurança, como os sistemas antivírus e de detecção de intrusão, não têm sido suficien- tes para combater a ampla gama de ameaças que comprometem a operação dos sistemas de software actuais. Para mitigar estas ameaças são necessárias abordagens ativas de defesa. Tais abordagens baseiam-se na ideia de adicionar mecanismos para enganar os adversários (do inglês deception). As técnicas de enganação (em português, "ato ou efeito de enganar, de induzir em erro; artimanha usada para iludir") contribuem para a defesa frustrando o avanço dos atacantes por manipulação das suas perceções. A manipula- ção é conseguida através de respostas enganadoras, de "fintas", ou indicações erróneas e outras falsidades adicionadas intencionalmente num sistema. É claro que esses meca- nismos de enganação podem resultar em efeitos colaterais que devem ser tratados. Os métodos atuais usados para enganar um atacante inspiram-se fundamentalmente nas técnicas da área militar, fornecendo apenas instruções de alto nível que ignoram, em grande parte, a enganação como parte do ciclo de vida do desenvolvimento de software seguro. Consequentemente, há poucas referências práticas em como gerar técnicas de defesa baseadas em enganação. Esta tese de doutoramento contribui com uma aborda- gem sistemática para especificar e desenhar requisitos, táticas e estratégias de enganação cibernéticas. Esta abordagem é composta por (i) uma modelação multi-paradigma para re- presentar requisitos, táticas e estratégias de enganação, (ii) uma arquitetura de referência para apoiar a integração de estratégias de enganação na operação dum sistema, e (iii) um método para orientar os engenheiros na modelação de enganação. Uma ferramenta protó- tipo, um estudo de caso e uma avaliação experimental mostram resultados encorajadores para a aplicação da abordagem na prática. Finalmente, a expressividade da linguagem de modelação de enganação é avaliada por um mapeamento de cobertura de conceitos

    Rumor source identification in complex networks

    Full text link
    This thesis conducts an in-depth study on rumor spreading process through a complex network, with the objective to identify the source(s) of the rumor. This work is of fundamental importance for a secure network.<br /

    The 1995 Goddard Conference on Space Applications of Artificial Intelligence and Emerging Information Technologies

    Get PDF
    This publication comprises the papers presented at the 1995 Goddard Conference on Space Applications of Artificial Intelligence and Emerging Information Technologies held at the NASA/Goddard Space Flight Center, Greenbelt, Maryland, on May 9-11, 1995. The purpose of this annual conference is to provide a forum in which current research and development directed at space applications of artificial intelligence can be presented and discussed

    Systematics and Diversity of Annelids

    Get PDF
    In this Special Issue, we address the state of the art of the systematics of the main annelid groups and the improvements in the diversity they hold, with special emphasis on the latest discoveries in well-studied areas, expeditions to unsurveyed areas or environments, or the use of novel techniques that allow for the improvement of biodiversity knowledge. We are hoping that this Special Issue will provide a platform facilitating a review of current knowledge on the subject, identifying current research problems, as well as indicating directions and research trends for the future

    Grammatical gender and linguistic complexity : Volume I: General issues and specific studies

    Get PDF
    Peer reviewe

    Digital Media and Textuality: From Creation to Archiving

    Get PDF
    Due to computers' ability to combine different semiotic modes, texts are no longer exclusively comprised of static images and mute words. How have digital media changed the way we write and read? What methods of textual and data analysis have emerged? How do we rescue digital artifacts from obsolescence? And how can digital media be used or taught inside classrooms? These and other questions are addressed in this volume that assembles contributions by artists, writers, scholars and editors. They offer a multiperspectival view on the way digital media have changed our notion of textuality

    Digital Media and Textuality

    Get PDF
    Due to computers' ability to combine different semiotic modes, texts are no longer exclusively comprised of static images and mute words. How have digital media changed the way we write and read? What methods of textual and data analysis have emerged? How do we rescue digital artifacts from obsolescence? And how can digital media be used or taught inside classrooms? These and other questions are addressed in this volume that assembles contributions by artists, writers, scholars and editors such as Dene Grigar, Sandy Baldwin, Carlos Reis, and Frieder Nake. They offer a multiperspectival view on the way digital media have changed our notion of textuality

    Grammatical gender and linguistic complexity, Volume 1

    Get PDF
    The many facets of grammatical gender remain one of the most fruitful areas of linguistic research, and pose fascinating questions about the origins and development of complexity in language. The present work is a two-volume collection of 13 chapters on the topic of grammatical gender seen through the prism of linguistic complexity. The contributions discuss what counts as complex and/or simple in grammatical gender systems, whether the distribution of gender systems across the world’s languages relates to the language ecology and social history of speech communities. This volume is complemented by volume two, which consists of three chapters providing diachronic and typological case studies, followed by a final chapter discussing old and new theoretical and empirical challenges in the study of the dynamics of gender complexity

    Stories worth telling: How one school navigates tensions between innovation and standards

    Get PDF
    This dissertation examines the cultural practice of assessment at King Middle School, a grades 6--8 school in Portland, Maine. I trace this school\u27s reform efforts over 23 years, within the current development of school-wide practices over time, in relation to making work public. I used a sociocultural framework, which allowed for an examination of the situation-as-a-whole, to see learning as distributed among people, time and objects, and to view artifacts of student work as boundary objects ---sites of negotiation among people from different, but related, social worlds. A sociocultural perspective also allowed for an expansive notion of assessment that included not just individual classroom strategies or school-wide practices, but also the system of assessment across communities. I adopted a grounded theory approach to data collection and analysis. My research yielded a mid-level theory about how sharing work with audiences---and the resulting recognition---shapes students, teachers, institutions and communities. Accordingly, this theory also describes a dialectic process---how institutions, communities, teachers and students shape the cultural practice of assessment. In line with a sociocultural perspective, I also found that recognition was not simply something produced through student work, but was an inherent feature of the activity. In conclusion, I share implications on three levels: conceptual, methodological and practical. Conceptually, I offer a developmental understanding of recognition in which recognition can be seen as a rich site of acknowledgement for contributions to, and membership in, communities. My practical findings include recommendations for policy, schools and classrooms such as: (1) Allowing multiple types of evidence to \u27count\u27 as measures of academic achievement; (2) intentionally perforating the traditional boundaries of school; (3) creating opportunities for students to engage in reciprocal caring; and (4) seeing assessment as integral to, rather than separate from, learning
    corecore