96 research outputs found

    Protecting web servers from distributed denial of service attack

    Get PDF
    This thesis developed a novel architecture and adaptive methods to detect and block Distributed Denial of Service attacks with minimal punishment to legitimate users. A real time scoring algorithm differentiated attackers from legitimate users. This architecture reduces the power consumption of a web server farm thus reducing the carbon footprint

    Cloud BI: A Multi-party Authentication Framework for Securing Business Intelligence on the Cloud

    Get PDF
    Business intelligence (BI) has emerged as a key technology to be hosted on Cloud computing. BI offers a method to analyse data thereby enabling informed decision making to improve business performance and profitability. However, within the shared domains of Cloud computing, BI is exposed to increased security and privacy threats because an unauthorised user may be able to gain access to highly sensitive, consolidated business information. The business process contains collaborating services and users from multiple Cloud systems in different security realms which need to be engaged dynamically at runtime. If the heterogamous Cloud systems located in different security realms do not have direct authentication relationships then it is technically difficult to enable a secure collaboration. In order to address these security challenges, a new authentication framework is required to establish certain trust relationships among these BI service instances and users by distributing a common session secret to all participants of a session. The author addresses this challenge by designing and implementing a multiparty authentication framework for dynamic secure interactions when members of different security realms want to access services. The framework takes advantage of the trust relationship between session members in different security realms to enable a user to obtain security credentials to access Cloud resources in a remote realm. This mechanism can help Cloud session users authenticate their session membership to improve the authentication processes within multi-party sessions. The correctness of the proposed framework has been verified by using BAN Logics. The performance and the overhead have been evaluated via simulation in a dynamic environment. A prototype authentication system has been designed, implemented and tested based on the proposed framework. The research concludes that the proposed framework and its supporting protocols are an effective functional basis for practical implementation testing, as it achieves good scalability and imposes only minimal performance overhead which is comparable with other state-of-art methods

    CIRA annual report FY 2014/2015

    Get PDF
    Reporting period July 1, 2014-March 31, 2015

    Data management and reporting for drinking water quality monitoring in community-managed supplies

    Get PDF
    Includes bibliographical references (leaves 111-126).Water Service Authorities, which may be district municipalities with hundreds of community-managed supplies under their jurisdiction, are legally responsible for ensuring the quality of water supplied to all consumers. Without the assistance of communities, this requirement, which would involve regular testing in many remote and inaccessible supplies, is extremely difficult to fulfil. Water Service Authorities also struggle to respond timeously to problems in remote supplies, as they are often unaware of the problem for some days. Two-way communication between the Water Service Authority and the Community-based Water Services Provider is therefore essential to an effective monitoring programme. Information and communication technologies, particularly mobile phones on the cellular network, offer potential solution to the challenge of supporting community-managed supplies. Following an investigation into the information needs of various stakeholders in community management, a prototype drinking water quality information system for community-managed supplies was developed

    Data Collection in Fragile States

    Get PDF
    ‘This open access book addresses an urgent issue on which little organized information exists. It reflects experience in Africa but is highly relevant to other fragile states as well.’ —Constantine Michalopoulos, John Hopkins University, USA and former Director of Economic Policy and Co-ordination at the World Bank Fragile countries face a triple data challenge. Up-to-date information is needed to deal with rapidly changing circumstances and to design adequate responses. Yet, fragile countries are among the most data deprived, while collecting new information in such circumstances is very challenging. This open access book presents innovations in data collection developed with decision makers in fragile countries in mind. Looking at innovations in Africa from mobile phone surveys monitoring the Ebola crisis, to tracking displaced people in Mali, this collection highlights the challenges in data collection researchers face and how they can be overcome

    Data Collection in Fragile States

    Get PDF
    ‘This open access book addresses an urgent issue on which little organized information exists. It reflects experience in Africa but is highly relevant to other fragile states as well.’ —Constantine Michalopoulos, John Hopkins University, USA and former Director of Economic Policy and Co-ordination at the World Bank Fragile countries face a triple data challenge. Up-to-date information is needed to deal with rapidly changing circumstances and to design adequate responses. Yet, fragile countries are among the most data deprived, while collecting new information in such circumstances is very challenging. This open access book presents innovations in data collection developed with decision makers in fragile countries in mind. Looking at innovations in Africa from mobile phone surveys monitoring the Ebola crisis, to tracking displaced people in Mali, this collection highlights the challenges in data collection researchers face and how they can be overcome

    Big Data in Bioeconomy

    Get PDF
    This edited open access book presents the comprehensive outcome of The European DataBio Project, which examined new data-driven methods to shape a bioeconomy. These methods are used to develop new and sustainable ways to use forest, farm and fishery resources. As a European initiative, the goal is to use these new findings to support decision-makers and producers – meaning farmers, land and forest owners and fishermen. With their 27 pilot projects from 17 countries, the authors examine important sectors and highlight examples where modern data-driven methods were used to increase sustainability. How can farmers, foresters or fishermen use these insights in their daily lives? The authors answer this and other questions for our readers. The first four parts of this book give an overview of the big data technologies relevant for optimal raw material gathering. The next three parts put these technologies into perspective, by showing useable applications from farming, forestry and fishery. The final part of this book gives a summary and a view on the future. With its broad outlook and variety of topics, this book is an enrichment for students and scientists in bioeconomy, biodiversity and renewable resources

    The Nexus Between Security Sector Governance/Reform and Sustainable Development Goal-16

    Get PDF
    This Security Sector Reform (SSR) Paper offers a universal and analytical perspective on the linkages between Security Sector Governance (SSG)/SSR (SSG/R) and Sustainable Development Goal-16 (SDG-16), focusing on conflict and post-conflict settings as well as transitional and consolidated democracies. Against the background of development and security literatures traditionally maintaining separate and compartmentalized presence in both academic and policymaking circles, it maintains that the contemporary security- and development-related challenges are inextricably linked, requiring effective measures with an accurate understanding of the nature of these challenges. In that sense, SDG-16 is surely a good step in the right direction. After comparing and contrasting SSG/R and SDG-16, this SSR Paper argues that human security lies at the heart of the nexus between the 2030 Agenda of the United Nations (UN) and SSG/R. To do so, it first provides a brief overview of the scholarly and policymaking literature on the development-security nexus to set the background for the adoption of The Agenda 2030. Next, it reviews the literature on SSG/R and SDGs, and how each concept evolved over time. It then identifies the puzzle this study seeks to address by comparing and contrasting SSG/R with SDG-16. After making a case that human security lies at the heart of the nexus between the UN’s 2030 Agenda and SSG/R, this book analyses the strengths and weaknesses of human security as a bridge between SSG/R and SDG-16 and makes policy recommendations on how SSG/R, bolstered by human security, may help achieve better results on the SDG-16 targets. It specifically emphasizes the importance of transparency, oversight, and accountability on the one hand, and participative approach and local ownership on the other. It concludes by arguing that a simultaneous emphasis on security and development is sorely needed for addressing the issues under the purview of SDG-16
    • …
    corecore