32 research outputs found

    Verifikasi Signature Pada Kolaborasi Sistem Deteksi Intrusi Jaringan Tersebar Dengan Honeypot

    Get PDF
    Sistem Deteksi Intrusi atau IDS merupakan suatu sistem yang banyak digunakan oleh para administrator jaringan untuk mendeteksi adanya USAha-USAha penyusupan secara proaktif berdasarkan signature atau anomali dengan cara mengeluarkan alert (peringatan) sebagai hasil dari pendeteksiannya. Namun dalam implementasinya, IDS terkadang mengeluarkan alert yang salah (true negative) atau tidak dapat mendeteksi intrusi yang bersifat Zero-Day attack, sehingga menyebabkan administrator kesulitan dalam menganalisa serangan dan tindakan yang tepat selanjutnya. Untuk menyelesaikan permasalahan yang terjadi, maka perlu dilakukan suatu kolaborasi antar IDS maupun dengan teknologi keamanan jaringan yang lain dengan tujuan untuk membuat pendeteksian intrusi menjadi lebih baik. Pada penelitian ini, diajukan suatu bentuk Kolaborasi IDS dengan teknologi keamanan jaringan, yaitu dengan Honeypot. Selain itu diajukan pula suatu mekanisme perbaikan signature hasil analisis Honeypot dengan tujuan agar signature bisa langsung digunakan oleh IDS tanpa terjadi kesalahan. Pengujian pada lima belas skenario serangan yang dilakukan menunjukkan bahwa konsep kolaborasi dan mekanisme perbaikan signature yang diajukan mampu mereduksi alert true negative dan zero-day attack sebesar 85%. Karena dari lima belas skenario serangan hanya dua skenario serangan yang tidak berhasil terdeteksi oleh IDS dan Honeypot

    Flow-Based Rules Generation for Intrusion Detection System using Machine Learning Approach

    Get PDF
    Rapid increase in internet users also brought new ways of privacy and security exploitation. Intrusion is one of such attacks in which an authorized user can access system resources and is major concern for cyber security community. Although AV and firewall companies work hard to cope with this kind of attacks and generate signatures for such exploits but still, they are lagging behind badly in this race. This research proposes an approach to ease the task of rules generationby making use of machine learning for this purpose. We used 17 network features to train a random forest classifier and this trained classifier is then translated into rules which can easily be integrated with most commonly used firewalls like snort and suricata etc. This work targets five kind of attacks: brute force, denial of service, HTTP DoS, infiltrate from inside and SSH brute force. Separate rules are generated for each kind of attack. As not every generated rule contributes toward detection that's why an evaluation mechanism is also used which selects the best rule on the basis of precision and f-measure values. Generated rules for some attacks have 100% precision with detection rate of more than 99% which represents effectiveness of this approach on traditional firewalls. As our proposed system translates trained classifier model into set of rules for firewalls so it is not only effective for rules generation but also give machine learning characteristics to traditional firewall to some extent.&nbsp

    Csapda a hálózaton : Trap on the Network

    Get PDF
    Az informatikai hálózatot, legyen az otthoni, kisvállalati, vagy akár egy komplett összetett nagyhálózat, mindig érik támadások. A hálózatokban a rendszeradminisztrátorok gyakran csaliként használnak speciális eszközöket (u.n. mézes bödönöket), amelyek segítségével a támadások feltérképezhetők, a támadók azonosíthatók. Ez lehet egy erre a célra konfigurált szerver (honeypot), hálózat (honeynet) vagy akár telephelyek közötti összehangolt rendszer (honeyfarm). Ezek az eszközök úgy vannak konfigurálva, hogy a támadó a rendszert sebezhetőnek érzékeli, megpróbál behatolni, miközben tényleges kárt nem tud okozni, de nyomot hagy maga után. Ezekből a nyomokból információ szerezhető a támadóról, és emellett egy behatolás érzékelő rendszer (IDS) tanítására is hasznosíthatók az adatok

    Pervasive Secure Content Delivery Networks Implementation

    Get PDF
    Over the years, communication networks have been shifting their focus from providing connectivity in a client/server model to providing a service or content. This shift has led to topic areas like Service-Oriented Architecture (SOA), Heterogeneous Wireless Mesh Networks, and Ubiquitous Computing. Furthermore, probably the broadest of these areas which embarks all is the Internet of Things (IoT). The IoT is defined as an Internet where all physical entities (e.g., vehicles, appliances, smart phones, smart homes, computers, etc.), which we interact daily are connected and exchanging data among themselves and users. The IoT has become a global goal for companies, researchers, and users alike due to its different implementation and functional benefits: performance efficiency, coverage, economic and health. Due to the variety of devices which connect to it, it is expected that the IoT is composed of multiple technologies interacting together, to deliver a service. This technologies interactions renders an important challenge that must be overcome: how to communicate these technologies effectively and securely? The answer to this question is vital for a successful deployment of IoT and achievement of all the potential benefits that the IoT promises. This thesis proposes a SOA approach at the Network Layer to be able to integrate all technologies involved, in a transparent manner. The proposed set of solutions is composed of primarily the secure implementation of a unifying routing algorithm and a layered messaging model to standardize communication of all devices. Security is targeted to address the three main security concerns (i.e., confidentiality, integrity, and availability), with pervasive schemes that can be employed for any kind of device on the client, backbone, and server side. The implementation of such schemes is achieved by standard current security mechanisms (e.g., encryption), in combination with novel context and intelligent checks that detect compromised devices. Moreover, a decentralized content processing design is presented. In such design, content processing is handled at the client side, allowing server machines to serve more content, while being more reliable and capable of processing complete security checks on data and client integrity

    Play Among Books

    Get PDF
    How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books

    Play Among Books

    Get PDF
    How does coding change the way we think about architecture? Miro Roman and his AI Alice_ch3n81 develop a playful scenario in which they propose coding as the new literacy of information. They convey knowledge in the form of a project model that links the fields of architecture and information through two interwoven narrative strands in an “infinite flow” of real books

    The music of Toru Takemitsu : influences, confluences and status.

    Get PDF
    SIGLEAvailable from British Library Document Supply Centre-DSC:DXN017265 / BLDSC - British Library Document Supply CentreGBUnited Kingdo

    Modern Art Movements and St Ives 1939-49

    Get PDF
    This thesis provides a view of modern art in St Ives between 1939 and 1949 by focusing on two interlinked concerns: the movement of objects, people and ideas through communication and transport networks, and the modern art movements which were developed by artists working in the town during this period. Drawing especially from studies of place, hybridity and mobility, Chapter 1 provides an account of two artists’ migration to St Ives in 1939: Naum Gabo and Barbara Hepworth. It considers the foundational importance of movement to the narrative of modern art in St Ives and examines the factors which contributed to artists’ decisions to relocate. Using this information, it probes presumptions surrounding St Ives as an artists’ ‘colony’ and proposes it as a site of ‘coastal modernism’. Chapters 2 and 3 examine the contribution by artists in St Ives to two developing art movements: Constructivism and Cubism. Both investigations show how artists participated in wide-reaching artistic networks within which ideas and objects were shared. Each chapter also particularly reveals the value of art movements for providing temporal scales through which artists could reflect upon and establish the connections of their work to the past, present and future. Chapter Two focuses on the Constructive project associated with the publication of 'Circle: International Survey of Constructive Art' (1937), revealing how modern art in St Ives inherited ideas and styles from earlier movements and continued to reflect upon the value of the ‘Constructive spirit’ as Europe changed. Chapter Three is an examination of Nicholson’s connections to the Cubist movement and an analysis of the long-standing impact this had on his work and critical reception both before and after the Second World War. To conclude this thesis, two narratives centred on 1964, the year often used to define the end of an artistic period in St Ives, suggest how the internationalism of artists and artist groups in St Ives changed during the period which followed 1949

    Ambiguous Recognition: Recursion, Cognitive Blending, and the Problem of Interpretation in Twenty-First-Century Fiction

    Get PDF
    This dissertation uses theories of cognitive conceptual integration (as outlined by Gilles Fauconnier and Mark Turner) to propose a model of narrative reading that mediates between narratology and theories of reception. I use this model to demonstrate how new experimental narratives achieve a potent balance between a determinate and open story-form. Where the high postmodernists of the 1970s and 80s created ironic, undecidable story-worlds, the novels considered here allow readers to embrace seemingly opposite propositions without retreating into ironic suspension, trading the postmodernist “neither/nor” for a new “both/and.” This technique demands significant revision of both descriptions of radical experimentation in twenty-first-century novels, and of earlier narratological accounts of the distinction between story and discourse. Each novel considered in this dissertation encourages its reader to recognize combined concepts in the course of the reading process. Shelley Jackson’s Half Life combines singular and plural identity, reimagining individualist subjectivity and the literary treatment of (dis)ability. Mark Z. Danielewski’s Only Revolutions combines objective and subjective temporality, offering a new perspective on American myth-making in the popular post-Kerouac road-novel tradition. Percival Everett’s Erasure combines reliable and unreliable narration to create a complex critique of the idea of an African American novel tradition. M.D. Coverley’s hypertext novel Califia involves the reader in all three of these discursive dimensions at once, updating the marginalized art of hypertext fiction by inviting the reader to see his or her role in navigating the text as both creative and determined—the epitome of open-and-closed form. My analysis demonstrates how cognitive blending is a precise method for describing how a reader interprets complex narrative structures. I propose this blending-model as a new approach to contemporary experimental fiction from the perspective of the reader’s cognitive work, and show how it offers new readings of important contemporary fiction. I argue that twenty-first-century authors attempt simultaneously to construct “open” forms, and to address real socio-cultural concerns in the world; I also argue that a narratology founded on theories of cognitive processes is best-equipped to describe the operations of reading and understanding these complex narrative forms
    corecore