5,287 research outputs found

    Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks

    Get PDF
    Malicious software is abundant in a world of innumerable computer users, who are constantly faced with these threats from various sources like the internet, local networks and portable drives. Malware is potentially low to high risk and can cause systems to function incorrectly, steal data and even crash. Malware may be executable or system library files in the form of viruses, worms, Trojans, all aimed at breaching the security of the system and compromising user privacy. Typically, anti-virus software is based on a signature definition system which keeps updating from the internet and thus keeping track of known viruses. While this may be sufficient for home-users, a security risk from a new virus could threaten an entire enterprise network. This paper proposes a new and more sophisticated antivirus engine that can not only scan files, but also build knowledge and detect files as potential viruses. This is done by extracting system API calls made by various normal and harmful executable, and using machine learning algorithms to classify and hence, rank files on a scale of security risk. While such a system is processor heavy, it is very effective when used centrally to protect an enterprise network which maybe more prone to such threats.Comment: 6 page

    How Smart is your Android Smartphone?

    Get PDF
    Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt data stored on the external media card. While smartphones remain vulnerable to a variety of security threats, this encryption provides an additional level of security

    Protecting Private Data in the Cloud

    Get PDF
    Companies that process business critical and secret data are reluctant to use utility and cloud computing for the risk that their data gets stolen by rogue system administrators at the hosting company. We describe a system organization that prevents host administrators from directly accessing or installing eaves-dropping software on the machine that holds the client's valuable data. Clients are monitored via machine code probes that are inlined into the clients' programs at runtime. The system enables the cloud provider to install and remove software probes into the machine code without stopping the client's program, and it prevents the provider from installing probes not granted by the client

    Virus Sharing, Genetic Sequencing, and Global Health Security

    Get PDF
    The WHO’s Pandemic Influenza Preparedness (PIP) Framework was a milestone global agreement designed to promote the international sharing of biological samples to develop vaccines, while that ensuring poorer countries would have access to those vaccines. Since the PIP Framework was negotiated, scientists have developed the capacity to use genetic sequencing data (GSD) to develop synthetic viruses rapidly for product development of life-saving technologies in a time-sensitive global emergency—threatening to unravel the Framework. Access to GSD may also have major implications for biosecurity, biosafety, and intellectual property (IP). By rendering the physical transfer of viruses antiquated, GSD may also undermine the effectiveness of the PIP Framework itself, with disproportionate impacts on poorer countries. We examine the changes that need to be made to the PIP Framework to address the growing likelihood that GSD might be shared instead of physical virus samples. We also propose that the international community harness this opportunity to expand the scope of the PIP Framework beyond only influenza viruses with pandemic potential. In light of non-influenza pandemic threats such as the Middle East Respiratory Syndrome (MERS) and Ebola, we call for an international agreement on the sharing of the benefits of research – such as vaccines and treatments – for other infectious diseases to ensure not only a more secure and healthy world, but also a more just world, for humanity

    Keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals

    Get PDF
    Pembinaan bahan bantu belajar untuk tujuan PdPC sememangnya digalakkan oleh Kementerian Pendidikan Malaysia bagi meningkatkan kualiti pendidikan. Kajian ini bertujuan untuk membangun dan mengenalpasti keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals. Kajian ini adalah kuasi-eksperimen yang melibatkan dua buah sekolah menengah harian di daerah Batu Pahat. Instrumen kajian yang digunakan ialah soalan ujian pra dan pasca, soal selidik dan senarai semak. Dapatan kajian telah dianalisis menggunakan perisian Statistic Package For The Social Science Version 22.0 (SPSS). Analisis deskriptif dalam bentuk frekuensi, peratus, min dan sisihan piawai digunakan semasa penganalisaan data. Ujian-t pula digunakan untuk melihat perbezaan pencapaian antara ujian pra dengan ujian pasca bagi kumpulan rawatan dan kumpulan kawalan. Kumpulan rawatan diberi set soal selidik tentang motivasi pelajar selepas menggunakan carta pembelajaran Omygram dalam PdPC. Hasil dapatan kajian mendapati bahawa, terdapat perbezaan pencapaian yang signifikan antara skor ujian pra dengan skor ujian pasca bagi kumpulan rawatan. Motivasi pelajar selepas menggunakan carta pembelajaran Omygram juga berada pada tahap tinggi

    Security of the Java Execution environment in e-business applications for SMEs

    Get PDF
    Web space is currently inherent in any business activity, from SMEs to international holdings. In this context security of e-business applications becomes an issue intensively studied by the scientific literature.Currently the Java programming language is the most popular among software developers. The paper studies new elements of security, mainly for the Java environment. Other topics studied in this article refer to attack targets, fundamental threats against computer systems, means of facilitating security attacks and Java execution security environment. The case study demonstrates the impossibility of using a Java apllet over web to access files and folders structure on the host systems. Using Java Web environment is the security strength of e-business applications
    • …
    corecore