5,287 research outputs found
Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks
Malicious software is abundant in a world of innumerable computer users, who
are constantly faced with these threats from various sources like the internet,
local networks and portable drives. Malware is potentially low to high risk and
can cause systems to function incorrectly, steal data and even crash. Malware
may be executable or system library files in the form of viruses, worms,
Trojans, all aimed at breaching the security of the system and compromising
user privacy. Typically, anti-virus software is based on a signature definition
system which keeps updating from the internet and thus keeping track of known
viruses. While this may be sufficient for home-users, a security risk from a
new virus could threaten an entire enterprise network. This paper proposes a
new and more sophisticated antivirus engine that can not only scan files, but
also build knowledge and detect files as potential viruses. This is done by
extracting system API calls made by various normal and harmful executable, and
using machine learning algorithms to classify and hence, rank files on a scale
of security risk. While such a system is processor heavy, it is very effective
when used centrally to protect an enterprise network which maybe more prone to
such threats.Comment: 6 page
How Smart is your Android Smartphone?
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt data stored on the external media card. While smartphones remain vulnerable to a variety of security threats, this encryption provides an additional level of security
Protecting Private Data in the Cloud
Companies that process business critical and secret data are reluctant
to use utility and cloud computing for the risk that their data gets
stolen by rogue system administrators at the hosting company. We
describe a system organization that prevents host administrators from
directly accessing or installing eaves-dropping software on the
machine that holds the client's valuable data. Clients are monitored
via machine code probes that are inlined into the clients' programs at
runtime. The system enables the cloud provider to install and remove software
probes into the machine code without stopping the client's program, and
it prevents the provider from installing probes not granted by the
client
Virus Sharing, Genetic Sequencing, and Global Health Security
The WHO’s Pandemic Influenza Preparedness (PIP) Framework was a milestone global agreement designed to promote the international sharing of biological samples to develop vaccines, while that ensuring poorer countries would have access to those vaccines. Since the PIP Framework was negotiated, scientists have developed the capacity to use genetic sequencing data (GSD) to develop synthetic viruses rapidly for product development of life-saving technologies in a time-sensitive global emergency—threatening to unravel the Framework. Access to GSD may also have major implications for biosecurity, biosafety, and intellectual property (IP).
By rendering the physical transfer of viruses antiquated, GSD may also undermine the effectiveness of the PIP Framework itself, with disproportionate impacts on poorer countries. We examine the changes that need to be made to the PIP Framework to address the growing likelihood that GSD might be shared instead of physical virus samples. We also propose that the international community harness this opportunity to expand the scope of the PIP Framework beyond only influenza viruses with pandemic potential.
In light of non-influenza pandemic threats such as the Middle East Respiratory Syndrome (MERS) and Ebola, we call for an international agreement on the sharing of the benefits of research – such as vaccines and treatments – for other infectious diseases to ensure not only a more secure and healthy world, but also a more just world, for humanity
Keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals
Pembinaan bahan bantu belajar untuk tujuan PdPC sememangnya digalakkan oleh Kementerian Pendidikan Malaysia bagi meningkatkan kualiti pendidikan. Kajian ini bertujuan untuk membangun dan mengenalpasti keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals. Kajian ini adalah kuasi-eksperimen yang melibatkan dua buah sekolah menengah harian di daerah Batu Pahat. Instrumen kajian yang digunakan ialah soalan ujian pra dan pasca, soal selidik dan senarai semak. Dapatan kajian telah dianalisis menggunakan perisian Statistic Package For The Social Science Version 22.0 (SPSS). Analisis deskriptif dalam bentuk frekuensi, peratus, min dan sisihan piawai digunakan semasa penganalisaan data. Ujian-t pula digunakan untuk melihat perbezaan pencapaian antara ujian pra dengan ujian pasca bagi kumpulan rawatan dan kumpulan kawalan. Kumpulan rawatan diberi set soal selidik tentang motivasi pelajar selepas menggunakan carta pembelajaran Omygram dalam PdPC. Hasil dapatan kajian mendapati bahawa, terdapat perbezaan pencapaian yang signifikan antara skor ujian pra dengan skor ujian pasca bagi kumpulan rawatan. Motivasi pelajar selepas menggunakan carta pembelajaran Omygram juga berada pada tahap tinggi
Security of the Java Execution environment in e-business applications for SMEs
Web space is currently inherent in any business activity, from SMEs to international holdings. In this context security of e-business applications becomes an issue intensively studied by the scientific literature.Currently the Java programming language is the most popular among software developers. The paper studies new elements of security, mainly for the Java environment. Other topics studied in this article refer to attack targets, fundamental threats against computer systems, means of facilitating security attacks and Java execution security environment. The case study demonstrates the impossibility of using a Java apllet over web to access files and folders structure on the host systems. Using Java Web environment is the security strength of e-business applications
- …