105 research outputs found

    International Alphabets in Network Traffic Monitoring

    Get PDF
    Tato práce se zabývá implementací podpory síťových identifikátorů obsahujících národní znaky v software projektu SProbe, který je navržen pro monitorování síťových toků. Bylo nutno otestovat a zhodnotit stav vybraných síťových aplikací pracujících nad protokoly SMTP, POP3, IMAP, FTP nebo SIP. Na základě získaných informací bylo navrženo rozšíření stávajícího software projektu SProbe o modul pro podporu monitorování síťového provozu se znaky národních abeced. Navržené řešení bylo následně naimplementováno a důkladně byla otestována funkčnost celého výsledného systému. Dále je v této práci navržena a implementována úprava testovacího prostředí pro rychlejší a efektivnější testování systému se zaměřením na testy obsahující diakritiku.This work deals with the implementation of support for network identifiers containing national characters in the SProbe software project, which is designed to monitor network flows. It was necessary to test and evaluate the status of selected network applications working over SMTP, POP3, IMAP, FTP or SIP protocols. On the basis of the information obtained, an extension of the current software project SProbe was proposed - a module to support network traffic monitoring with national alphabet characters. The proposed solution was then implemented and the functionality of the entire resulting system was tested. In addition, this work proposes and implements a modification of the test environment for faster and more efficient testing of the system focusing on tests containing diacritics.

    A security analysis of email communications

    Get PDF
    The objective of this report is to analyse the security and privacy risks of email communications and identify technical countermeasures capable of mitigating them effectively. In order to do so, the report analyses from a technical point of view the core set of communication protocols and standards that support email communications in order to identify and understand the existing security and privacy vulnerabilities. On the basis of this analysis, the report identifies and analyses technical countermeasures, in the form of newer standards, protocols and tools, aimed at ensuring a better protection of the security and privacy of email communications. The practical implementation of each countermeasure is evaluated in order to understand its limitations and identify potential technical and organisational constrains that could limit its effectiveness in practice. The outcome of the above mentioned analysis is a set of recommendations regarding technical and organisational measures that when combined properly have the potential of more effectively mitigating the privacy and security risks of today's email communications.JRC.G.6-Digital Citizen Securit

    OSINT-based Email Analyzer for Phishing Detection

    Get PDF
    It is more and more common to receive emails asking for credentials. They usually say that there is some kind of issue that must be solved by accessing the involved service using the link inside the message text. These emails are often malicious, thought to steal users' or employees' credentials and gain access to personal or corporate areas. This scenario is commonly known as phishing, and nowadays it is the most common cause of corporate data breaches. The attacker tries to exploit human vulnerabilities like fear, concern or carelessness to obtain what would be difficult to achieve otherwise. Even if it is easy from an expert point of view to recognize such attempts, it is not so simple to automatize their detection, due to the fact that there are various techniques to elude systematic checks. Nevertheless, Würth Phoenix wants to improve their cyber defense against any possible threat, and hence they assigned me the task of working on phishing emails detection. This thesis presents a novel program that can analyze all emails delivered to a specifically set up email server without any filtering on incoming traffic, which is then called a "spam-trap-box." Additionally, it is configured with accounts registered for domains owned by failed companies that used to operate in the same industry of Würth Phoenix customers. This way it is more probable to analyze traffic similar to the one in a real case scenario. The innovative part of the analysis implemented is the use of Open Source Intelligence (OSINT) to compare the most relevant parts of an email with evidence of other phishing attempts indexed on the web, which are generally known as Indicators of Compromise (IoCs). After the inspection, if an email is categorized as malicious, new IoCs are created to feed the Würth Phoenix Security Operation Center (SOC), which is the service responsible for the protection against cyber threats offered to their customers. The new indicators include more information than the ones used during the analysis, and the findings are inherent to clients' businesses, thus the SOC has more details to use while analyzing their email traffic

    NVIDIA Bug Services: Synchronization & Statistics

    Get PDF
    The NVIDIA ChromeOS team works with NVIDIA’s internal bug database and Google’s partner bugs database. Project Managers currently manually copy-paste bugs from the Google database to the NVIDIA database so that NVIDIA engineers can work on those bugs. To track the progress of projects, NVIDIA’s Project Managers manually tabulate data and generate bug trend visualizations. Both these manual operations are time-intensive and prone to human error. We developed a service to automate the synchronization of Google bugs, guaranteeing timely and automatic Google partner bug updates. We also developed a tool to automate the generation of bug statistics, providing an easy manner of periodically visualizing bug trends

    The sources and characteristics of electronic evidence and artificial intelligence

    Get PDF
    In this updated edition of the well-established practitioner text, Stephen Mason and Daniel Seng have brought together a team of experts in the field to provide an exhaustive treatment of electronic evidence and electronic signatures. This fifth edition continues to follow the tradition in English evidence text books by basing the text on the law of England and Wales, with appropriate citations of relevant case law and legislation from other jurisdictions

    MEMBANGUN MAIL SERVER BERBASIS LINUX DENGAN MENGGUNAKAN POSTFIX

    Get PDF
    ABSTRAKSI Dwi Wahyudi, 2007, MEMBANGUN MAIL SERVER BERBASIS LINUX DENGAN MENGGUNAKAN POSTFIX. Program D3 Ilmu Komputer Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Sebelas Maret. Tujuan dari penelitian ini adalah untuk membangun sebuah sistem mail server yang bertugas untuk menangani lalu-lintas email dalam suatu sistem jaringan komputer yang di implementasikan pada platform Linux yang terkenal free, handal dan stabil dalam menangani sebagai fungsi server dengan menggunakan aplikasi MTA Postfix. Dalam membangun mail server berbasis Linux menggunakan Postfix dilakukan pengkajian dan penelitian menggunakan metode studi literatur pada berbagai sumber baik melalui buku maupun browsing di internet. Selain itu juga di gunakan metode wawancara serta metode studi pustaka dengan OS Slackware Linux dan software Postfix, Apache, MySQL, BIND, IMAP dan Uebimiau. Dari hasil Tugas Akhir dapat disimpulkan bahwa Postfix merupakan salah satu alternatif MTA berbasis Linux yang dirancang lebih cepat, lebih mudah dirawat dan lebih aman dalam menangani lalu-lintas penerimaan dan pengiriman email

    Implementation of an identity based encryption sub-system for secure e-mail and other applications

    Get PDF
    This thesis describes the requirements for, and design of, a suite of a sub-systems which support the introduction of Identity Based Encryption (IBE) to Intrenet communications. Current methods for securing Internet transmission are overly complex to users and require expensive and complex supporting infrastructure for distributing credentials such as certificates or public keys. Identity Based Encryption holds a promise of simplifying the process without compromising the security. In this thesis I will outline the theory behind the cryptography required , give a background to e-M ail and messaging protocols,the current security methods, the infrastructure used, the issues with these methods, and the break through that recent innovations in Identity Based Encryption hopes to deliver.I will describe an implementation of a sub-system that secures e-Mail and other protocolsin desktop platforms with as little impact on the end user as possible
    corecore