7 research outputs found

    Scalable Wavelet-Based Active Network Stepping Stone Detection

    Get PDF
    Network intrusions leverage vulnerable hosts as stepping stones to penetrate deeper into a network and mask malicious actions from detection. This research focuses on a novel active watermark technique using Discrete Wavelet Transformations to mark and detect interactive network sessions. This technique is scalable, nearly invisible and resilient to multi-flow attacks. The watermark is simulated using extracted timestamps from the CAIDA 2009 dataset and replicated in a live environment. The simulation results demonstrate that the technique accurately detects the presence of a watermark at a 5% False Positive and False Negative rate for both the extracted timestamps as well as the empirical tcplib distribution. The watermark extraction accuracy is approximately 92%. The live experiment is implemented using the Amazon Elastic Compute Cloud. The client system sends marked and unmarked packets from California to Virginia using stepping stones in Tokyo, Ireland and Oregon. Five trials are conducted using simultaneous watermarked and unmarked samples. The live results are similar to the simulation and provide evidence demonstrating the effectiveness in a live environment to identify stepping stones

    Packet analysis for network forensics: A comprehensive survey

    Get PDF
    Packet analysis is a primary traceback technique in network forensics, which, providing that the packet details captured are sufficiently detailed, can play back even the entire network traffic for a particular point in time. This can be used to find traces of nefarious online behavior, data breaches, unauthorized website access, malware infection, and intrusion attempts, and to reconstruct image files, documents, email attachments, etc. sent over the network. This paper is a comprehensive survey of the utilization of packet analysis, including deep packet inspection, in network forensics, and provides a review of AI-powered packet analysis methods with advanced network traffic classification and pattern identification capabilities. Considering that not all network information can be used in court, the types of digital evidence that might be admissible are detailed. The properties of both hardware appliances and packet analyzer software are reviewed from the perspective of their potential use in network forensics

    Sniffing and chaffing network traffic in stepping-stone intrusion detection

    No full text
    © 2018 IEEE. Since stepping-stones were widely used to launch attacks over the targets in the Internet, many approaches have been developed to detect stepping-stone intrusion. We found that most of the approaches need to sniff and analyze computer network traffic to detect stepping-stone intrusion. In this paper, we introduce how to make a code to sniff TCP/IP packet. But some intruders can evade detection using TCP/IP session manipulation, such as chaff-perturbation. In order to help researchers understand how a session is manipulated and develop more advanced approaches not only detecting stepping-stone intrusion, but also resisting intruders\u27 manipulation, we present a tool Fragroute which can be used to inject meaningless packets into a TCP/IP session across the Internet

    Gender in Literature

    Get PDF
    Openly licensed anthology focused on the theme of the Gender Roles portrayed in Literature. Contains Anna Lombard by Victoria Cross; The Beth Book by Sarah Grand; King Solomon’s Mines by H. Rider Haggard; Jude the Obscure by Thomas Hardy; The Blood of the Vampire by Florence Marryat; The Beetle by Richard March; The Strange Case of Dr. Jekyll and Mr. Hyde by Robert Louis Stevenson; The Picture of Dorian Gray by Oscar Wilde

    British Literature II: Romantic Era to the Twentieth Century and Beyond

    Get PDF
    The University of North Georgia Press and Affordable Learning Georgia bring you British Literature II: Romantic Era to the Twentieth Century and Beyond. Featuring 37 authors and full texts of their works, the selections in this open anthology represent the literature developed within and developing through their respective eras. This completely-open anthology will connect students to the conversation of literature that has captivated readers in the past and still holds us now. Features: Contextualizing introductions to the Romantic era; the Victorian era; and the Twentieth Century and beyond Over 90 historical images In-depth biographies of each author Instructional Design features, including Reading and Review Questions This textbook is an Open Educational Resource. It can be reused, remixed, and reedited freely without seeking permission. Accessible files with optical character recognition (OCR) and auto-tagging provided by the Center for Inclusive Design and Innovation.https://oer.galileo.usg.edu/english-textbooks/1016/thumbnail.jp

    Bowdoin Orient v.123, no.1-22 (1992-1993)

    Get PDF
    https://digitalcommons.bowdoin.edu/bowdoinorient-1990s/1004/thumbnail.jp

    Maritime expressions:a corpus based exploration of maritime metaphors

    Get PDF
    This study uses a purpose-built corpus to explore the linguistic legacy of Britain’s maritime history found in the form of hundreds of specialised ‘Maritime Expressions’ (MEs), such as TAKEN ABACK, ANCHOR and ALOOF, that permeate modern English. Selecting just those expressions commencing with ’A’, it analyses 61 MEs in detail and describes the processes by which these technical expressions, from a highly specialised occupational discourse community, have made their way into modern English. The Maritime Text Corpus (MTC) comprises 8.8 million words, encompassing a range of text types and registers, selected to provide a cross-section of ‘maritime’ writing. It is analysed using WordSmith analytical software (Scott, 2010), with the 100 million-word British National Corpus (BNC) as a reference corpus. Using the MTC, a list of keywords of specific salience within the maritime discourse has been compiled and, using frequency data, concordances and collocations, these MEs are described in detail and their use and form in the MTC and the BNC is compared. The study examines the transformation from ME to figurative use in the general discourse, in terms of form and metaphoricity. MEs are classified according to their metaphorical strength and their transference from maritime usage into new registers and domains such as those of business, politics, sports and reportage etc. A revised model of metaphoricity is developed and a new category of figurative expression, the ‘resonator’, is proposed. Additionally, developing the work of Lakov and Johnson, Kovesces and others on Conceptual Metaphor Theory (CMT), a number of Maritime Conceptual Metaphors are identified and their cultural significance is discussed
    corecore