2,150 research outputs found
Recommended from our members
Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network
In this paper we present empirical results and speculative analysis based on observations collected over a two month period from studies with two high interaction honeynets, deployed in a corporate and an SME (small to medium enterprise) environment, and a distributed honeypots deployment. All three networks contain a mixture of Windows and Linux hosts. We detail the architecture of the deployment and results of comparing the observations from the three environments. We analyze in detail the times between attacks on different hosts, operating systems, networks or geographical location. Even though results from honeynet deployments are reported often in the literature, this paper provides novel results analyzing traffic from three different types of networks and some initial exploratory models. This research aims to contribute to endeavours in the wider security research community to build methods, grounded on strong empirical work, for assessment of the robustness of computer-based systems in hostile environments
The Distribution of Minimum of Ratios of Two Random Variables and Its Application in Analysis of Multi-hop Systems
The distributions of random variables are of interest in many areas of science. In this paper, ascertaining on the importance of multi-hop transmission in contemporary wireless communications systems operating over fading channels in the presence of cochannel interference, the probability density functions (PDFs) of minimum of arbitrary number of ratios of Rayleigh, Rician, Nakagami-m, Weibull and α-” random variables are derived. These expressions can be used to study the outage probability as an important multi-hop system performance measure. Various numerical results complement the proposed mathematical analysis
Recommended from our members
Enhancing Fault / Intrusion Tolerance through Design and Configuration Diversity
Fault/intrusion tolerance is usually the only viable way of improving the system dependability and security in the presence of continuously evolving threats. Many of the solutions in the literature concern a specific snapshot in the production or deployment of a fault-tolerant system and no immediate considerations are made about how the system should evolve to deal with novel threats. In this paper we outline and evaluate a set of operating systemsâ and applicationsâ reconfiguration rules which can be used to modify the state of a system replica prior to deployment or in between recoveries, and hence increase the replicas chance of a longer intrusion-free operation
HLS: a framework for composing soft real-time schedulers
Journal ArticleHierarchical CPU scheduling has emerged as a way to (1) support applications with diverse scheduling requirements in open systems, and (2) provide load isolation between applications, users, and other resource principals. Most existing work on hierarchical scheduling has focused on systems that provide a fixed scheduling model: the schedulers in part or all of the hierarchy are specified in advance. In this paper we describe a system of guarantees that permits a general hierarchy of soft real-time schedulers-one that contains arbitrary scheduling algorithms at all points within the hierarchy-to be analyzed. This analysis results in deterministic guarantees for threads at the leaves of the hierarchy. We also describe the design, implementation, and performance evaluation of a system for supporting such a hierarchy in the Windows 2000 kernel. Finally, we show that complex scheduling behaviors can be created using small schedulers as components and describe the HLS programming environment
Recommended from our members
FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery
The goal of the FOREVER project is to develop a service for Fault/intrusiOn REmoVal through Evolution & Recovery. In order to achieve this goal, our work addresses three main tasks: the definition of the FOREVER service architecture; the analysis of how diversity techniques can improve resilience; and the evaluation of the FOREVER service. The FOREVER service is an important contribution to intrustion-tolerant replication middleware and significantly enhances the resilience
Recommended from our members
Improved measurement technique for the characterisation of phase change materials using the T-history method
Recently the interest in Phase Change Materials (PCMs) has grown significantly amongst researchers [1-9]. Namely, these materials, due to their ability to store large amounts of thermal energy in relatively small temperature intervals, can be effectively used for various thermal energy storage (TES) applications. Nevertheless, accurate knowledge of the thermal properties of PCMs is a prerequisite before design processes and real time deployments of any TES applications.
The T-history method is widely used for the investigation of phase change materials. The majority of the T-history studies reported in the literature during the last 20 years aim to reduce the temperature and the heat storage uncertainty associated with the PCMs measurement [3-9]. Reduction of these uncertainties is important since it should provide better material utilisation. This paper presents an improved measurement technique for the characterisation of PCMs using the T-history method. The main modifications involved in the measurement process are briefly summarized below.
Primarily, suggested improvements include the selection of the thermally controlled environment and the temperature sensing modalities for the T-history setup. This was followed by the development of the adequate instrumentation and data acquisition system. In addition, the mathematical model given by Marin et al. was adjusted for the data analysis in order to take the subcooling phenomenon into account. The calculated results on heat capacity were presented as heat density in given temperature intervals, as suggested by Mehling et al. Moreover, the determination of the total phase change heat in case of both cooling and heating cycles showed that the reduction of relevant temperature and heat storage uncertainties was achieved
- âŠ