3,577 research outputs found
Persistent issues in encryption software: A heuristic and cognitive walkthrough
The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security. One mechanism for ensuring the integrity and confidentiality of information is encryption software. Unfortunately, software usability issues can hinder an end-user’s capability to properly utilise the security features effectively. To date there has been little research in investigating the usability of encryption software and proposing solutions for improving them. This research paper analysed the usability of encryption software targeting end-users. The research identified several issues that could impede the ability of a novice end-user to adequately utilise the encryption software. A set of proposed recommendations are suggested to improve encryption software which could be empirically verified through further research
Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers
In this paper, we present the results of using bags of system calls for
learning the behavior of Linux containers for use in anomaly-detection based
intrusion detection system. By using system calls of the containers monitored
from the host kernel for anomaly detection, the system does not require any
prior knowledge of the container nature, neither does it require altering the
container or the host kernel.Comment: Published version available on IEEE Xplore
(http://ieeexplore.ieee.org/document/7414047/) arXiv admin note: substantial
text overlap with arXiv:1611.0305
Toward Smart Moving Target Defense for Linux Container Resiliency
This paper presents ESCAPE, an informed moving target defense mechanism for
cloud containers. ESCAPE models the interaction between attackers and their
target containers as a "predator searching for a prey" search game. Live
migration of Linux-containers (prey) is used to avoid attacks (predator) and
failures. The entire process is guided by a novel host-based
behavior-monitoring system that seamlessly monitors containers for indications
of intrusions and attacks. To evaluate ESCAPE effectiveness, we simulated the
attack avoidance process based on a mathematical model mimicking the
prey-vs-predator search game. Simulation results show high container survival
probabilities with minimal added overhead.Comment: Published version is available on IEEE Xplore at
http://ieeexplore.ieee.org/document/779685
Student-Teachers’ Beliefs towards Learning Mathematics and Beliefs of Mathematics Teaching Efficacy and their Relation to their Perception of the Development of Pupils’ Understanding of Mathematics
The present study aimed at investigating the student-teachers’ beliefs towards learning mathematics, and beliefs of mathematics teaching efficacy and their relation to their perception of the development of pupils’ understanding of mathematics. Three measures were used in this study: The beliefs towards learning mathematics, the mathematics teaching efficacy beliefs, and the mathematics teacher's perception of the development of pupils’ understanding. Validity and reliability were established. A sample of student-teachers participated in the study. The results of the study showed that the more the positive student-teachers’ beliefs towards learning mathematics, the greater their mathematics teaching-efficacy was. Similarly, the greater the positive student-teachers’ belief towards learning mathematics, the more they become aware of the development of pupils’ understanding of mathematics. Finally, increasing the teaching efficacy of mathematics student-teachers was associated with an increase in their perception of the development of pupils’ understanding of mathematics. Both beliefs and teaching efficacy explained significant variance in the perception of their pupils’ understanding of mathematics
- …