26 research outputs found

    The honeytank: a scalable approach to collect malicious Internet traffic

    No full text
    In this paper, we propose an efficient method for collecting large amounts of malicious Internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were collected on a campus network attached to the internet. We explain how we implemented various protocols in a stateless way. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols.Anglai

    The HoneyTank : a scalable approach to collect malicious Internet traffic

    No full text
    During the last few years, the amount of malicious traffic on the Internet has increased due to the spreading of worms, various port scanning activities, intrusion attempts or spammers. Collecting and analyzing this malicious traffic is an important issue. It can teach us what are the latest trends in computer misuse, it can help us discovering new kinds of attacks or it can be used to automatically generate signatures for network-based intrusion detection systems. In this paper, we propose an efficient method for collecting large amounts of malicious traffic running over TCP. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX IDS and provide in this paper several examples of the malicious activities which were collected on a campus network attached to the Internet. We explain how we implemented various protocols in a stateless way and we discuss limitations of our approach. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols

    Cancer prevalence in osteoporotic women with low serum vitamin D levels

    Get PDF
    Objective: The aim of this study was to assess the role of vitamin D in cancer development in postmenopausal osteoporotic women. Methods: A cross-sectional and in vitro study was carried out, with statistical analysis with odds ratios and 95% CIs presented. Human estrogen receptor-positive breast cancer cells (MCF-7) were studied in vitro. The apoptosis-to-proliferation (A/P) ratio was also determined. Results: A total of 885 women were included in this study. Any kind of cancer was found in 112 (12.7%) of all women. Breast cancer was the most prevalent malignancy, representing half of the cases (n = 56, 50%). The prevalence of any kind of cancer and breast cancer in women with low 25-hydroxyvitamin D(3) levels (25OHD; <50 nmol/L) was higher than in women with high 25OHD levels (>= 50 nmol/L). The in vitro study demonstrated a statistically significant increased A/P ratio of 5.27 (95% CI, 4.054-6.493) with a high concentration of 1 alpha, 25-dihydroxyvitamin D (10 mu M) after 96 hours. Conclusions: Osteoporotic women with low serum levels of 25OHD (<50 nmol/L) have an increased prevalence of any kind of cancer and breast cancer; however, these differences are not statistically significant. 1 alpha, 25-dihydroxyvitamin D induced an increased A/P ratio in MCF-7 breast cancer cells in vitro

    Supporting mobility in multicast: A compromise between large and small group multicast

    No full text
    With the recent wireless boom and the IP convergence, there is a need to support efficiently a lot of concurrent small group multicast flows. In this paper, we describe how to integrate mobility support to a Small Group Multicast routing protocol named Sender Initiated Multicast (SIM). We then compare it with PIM-SSM through simulation and show that SIM requires fewer router states than PIM-SSM for small groups with static and mobile receivers
    corecore