316 research outputs found

    Comparison of Empirical Data from Two Honeynets and a Distributed Honeypot Network

    Get PDF
    In this paper we present empirical results and speculative analysis based on observations collected over a two month period from studies with two high interaction honeynets, deployed in a corporate and an SME (small to medium enterprise) environment, and a distributed honeypots deployment. All three networks contain a mixture of Windows and Linux hosts. We detail the architecture of the deployment and results of comparing the observations from the three environments. We analyze in detail the times between attacks on different hosts, operating systems, networks or geographical location. Even though results from honeynet deployments are reported often in the literature, this paper provides novel results analyzing traffic from three different types of networks and some initial exploratory models. This research aims to contribute to endeavours in the wider security research community to build methods, grounded on strong empirical work, for assessment of the robustness of computer-based systems in hostile environments

    New light on electromagnetic corrections to the scattering parameters obtained from experiments on pionium

    Get PDF
    We calculate the electromagnetic corrections needed to obtain isospin invariant hadronic pion-pion s-wave scattering lengths a^0, a^2 from the elements a_cc, a_0c of the s-wave scattering matrix for the (\pi^+ \pi^-, \pi^0 \pi^0) system at the \pi^+ \pi^- threshold. These elements can be extracted from experiments on pionium. Our calculation uses energy independent hadronic pion-pion potentials that satisfactorily reproduce the low-energy phase shifts given by two-loop chiral pertur- bation theory. We also take into account an important relativistic effect whose inclusion influences the corrections considerably.Comment: 14 pages including 3 figures. Uses elsart.cls. Some numbers have been updated and a few typos have been correcte

    The effect of vacuum polarisation on muon-proton scattering at small energies and angles

    Get PDF
    We give a compact expression for the unpolarised differential cross section for muon-proton scattering in the one photon exchange approximation. The effect of adding the vacuum polarisation amplitude to the no-spin-flip amplitude for one photon exchange is calculated at small energies and scattering angles and is found to be negligible for present experiments.Comment: 6 pages, one figur

    OS diversity for intrusion tolerance: Myth or reality?

    Get PDF
    One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper we present a study with operating systems (OS) vulnerability data from the NIST National Vulnerability Database. We have analyzed the vulnerabilities of 11 different OSes over a period of roughly 15 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSes. Hence, our analysis provides a strong indication that building a system with diverse OSes may be a useful technique to improve its intrusion tolerance capabilities
    corecore