25 research outputs found

    Web server load prediction and anomaly detection from hypertext transfer protocol logs

    Get PDF
    As network traffic increases and new intrusions occur, anomaly detection solutions based on machine learning are necessary to detect previously unknown intrusion patterns. Most of the developed models require a labelled dataset, which can be challenging owing to a shortage of publicly available datasets. These datasets are often too small to effectively train machine learning models, which further motivates the use of real unlabeled traffic. By using real traffic, it is possible to more accurately simulate the types of anomalies that might occur in a real-world network and improve the performance of the detection model. We present a method able to predict and categorize anomalies without the aid of a labelled dataset, demonstrating the model’s usability while also gathering a dataset from real noisy network traffic. The proposed long short-term memory (LTSM) based intrusion detection system was tested in a real-world setting of an antivirus company and was successful in detecting various intrusions using 5-minute windowing over both the predicted and real update curves thereby demonstrating its usefulness. Our contribution was the development of a robust model generally applicable to any hypertext transfer protocol (HTTP) traffic with almost real-time anomaly detection, while also outperforming earlier studies in terms of prediction accuracy

    International Conference on Computer Systems and Technologies -CompSysTech'11 Risk Analysis supported by Information Security Metrics

    Get PDF
    INTRODUCTION The importance of assuring the security of information assets is becoming more critical every year. The discussion about information security issues is necessary for business enterprise and companies are becoming aware of it. However the key areas of information security risk management and risk metrics still do not receive enough attention. Despite lots of documents describing the managed approach to risk, they do not clearly define a proper risk analysis and assessment. There exists ISO standards which explain the theoretical risk analysis approach and provide generic guidance on choosing security objectives, like the ISO 27000 standards family, however they do not describe the practical aspects and they fall short when evaluating the sufficiency of security mechanisms in a formal way. The situation of knowledge base has improved in a past few years; however there is still need of standardization in a whole risk assessment process. In this paper we propose a formal model for the quantitative risk assessment with the usage of measures and metrics, which minimizes the subjective factors of the security evaluation. This model is designed to make the risk analysis process more automatized, so it could be easily repeated and the results should be consistent and comparable

    AN AUTOMATIC MEASUREMENT SYSTEM WITH SPREADING RESISTANCE AND PCIV PROFILING FOR CHARACTERIZATION OF SEMICONDUCTORS

    Get PDF
    This article deals with the design and a control program of an automatic measuring system (AMS). The AMS allows to obtain the carrier concentration profile n(x) from the spreading resistance (SRP, with single point probe) and point contact current voltage (PCIV) measurements on a bevelled structure. The software of the AMS contains the possibility of calibration needed for converting the measured data into a carrier concentration profile and graphical subroutines for conversion of the resistivity to concentration. The software of the AMS further permits monitoring of running measurements by SRP and PCIV by LAN networks. The attained results in designing and creating the control program were verified by measuring and determining the carrier concentration profile on selected structures. The experimental n(x) profile has been compared with that calculated by program SUPREM

    The Czech Contribution to Future Large X-Ray Astronomy Telescopes: Recent Progress

    Get PDF
    We briefly review the recent status of the Czech contribution to future space X-ray astronomy missions with emphasis on the development of new technologies and test samples of X-ray mirrors with precise surfaces based on new materials and alternative designs. We report on further investigations and tests of X-ray optical arrangements, such as Kirkpatrick-Baez systems and Multi-Foil Optics

    Management and Verification of Firewall and Router Access Lists

    Get PDF
    Security in computer networks is a very complex task especially if it is required to separate a corporate network from public Internet or to divide a~company's intranet into multiple zones with different security requirements. The network security policy that describes these security requirements is primarily presented in a high-level form. Also, the security policy is enforced using some low-level security mechanisms, mainly firewall technology. One of the main difficulties faced by the network administrator is how to translate the high-level policy description to the low-level firewall rule-base. This paper presents Role-Based Network Security (RBNS) model that can be used as an intermediary level between high-level policy form and low-level firewall rule-base. We use the Role-Based Access Control (RBAC) model as a framework for our proposed RBNS model. The main concept of RBNS model is that network services are assigned to roles and hosts are made members of appropriate roles thereby acquiring the roles' network services. Also, the paper presents a compilation algorithm that can be used to automatically generate the low-level firewall rule-base from the RBNS intermediary-level. The paper presents a proposed verification algorithm to prove that the high-level policy and the translated low-level firewall rule-base are equivalent. Based on the RBNS model, we design and implement a firewall management toolkit. The paper demonstrates in brief the toolkit's capabilities through an example, thus showing that the using of this model separates the high-level security policy from the underlying enforcement mechanism. This separation offers easier management and debugging of low-level firewall rule-base at an appropriate level of abstraction

    On Identifying Proper Security Mechanisms

    No full text
    Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceSelection of proper security mechanisms that will protect the organization’s assets against cyber threats is an important non-trivial problem. This paper introduces the approach based on statistical methods that will help to choose the proper controls with respect to actual security threats. First, we determine security mechanisms that support control objectives from ISO/IEC 27002 standard and assign them meaningful weights. Then we employ a factor analysis to reveal dependencies among control objectives. Then this knowledge can be reflected to security mechanisms, that inherit these dependencies from control objectives

    EFFECT OF BIOTIC AND ABIOTIC PRETREATMENTS OF HORN-BEAM WOOD ON ITS PROPERTIES INTERESTING FROM VIEWPOINT OF PULPING IN ALKALINE MEDIA.

    No full text
    A series of comparable specimens of hornbeam wood were submitted to pretreatments by white-rot fungi, by alkali alone, or by alkali and oxidizing agents. The pretreatments caused weight loss of wood and modified its physical properties and chemical composition. All pretreat-ments reduced markedly axial permeability of the test specimens in the wet state (w > FSP). The chemical pretreatments of the test specimens, however, increased the rate of diffusion in the direction parallel to the grain. All pretreatments made the kinetics of wood/water interactions in the initial phase much higher, especially when white-rot fungi were used. The chemical pretreatments caused extreme swelling of wood, and on the other hand, drying of the pretreated specimens to their initial moisture content resulted in extremely deep reduction of their dimen-sions. An increased rate of wood/water interactions, high uptake of water, and higher diffusion coefficients of wood pretreated by alkali may positively influence the pulping processes
    corecore