528 research outputs found

    Watchword-Oriented and Time-Stamped Algorithms for Tamper-Proof Cloud Provenance Cognition

    Full text link
    Provenance is derivative journal information about the origin and activities of system data and processes. For a highly dynamic system like the cloud, provenance can be accurately detected and securely used in cloud digital forensic investigation activities. This paper proposes watchword oriented provenance cognition algorithm for the cloud environment. Additionally time-stamp based buffer verifying algorithm is proposed for securing the access to the detected cloud provenance. Performance analysis of the novel algorithms proposed here yields a desirable detection rate of 89.33% and miss rate of 8.66%. The securing algorithm successfully rejects 64% of malicious requests, yielding a cumulative frequency of 21.43 for MR

    Investigate how developers and managers view security design in software

    Full text link
    Software security requirements have been traditionally considered as a non-functional attribute of the software. However, as more software started to provide services online, existing mechanisms of using firewalls and other hardware to secure software have lost their applicability. At the same time, under the current world circumstances, the increase of cyber-attacks on software is ever increasing. As a result, it is important to consider the security requirements of software during its design. To design security in the software, it is important to obtain the views of the developers and managers of the software. Also, it is important to evaluate if their viewpoints match or differ regarding the security. Conducting this communication through a specific model will enable the developers and managers to eliminate any doubts on security design and adopt an effective strategy to build security into the software. In this paper, we analyzed the viewpoints of developers and managers regarding their views on security design. We interviewed a team of 7 developers and 2 managers, who worked in two teams to build a real-life software product that was recently compromised by a cyber-attack. We obtained their views on the reasons for the successful attack by the malware and took their recommendations on the important aspects to consider regarding security. Based on their feedback, we coded their open-ended responses into 4 codes, which we recommended using for other real-life software as well

    Analysis of variable VHE gamma-ray emission from the hard spectrum blazar 1ES 1218+304

    Get PDF
    This thesis is a study of the very high energy gamma-ray emission from the hard spectrum blazar 1ES 1218+304. The data were collected during the 2008/09 observing season by the VERITAS observatory, an array of four atmospheric Cherenkov telescopes in Southern Arizona. This work describes the development of a set of analysis tools suitable for the extraction of the energy spectra of astrophysical objects. Initially, the tools are applied to the Crab nebula data to optimize and calibrate the analysis. Afterwards, the analysis is applied to the high energy observations of the blazar 1ES 1218+304. We report an intense, day-scale flare observed on January 30, 2009. This marks the first detection of variability in gamma-ray emission from 1ES 1218+304. I also investigate the possibility of detecting a spectral feature in the observed energy spectra of blazar due to extragalactic background light. I demonstrate the presence of a spectral cut-off in the simulated multi-TeV energy spectra of blazars at around 1 TeV. This novel technique has a strong potential to discover the first observable signature of absorption of very high-energy photons due to the extragalactic background light

    Qualitative analysis of the relationship between design smells and software engineering challenges

    Full text link
    Software design debt aims to elucidate the rectification attempts of the present design flaws and studies the influence of those to the cost and time of the software. Design smells are a key cause of incurring design debt. Although the impact of design smells on design debt have been predominantly considered in current literature, how design smells are caused due to not following software engineering best practices require more exploration. This research provides a tool which is used for design smell detection in Java software by analyzing large volume of source codes. More specifically, 409,539 Lines of Code (LoC) and 17,760 class files of open source Java software are analyzed here. Obtained results show desirable precision values ranging from 81.01\% to 93.43\%. Based on the output of the tool, a study is conducted to relate the cause of the detected design smells to two software engineering challenges namely "irregular team meetings" and "scope creep". As a result, the gained information will provide insight to the software engineers to take necessary steps of design remediation actions.Comment: arXiv admin note: substantial text overlap with arXiv:1910.0542

    URegM: a unified prediction model of resource consumption for refactoring software smells in open source cloud

    Full text link
    The low cost and rapid provisioning capabilities have made the cloud a desirable platform to launch complex scientific applications. However, resource utilization optimization is a significant challenge for cloud service providers, since the earlier focus is provided on optimizing resources for the applications that run on the cloud, with a low emphasis being provided on optimizing resource utilization of the cloud computing internal processes. Code refactoring has been associated with improving the maintenance and understanding of software code. However, analyzing the impact of the refactoring source code of the cloud and studying its impact on cloud resource usage require further analysis. In this paper, we propose a framework called Unified Regression Modelling (URegM) which predicts the impact of code smell refactoring on cloud resource usage. We test our experiments in a real-life cloud environment using a complex scientific application as a workload. Results show that URegM is capable of accurately predicting resource consumption due to code smell refactoring. This will permit cloud service providers with advanced knowledge about the impact of refactoring code smells on resource consumption, thus allowing them to plan their resource provisioning and code refactoring more effectively

    DDoS Attack Detection with Deep Learning Algorithm for SNMP, NetBISO, and DNS

    Get PDF
    Abstract: In this day and age of advanced technology, devices that are connected to the Internet and can think are a big part of both our everyday lives and the work we do in factories. The number of Internet of Things devices has been steadily increasing from one year to the next, and it is expected that by 2030, there will be 126 billion of them. On the other hand, the number of distributed denial of service, or DDoS, attacks on the internet's surface has gone up as the number of Internet of Things devices has grown. Because IoT devices are limited in what they can do, it's important to come up with some advanced security techniques to protect the DDoS surface. Because of this, people who want to take control of an Internet of Things device can attack it. This thesis uses the CICDoS2019 dataset to improve how bugs are handled and build a new taxonomy that can handle DDoS attacks better. In the end, this will make the defense against these kinds of attacks stronger. In this paper, the DNN and the LSTMs methods to find distributed denial of service threats (SNMP, NetBIOS, DNS). With our suggested method, accuracy rates of 99.99% have been reached. . Keywords SNMP, NetBIOS, DNS, LSTM, DDN, Deep Learnin
    • …
    corecore