179 research outputs found

    Application Intrusion Detection: Security for Cloud Deployments

    Get PDF
    As servers move to the cloud, sources for security analysis become more limited. Security teams must make the most of the resources available to them. Our project attempts to fulfill this need by providing a template-based application to analyze and detect security events in logs that are available in cloud environments. We focus on authentication logs, but analysis modules can be added to flag anomalies in any log. The deliverables include log analysis, including successive repeated failures, location-based anomalies, and excessive failed login attempts across multiple accounts. To present our findings we output the results to a web interface for further analysis by a security team. Our project was limited by time, knowledge, available hardware and log sources. Under these constraints we developed a server-based solution that analyzes authentication logs and presents the data in an easily understood format. An authentication data log for a large organization can contain millions of events. To narrow down the large volume of information into a manageable number of interesting events, we analyzed the data-based on a set of our proposed criteria. The information that results from the analysis is easily read and used for further investigation into possible malicious behavior. The market impact of a comprehensive security engine capable of analyzing large amounts of seemingly unconnected data and reducing them into only the interesting entries would be significant. It would save security teams time, improve the incident detection efficiency, and help focus efforts and funds where they are needed most.https://scholarscompass.vcu.edu/capstone/1095/thumbnail.jp

    Manned-Unmanned Self-Organizing Bursty Networks with Biological Nodes

    Get PDF
    CRUSER TechCon 2018 Research at NPS. Wednesday 1: SensingAn elusive (hard to detect and hard to compromise) fast morphing network composed of cooperative manned-unmanned short living nodes and links, could be a significant force multiplier in providing an asymmetric advantage for emerging urban and coastal maritime combat. During FY16-FY17, sponsored by CRUSER, our research team made initial successful steps in proof of concept experimental studies of short-living projectile-based nodes for multi-domain mesh networking as well as short-living directional links to enable robust elusive littoral mesh networking. Through incremental experimentation, we've explored promising capabilities of integrating short-living nodes with miniature short-living link models to support very temporary connections between nodes of a multi-domain mesh network, enabled by maneuvering UAV formations, small sets of USVs and UGVs, fast patrol boats, and urban area ground units. Integration of biological aerial and ground nodes, such as falcons in the air and canines on the ground, provides a unique opportunity provides a unique opportunity to expand bursty manned-unmanned mesh networks research into the new level of formation autonomous behavior. In this new line of research we explore feasibility and major constraints for falcons and canines to carry on advanced miniature solutions for bursty links and nodes. We explore the falcons capability to serve as fast moving aerial relays for rapidly stretching the UAV-UGV or/and UAV-USV mesh network into the otherwise denied area, negotiate position and distance with closest UAV-UGV-USV-dismounted operator neighbors, and exercise unstructured autonomous behavior to maintain sensing or attack patterns. Similarly, we explore the capability of canines to maintain "canine nose-UAV/Falcon eye" cooperation in stretching the network to mission area, to enable temporary sensor data bursts collection and transfer, and , certainly their ability enhance UAV-UGV-USV mesh network autonomous behavior

    The Parthenon, February 27, 2018

    Get PDF
    The Parthenon, Marshall University’s student newspaper, was published by students Monday through Friday during the regular semester and weekly on Thursdays during the summer. Due to budgetary constraints, beginning with the 2016 Fall semester, the newspaper is only published two days a week. Physical issues are printed on Tuesdays and Fridays. The editorial staff is responsible for the news and the editorial content

    Fosse Favorite, Chicago, To Take Mainstage at IWU

    Get PDF

    December 2011; VPA Momentum

    Get PDF
    https://surface.syr.edu/vpa_news/1008/thumbnail.jp

    Illinois State University and Illinois Wesleyan University University Choirs

    Get PDF
    Center for the Performing Arts Concert Hall Sunday April 13, 2003 7:00p.m

    The Amicus: Vol.2, No.3

    Get PDF

    Ethnocentrism And Off Reservation Indian Boarding Schools

    Get PDF
    Ethnocentrism is a force to be reckoned with. The idea that one’s culture is morally and intellectually superior to another is a concept that has followed expanding civilizations for ages. The saga of the United States is no different. A society in a stage of expansion may think from a place of grandeur, and apply their cultural values to conquered people. This research will focus on three categories that will illustrate a holistic mindset of ethnocentrism from the point of view of the expanding United States to the original inhabitants of the continent. First, an exploration of federal government Indian policy. Second, an investigation into the personal memoirs of Richard H. Pratt, the originator of the first off-reservation boarding school. Finally, and possibly most effective, the voices of the students, and their decedents, of off-reservation boarding schools will be interpreted. The research is applied to high school social studies classrooms through analysis of primary sources via collaborative learning
    corecore