26 research outputs found
The honeytank: a scalable approach to collect malicious Internet traffic
In this paper, we propose an efficient method for collecting large amounts of malicious Internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were collected on a campus network attached to the internet. We explain how we implemented various protocols in a stateless way. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols.Anglai
The HoneyTank : a scalable approach to collect malicious Internet traffic
During the last few years, the amount of malicious traffic on the Internet has increased due to the spreading of worms, various port scanning activities, intrusion attempts or spammers. Collecting and analyzing this malicious traffic is an important issue. It can teach us what are the latest trends in computer misuse, it can help us discovering new kinds of attacks or it can be used to automatically generate signatures for network-based intrusion detection systems. In this paper, we propose an efficient method for collecting large amounts of malicious traffic running over TCP. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX IDS and provide in this paper several examples of the malicious activities which were collected on a campus network attached to the Internet. We explain how we implemented various protocols in a stateless way and we discuss limitations of our approach. We also discuss how our method can be improved to make an accurate but still stateless emulation of stateful protocols
Cancer prevalence in osteoporotic women with low serum vitamin D levels
Objective: The aim of this study was to assess the role of vitamin D in cancer development in postmenopausal osteoporotic women. Methods: A cross-sectional and in vitro study was carried out, with statistical analysis with odds ratios and 95% CIs presented. Human estrogen receptor-positive breast cancer cells (MCF-7) were studied in vitro. The apoptosis-to-proliferation (A/P) ratio was also determined. Results: A total of 885 women were included in this study. Any kind of cancer was found in 112 (12.7%) of all women. Breast cancer was the most prevalent malignancy, representing half of the cases (n = 56, 50%). The prevalence of any kind of cancer and breast cancer in women with low 25-hydroxyvitamin D(3) levels (25OHD; <50 nmol/L) was higher than in women with high 25OHD levels (>= 50 nmol/L). The in vitro study demonstrated a statistically significant increased A/P ratio of 5.27 (95% CI, 4.054-6.493) with a high concentration of 1 alpha, 25-dihydroxyvitamin D (10 mu M) after 96 hours. Conclusions: Osteoporotic women with low serum levels of 25OHD (<50 nmol/L) have an increased prevalence of any kind of cancer and breast cancer; however, these differences are not statistically significant. 1 alpha, 25-dihydroxyvitamin D induced an increased A/P ratio in MCF-7 breast cancer cells in vitro
Supporting mobility in multicast: A compromise between large and small group multicast
With the recent wireless boom and the IP convergence, there is a need to support efficiently a lot of concurrent small group multicast flows. In this paper, we describe how to integrate mobility support to a Small Group Multicast routing protocol named Sender Initiated Multicast (SIM). We then compare it with PIM-SSM through simulation and show that SIM requires fewer router states than PIM-SSM for small groups with static and mobile receivers