3,440 research outputs found

    Persistent issues in encryption software: A heuristic and cognitive walkthrough

    Get PDF
    The support information accompanying security software can be difficult to understand by end-users, who have little knowledge in cyber security. One mechanism for ensuring the integrity and confidentiality of information is encryption software. Unfortunately, software usability issues can hinder an end-user’s capability to properly utilise the security features effectively. To date there has been little research in investigating the usability of encryption software and proposing solutions for improving them. This research paper analysed the usability of encryption software targeting end-users. The research identified several issues that could impede the ability of a novice end-user to adequately utilise the encryption software. A set of proposed recommendations are suggested to improve encryption software which could be empirically verified through further research

    Applying Bag of System Calls for Anomalous Behavior Detection of Applications in Linux Containers

    Full text link
    In this paper, we present the results of using bags of system calls for learning the behavior of Linux containers for use in anomaly-detection based intrusion detection system. By using system calls of the containers monitored from the host kernel for anomaly detection, the system does not require any prior knowledge of the container nature, neither does it require altering the container or the host kernel.Comment: Published version available on IEEE Xplore (http://ieeexplore.ieee.org/document/7414047/) arXiv admin note: substantial text overlap with arXiv:1611.0305

    Toward Smart Moving Target Defense for Linux Container Resiliency

    Full text link
    This paper presents ESCAPE, an informed moving target defense mechanism for cloud containers. ESCAPE models the interaction between attackers and their target containers as a "predator searching for a prey" search game. Live migration of Linux-containers (prey) is used to avoid attacks (predator) and failures. The entire process is guided by a novel host-based behavior-monitoring system that seamlessly monitors containers for indications of intrusions and attacks. To evaluate ESCAPE effectiveness, we simulated the attack avoidance process based on a mathematical model mimicking the prey-vs-predator search game. Simulation results show high container survival probabilities with minimal added overhead.Comment: Published version is available on IEEE Xplore at http://ieeexplore.ieee.org/document/779685

    Student-Teachers’ Beliefs towards Learning Mathematics and Beliefs of Mathematics Teaching Efficacy and their Relation to their Perception of the Development of Pupils’ Understanding of Mathematics

    Get PDF
    The present study aimed at investigating the student-teachers’ beliefs towards learning mathematics, and beliefs of mathematics teaching efficacy and their relation to their perception of the development of pupils’ understanding of mathematics. Three measures were used in this study: The beliefs towards learning mathematics, the mathematics teaching efficacy beliefs, and the mathematics teacher's perception of the development of pupils’ understanding. Validity and reliability were established. A sample of student-teachers participated in the study. The results of the study showed that the more the positive student-teachers’ beliefs towards learning mathematics, the greater their mathematics teaching-efficacy was. Similarly, the greater the positive student-teachers’ belief towards learning mathematics, the more they become aware of the development of pupils’ understanding of mathematics. Finally, increasing the teaching efficacy of mathematics student-teachers was associated with an increase in their perception of the development of pupils’ understanding of mathematics. Both beliefs and teaching efficacy explained significant variance in the perception of their pupils’ understanding of mathematics
    • …
    corecore