426 research outputs found

    A deception based framework for the application of deceptive countermeasures in 802.11b wireless networks

    Get PDF
    The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were investigated to provide an understanding of how deception may be used in network security. Deceptive network countermeasures and attacks may then be tested on a wireless honeypot as an investigation into the effectiveness of deceptions used in network security. A structured framework, that describes the type of deception and its modus operandi, was utilised to deploy existing honeypot technologies for intrusion detection. Network countermeasures and attacks were mapped to deception types in the framework. This enabled the honeypot to appear as a realistic network and deceive targets in varying deceptive conditions. The investigation was to determine if particular deceptive countermeasures may reduce the effectiveness of particular attacks. The effectiveness of deceptions was measured, and determined by the honeypot\u27s ability to fool the attacking tools used. This was done using brute force network attacks on the wireless honeypot. The attack tools provided quantifiable forensic data from network sniffing, scans, and probes of the wireless honeypot. The aim was to deceive the attack tools into believing a wireless network existed, and contained vulnerabilities that may be further exploited by the naive attacker

    Leading hackers down the garden path

    Get PDF
    Can a hacker be controlled by predetermined deception? Limiting the decision making capabilities of hackers is one technique of network countermeasure that a honeynet enables. By furnishing a honeynet with a realistic range of services but restricted vulnerabilities, a hacker may be forced to direct their attacks to the only available exploits. This research discusses the deployment of a honeynet configured with a deceptive TELNET and TFTP exploit. Four hackers were invited to attack the honeynet and the analysis of their compromise identified if they engaged in a guided pathway to the intended deception. Hand trace analysis was performed on network log files to determine their primary attack vector. Conceptual analysis and frequency analyses methods were adopted to verify the hacker’s compromise and subsequent deception. The results demonstrated how three out of four hackers were lead down a misguided pathway of network deception

    Leading hackers down the garden path

    Get PDF
    Can a hacker be controlled by predetermined deception? Limiting the decision making capabilities of hackers is one technique of network countermeasure that a honeynet enables. By furnishing a honeynet with a realistic range of services but restricted vulnerabilities, a hacker may be forced to direct their attacks to the only available exploits. This research discusses the deployment of a honeynet configured with a deceptive TELNET and TFTP exploit. Four hackers were invited to attack the honeynet and the analysis of their compromise identified if they engaged in a guided pathway to the intended deception. Hand trace analysis was performed on network log files to determine their primary attack vector. Conceptual analysis and frequency analyses methods were adopted to verify the hacker’s compromise and subsequent deception. The results demonstrated how three out of four hackers were lead down a misguided pathway of network deception

    Determination Of Synthetic Phenolic Antioxidants In Food Items Using Hplc And Total Antioxidants Using Fia Approaches

    Get PDF
    Antioksidan fenolik sintetik (SPAs) merupakan bahan tambahan makanan yang ditambah ke dalam makanan untuk memanjangkan tempoh penyimpanannya. Synthetic phenolic antioxidants (SPAs) are food additives that are added to food to extend their shelf life

    How to build a faraday on the cheap for wireless security testing

    Get PDF
    The commonly known security weaknesses associated with the 802.11b wireless standard have introduced a variety of security measures to countermeasure attacks. Using a wireless honeypot, a fake wireless network may be configured through emulation of devices and the TCP/IP fingerprinting of OS network stacks. TCP/IP fingerprinting is one of the most popular methods employed to determine the type of OS running on a target and this information can then be used to determine the type of vulnerabilities to target on the host. Testing the effectiveness of this technique to ensure that a wireless honeypot using honeyd may deceive an attacker has been an ongoing study due to problems conducting TCP/IP fingerprinting in the wireless environment. Research conducted in a university laboratory showed that the results were ineffective and the time taken to conduct testing could be as long as 60 hours. The subsequent exploration of different testing methods and locations illuminated on an ideal research facility called a faraday cage. The design and construction of the faraday is discussed in this paper as an affordable solution for controlled and reliable testing of TCP/IP fingerprinting against the scanning tool Network Mapper (NMAP). The results are useful when looking to deploy a deceptive honeypot as a defence mechanism against wireless attackers

    Technical Education 2020 in Singapore: Better Quality, Higher Performance and More Choices through a Market Approach

    Get PDF
    This article aims to create a vision for technical education in Singapore in the year 2020, and the likely outcomes in terms of quality, performance and choice. Singapore is today one of the world‘s most globalised nations and it has achieved notable economic success. The current technical education system with the Institute of Technical Education (ITE) as the principal provider can be considered highly successful after more than 40 years of development. By analysing the evolution of a contemporary governance model employed by ITE and juxtaposing it with growing global trends in school choice, privatisation and marketisation, there is reason to expect further changes in institutional governance towards more empowerment and use of the Public Private Partnership (PPP) approach to promote greater engagement of the private sector. Visions are created through conceptual analysis of the evolution of a contemporary governance model and concept plans already in place for further development of technical education in Singapore. To date, ITE has introduced the ‗One ITE System, Three Colleges‘ governance model for greater autonomy in frontline operations and has proceeded to use the PPP approach to develop its planned new campuses. With Singapore well known as a nation which strives for excellence in everything it does and ITE embracing the vision to be ‗A Global Leader in Technical Education‘, it is likely that in 2020, technical education in Singapore would offer better quality, higher performance and more choices. This article systematically looks at key governance issues and the PPP approach for technical education, anticipating how they would affect the quality, performance, and delivery of technical education in Singapore and arriving at visions for ‗Technical Education 2020 in Singapore‘

    Determination Of Synthetic Phenolic Antioxidants In Food Items Using HPLC And Total Antioxidants Using FIA Approaches [TX553.A73 Y55 2007 f rb].

    Get PDF
    Antioksidan fenolik sintetik (SPAs) merupakan bahan tambahan makanan yang ditambah ke dalam makanan untuk memanjangkan tempoh penyimpanannya. Synthetic phenolic antioxidants (SPAs) are food additives that are added to food to extend their shelf life

    Composite graph coloring algorithms and applications

    Get PDF
    A vertex-composite graph is a graph that can have unequal chromaticities on its vertices. Vertex-composite graph coloring or composite graph coloring involves coloring each vertex of a composite graph with consecutive colors according to the vertex\u27s chromaticity with no two vertices adjacent to one another having the same color(s). New heuristic algorithms including the use of the saturation degree method have been developed in this research. All eleven heuristic algorithms including Clementson and Elphick algorithms were then tested using random composite graphs with five different chromaticity distributions. The best algorithm which uses the least average colors from the experiment is the MLF1I algorithm follow very closely by the MLF2I algorithm. Four applications, Timetabling, Job Shop Scheduling, CPU Scheduling and Network Assignment Problem, have been formulated as composite graph coloring problems and solved using heuristic composite graph coloring algorithms --Abstract, page ii

    Acute lower respiratory tract infection in infancy: a seven year follow-up study

    Get PDF
    Seven years after hospitalisation for acute lower respiratory tract infection in infancy, 200 children and their case -controls were assessed for respiratory status and epidemiological characteristics. The index group comprised 100 cases where respiratory syncytial virus had been responsible for the index illness (RSV +) and 100 cases in whom this organism had not been found (RSV -).No differences were noted between index and control children with respect to birth weight and gestational age, although breast feeding was more frequently observed in control children. Index children reported more respiratory symptoms and asthma as well as other indices of respiratory illhealth. Although index children appeared to be a socially disadvantaged group, parental respiratory symptoms and smoking habits were comparable in both groups of children. The atopic background was similar in index and control populations. At follow -up, index children were shorter than controls, although their weights were comparable. Tests of respiratory function were diminished in index children, who also had evidence of bronchial hyperreactivity.RSV+ and RSV- index children showed similar clinical characteristics and atopic background. No significant differences were found in the age at which the index illness occurred, or in the proportion who were breast -fed. The results of tests of respiratory function and exercise test were comparable in RSV+ and RSV- children.Children who had suffered bronchitis, bronchiolitis or pneumonia had similar clinical characteristics compared to their controls, with the exception that fewer children who had bronchiolitis were breast -fed, and children who suffered pneumonia were of lower birth weight. All three sub -groups of index children reported more respiratory symptoms and ill health than their controls. Social and family factors were less favourable when compared to control children. The atopic background was similar between the three disease categories, and also between index and control children. Tests of respiratory function were significantly reduced only in children who had bronchiolitis, although the trend in the bronchitis and pneumonia children was also towards poorer function. A one -way analysis of variance between disease categories on the differences between case and control for each respiratory function measurement showed that differences within a disease category was geater than the differences between disease categories.Following the index illness, children were reported to cough, wheeze or remain asymptomatic. Those with symptoms were almost identical in terms of clinical, social and family characteristics, as well as atopic background; but differed from their controls. Tests of respiratory function were diminished in both groups of symptomatic children, with evidence of bronchial hyper- reactivity. The asymptomatic index children did not differ from the symptomatic children with respect to social factors, suggesting that these contribute little to the occurrence of respiratory symptoms. Asymptomatic children were of similar height to their controls. Respiratory function was also comparable although there was a slight trend to hyper- reactive airways.Children whose index illness was attributed solely to acute infections (RSV +, non -atopic) reported similar occurrences of respiratory symptoms to their controls. Respiratory function was also comparable. When there was a background history of atopy, children reported more respiratory symptoms and had significantly lower tests of respiratory function as well as evidence of bronchial hyperreactivity when compared with controls. The results suggest that atopy is a determinant of poor respiratory function, but they may have also been influenced by the discrepancy in numbers. Bronchial reactivity was present in excess in atopic and non -atopic index cases, despite being significant only in the atopic children.Index children with bronchial reactivity showed similar clinical, atopic, social and family characteristics to those without evidence of hyperreactive airways, but these two groups differed clinically and in social and family background from control children. Those with bronchial reactivity wheezed more, and there was a greater percentage of asthmatics. Respiratory function was significantly diminished compared to controls. There was no excess of atopic disorders in the index children with hyperreactive airways.Children without evidence of hyperreactive airways also reported more respiratory symptoms, but bronchitis rather than asthma was diagnosed in these children. Except for a lower PEFR, all other tests of respiratory function were similar between index and control children.Ventilatory dysfunction paralleled bronchial reactivity. It is not clear which is of primary importance, or if there is any relationship between the two. Acute respiratory infection may have caused both these abnormalities, or they could have predated the event, rendering children more susceptible to infection

    If You go Down the Internet Today - Deceptive Honeypots

    Get PDF
    This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools have a place in modern network defence architecture
    corecore