405 research outputs found

    ANALYSIS OF CLIENT-SIDE ATTACKS THROUGH DRIVE-BY HONEYPOTS

    Get PDF
    Client-side cyberattacks on Web browsers are becoming more common relative to server-side cyberattacks. This work tested the ability of the honeypot (decoy) client software Thug to detect malicious or compromised servers that secretly download malicious files to clients, and to classify what it downloaded. Prior to using Thug we did TCP/IP fingerprinting to assess Thug’s ability to impersonate different Web browsers, and we created our own malicious Web server with some drive-by exploits to verify Thug’s functions; Thug correctly identified 85 out of 86 exploits from this server. We then tested Thug’s analysis of delivered exploits from two sets of real Web servers; one set was obtained from random Internet addresses of Web servers, and the other came from a commercial blacklist. The rates of malicious activity on 37,415 random websites and 83,667 blacklisted websites were 5.6% and 1.15%, respectively. Thug’s interaction with the blacklisted Web servers found 163 unique malware files. We demonstrated the usefulness and efficiency of client-side honeypots in analyzing harmful data presented by malicious websites. These honeypots can help government and industry defenders to proactively identify suspicious Web servers and protect users.OUSD(R&E)Outstanding ThesisLieutenant, United States NavyApproved for public release. Distribution is unlimited

    An Explicit Criterion for Adaptive Periodic Noise Canceller Robustness Applied to Feedback Cancellation

    Get PDF
    This paper addresses the issue of robustness of an LMS-driven Adaptive Periodic Noise Canceller (APNC) in a closed-loop system. By adopting an analysis based on H-infinity theory, expressions are given under which the APNC, driven by the LMS algorithm, will exhibit robust performance properties. Simulation results are used to verify the analysis. Comparison is also made with an expression for stepsize derived for the less stringent bound of algorithm stability to demonstrate the strictness of the robustness criterion

    Kinetic studies of HIV-1 and HIV-2 envelope glycoprotein-mediated fusion

    Get PDF
    BACKGROUND: HIV envelope glycoprotein (Env)-mediated fusion is driven by the concerted coalescence of the HIV gp41 N-helical and C-helical regions, which results in the formation of 6 helix bundles. Kinetics of HIV Env-mediated fusion is an important determinant of sensitivity to entry inhibitors and antibodies. However, the parameters that govern the HIV Env fusion cascade have yet to be fully elucidated. We address this issue by comparing the kinetics HIV-1(IIIB )Env with those mediated by HIV-2 from two strains with different affinities for CD4 and CXCR4. RESULTS: HIV-1 and HIV-2 Env-mediated cell fusion occurred with half times of about 60 and 30 min, respectively. Binding experiments of soluble HIV gp120 proteins to CD4 and co-receptor did not correlate with the differences in kinetics of fusion mediated by the three different HIV Envs. However, escape from inhibition by reagents that block gp120-CD4 binding, CD4-induced CXCR4 binding and 6-helix bundle formation, respectively, indicated large difference between HIV-1 and HIV-2 envelope glycoproteins in their CD4-induced rates of engagement with CXCR4. CONCLUSION: The HIV-2 Env proteins studied here exhibited a significantly reduced window of time between the engagement of gp120 with CD4 and exposure of the CXCR4 binding site on gp120 as compared with HIV-1(IIIB )Env. The efficiency with which HIV-2 Env undergoes this CD4-induced conformational change is the major cause of the relatively rapid rate of HIV-2 Env mediated-fusion

    The HIV-1 late domain-2 S40A polymorphism in antiretroviral (or ART)-exposed individuals influences protease inhibitor susceptibility.

    Get PDF
    BackgroundThe p6 region of the HIV-1 structural precursor polyprotein, Gag, contains two motifs, P7TAP11 and L35YPLXSL41, designated as late (L) domain-1 and -2, respectively. These motifs bind the ESCRT-I factor Tsg101 and the ESCRT adaptor Alix, respectively, and are critical for efficient budding of virus particles from the plasma membrane. L domain-2 is thought to be functionally redundant to PTAP. To identify possible other functions of L domain-2, we examined this motif in dominant viruses that emerged in a group of 14 women who had detectable levels of HIV-1 in both plasma and genital tract despite a history of current or previous antiretroviral therapy.ResultsRemarkably, variants possessing mutations or rare polymorphisms in the highly conserved L domain-2 were identified in seven of these women. A mutation in a conserved residue (S40A) that does not reduce Gag interaction with Alix and therefore did not reduce budding efficiency was further investigated. This mutation causes a simultaneous change in the Pol reading frame but exhibits little deficiency in Gag processing and virion maturation. Whether introduced into the HIV-1 NL4-3 strain genome or a model protease (PR) precursor, S40A reduced production of mature PR. This same mutation also led to high level detection of two extended forms of PR that were fairly stable compared to the WT in the presence of IDV at various concentrations; one of the extended forms was effective in trans processing even at micromolar IDV.ConclusionsOur results indicate that L domain-2, considered redundant in vitro, can undergo mutations in vivo that significantly alter PR function. These may contribute fitness benefits in both the absence and presence of PR inhibitor

    The Grizzly, October 31, 1980

    Get PDF
    Campus Poll Favors Reagan, Anderson • Sorority Pleads Guilty To Alcohol Violations • Board Approves Cost Increases For Next Year • Carter & Reagan Make Final Philly Appearances • Athletic Hall of Fame Slated For Founder\u27s Day • It\u27s Laurie for Holmecoming Queen 1980 • Utility Gym Opens With Exciting Concert • Richter Hosts Town Meeting • APO Charter Reviewed • Halloween Dates Back 2000 Years • Booters Drop Three Straight • Gridders Drowned By Swarthmore • Hockey Suffers Season\u27s Second Defeat • Homecoming Sweet For Cross Countryhttps://digitalcommons.ursinus.edu/grizzlynews/1045/thumbnail.jp

    A High-Resolution Spectroscopic Search for the Remaining Donor for Tycho's Supernova

    Get PDF
    In this paper, we report on our analysis using Hubble Space Telescope astrometry and Keck-I HIRES spectroscopy of the central six stars of Tycho's supernova remnant (SN 1572). With these data, we measured the proper motions, radial velocities, rotational velocities, and chemical abundances of these objects. Regarding the chemical abundances, we do not confirm the unusu- ally high [Ni/Fe] ratio previously reported for Tycho-G. Rather, we find that for all metrics in all stars, none exhibit the characteristics expected from traditional SN Ia single-degenerate-scenario calculations. The only possible exception is Tycho-B, a rare, metal-poor A-type star; however, we are unable to find a suitable scenario for it. Thus, we suggest that SN 1572 cannot be explained by the standard single-degenerate model.Comment: 34 pages, 11 Figures, revised and resubmitted to Ap

    Identification of regions in multiple sequence alignments thermodynamically suitable for targeting by consensus oligonucleotides: application to HIV genome

    Get PDF
    BACKGROUND: Computer programs for the generation of multiple sequence alignments such as "Clustal W" allow detection of regions that are most conserved among many sequence variants. However, even for regions that are equally conserved, their potential utility as hybridization targets varies. Mismatches in sequence variants are more disruptive in some duplexes than in others. Additionally, the propensity for self-interactions amongst oligonucleotides targeting conserved regions differs and the structure of target regions themselves can also influence hybridization efficiency. There is a need to develop software that will employ thermodynamic selection criteria for finding optimal hybridization targets in related sequences. RESULTS: A new scheme and new software for optimal detection of oligonucleotide hybridization targets common to families of aligned sequences is suggested and applied to aligned sequence variants of the complete HIV-1 genome. The scheme employs sequential filtering procedures with experimentally determined thermodynamic cut off points: 1) creation of a consensus sequence of RNA or DNA from aligned sequence variants with specification of the lengths of fragments to be used as oligonucleotide targets in the analyses; 2) selection of DNA oligonucleotides that have pairing potential, greater than a defined threshold, with all variants of aligned RNA sequences; 3) elimination of DNA oligonucleotides that have self-pairing potentials for intra- and inter-molecular interactions greater than defined thresholds. This scheme has been applied to the HIV-1 genome with experimentally determined thermodynamic cut off points. Theoretically optimal RNA target regions for consensus oligonucleotides were found. They can be further used for improvement of oligo-probe based HIV detection techniques. CONCLUSIONS: A selection scheme with thermodynamic thresholds and software is presented in this study. The package can be used for any purpose where there is a need to design optimal consensus oligonucleotides capable of interacting efficiently with hybridization targets common to families of aligned RNA or DNA sequences. Our thermodynamic approach can be helpful in designing consensus oligonucleotides with consistently high affinity to target variants in evolutionary related genes or genomes

    Social Network Analysis

    Get PDF
    The proposed roundtable will bring together researchers from the iSchool community to discuss trends, new questions, and innovative ideas regarding social networks. For instance, how to discover and analyze subcommunities within a very large social network? How new behaviors in on-line social networks emerge through interactions? How social networks hidden within blogs, fora, and other forms of on-line communications can be identified? What are the impacts of social networks on social activities? How do social networks form, evolve, and grow? How ideas are spread over time and space using social networks? The proposed roundtable will stress the interdisciplinary challenges of these and other topics related to social networks. Through these interactions, we hope the roundtable can help the iSchool community in establishing one or multiple grand challenges regarding social networks and launching an effort to develop a strategy that aims to position iSchools to be leaders in addressing these grand challenges
    • …
    corecore