53 research outputs found

    From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions

    Get PDF
    In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies

    Using response action with Intelligent Intrusion detection and prevention System against web application malware

    Full text link
    Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system

    Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation

    Get PDF
    Many current systems security research efforts focus on mechanisms for Intrusion Prevention and Self-Healing Software. Unfortunately, such systems find it difficult to gain traction in many deployment scenarios. For self-healing techniques to be realistically employed, system owners and administrators must have enough confidence in the quality of a generated fix that they are willing to allow its automatic deployment. In order to increase the level of confidence in these systems, the efficacy of a 'fix' must be tested and validated after it has been automatically developed, but before it is actually deployed. Due to the nature of attacks, such verification must proceed automatically. We call this problem Automatic Repair Validation (ARV). As a way to illustrate the difficulties faced by ARV, we propose the design of a system, Bloodhound, that tracks and stores malicious network flows for later replay in the validation phase for self-healing softwar

    Application of Constructivist Theory in Flipped Classroom — Take College English Teaching as a Case Study

    Get PDF
    In the context of information globalization and the popularity of the Internet, the flipped classroom as a new teaching mode, a new pedagogical method has become a heated topic and a growing concern for educators across the world. In this paper, the flipped classroom is supported by constructivist learning theory. The teaching mode under the constructivist learning theory is typically students-centered which corresponds with the flipped classroom mode. This paper mainly focuses on the application of constructivist learning theory in flipped classroom, taking college English teaching for example to interpret the student- student, teacher- student interactions in the flipped classroom with the final goal to promote students’ learning efficiency and quality

    Using Dance/ Body Movement Therapy with a Trauma Population

    Get PDF
    This literature review reveals how the inclusion of a body based, dance/movement therapy treatment to a trauma exposed population can unveil and help integrate underlying patterns of dysregulation, dissociation, attachment, and stored body sensations. It describes highlights of a clinical application combining movement observation and therapy with knowledge of neurological and somatic symptomology within the individual with post-traumatic symptoms. Methods addressed included, traditional cognitive based therapies (top-down), and body-based therapies (bottom-up) focusing on dance/movement therapy. It is concluded that further implementation, research, and knowledge in the field of Dance/Movement therapy is needed

    A Scoping Review of Behavior Change Techniques Used to Promote Physical Activity Among Women in Midlife

    Get PDF
    Women in midlife experience health risks that could be mitigated by regular physical activity and reduced sedentary time, but this population rarely achieves physical activity levels that would protect their health. As a result, many behavioral interventions are designed to promote physical activity in this population, which are purportedly guided by theoretical models of health behavior (change) and activate an associated set of behavior change techniques (BCTs). The efficacy and effectiveness of these interventions appear to be limited, however, raising questions about their design and adaptation for women in midlife. Several aspects of these interventions are currently unclear. Specifically, which women they target (i.e., how midlife and sedentary or inactive are defined), which theoretical models or behavior BCTs are used, and how BCTs are activated in such interventions. A synthesis of this information would be useful as an initial step toward improving physical activity interventions for this at-risk group, and thus, represented the goal of the present scoping review. Eligibility required publication in a peer-reviewed journal in English between 2000 and 2021, inclusion of only women in midlife who did not have any medical or other restrictions on their physical activity (e.g., cancer diagnosis), and free-living physical activity or sedentary behavior as the target outcome (with associated assessment). Of the 4,410 initial results, 51 articles met inclusion criteria, and these described 36 unique interventions. More than half of the articles (59%) named an underlying theoretical model and interventions included an average of 3.76 identifiable BCTs (range 1-11). However, descriptions of many interventions were limited and did not provide enough detail to determine whether or how specific BCTs were activated. Interventions also used a wide range of inclusion criteria for age range and starting activity level, which has implications for targeting/tailoring and effectiveness, and many interventions focused on marginalized populations (e.g., women from racial/ethnic minority backgrounds, those un- or under-insured). The present review identifies some strengths and highlights important limitations of existing literature, as well as key opportunities for advancing the design and potential utility of physical activity interventions for women in midlife
    • …
    corecore