476 research outputs found

    Automatic Detection of Malware-Generated Domains with Recurrent Neural Models

    Get PDF
    Modern malware families often rely on domain-generation algorithms (DGAs) to determine rendezvous points to their command-and-control server. Traditional defence strategies (such as blacklisting domains or IP addresses) are inadequate against such techniques due to the large and continuously changing list of domains produced by these algorithms. This paper demonstrates that a machine learning approach based on recurrent neural networks is able to detect domain names generated by DGAs with high precision. The neural models are estimated on a large training set of domains generated by various malwares. Experimental results show that this data-driven approach can detect malware-generated domain names with a F_1 score of 0.971. To put it differently, the model can automatically detect 93 % of malware-generated domain names for a false positive rate of 1:100.Comment: Submitted to NISK 201

    Clustering Methods for Electricity Consumers: An Empirical Study in Hvaler-Norway

    Get PDF
    The development of Smart Grid in Norway in specific and Europe/US in general will shortly lead to the availability of massive amount of fine-grained spatio-temporal consumption data from domestic households. This enables the application of data mining techniques for traditional problems in power system. Clustering customers into appropriate groups is extremely useful for operators or retailers to address each group differently through dedicated tariffs or customer-tailored services. Currently, the task is done based on demographic data collected through questionnaire, which is error-prone. In this paper, we used three different clustering techniques (together with their variants) to automatically segment electricity consumers based on their consumption patterns. We also proposed a good way to extract consumption patterns for each consumer. The grouping results were assessed using four common internal validity indexes. We found that the combination of Self Organizing Map (SOM) and k-means algorithms produce the most insightful and useful grouping. We also discovered that grouping quality cannot be measured effectively by automatic indicators, which goes against common suggestions in literature.Comment: 12 pages, 3 figure

    An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics

    Get PDF
    Biometric systems have to address many requirements, such as large population coverage, demographic diversity, varied deployment environment, as well as practical aspects like performance and spoofing attacks. Traditional unimodal biometric systems do not fully meet the aforementioned requirements making them vulnerable and susceptible to different types of attacks. In response to that, modern biometric systems combine multiple biometric modalities at different fusion levels. The fused score is decisive to classify an unknown user as a genuine or impostor. In this paper, we evaluate combinations of score normalization and fusion techniques using two modalities (fingerprint and finger-vein) with the goal of identifying which one achieves better improvement rate over traditional unimodal biometric systems. The individual scores obtained from finger-veins and fingerprints are combined at score level using three score normalization techniques (min-max, z-score, hyperbolic tangent) and four score fusion approaches (minimum score, maximum score, simple sum, user weighting). The experimental results proved that the combination of hyperbolic tangent score normalization technique with the simple sum fusion approach achieve the best improvement rate of 99.98%.Comment: 10 pages, 5 figures, 3 tables, conference, NISK 201

    Evaluation of team dynamic in Norwegian projects for IT students

    Get PDF
    The need for teaching realistic software development in project courses has increased in a global scale. It has always been challenges in cooperating fast-changing software technologies, development methodologies and teamwork. Moreover, such project courses need to be designed in the connection to existing theoretical courses. We performed a large-scale research on student performance in Software Engineering projects in Norwegian universities. This paper investigates four aspects of team dynamics, which are team reflection, leadership, decision making and task assignment in order to improve student learning. Data was collected from student projects in 4 years at two universities. We found that some leader's characteristics are perceived differently for female and male leaders, including the perception of leaders as skilful workers or visionaries. Leadership is still a challenging aspect to teach, and assigned leadership is probably not the best way to learn. Students is are performing well in task review, however, needs support while performing task assignment. The result also suggests that task management to be done in more fine-grained levels. It is also important to maintain an open and active discussion to facilitate effective group decision makings

    nsroot: Minimalist Process Isolation Tool Implemented With Linux Namespaces

    Get PDF
    Data analyses in the life sciences are moving from tools run on a personal computer to services run on large computing platforms. This creates a need to package tools and dependencies for easy installation, configuration and deployment on distributed platforms. In addition, for secure execution there is a need for process isolation on a shared platform. Existing virtual machine and container technologies are often more complex than traditional Unix utilities, like chroot, and often require root privileges in order to set up or use. This is especially challenging on HPC systems where users typically do not have root access. We therefore present nsroot, a lightweight Linux namespaces based process isolation tool. It allows restricting the runtime environment of data analysis tools that may not have been designed with security as a top priority, in order to reduce the risk and consequences of security breaches, without requiring any special privileges. The codebase of nsroot is small, and it provides a command line interface similar to chroot. It can be used on all Linux kernels that implement user namespaces. In addition, we propose combining nsroot with the AppImage format for secure execution of packaged applications. nsroot is open sourced and available at: https://github.com/uit-no/nsroo

    Building sentiment Lexicons applying graph theory on information from three Norwegian thesauruses

    Get PDF
    Sentiment lexicons are the most used tool to automatically predict sentiment in text. To the best of our knowledge, there exist no openly available sentiment lexicons for the Norwegian language. Thus in this paper we applied two different strategies to automatically generate sentiment lexicons for the Norwegian language. The first strategy used machine translation to translate an English sentiment lexicon to Norwegian and the other strategy used information from three different thesauruses to build several sentiment lexicons. The lexicons based on thesauruses were built using the Label propagation algorithm from graph theory. The lexicons were evaluated by classifying product and movie reviews. The results show satisfying classification performances. Different sentiment lexicons perform well on product and on movie reviews. Overall the lexicon based on machine translation performed the best, showing that linguistic resources in English can be translated to Norwegian without losing significant value

    Integrating BIM and gaming to support building operation: the case of a new hospital

    Get PDF
    Moving into a new hospital requires healthcare professionals to adapt to a new work environment. Workflows, processes, and competencies become obsolete and need to be tailored for the new hospital. This paper explores a role-play serious game developed for the purpose of familiarizing professionals with their new work environment. A three-dimensional virtual prototype of the new hospital building created from Building Information Modeling technology, served as the graphical environment in which the game was staged. The game, namely the “Ward”, is intended to provide healthcare professionals with a virtual training ground for exercising new work processes. We conducted a series of interviews with the client, healthcare experts, and the software developers involved in developing the games. Our intention of doing so was twofold: attaining an understanding of how Building Information Modeling data has been integrated into the game and exploring how the game’s functionalities had been fitted to best support the healthcare professionals in their learning. By exploring the process of the game’s development we were able to point out shortcomings in current practice and to suggest areas for improvement. These are (1) use of crossover modules, (2) increased collaboration, (3) clear communication of information needs, and (4) better contractual agreements. The gameplay could be further improved by increasing the amount of non-player characters. Moreover, we just begin to understand how pedagogical concepts for games conveying architectural designs can be built. This indicates that developing such concepts is an intriguing avenue for further research. We argue that the findings are useful for practitioners and researchers interested in integrating BIM and gaming technology

    ‘Safe spaces’ – Electronic media, the internet and the representation of disability.

    Get PDF
    This paper details the findings from a research into educational ‘safe spaces’. In this research, the electronic media emplaced within four English schools’ intranet sites were examined to evidence the image of disability and impairment constructed in this ‘safe space’. The research, through the employment of proto text analysis, revealed that the image of disability and impairment within schools’ electronic media represented and unbalanced and negative image of disability that was grounded in the ideology of child deficit. Based upon these findings it is argued that ‘safe space’ in relation to these intranet sites was more a metaphor of dominance and power than one located within the principles of equality and social justice. The paper argues that as educators we must move beyond safe spaces as a shallow paradigm of meaning and ask when creating such places - what does space mean, how do the electronic media employed in such spaces create meaning and what might specific safe spaces do

    The anti-democratic employment of school cyberspace. A pilgrimage into an Arab winter?

    Get PDF
    In this article I wish to bring critical attention to the manner in which the Internet and intranet are employed as pedagogical space in schools. Within this article I also articulate my struggle to understand and conduct research in this place of electronic communication. Informed by Nietzsche and some biblical scripture, I suggest that what we are finding in education is a church of the intranet that is worshiped as a shelter of safety for educational learning. However, my contention is that a lack of control of uploaded and downloaded digital media results in spaces which mirror extant societal prejudices and bigotry. To evidence my argument I present specific data from English schools' colonisation of cyberspace and suggest that in this terra nullius a new civilisation, constructed upon old world ideals, ‘conformed’ the construction of the disabled indigene

    Employment of American and British first language textbooks as a foreign language resource in private schools in South Lebanon

    Get PDF
    This article presents the findings of research that examined how teachers employed first language textbooks to teach English as a foreign language and to develop the intercultural competences of their students. The research employed semi-structured phenomenological interviews and questionnaires with eight South Lebanese educators. The findings demonstrates how in relation to language learning, the employment of foreign textbooks produces successful results. The research though also details how teachers have to work hard to bridge the cultural gaps between their students and the ‘alien’ cultures detailed in the textbooks. Problematic, it would appear to the development of inter cultural competence is that in South Lebanon some cultures, noticeably that of Judaism, and some topics, such as sexuality, that schools, teachers but moreover parents control how and indeed if, students are inculcated into wider cultures and debates. The conclusion of the research details how in the development of intercultural competence that teachers are the key mediators of students’ responses to cultures and practices other than their own
    • …
    corecore