848 Hits in 3.0 sec

Automated Self-Adaptation for Cyber-Defense -- Pushing Adaptive Perimeter Protection Inward

Brett Benyo, Partha Pal, Richard Schantz, Aaron Paulos, David J. Musliner, Tom Marble, Jeffrey M. Rye, Michael W. Boldt, Scott Friedman
2013 2013 IEEE 7th International Conference on Self-Adaptation and Self-Organizing Systems Workshops  
We describe a number of experiments evaluating the relevance and effectiveness of the integrated cyber-defense operation.  ...  This paper presents a recently achieved incremental milestone on the long path toward more intelligently adaptive, automated and self-managed computer systems.  ...  We start a malicious client that waits a random interval and sends the attack sequence. When the exploits trigger, the fault injector module injects the intended attack effects.  ... 
doi:10.1109/sasow.2013.22 dblp:conf/saso/BenyoPSPMMRBF13 fatcat:l57sioptvbgcxg473glmzjlvym

Detection and Analysis of Drive-by Downloads and Malicious Websites [article]

Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi
2020 arXiv   pre-print
Drive by downloads is a very good example of the exponential increase in malicious activity over the Internet and how it affects the daily use of the web.  ...  A drive by download is a download that occurs without users action or knowledge. It usually triggers an exploit of vulnerability in a browser to downloads an unknown file.  ...  Conclusions In this paper, we proposed an approach to filter benign and malicious websites.  ... 
arXiv:2002.08007v2 fatcat:432ck2ygnrehfjioknwrr6mkzy

Architecture-based self-protecting software systems

Eric Yuan, Sam Malek, Bradley Schmerl, David Garlan, Jeff Gennari
2013 Proceedings of the 9th international ACM Sigsoft conference on Quality of software architectures - QoSA '13  
In this paper, we argue for an architecturebased self-protection (ABSP) approach to address this challenge.  ...  With this approach, it is possible to reason about the impact of a potential security breach on the system, assess the overall security posture of the system, and achieve defense in depth.  ...  A prime example of this pattern comes from the seminal work by [4] described a Byzantine Fault Tolerance (BFT) algorithm that can effectively tolerate f faulty nodes with 3f +1 replicas within a short  ... 
doi:10.1145/2465478.2465479 dblp:conf/qosa/YuanMSGG13 fatcat:sbhb7vucvfe5plmyygyybkr3lu

UbiCrawler: a scalable fully distributed Web crawler

Paolo Boldi, Bruno Codenotti, Massimo Santini, Sebastiano Vigna
2004 Software, Practice & Experience  
The main features of UbiCrawler are platform independence, linear scalability, graceful degradation in the presence of faults, a very effective assignment function (based on consistent hashing) for partitioning  ...  We report our experience in implementing UbiCrawler, a scalable distributed web crawler, using the Java programming language.  ...  Note that satisfying partially the above requirement is not difficult: for instance, a typical approach used in non-fault-tolerant distributed crawlers is to compute a modulo-based hash function of the  ... 
doi:10.1002/spe.587 fatcat:xy4hjii4pjg37b2f2txogzbp6e

Use chains to block DNS attacks: A trusty blockchain-based domain name system

Wen-Bin Hsieh, Jenq-Shiou Leu, Jun-Ichi Takada
2022 Journal of Communications and Networks  
The demand for trusted IP addresses has led a lot of research, including IP whitelisting, DNS filtering and so on. However, these technologies still have many shortcomings.  ...  The URL and IP address of a permissioned website are recorded in blockchain through a specific smart contract.  ...  He is now a researcher focusing machine learning, information security and cryptography. (e-mail: J.-S.  ... 
doi:10.23919/jcn.2022.000009 fatcat:ycofwe6phbb4pou7jalpgdutvi

Apoidea: A Decentralized Peer-to-Peer Architecture for Crawling the World Wide Web [chapter]

Aameek Singh, Mudhakar Srivatsa, Ling Liu, Todd Miller
2004 Lecture Notes in Computer Science  
to the peers for a better and faster crawl.  ...  This paper describes a decentralized peer-to-peer model for building a Web crawler.  ...  Given the fact that the networking infrastructure of these domains are comparable, a  ... 
doi:10.1007/978-3-540-24610-7_10 fatcat:gzt5umozxnfltexnxfnokd2pfe

WebEye - Automated Collection of Malicious HTTP Traffic [article]

Johann Vierthaler, Roman Kruszelnicki, Julian Schütte
2018 arXiv   pre-print
We regard WebEye and the data sets it creates as a tool for researchers and product developers to evaluate and improve their AI-based anti-malware solutions against large-scale benchmarks.  ...  Large data sets of realistic web traffic, correctly classified as benign or malicious are needed, not only to train classic and deep learning algorithms, but also to serve as evaluation benchmarks for  ...  service for scanning URLs or files for malicious content by using multiple anti virus engines.  ... 
arXiv:1802.06012v1 fatcat:idaptnjen5em5cmwyjrherczi4

Small trusted primitives for dependable systems

Petros Maniatis, Byung-Gon Chun
2011 ACM SIGOPS Operating Systems Review  
Conservative design for such systems dictates that their security and fault tolerance depend on a very small number of assumptions taken on faith; such assumptions are typically called the "trusted computing  ...  Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate.  ...  We would also like to thank our colleague Jaeyeon Jung for providing us with detailed guidance on how to present this article best.  ... 
doi:10.1145/1945023.1945038 fatcat:wycqymcve5aeflzpkcis4fdaey

Botnet in DDoS Attacks: Trends and Challenges

Nazrul Hoque, Dhruba K. Bhattacharyya, Jugal K. Kalita
2015 IEEE Communications Surveys and Tutorials  
Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming, and click fraud.  ...  This survey presents a comprehensive overview of DDoS attacks, their causes, types with a taxonomy, and technical details of various attack launching tools.  ...  The project has a comprehensive approach that handles both accidental and malicious faults.  ... 
doi:10.1109/comst.2015.2457491 fatcat:oph4lgawmzbuvgygq4iagsr6eu

"Design and Implementation of Scalable, Fully Distributed Web Crawler for a Web Search Engine"

M. Sunil Kumar, P. Neelima
2011 International Journal of Computer Applications  
A new model and architecture for a Web crawler that tightly integrates the crawler with the rest of the search engine is designed first. The development and implementation are discussed in detail.  ...  This can be taken one step further, as there are tools available for dealing with all the possible interactions between the modules of a search engine,  ...  Fault tolerance A distributed crawler should continue to work under crash faults, that is, when some agents abruptly die.  ... 
doi:10.5120/1963-2629 fatcat:dmvgucbvwnfu7dsg3pxevzmeuy

Dissecting ghost clicks

Sumayah A. Alrwais, Alexandre Gerber, Christopher W. Dunn, Oliver Spatscheck, Minaxi Gupta, Eric Osterweil
2012 Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12  
The attackers hijacked clicks and ad impressions on victim machines infected by a DNS changer malware to earn ad revenue fraudulently.  ...  We experimented with the attack infrastructure when it was in operation and present a detailed account of the attackers' modus operandi.  ...  Overall, the attack infrastructure was well provisioned, with attention paid to fault tolerance.  ... 
doi:10.1145/2420950.2420954 dblp:conf/acsac/AlrwaisGDSGO12 fatcat:ffps5jvlpvh7niufxc5rrrnv3u


M. G. Devikar .
2015 International Journal of Research in Engineering and Technology  
To overcome the above problems a new proposed system "Filtering of Unwanted Messages, Images and Phish Links on OSN wall" an online application is proposed.  ...  The system also provides filtering of images through steganography , that is retrieving the hidden messages from the images.  ...  It can tolerate more faults on a network.  ... 
doi:10.15623/ijret.2015.0404123 fatcat:6nsqodkl7rcefjs7ta2jxudeim

A Survey on Web Application Vulnerabilities (SQLIA, XSS) Exploitation and Security Engine for SQL Injection

Rahul Johari, Pankaj Sharma
2012 2012 International Conference on Communication Systems and Network Technologies  
These websites have been continuously targeted by highly motivated malicious users to acquire monetary gain.  ...  In this paper, we present a detailed review on various types of Structured Query Language Injection attacks, Cross Site Scripting Attack, vulnerabilities, and prevention techniques.  ...  Sarma, Scientist 'E' (CERT-In) for inputs.  ... 
doi:10.1109/csnt.2012.104 fatcat:wssh2iipwncmdgz3juczxqfnom

Permanent Web Publishing

David S. H. Rosenthal, Vicky Reich
2000 USENIX Annual Technical Conference  
It is a majority-voting fault-tolerant system that, unlike normal systems, has far more replicas than would be required just to survive the anticipated failures.  ...  We are exploring techniques that exploit the surplus of replicas to permit a much looser form of coordination between them than conventional fault-tolerant technology would require.  ...  The project was to a large extent inspired by Danny Hillis & Stewart Brand's Millennium Clock project [clock] .  ... 
dblp:conf/usenix/RosenthalR00 fatcat:mqecw6tjsbh3vh5ir5oku25gzu

Towards reliable OSGi framework and applications

Heejune Ahn, Hyukjun Oh, Chang Oan Sung
2006 Proceedings of the 2006 ACM symposium on Applied computing - SAC '06  
The OSGi (Open Service Gateway initiative) framework employs the service-oriented approach and the java classloader architecture for the runtime service deployment, that are well suited to the dynamic  ...  This paper analyzes software reliability issues in OSGi framework and proposes a proxy-based reliable extensions.  ...  In the paper, we propose a proxy-based fault tolerant approach for SOA systems.  ... 
doi:10.1145/1141277.1141617 dblp:conf/sac/AhnOS06 fatcat:tbe4v7kyvfblza2wudu6umrjwy
« Previous Showing results 1 — 15 out of 848 results