The document describes a proposed integrated honeypot system that aims to detect zero-day attacks, SSH attacks, and keylogger-spyware attacks. The system uses honeypots deployed in virtual machines to log attack behaviors. A separate detection framework then analyzes the honeypot logs to generate new signatures for intrusion detection and prevention systems like Snort. The integrated honeypot includes features for logging details of the targeted attacks. The system is meant to help update defenses against new attack patterns.
The document summarizes a review on using honeypots as an intrusion detection system for wireless networks. It discusses how honeypots can be used to detect attackers by emulating vulnerable websites and systems to attract intruders. The proposed system uses different fake websites containing invalid or decoy information. If a user interacts with the honeypot sites suspiciously, their IP address would be blacklisted. The system aims to identify new attack patterns and secure the network for the future by monitoring attacker behavior on the honeypot systems without affecting real systems.
Detection and prevention of keylogger spyware attacksIAEME Publication
This document summarizes a proposed method for detecting and preventing keylogger spyware attacks. Keylogger spyware poses a serious threat by recording keyboard keystrokes to steal sensitive information like passwords and account numbers. The proposed method uses a detection and prevention system to identify keyloggers and remove them from infected systems. It aims to protect systems from this type of malware in a network. The document provides an overview of different types of malware like adware, spyware, and keyloggers, and describes how keylogger spyware works by logging keystrokes and transmitting the stolen data to malicious users.
This document discusses honeypots as a solution for internet-based data security. It defines honeypots as fake computer systems designed to collect data on intruders by appearing as legitimate systems. The document outlines different types of honeypots including production honeypots for organizations, research honeypots to study hacker tactics, and database honeypots to capture SQL injections. It also discusses low and high interaction honeypots, with low interaction simulating services and high interaction using whole systems. Finally, it introduces honey nets as networks of monitored high interaction honeypots simulating a production environment.
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
The objective of the proposed system is to integrate the high volume of data along with the important
considerations like monitoring a wide array of heterogeneous security. When a real time cyber attack
occurred, the Intrusion Detection System automatically store the log in distributed environment and
monitor the log with existing intrusion dictionary. At the same time the system will check and categorize the
severity of the log to high, medium, and low respectively. After the categorization, the system will
automatically take necessary action against the user-unit with respect to the severity of the log. The
advantage of the system is that it utilize anomaly detection, evaluates data and issue alert message or
reports based on abnormal behaviour.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document compares different types of honeypot systems. It discusses low, medium, and high interaction honeypots. Low interaction honeypots are easiest to install but provide limited information on attackers. High interaction honeypots deploy real operating systems and applications and provide the most detailed attacker information but are also highest risk and hardest to manage. The document analyzes the tradeoffs between honeypot interaction levels in terms of effort, information gathered, and security risks.
This document discusses honeypots and the honeyd software. Honeypots are decoy servers that are used to detect intruders by appearing as normal servers but containing fake data. Honeyd is a honeypot daemon that can simulate a large network using a single host by creating virtual hosts with different personalities. It is used for distraction, detecting suspicious traffic, and learning about attack techniques. The document describes how to configure honeyd by setting virtual host properties and firewall rules to forward traffic to it.
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
Client side attacks are those which exploits the vulnerabilities in client side applications such as browsers, plug-ins etc. The remote attackers execute the malicious code in end user’s system without his knowledge. Here in this research, we propose to detect and measure the drive by download class of malware which infect the end user’s system through HTTP based propagation mechanism. The purpose of this research is to introduce a class of technology known as client honeypot through which we execute the domains in a virtual machine in more optimized manner. Those virtual machines are the controlled environment for the execution of those URLs. During the execution of the websites, the PE files dropped into the system are logged and further analyzed for categorization of malware. Further the critical analysis has been performed by applying some reverse engineering techniques to categories the class of malware and source of infections performed by the malware.
The document summarizes a review on using honeypots as an intrusion detection system for wireless networks. It discusses how honeypots can be used to detect attackers by emulating vulnerable websites and systems to attract intruders. The proposed system uses different fake websites containing invalid or decoy information. If a user interacts with the honeypot sites suspiciously, their IP address would be blacklisted. The system aims to identify new attack patterns and secure the network for the future by monitoring attacker behavior on the honeypot systems without affecting real systems.
Detection and prevention of keylogger spyware attacksIAEME Publication
This document summarizes a proposed method for detecting and preventing keylogger spyware attacks. Keylogger spyware poses a serious threat by recording keyboard keystrokes to steal sensitive information like passwords and account numbers. The proposed method uses a detection and prevention system to identify keyloggers and remove them from infected systems. It aims to protect systems from this type of malware in a network. The document provides an overview of different types of malware like adware, spyware, and keyloggers, and describes how keylogger spyware works by logging keystrokes and transmitting the stolen data to malicious users.
This document discusses honeypots as a solution for internet-based data security. It defines honeypots as fake computer systems designed to collect data on intruders by appearing as legitimate systems. The document outlines different types of honeypots including production honeypots for organizations, research honeypots to study hacker tactics, and database honeypots to capture SQL injections. It also discusses low and high interaction honeypots, with low interaction simulating services and high interaction using whole systems. Finally, it introduces honey nets as networks of monitored high interaction honeypots simulating a production environment.
REAL-TIME INTRUSION DETECTION SYSTEM FOR BIG DATAijp2p
The objective of the proposed system is to integrate the high volume of data along with the important
considerations like monitoring a wide array of heterogeneous security. When a real time cyber attack
occurred, the Intrusion Detection System automatically store the log in distributed environment and
monitor the log with existing intrusion dictionary. At the same time the system will check and categorize the
severity of the log to high, medium, and low respectively. After the categorization, the system will
automatically take necessary action against the user-unit with respect to the severity of the log. The
advantage of the system is that it utilize anomaly detection, evaluates data and issue alert message or
reports based on abnormal behaviour.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document compares different types of honeypot systems. It discusses low, medium, and high interaction honeypots. Low interaction honeypots are easiest to install but provide limited information on attackers. High interaction honeypots deploy real operating systems and applications and provide the most detailed attacker information but are also highest risk and hardest to manage. The document analyzes the tradeoffs between honeypot interaction levels in terms of effort, information gathered, and security risks.
This document discusses honeypots and the honeyd software. Honeypots are decoy servers that are used to detect intruders by appearing as normal servers but containing fake data. Honeyd is a honeypot daemon that can simulate a large network using a single host by creating virtual hosts with different personalities. It is used for distraction, detecting suspicious traffic, and learning about attack techniques. The document describes how to configure honeyd by setting virtual host properties and firewall rules to forward traffic to it.
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
Client side attacks are those which exploits the vulnerabilities in client side applications such as browsers, plug-ins etc. The remote attackers execute the malicious code in end user’s system without his knowledge. Here in this research, we propose to detect and measure the drive by download class of malware which infect the end user’s system through HTTP based propagation mechanism. The purpose of this research is to introduce a class of technology known as client honeypot through which we execute the domains in a virtual machine in more optimized manner. Those virtual machines are the controlled environment for the execution of those URLs. During the execution of the websites, the PE files dropped into the system are logged and further analyzed for categorization of malware. Further the critical analysis has been performed by applying some reverse engineering techniques to categories the class of malware and source of infections performed by the malware.
Honey pots can be implemented in cloud computing to improve security. There are several components, including a cloud controller, cluster controller, honey controller, and log storage system. Low interaction honey pots like Honeyd emulate services to detect attacks, while high interaction honey pots like Honeynets allow more flexibility for attackers but carefully control outbound traffic. Honey pots can be offered as a service for cloud customers, providing logs and statistics to help secure resources against future attacks.
This document summarizes a proposed network attack alerting system that aims to reduce redundant alerts from intrusion detection systems (IDS). The system uses both network-based and host-based IDS to detect attacks launched using the Backtrack penetration testing tool on a virtual network environment. Well-known open source IDS tools from the Security Onion distribution are used to generate alerts. The system builds a database of alerts and defines rules to eliminate duplicate alerts for the same attack based on attributes like source/destination IP and port. It also establishes a severity classification scheme using threshold values of alerts and time to help administrators prioritize responses.
To modify the fake filesystem in Kippo honeypot:
1. Browse to /honeydrive/kippo/data/fs
2. Create a new directory or file (e.g. myfiles)
3. Modify the script create_filesystem.py to include the newly created directory/file in the fake filesystem
4. Re-run the script to rebuild the fake filesystem pickle file with the modifications
5. Restart Kippo using ./start.sh
6. Now when an attacker SSH's in, they should see the new myfiles directory/file
The fake filesystem is built dynamically using Python scripts and stored in a pickle file. Modifying the creation script allows customizing what
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document provides an overview of honeypots, which are security resources that are intended to be probed, attacked, or compromised in order to gather information about attackers. Honeypots can be used to learn about past attacks, detect currently occurring attacks, and identify new types of attacks. They work by monitoring any traffic to resources that are not expected to receive data. Honeypots have advantages like reducing false alarms and providing data for analysis, but also have disadvantages like narrow visibility and risks of the attacker using the honeypot to attack other systems. The document discusses different types of honeypots including low and high interaction honeypots, and specific honeypot tools like Honeyd and Honeynets.
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks.
Honeypot is an exciting new technology with enormous potential for the security community.It is resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques.
This document provides definitions and explanations of honeypots and honeynets. It begins by defining a honeypot as a resource that pretends to be a real target in order to gather information about attacks without putting real systems at risk. There are different types of honeypots including research/production honeypots and low/high interaction honeypots. Honeynets are networks of multiple honeypot systems that allow for containment of attackers and capture of all activity. Virtual honeynets deploy entire honeynet architectures virtually on single systems. The document outlines advantages like flexibility and minimal resources, and disadvantages like narrow field of view and risk of fingerprinting.
This document describes the design and implementation of a Linux-based network forensic system using honeynet technology. The system uses a virtual honeynet to collect network attack traces that can be used for further investigation. A virtual honeynet environment is created using Open Source Virtual Box to simulate systems under attack. The collected logs and data provide digital evidence of attacks that can help with network forensics investigations.
This document proposes a new approach to designing and developing a portable high interaction honeypot system. The key aspects are:
1) It implements the honeypot system on a USB device to provide easy installation, high portability, and plug-and-play operation.
2) The complete honeypot system runs as a live USB system, meaning the operating system runs entirely in memory rather than installing to the hard disk. This allows the system to be restored to its original state by rebooting.
3) It aims to reduce the difficulties in configuring and maintaining high interaction honeypots by making the system easy to deploy and restore. The portable design also helps boost security awareness for users.
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
This document summarizes an extensive survey of intrusion detection systems. It discusses the general architecture of IDS, including host-based and network-based systems. It describes different types of attacks (e.g. DoS, probing, user-to-root) and defenses. It analyzes previous work applying data mining techniques like machine learning to improve detection rates and reduce false alarms. A key problem is the massive number of false alarms that overburden security managers; the document aims to investigate solutions to lower the false alarm rate so that real threats are not missed.
Honeypots are decoy systems used to gather threat intelligence. They allow monitoring of attacks to better understand tactics and improve defenses. There are different types, including low-interaction virtual honeypots for ease of use and high-interaction physical honeypots for more detailed data. Honeypots are placed in various network locations and can operate as production systems to detect threats or research systems to collect information. They provide security benefits but also have limitations like narrow views and fingerprinting risks.
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
To provide security to network we use existing Intrusion Detection System(IDS) for
identification of known attack with low false alarm,but it is not working when unknown attacks
occurs so to identify unknown attacks we use Anomaly based IDS(ADS) with high false alarm.
HIDS is the combination of IDS and ADS with their advantages for identification of known as well
as unknown attack.IDS used signature based model to identify known attack and ADS used anomaly
based model for identification of unknown attack.HIDS used internet episode rules for identify
known as well as unknown attacks.
This document summarizes various soft computing techniques that can be used for intrusion detection, including fuzzy logic, graph-based approaches, and neural networks. Fuzzy logic can be used to classify parameters and detect anomalies by comparing normal and new fuzzy association rule sets. Graph-based approaches model network traffic as graphs of nodes and edges and use clustering algorithms to detect anomalies. Neural networks can be trained on audit log data to recognize normal behavior and detect deviations that may indicate attacks. These soft computing methods aim to improve on signature-based detection by learning patterns of normal network activity and detecting anomalies.
Day by day the internet is becoming an essential part of everyone’s life. In India from 2015 – 2020, there is an increase in internet users by 400 million users. As technology and innovation are increasing rapidly. Security is a key point to keep things in order. Security and privacy are the biggest concern in the world let it is in any field or domain. There is no big difference in cyber security the security is the biggest concern worrying about attacks which could happen anytime. So, in this paper, we are going to talk about honeypot comprehensively. The aim is to track hacker to analyze and understand hacker attacker behavior to create a secure system which is sustainable and efficient. Anoop V Kanavi | Feon Jaison "Honeypot Methods and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38045.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38045/honeypot-methods-and-applications/anoop-v-kanavi
The document proposes Double Guard, an intrusion detection system that manages both the front-end and back-end of multi-tier web applications. It builds normality models from both the front-end HTTP traffic and back-end SQL queries. By composing a web IDS and database IDS and maintaining isolated user sessions, Double Guard can detect a wide range of attacks with high accuracy and few false positives.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Honeynet Project is a non-profit organization that aims to improve internet security by learning about computer attacks. It deploys honeypots - computers designed to be hacked - to capture data on threats. The organization shares its research findings openly. It also operates a Honeynet Research Alliance of groups around the world collaborating on honeypot technologies and research.
This document discusses intrusion detection and the technology of Snort. It defines intrusion detection as discovering unauthorized network or computer activities. Intrusion detection aims to detect violations of confidentiality, integrity, and availability. Snort is introduced as an open-source network intrusion detection system that analyzes network traffic and compares it to configurable rules to detect suspicious patterns. Snort runs on both UNIX and Windows platforms and has a small system footprint, making it a lightweight intrusion detection option.
This document discusses honeypots, which are decoy computer systems used to detect attacks. Honeypots have several advantages, including collecting small but high-value data, requiring minimal resources, and working in encrypted or IPv6 environments. Two specific honeypot tools discussed are Honeyd, an open source low-interaction honeypot that can emulate many operating systems and services, and honeynets, which are entire networks of high-interaction honeypots used to capture extensive attacker activity. The document compares several honeypot products and outlines first and second generation honeynet architectures.
This document provides biographical information about Jeff Bezos, the founder and CEO of Amazon.com. It discusses that he was born in New Mexico and grew up working on his family's ranch. After graduating from Princeton, he worked on Wall Street before founding Amazon in 1994. It details that Amazon began as an online bookstore and is now a massive ecommerce company. The summary also notes that Bezos owns aerospace company Blue Origin and purchased The Washington Post in 2013. As of 2016, Bezos has an estimated net worth of $66.7 billion, making him one of the richest people in the world.
Honey pots can be implemented in cloud computing to improve security. There are several components, including a cloud controller, cluster controller, honey controller, and log storage system. Low interaction honey pots like Honeyd emulate services to detect attacks, while high interaction honey pots like Honeynets allow more flexibility for attackers but carefully control outbound traffic. Honey pots can be offered as a service for cloud customers, providing logs and statistics to help secure resources against future attacks.
This document summarizes a proposed network attack alerting system that aims to reduce redundant alerts from intrusion detection systems (IDS). The system uses both network-based and host-based IDS to detect attacks launched using the Backtrack penetration testing tool on a virtual network environment. Well-known open source IDS tools from the Security Onion distribution are used to generate alerts. The system builds a database of alerts and defines rules to eliminate duplicate alerts for the same attack based on attributes like source/destination IP and port. It also establishes a severity classification scheme using threshold values of alerts and time to help administrators prioritize responses.
To modify the fake filesystem in Kippo honeypot:
1. Browse to /honeydrive/kippo/data/fs
2. Create a new directory or file (e.g. myfiles)
3. Modify the script create_filesystem.py to include the newly created directory/file in the fake filesystem
4. Re-run the script to rebuild the fake filesystem pickle file with the modifications
5. Restart Kippo using ./start.sh
6. Now when an attacker SSH's in, they should see the new myfiles directory/file
The fake filesystem is built dynamically using Python scripts and stored in a pickle file. Modifying the creation script allows customizing what
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
This document provides an overview of honeypots, which are security resources that are intended to be probed, attacked, or compromised in order to gather information about attackers. Honeypots can be used to learn about past attacks, detect currently occurring attacks, and identify new types of attacks. They work by monitoring any traffic to resources that are not expected to receive data. Honeypots have advantages like reducing false alarms and providing data for analysis, but also have disadvantages like narrow visibility and risks of the attacker using the honeypot to attack other systems. The document discusses different types of honeypots including low and high interaction honeypots, and specific honeypot tools like Honeyd and Honeynets.
LATTICE STRUCTURAL ANALYSIS ON SNIFFING TO DENIAL OF SERVICE ATTACKSIJCNCJournal
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants’ can be stolen through sniffers. This is the primary reason for most of the variations of DDoS attacks in the network from a variety of its catalog of attacks. An effective and trusted framework for detecting and preventing these sniffing has greater significance in today’s computing. A counter hack method to avoid data theft is to encrypt sensitive information. This paper provides an analysis of the most prominent sniffing attacks. Moreover, this is one of the most important strides to guarantee system security. Also, a Lattice structure has been derived to prove that sniffing is the prominent activity for DoS or DDoS attacks.
Honeypot is an exciting new technology with enormous potential for the security community.It is resource which is intended to be attacked and compromised to gain more information about the attacker and his attack techniques.
This document provides definitions and explanations of honeypots and honeynets. It begins by defining a honeypot as a resource that pretends to be a real target in order to gather information about attacks without putting real systems at risk. There are different types of honeypots including research/production honeypots and low/high interaction honeypots. Honeynets are networks of multiple honeypot systems that allow for containment of attackers and capture of all activity. Virtual honeynets deploy entire honeynet architectures virtually on single systems. The document outlines advantages like flexibility and minimal resources, and disadvantages like narrow field of view and risk of fingerprinting.
This document describes the design and implementation of a Linux-based network forensic system using honeynet technology. The system uses a virtual honeynet to collect network attack traces that can be used for further investigation. A virtual honeynet environment is created using Open Source Virtual Box to simulate systems under attack. The collected logs and data provide digital evidence of attacks that can help with network forensics investigations.
This document proposes a new approach to designing and developing a portable high interaction honeypot system. The key aspects are:
1) It implements the honeypot system on a USB device to provide easy installation, high portability, and plug-and-play operation.
2) The complete honeypot system runs as a live USB system, meaning the operating system runs entirely in memory rather than installing to the hard disk. This allows the system to be restored to its original state by rebooting.
3) It aims to reduce the difficulties in configuring and maintaining high interaction honeypots by making the system easy to deploy and restore. The portable design also helps boost security awareness for users.
An Extensive Survey of Intrusion Detection SystemsIRJET Journal
This document summarizes an extensive survey of intrusion detection systems. It discusses the general architecture of IDS, including host-based and network-based systems. It describes different types of attacks (e.g. DoS, probing, user-to-root) and defenses. It analyzes previous work applying data mining techniques like machine learning to improve detection rates and reduce false alarms. A key problem is the massive number of false alarms that overburden security managers; the document aims to investigate solutions to lower the false alarm rate so that real threats are not missed.
Honeypots are decoy systems used to gather threat intelligence. They allow monitoring of attacks to better understand tactics and improve defenses. There are different types, including low-interaction virtual honeypots for ease of use and high-interaction physical honeypots for more detailed data. Honeypots are placed in various network locations and can operate as production systems to detect threats or research systems to collect information. They provide security benefits but also have limitations like narrow views and fingerprinting risks.
Hybrid Intrusion Detection System using Weighted Signature Generation over An...Editor IJMTER
To provide security to network we use existing Intrusion Detection System(IDS) for
identification of known attack with low false alarm,but it is not working when unknown attacks
occurs so to identify unknown attacks we use Anomaly based IDS(ADS) with high false alarm.
HIDS is the combination of IDS and ADS with their advantages for identification of known as well
as unknown attack.IDS used signature based model to identify known attack and ADS used anomaly
based model for identification of unknown attack.HIDS used internet episode rules for identify
known as well as unknown attacks.
This document summarizes various soft computing techniques that can be used for intrusion detection, including fuzzy logic, graph-based approaches, and neural networks. Fuzzy logic can be used to classify parameters and detect anomalies by comparing normal and new fuzzy association rule sets. Graph-based approaches model network traffic as graphs of nodes and edges and use clustering algorithms to detect anomalies. Neural networks can be trained on audit log data to recognize normal behavior and detect deviations that may indicate attacks. These soft computing methods aim to improve on signature-based detection by learning patterns of normal network activity and detecting anomalies.
Day by day the internet is becoming an essential part of everyone’s life. In India from 2015 – 2020, there is an increase in internet users by 400 million users. As technology and innovation are increasing rapidly. Security is a key point to keep things in order. Security and privacy are the biggest concern in the world let it is in any field or domain. There is no big difference in cyber security the security is the biggest concern worrying about attacks which could happen anytime. So, in this paper, we are going to talk about honeypot comprehensively. The aim is to track hacker to analyze and understand hacker attacker behavior to create a secure system which is sustainable and efficient. Anoop V Kanavi | Feon Jaison "Honeypot Methods and Applications" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38045.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38045/honeypot-methods-and-applications/anoop-v-kanavi
The document proposes Double Guard, an intrusion detection system that manages both the front-end and back-end of multi-tier web applications. It builds normality models from both the front-end HTTP traffic and back-end SQL queries. By composing a web IDS and database IDS and maintaining isolated user sessions, Double Guard can detect a wide range of attacks with high accuracy and few false positives.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The Honeynet Project is a non-profit organization that aims to improve internet security by learning about computer attacks. It deploys honeypots - computers designed to be hacked - to capture data on threats. The organization shares its research findings openly. It also operates a Honeynet Research Alliance of groups around the world collaborating on honeypot technologies and research.
This document discusses intrusion detection and the technology of Snort. It defines intrusion detection as discovering unauthorized network or computer activities. Intrusion detection aims to detect violations of confidentiality, integrity, and availability. Snort is introduced as an open-source network intrusion detection system that analyzes network traffic and compares it to configurable rules to detect suspicious patterns. Snort runs on both UNIX and Windows platforms and has a small system footprint, making it a lightweight intrusion detection option.
This document discusses honeypots, which are decoy computer systems used to detect attacks. Honeypots have several advantages, including collecting small but high-value data, requiring minimal resources, and working in encrypted or IPv6 environments. Two specific honeypot tools discussed are Honeyd, an open source low-interaction honeypot that can emulate many operating systems and services, and honeynets, which are entire networks of high-interaction honeypots used to capture extensive attacker activity. The document compares several honeypot products and outlines first and second generation honeynet architectures.
This document provides biographical information about Jeff Bezos, the founder and CEO of Amazon.com. It discusses that he was born in New Mexico and grew up working on his family's ranch. After graduating from Princeton, he worked on Wall Street before founding Amazon in 1994. It details that Amazon began as an online bookstore and is now a massive ecommerce company. The summary also notes that Bezos owns aerospace company Blue Origin and purchased The Washington Post in 2013. As of 2016, Bezos has an estimated net worth of $66.7 billion, making him one of the richest people in the world.
Design of Low Voltage Low Power CMOS OP-AMPIJERA Editor
Operational amplifiers are an integral part of many analog and mixed signal systems. As the demand for mixed
mode integrated circuits increases, the design of analog circuits such as operational amplifiers in CMOS
technology becomes more critical. This paper presents a two stage CMOS operational amplifier, which operates
at ±1.8V power supply using TSMC 0.18um CMOS technology. The OP-AMP designed exhibit unity gain
frequency of 12.6 MHz, and gain of 55.5db with 300uw power dissipation. The gain margin and phase margin
of OP-AMP is 45˚ and 60˚ respectively. Design and simulation has been carried out in P Spice tool.
The report made 17 recommendations to strengthen Australia's corporate governance framework around executive pay. The first 15 recommendations aim to improve board accountability, effectiveness and independence in setting executive pay through measures like requiring remuneration committees to have independent chairs and members, prohibiting executives from sitting on remuneration committees, and giving shareholders a non-binding vote on pay practices. The report concluded that Australia's system is sound but could be improved with greater transparency and accountability.
The new changes to the Corporations Act give shareholders more power over executive pay. Shareholders can now vote to remove the entire board if the executive pay report receives "no" votes of over 25% for two years in a row. The changes also tighten rules for hiring remuneration consultants and prohibit executives from hedging equity pay or voting on their own compensation. Companies will face the first shareholder votes under these new rules at upcoming annual meetings.
Restoration of a salt marsh in Boston impacted macroinvertebrate communities. Diversity and evenness indices showed differences between the restored, impacted, and dredge spoils treatments. While the restored site had lower diversity, the community composition matched natural salt marshes, indicating successful restoration. Analysis of carbon and nitrogen content found the restored site separated trophically from the other treatments. The restored site developed a specialized feeding system with potential marine inputs, showing restoration created distinct macroinvertebrate communities.
Your WordPress blog needs to have buttons so that people may easily connect with you on social media sites such as Facebook, Twitter, and YouTube. This short video shows you how to add Social Media Widget by Acurax to your WordPress blog.
Nitin Sharma is currently pursuing an MBA from Sikkim Manipal University. He has over 5 years of experience as a Warehouse Manager at Lexus Business combines Pvt Ltd. His responsibilities include receiving orders, unloading and storing products, maintaining accurate inventory records, and ensuring quality control. He is proficient in inventory management systems and possesses strong accounting, prioritization, and data entry skills.
Noorhashimah binte Mohd Noh has successfully attained industry approved competencies in providing gems service. She received a Statement of Attainment from the Singapore Workforce Development Agency and Capelle Academy Pte Ltd, which was accredited under the Singapore Workforce Skills Qualifications system. The training and assessment of her competencies were completed on January 13, 2022.
Increment of carbohydrate concentration of Chlorella minutissima microalgae f...IJERA Editor
Microalgae, like any other microorganism react to changes in the external environment with changes in their
intracellular environment. Thus, the manipulation of cultivation conditions, especially the presence or absence
of certain nutrients, stimulates the biosynthesis of compounds of interest. Their carbohydrates can be used to
produce bioethanol. The objective of this study was to evaluate the effect of the medium and the concentrations
of nitrogen and phosphate components used in the culture medium of the microalgae Chlorella minutissima in
the carbohydrate concentration of the same. Box-Behnken Planning was used, totaling 15 trials. The cultivations
were carried out until early stationary phase of growth of the microalgae in closed 2 L reactors. At the end of the
cultivation, the carbohydrate concentrations of dry biomass (%) and yield in carbohydrates (g.L-1
.d-1
) were
determined. According to the analysis of effects, the microalgae Chlorella minutissima cultivated in Basal
medium, with the addition of 0.125 gL-1
of the nitrogenized component (KNO3) and without addition of
phosphatized components (K2HPO4 and KH2PO4) had a higher yield in carbohydrates in the cultivation (0,030 ±
0.002 g.L-1
.d-1
).
The document discusses native and invasive plants on a school campus. It explains that invasive plants were often brought in from other places and spread more quickly than native plants by competing for resources. Some invasive croton plants had been planted on the campus because they spread rapidly. The document suggests removing invasive plants and replacing them with native species to solve the problem. It also questions what will happen to bugs if an invasive strawberry guava tree is removed and whether students can complete their eradication plan.
Certificate of Training - Emergency Procedures - General Evac & First ResponseDannielle Backhouse
In the event of an emergency requiring evacuation or first response, follow these procedures. Designate safety wardens to check areas are clear and assist evacuation. Once safely away from the building, conduct a headcount and report any missing persons or injuries immediately to the emergency services. The priority is responding quickly and calmly to protect life and property.
Tecnologia de la construccion y la arquitecturaCiinthy Peralta
This document discusses construction technology and structural systems and their relationship to architecture. It introduces the topics and provides examples, including discussing Sky City, a proposed mega-tall building project in China. Several sections cover introductions, technologies, structures, relationships to architecture, and an example project with a provided link for more details.
Alinea kedua UUD 1945 menyatakan bahwa perjuangan kemerdekaan Indonesia telah memasuki titik krusial dimana kemerdekaan harus dideklarasikan, namun tujuan akhirnya adalah mewujudkan negara Indonesia yang merdeka, bersatu, adil dan sejahtera. Alinea keempat menjelaskan bahwa tujuan perjuangan kemerdekaan adalah mewujudkan ketertiban dunia yang berdasarkan kemerdekaan, perdamaian abadi, dan kead
This document discusses using data mining techniques to detect spyware. It begins by defining spyware and artificial intelligence. It then discusses three AI approaches that have been applied to spyware detection: heuristic technology, neural network technology, and data mining techniques. It focuses on using breadth-first search (BFS) within a data mining approach. The document finds that data mining techniques achieve an overall accuracy of 90.5% in detecting spyware, performing better than traditional signature-based or heuristic-based methods.
Utilization Data Mining to Detect Spyware IOSR Journals
This document discusses using data mining techniques to detect spyware. It begins by defining spyware and artificial intelligence. It then discusses three AI approaches that have been applied to spyware detection: heuristic technology, neural network technology, and data mining techniques. It focuses on using breadth-first search (BFS) within a data mining approach. The document finds that data mining techniques perform better than traditional signature-based or heuristic-based detection methods, achieving an overall accuracy of 90.5% at detecting spyware using BFS algorithms.
This document discusses securing healthcare networks against cyber attacks. It proposes using intrusion detection systems to continuously monitor networks, firewalls to ensure endpoint devices comply with security policies, and biometrics for identity-based network access control. This would help protect patient privacy by safeguarding electronic health records and enhancing the security of hospital networks. The growing adoption of electronic records and devices in healthcare has increased risks of attacks that could intercept patient data or take over entire hospital networks. Strong network security measures are needed to address these risks.
Abstract: The exponential growth of the internet and new technology lead today's world in a hectic situation both positive as well as the negative module. Cybercriminals gamble in the dark net using numerous techniques. This leads to cybercrime. Cyber threats like Malware attempt to infiltrate the computer or mobile device offline or internet, chat(online), and anyone can be a potential target. Malware is also known as malicious software is often used by cybercriminals to achieve their goal by tracking internet activity, capturing sensitive information, or blocking computer access. Reverse engineering is one of the best ways to prevent and is a powerful tool to keep the fight against cyber attacks. Most people in the cyber world see it as a black hat—It is said as being used to steal data and intellectual property. But when it is in the hands of cybersecurity experts, reverse engineering dons the white hat of the hero. Looking at the program from the outside in –often by a third party that had no hand in writing the code. It allows those who practice it to understand how a given program or system works when no source code is available. Reverse engineering accomplishing several tasks related to cybersecurity: finding system vulnerabilities, researching malware &analyzing the complexity of restoring core software algorithms that can further protect against theft. It is hard to hack certain software.
Keywords: Malware, threat, vulnerablity, detection, reverse engineering, analysis.
Title: Malware analysis and detection using reverse Engineering
Author: B.Rashmitha, J. Alwina Beauty Angelin, E.R. Ramesh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Vol. 10, Issue 2, Month: April 2022 - June 2022
Page: (1-4)
Published Date: 01-April-2022
Research Publish Journals
Available at: www.researchpublish.com
You can Direct download full research paper at given below link:
https://www.researchpublish.com/papers/malware-analysis-and-detection-using-reverse-engineering
Academia Link: https://www.academia.edu/76069664/Malware_analysis_and_detection_using_reverse_Engineering_Available_at_www_researchpublish_com_journal_name_International_Journal_of_Computer_Science_and_Information_Technology_Research
Keyloggers are a invasive software often used to harvest secret information. One of the main reasons for
this fast growth is the possibility for unprivileged programs running in the user space to secretly steal and record all the
keystrokes typed by the users on a system. The ability to run in unprivileged mode makes possible their implementation
and distribution. but, at the same time, allows one to understand and imitate their behavior in detail.
The project entitled with “Network Security System” is related to hacking attacks in computer systems over internet. In today’s world many of the computer systems and servers are not secure because of increasing the hacking attacks or hackers with growing information, so information security specialist’s requirement has gone high.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...IJERA Editor
Malwares which is also known as malicious software’s is spreading through the exploiting the client side applications such as browsers, plug-ins etc. Attackers implant the malware codes in the user’s computer through web pages; thereby they are also known malicious web pages. Here in the paper, we present the usefulness of controlled environment in the form of client honeypots in detection of malicious web pages through collections of malicious intent in web pages and then perform detailed analysis for validation and confirmation of malicious web pages. First phase is collection of malicious infections through high interaction client honeypot, second phase is validations of the malicious infections embedded into web pages through behavior based analysis. Malwares which infect the client side applications and drop the malwares into user’s computers sometimes overrides the signature based detection techniques; thereby there is a need to study the behavior of the complete malicious web pages.
A Review Of Intrusion Detection System In Computer NetworkAudrey Britton
This document provides an overview of intrusion detection systems (IDS) and the techniques used to implement them. It discusses that IDS are used to detect malicious actions on computer networks and protect important files and documents. The document then summarizes that IDS have four main components - sensors to monitor the system, a database to store event information, an analysis module to detect potential threats, and a response module to address detected threats. It also categorizes IDS based on the data source, detection approach, structure, and how intrusions are detected. Finally, the document outlines various techniques used in IDS, including artificial intelligence methods like neural networks, fuzzy logic, genetic algorithms and machine learning approaches.
Designing Security Assessment of Client Server System using Attack Tree Modelingijtsrd
Information security has grown as a prominent issue in our digital life. The network security is becoming more significant as the volume of data being exchanged over net increases day by day. Attack trees AT technique play an important role to investigate the threat analysis problem to known cyber attacks for risk assessment. The technique is especially effective in assessing and managing the risks from hostile, intelligent adversaries. It is useful for analyzing threats against assets ranging from information systems to physical infrastructure. By using attack tree modeling analysis an organization can understand the ways in which they will be attacked, determine the likelihood and impact damage of these attacks and decide what action to take where the risks are unacceptable. This paper describes the attack tree model for organization based on Client Server Network. It provides the ways for defending and preventing sensitive information from attackers. Attack tree modeling provides for effective security solutions, cost effective security solutions and defensible risk mitigation decisions. Sandar Pa Pa Thein | Phyu Phyu | Thin Thin Swe "Designing Security Assessment of Client- Server System using Attack Tree Modeling" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26727.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/26727/designing-security-assessment-of-client--server-system-using-attack-tree-modeling/sandar-pa-pa-thein
This document proposes a machine learning approach using the Naive Bayes algorithm to detect distributed denial of service (DDoS) attacks through network intrusion detection. It first discusses the issues with existing intrusion detection systems, including long training times and low accuracy. It then summarizes research on applying various machine learning techniques like neural networks, decision trees, and Naive Bayes to intrusion detection. The proposed system would build a classifier using Naive Bayes, which provides faster training than other methods, to distinguish normal and attack traffic. This approach aims to improve upon the training time and detection accuracy of existing intrusion detection systems.
Defense mechanism for ddos attack through machine learningeSAT Journals
Abstract
There is a huge advancement in Computer networking in the past decade. But with the advancement, the threats to the computer networks are also increased. Today one of the biggest threats to the computer networks is the Distributed Denial of Service (DDoS) flooding attack. This paper emphasizes the application layer DDoS flooding attacks because these (layer seven) attacks are growing rapidly and becoming more severe problem. Many researchers used machine-learning techniques for intrusion detection, but some shows poor detection and some methods take more training time. From a survey, it is found that Naïve Bayes (NB) algorithm provides faster learning/training speed than other machine learning algorithms. Also it has more accuracy in classification and detection of attack. So we are proposing a network intrusion detection system (IDS) which uses a machine learning approach with the help of NB algorithm.
Keywords: DDoS (Distributed Denial of Service) flooding attack, Machine Learning, Naïve Bayes, Network Intrusion Detection
This document discusses ethical hacking and penetration testing. It begins by defining ethical hacking as using the same tools and techniques as hackers, but legally in order to test an organization's security. It then covers the history of ethical hacking. The rest of the document outlines the methodology of hacking including reconnaissance, scanning, gaining access, maintaining access, and clearing tracks. It discusses the types of hackers and tools used in ethical hacking. The document concludes by discussing the advantages and disadvantages of ethical hacking.
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...IJNSA Journal
End users are increasingly vulnerable to attacks directed at web browsers which make the most of popularity of today’s web services. While organizations deploy several layers of security to protect their systems and data against unauthorised access, surveys reveal that a large fraction of end users do not utilize and/or are not familiar with any security tools. End users’ hesitation and unfamiliarity with security products contribute vastly to the number of online DDoS attacks, malware and Spam distribution. This work on progress paper proposes a design focused on the notion of increased participation of internet service providers in protecting end users. The proposed design takes advantage of three different detection tools to identify the maliciousness of a website content and alerts users through utilising Internet Content Adaptation Protocol (ICAP) by an In-Browser cross-platform messaging system. The system also incorporates the users’ online behaviour analysis to minimize the scanning intervals of malicious websites database by client honeypots. Findings from our proof of concept design and other research indicate that such a design can provide a reliable hybrid detection mechanism while introducing low delay time into user browsing experience.
Intrusion Detection & Prevention Systems (IDPS) are crucial for protecting computers and detecting threats in real time. As threats have grown in the 21st century, IDPS have also evolved, with different types providing various protection functions. Effective IDPS not only detect and prevent attacks, but also log events, create reports on recent attacks, and provide detailed information. Detection methods include signature-based detection by comparing traffic to known attacks, anomaly-based detection by identifying deviations from normal behavior, and policy-based detection by enforcing allowed functions.
Malware Detection Module using Machine Learning Algorithms to Assist in Centr...IJNSA Journal
Malicious software is abundant in a world of innumerable computer users, who are constantly faced withthese threats from various sources like the internet, local networks and portable drives. Malware is potentially low to high risk and can cause systems to function incorrectly, steal data and even crash. Malware may be executable or system library files in the form of viruses, worms, Trojans, all aimed at breaching the security of the system and compromising user privacy. Typically, anti-virus software is based on a signature definition system which keeps updating from the internet and thus keeping track of known viruses. While this may be sufficient for home-users, a security risk from a new virus could threaten an entire enterprise network. This paper proposes a new and more sophisticated antivirus engine that can not only scan files, but also build knowledge and detect files as potential viruses. This is done by extracting system API calls made by various normal and harmful executable, and using machine learning algorithms to classify and hence, rank files on a scale of security risk. While such a system is processor heavy, it is very effective when used centrally to protect an enterprise network which maybe more prone to such threats.
Attackers May Depend On Social Engineering To Gain...Tiffany Sandoval
The document discusses integrating threat intelligence and incident response. It defines threat intelligence as technical and contextual information about emerging threats evaluated for accuracy. Threat intelligence feeds into strategic, operational and tactical security levels. Challenges include connecting diverse data points and filtering noise. A threat intelligence platform helps address this by analyzing data and delivering standardized information. The threat kill chain model outlines attack stages from reconnaissance to information theft. Integrating threat intelligence and incident response improves network defenses across each stage.
The overwhelming threat may be a challenge to
general security system. Fundamentally diverse alert and threat
techniques are been researched in order to reduce deceptive
warnings. Threat Detection Systems generates huge amount of
alerts which becomes challenging to deal with them and prepare
solution. The detection System checks inbound and outbound
network activities and finds an suspicious pattern that indicate
an ongoing steps for attack. Large amount of alert may contain
false alarm therefore need of alert analysis mechanisms to offer
high level information of seriousness of threat, how dangerous
device are and which device admin has to pay more attention. To
solve this query we would make use of time and space based alert
analysis technique that provides a solution in form of attack
graph and its evaluation that provides severity of attack to
administrator.
Looking to understand how hackers and other attackers use cyber technology to attack your network and your executives? This slide set provides an overview and details the anatomy of a cyber attack, and the strategies you can use to manage and mitigate risk.
This document describes a proposed artificial neural network based intrusion detection system. It uses a multilayer perceptron neural network architecture trained on the KDD Cup 99 intrusion detection dataset. The system monitors network traffic in real-time, extracts features from network packets, and classifies the traffic into six categories using the neural network. It is able to detect both known and unknown attacks. The system aims to improve upon traditional signature-based intrusion detection systems.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
24
2. BACKGROUND AND RELATED WORKS
Before going deep into the research works on these areas we can see about the background of these attacks.
2.1 Zero Day Attacks
A zero-day (or zero-hour or day zero) attack or threat is an attack that exploits a previously unknown
vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability.
This means that the developers have had zero days to address and patch the vulnerability. Malware writers are able to
exploit zero day vulnerabilities through several different attack vectors. Web browsers are a particular target because of
their widespread distribution and usage. Attackers can also send e-mail attachments, which exploit vulnerabilities in the
application opening the attachment. A special type of vulnerability management process focuses on finding and
eliminating zero-day weaknesses. This unknown vulnerability management lifecycle is a security and quality assurance
process that aims to ensure the security and robustness of both in-house and third party software products by finding and
fixing unknown (zero-day) vulnerabilities. The unknown vulnerability management process consists of four phases:
analyze, test, report and mitigate.
2.2 SSH Attacks
Now a days the malicious users are found of internet servers that can be used for their activities. One of the most
vulnerable target server is available even in the remote center is the Secure Shell (SSH). Several times these servers got
exploited by the Hackers if a very weak password is placed in the authentication mechanism. Whenever the hacker finds
a device with an SSH service, he will apply various available username and password combinations to get an authorized
access. If the hacker got succeeded in getting the connection he gains the remote access to the machine and then he can
use it for his malicious activities.
2.3 Keylogger- Spyware Attack
Spyware is a broad category of software designed to intercept or take partial control of a computer's operation
without the informed consent of that machine's owner or legitimate user. In simpler terms, spyware is a type of program
that watches what users do with their computer and then sends that information over the internet. Spyware can collect
many different types of information about a user: records the types of websites a user visits, records what is typed by the
user to intercept passwords or credit card numbers, used to launch “pop up” advertisements. Many legitimate companies
incorporate forms of spyware into their software for purposes of advertisement (Adware). Example spyware are GAIN /
Gator,E-Wallet, Cydoor, BonziBuddy, MySearch Toolbar, DownloadWare, BrowserAid, Dogpile Toolbar. A key-logger
spyware contains both scripts key-logger and spyware in a single program. The functionality of this program is that it can
capture all key strokes which are pressed by a system user and stores them in a log file. The spyware email this log file to
the designer's specified address. It is very harmful for those systems which are used in daily transaction process i.e.
online banking system.
2.4 Honeypots
In computer terminology, a honeypot is a trap/technology set to detect, deflect, or in some manner counteract
attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that
appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a
resource of value to attackers. Honeypot logs can be collected using remote procedure calls. Two or more honeypots on a
network form a honeynet. Typically, a honeynet is used for monitoring a larger and/or more diverse network in which
one honeypot may not be sufficient. Honeynets and honeypots are usually implemented as parts of larger network
intrusion detection systems. A honeyfarm is a centralized collection of honeypots and analysis tools.
A similar work is presented by Constantin Musca, Emma Mirica, Razvan Deaconescu in their “Detecting and
Analyzing Zero-day Attacks using Honeypots” [1] article. Here the authors suggested methods for separating the
unwanted traffic by using a honeypot system and using them to automatically generate attack signatures for the Snort
intrusion detection/prevention system. Here the honeypot is implemented in the form of a virtual machine and its
responsibility is to monitor and log as much information as it can about the attacks. Then, by the help of a protected
machine, the logs are collected from the remote machine, through an isolated connection, for analysis. However, the
problem is this architecture suffers lot of false positives and such an architecture can be used to detect other similar
attacks effectively, but are not specified over here in this paper.
In “Analysis and Visualization of SSH Attacks Using Honeypots” [2], the authors shown that honeypots remain
very effective tools in gathering information about SSH attacks. Furthermore, they found that attackers were continually
aiming servers in the wild employing ready-touse tools and dictionaries. Finally they presented a visualization tool
helping security researchers during the analysis of networks. This honeypot implementation was successfully tested
against some known exploits but failed with random dictionary attacks. Experimenting more on visualizing malicious
programs using honeypots, an idea that was started by security professional J. Blasco resulted visualization tool for the
3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
25
Nepenthes honeypot [3]. Nepenthes can be seen as a malware honeypot; a software to work with malware researchers in
the procedure of collecting and effectively storing vulnerable binaries of malicious software. The aforementioned
visualization tool [4] uses the AfterGlow and Graphviz software libraries for the purpose of creating several directed
graphs. These depict the relation between IP addresses, virus samples and geographical information.
3. PROPOSED SYSTEM
The proposed system architecture comprise of the detection phase of the zero day attack, SSH attack and the
Keylogger-Spyware attack. The technique behind the detection framework is the honeypot which is being deployed
inside the isolated environment, ie, .VM. For attracting attackers, we have to build a trap. The honeypot (or eventually
honeypots) will have to be implemented in our connectivity along with the other systems. We are also setting different
workstations together in the single network to check the inter-operability. The whole network is monitored and protected
by the Intrusion Detection/Prevention System (SNORT).Here the honeypot is allowed to communicate to the protected
machine through an encrypted channel where our implementation of an attack detection is working.
The general architecture of the proposed system is illustrated in Figure 1. It is a simple and efficient approach of
detecting the mentioned attacks. The major components included are: An integrated honeypot system, a framework that
generates signatures (iAttack detection framework) and a filtering component. Here filtering component is actually an
intrusion detection/ prevention system (such as Snort). Snort's open source network-based intrusion detection system
(NIDS) has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks [5].
Snort performs protocol analysis, content searching, and content matching. These basic services have many purposes
including application-aware triggered quality of service, to de-prioritize bulk traffic when latency-sensitive applications
are in use. The integrated honeypot doesn’t do any processing of the packets. It only captures information and the
detection framework is built on another machine, which is a protected one. This machine collects the information or the
logs stored on the honeypot through a safe channel. This framework is used to analyze the logs and on the basis of
different methods it generates new signatures for the preinstalled filtering component. The filtering component is usually
a software part of the architecture.
The working logic of the architecture is: when a new network first flows through the filtering component, it is
checked by the filtering component on the basis of rules it knows. When the network turns to be malicious the filtering
component will not allow them to pass or else if the network doesn’t match any rule it flows through the network,
including the honeypot system, which logs some
Information about it (the information related to the attacks mentioned here). Based on the logs information it
collects from the honeypot, the framework runs the rule writing procedure and generates new signatures. The integrated
honeypot (iHoney) includes the features to log the detailed information about the unknown zero day attack, SSH attack,
Key-logger-Spyware attack. The Integrated honeypot can be explained as follows;
Fig. 1: System Architecture
4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
26
Fig. 2: Integrated Honeypot
3.1 iHoney against SSH Attack
Deploy an SSH honeypot using a Virtual Private Server (VPS). (Kippo SSH honeypot).It can bind to Secure
Shell’s default TCP port 22 and log each connection attempt with the server. Also store these attempts to a MySQL
database along with useful information. Allows a list of credentials to be defined, which give access to a fake operating
system giving to the intruder the ability to interact with it. The program responds to these commands as a real operating
system based on Debian Linux.
Steps to deploy a Kippo SSH Honeypot
Step 1: Kippo SSH honeypot is a python based application.
Therefore, we need to first install python libraries:
$ sudo apt-get install python-twisted
Step 2: Normally we would run you sshd service listening on default port 22. It makes sense to use this port for our SSH
honeypot and thus if we already run the SSH service we need to change the default port to some other number. I would
suggest not to use alternative port 2222 as its use is already generally known and it could sabotage your disguise. Let's
pick some random 4-digit number like 4632. Open SSH /etc/ssh/sshd_config configuration file and change the Port
directive from:
Port 22 to Port 4632
Step 3: Restart our sshd:
$ sudo service ssh restart
Step 4: Furthermore, Kippo needs to run a non-privileged user so it is a good idea to create some separate user account
and run Kippo under this account. Create a new user kippo:
$ sudo adduser kippo
Step 5: First, login as or change user to kippo and then download the Kippo's source code:
kippo@ubuntu:~$wget
http://kippo.googlecode.com/files/kippo-0.5.tar.gz
Step 6: extract it with:
kippo@ubuntu:~$ tar xzf kippo-0.5.tar.gz this will create a new directory called kippo-0.5.
Step 7: Navigate into Kippo's directory you will see: kippo@ubuntu:~/kippo-0.5$ ls data dl doc fs.pickle honeyfs
kippo kippo.cfg kippo.tac log start.sh txtcmds utils
5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
27
Most notable directories and files here are:
• dl - this is a default directory when kippo will store all malware and exploits downloaded by hacker using the
wget command
• honeyfs - this directory includes some files, which will be presented to attacker
• kippo.cfg - kippo's configuration file
• log - default directory to log attackers interaction with the shell
• start.sh - this is a shell script to start kippo
• utils - contains various kippo utilities from which most notable is playlog.py, which allows uS to replay the
attacker's shell session
Kippo comes pre-configured with port 2222. This is mainly because kippo needs to run as non-privilege user
and nonprivileged user is not able to open any ports, which are below number 1024. To solve this problem we can use
iptables with "PREROUTING" and "REDIRECT" directives. This is not the best solution as any user can open port
above 1024 thus creating an opportunity to exploit.
Step 8: Starting Kippo SSH Honeypot
If you followed the above instructions up to this point, by now you should have configured you SSH honeypot
with the following settings:
• listening port 4633
• iptables portforward from 22 -> 4633
• hostname: accounting
• multiple root passwords
• fresh up to date honeyfs clone of your existing system
• OS: Linux Mint 14 Julaya Let's start Kippo SSH honeypot now.
$ pwd /home/kippo/kippo-0.5 kippo@ubuntu:~/kippo-0.5$ ./start.sh
Starting kippo in background...Generating RSA keypair... done. kippo@ubuntu:~/kippo-0.5$ cat kippo.pid 2087
Kippo comes with multiple other options and settings. One of them is to use utils/playlog.py utility to replay
attacker's shell interactions stored in log/tty/ directory [16]. In addition, Kippo allows for log files to be stored by the
MySQL database.
3.2 iHoney against Keylogger-Spyware Attack
Fig. 3: Honeypot Base Monitoring
6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
28
This architecture is designed in such a way that it can be easily compromised and hackers will not be able to
detect it. When a target software enters into user's computer it will also have a door into the honeypot system. This
system monitors the activity of this keylogger-Spyware. It also create a log file and sends this file to detection and
prevention server. At detection prevention server this file is inspected for threats. Figure 3 shows target software
monitoring process performed by honeypot system. The arrows show the entry of key logger spyware into the user's
computer and honeypot system. The detection and prevention system inspects that log file sent by honeypot to find out
malicious program. The functioning of this key logger spyware is that, it emails the information to a specified email
address periodically [17].
3.3. iHoney against Unknown Zero day Attack
Here two types of honeypot can be used according to the level of interaction the attacker has with it. And they
are low interaction honeypots and high-interaction honeypots [1]. The first one can be a network listener code that logs
any connection without doing an actual task and the other one is the high interaction honeypot can be a server that runs
real services.
3.3.1 Low interaction Honeypot
Listing 1: Honeyd.conf
Using the configuration file we can customize the honeypot as per our need. Here the specific honeypot is developed
for the windows XP system and the behavior of the honeypot is defined inside the configuration file. We can specify the
7. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
29
MAC address for the target device and also can mention the connection type (DHCP/not). We choose honeyd for the
purpose of honeypot because it is simple and efficient to implement. The results of the traffic monitoring will be
available in the /var/log/syslog file. The log file includes the details about the IP, TCP, ICMP, ARP protocol details. This
will check for the ping sweep, flooding attack, ARP spoofing, MAC spoofing, Denial of Service attack, SYN flood
attack, etc.
3.3.2 High Interaction Honeypot
To implement the data collection on a honeypot built as a virtual machine, Metasploitable is using. [1] No
logging capabilities for this solution. To avoid this problem, collect important logs & transfer them to protected machine
for processing. Running log_fetcher.sh, log_achiever.sh remotely. log_achiever.sh: Identifies important logs: System
Logs, Daemon Logs, Open port Stats, kernel logs, processes stats, installed packages. Shreds the logging file as we do
not want to analyze the same info for more than once. SSH protocol is using to retrieve log details. To avoid repeated
request for password the protocol Generates public key (sshkeygen) Copies to Metasploitable machine using ssh-copyid.
The Protected Machine analyzes the state of Honeypot. It verifies with the previous values stored. Mainly looks
for: New root processes: Tells us that an attacker tried to obtain admin privileges / attempt open back door in our s/m.
Installed package/listening ports: To check whether a new TCP connection is established or not. Process analysis:
collects metadata about PID, PPID, and CPU Utilization. Uses it to gain knowledge about attackers’ target. All logs from
the daemons installed on Honeypots: Gains information if attacker tried for SMTP server. Kernel module insertion:
Inserted kernel module acts as rootkit. The detailed working of the integrated honeypot is illustrated in the listing 2. By
the help of this algorithm the signature generation and attack detection can be done very easily. The process of iHoney
can be simply and efficiently represented by this algorithm and it shows the entire process history. The integrated
algorithm is also flexible in understanding.
Listing 2: Integrated iHoney Algorithm
4. CONCLUSION
Honeypot can be used as a system that lures the attackers into the network and it can be considered as an
effective tool for the identification of most of the network based threats. In proposed framework we have designed a
keylogger spyware, zero day, SSH attacking scenario how it enters into the system and then we showed the scenario of
honeypot base monitoring. This framework especially designed for these kinds of attacks. The logs that are being
generated by the honeypot system is analyzed by the protected machine and this machine is responsible for the
generation of updated signatures for the IDS that we are using in this architecture. So the effective monitoring of the
network can be done by this also it avoids the repeated checking of the same natured packets through the updating of
IDS. As a future work I suggest an automated system that can be placed instead of this iHoney which can identify all the
malfunctions happening inside the network.
8. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
30
REFERENCES
[1] Constantin Musca, Emma Mirica, Razvan Deaconescu, "Detecting and Analyzing Zero-day Attacks
using Honeypots”, 2013 19th International Conference on Control Systems and Computer Science,
ISBN: 978-0-7695-4980-4/13,DOI 10.1109/CSCS.2013.94.
[2] Ioannis Koniaris, Georgios Papadimitriou and Petros Nicopolitidis "Analysis and Visualization of SSH Attacks
Using Honeypots", EuroCon 2013 • 1-4 July 2013 • Zagreb, Croatia, ISBN: 978-1-4673-2232-4.
[3] P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, “The Nepenthes Platform: An Efficient Approach
to Collect Malware.”2006.
[4] J. Blasco, “An approach to malware collection log visualization.” 2008. “carniwwwhore.” [Online]. Available:
http://carnivore.it/2010/11/27/carniwwwhore.
[5] "Snort (software)", http://www.snort.org.
[6] “Honeyd development,” http://www.honeyd.org/, [Online; accessed 12- 10-2012].
[7] “Metasploitable2 - linux vulnerable machine,” https://community.rapid7. com/docs/DOC-1875, [Online;
accessed 11-01-2012].
[8] “Metasploitable2 - download link,” http://sourceforge.net/projects/metasploitable/files/Metasploitable2/,
[Online; accessed 11-01-2012].
[9] N. Provos and T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, 1st ed., 2007.
[10] C. Varlan, R. Rughinis, and O. Purdila, “A practical analysis of virtual honeypot mechanisms,” The 9th
RoEduNet Conference, Sibiu, Romania, 2010.
[11] “Honeyd tutorial,” http://travisaltman.com/honeypot-honeyd-tutorialpart-1-getting-started/, [Online; accessed
12-10-2012].
[12] “Metasploitable2 - linux vulnerable machine,” https://community.rapid7.com/docs/DOC-1875, [Online;
accessed 11-01-2012].
[13] L. Spitzner, “Honeypots: Catching the Insider Threat,” in Proceedings of the 19th Annual Computer Security
Applications Conference, 2003.
[14] L. Spitzner, Honeypots: Tracking Hackers. Boston, MA: Addison Wesley, 2003.
[15] L. Spitzner, “Strategies and issues: Honeypots - sticking it to hackers,” Network Magazine, 2003.
[16] “Deployment of Kippo SSH Honeypot on Ubuntu Linux” http://www.linuxcareer.com.
[17] Mohammad Wazid, Avita Katal, R.H. Goudar, D.P. Singh,Asit Tyagi , Robin Sharma Priyanka Bhakuni “A
Framework for Detection and Prevention of Novel Keylogger Spyware Attacks”, Proceedings of 7th
International Conference on Intelligent Systems and Control, ISBN: 978-1-4673-4603-0/12, 2012.
[18] Prof. S.B. Javheri and Shwetambari Ramesh Patil, “Attacks Classification In Network”, International Journal of
Information Technology and Management Information Systems (IJITMIS), Volume 4, Issue 3, 2013, pp. 1 - 11,
ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.