Spelling suggestions: "subject:"[een] DENIAL"" "subject:"[enn] DENIAL""
231 |
Trust-based application grouping for cloud datacenters : improving security in shared infrastructures / Agrupamento de aplicações baseado em relações de confiança para datacenters de nuvens : aumentando a segurança em infraestruturas compartilhadasMarcon, Daniel Stefani January 2013 (has links)
A computação em nuvem é um paradigma que tem atraído uma grande quantidade de clientes por meio do oferecimento de recursos computacionais através de um modelo de pagamento pelo uso. Entretanto, o compartilhamento da rede interna da nuvem por todos os locatários possibilita que usuários utilizem de forma egoísta ou maliciosa os recursos da rede, ocasionando ataques contra a privacidade e a integridade dos dados e a disponibilidade dos recursos. Os algoritmos de alocação atuais não impedem que a disponibilidade dos recursos de rede seja afetada por ataques ou resultam em subutilização de recursos. Nessa dissertação, é proposta uma estratégia para a alocação de recursos que aumenta a segurança no compartilhamento da rede da nuvem entre as aplicações de locatários. Esse objetivo é alcançado por meio do agrupamento de aplicações provenientes de usuários mutuamente confiáveis em domínios logicamente isolados, compostos por um conjunto de máquinas virtuais interconectadas por uma rede virtual (infraestruturas virtuais – VIs), além de considerar-se a quantidade de tráfego gerada pela comunicação entre VMs da mesma aplicação. Devido à complexidade do problema de alocação de recursos em nuvens computacionais, a estratégia é decomposta em duas etapas. Na primeira, dado um conjunto pre-estabelecido de VIs, alocam-se as mesmas no substrato físico, enquanto a segunda distribui e mapeia as aplicações no conjunto de infraestruturas virtuais. O uso de VIs provê um maior nível de isolamento entre locatários e, consequentemente, maior segurança. Contudo, o agrupamento pode resultar em fragmentação e afetar negativamente o grau de utilização dos recursos. Dessa forma, estuda-se esse compromisso e a factibilidade da abordagem proposta. Os resultados mostram os benefícios da estratégia de alocação proposta, que oferece maior proteção aos recursos de rede com baixo custo extra. Em particular, a segurança aumenta logaritmicamente de acordo com o número de VIs, enquanto a fragmentação de recursos cresce linearmente de acordo com o aumento do número de VIs oferecidas pelo provedor. / Cloud computing can offer virtually unlimited resources without any upfront capital investment through a pay-per-use pricing model. However, the shared nature of multi-tenant cloud datacenter networks enables unfair or malicious use of the intra-cloud network by tenants, allowing attacks against the privacy and integrity of data and the availability of resources. Recent research has proposed resource allocation algorithms that cannot protect tenants against attacks in the network or result in underutilization of resources. In this thesis, we introduce a resource allocation strategy that increases the security of network resource sharing among tenant applications. This is achieved by grouping applications from mutually trusting users into logically isolated domains composed of a set of virtual machines as well as the virtual network interconnecting them (virtual infrastructures - VIs), while considering the amount of traffic generated by the communication between VMs from the same application. Due to the hardness of the cloud resource allocation problem, we decompose the strategy in two steps. The first one allocates a given set of VIs onto the physical substrate, while the second distributes and maps applications into the set of virtual infrastructures. The use of VIs provides some level of isolation and higher security. However, groups may lead to fragmentation and negatively affect resource utilization. Therefore, we study the associated trade-off and feasibility of the proposed approach. Evaluation results show the benefits of our strategy, which is able to offer better network resource protection against attacks with low additional cost. In particular, the security can be logarithmically increased according to the number of VIs, while internal resource fragmentation linearly grows as the number of VIs offered by the provider increases.
|
232 |
Perversão e filiação : o desejo do analista em questão / Perversion et filiation : le désir de l'analyste en jeu / Perversion and filiation : the desire of the analyst in questionRosa Júnior, Norton Cezar Dal Follo da January 2013 (has links)
Cette recherche porte sur le thème de la perversion dans ses relations avec la filiation et le désir de l’analyste. Son importance se justifie du regard de la clinique et de sa pertinence sociale. Mais, il s’agit aussi d’une question d’ordre éthique, une fois que le domaine des perversions, fréquemment, se trouve imprégné de moralisme, des préjugés et d’idéaux de bonne forme. Les positionnements ne sont pas rares dans le milieu psi que les pervers ne cherchent pas l’analyse, étant donné qu’ils ne souffrent pas, qu’ils ne font que jouir par la souffrance de leurs victimes. Celle-ci n’est pas notre position. Au contraire, à partir du désir de l’analyste et de l’éthique qui fonde sa práxis, nous soutiendrons la thèse qu’il est possible qu’une clinique psychanalytique s’opère avec la perversion. Notre investigation est basée dans l’oeuvre de Sigmund Freud et l’enseignement de Jacques Lacan, suivie d’auteurs contemporains. Face à la complexité de cette thématique, nous avons pris la compagnie de cinq ouvrages: La philosophie dans le boudoir, écrite par le Marquis de Sade (1795), À la recherche du temps perdu, de Marcel Proust (1913), Lavoura arcaica, de Raduan Nassar (1979), Finnegans Wake, de James Joyce (1939), et Le balcon, de Jean Genet (1955). Notre proposition dans l’articulation de la psychanalyse et la littérature cherche à accueillir ce que les textes permettent d’accéder aux différents registres de la perversion dans la structure du sujet. A partir de ces références nous allons soutenir que l’impératif de jouissance du pervers impliquera dans le refus à la filiation. Ceci soulèvera des difficultés dans ses conditions d’aimer, de reconnaître la dette envers l’autre et de tolérer la différence. Cependant, Freud et Lacan, en reconnaissant l’aspect constituant de la perversion, ont inauguré les possibilités d’écoute de cette particulière position subjective par rapport à la castration. Donc, si d’une part Freud a montré la logique fétichiste de reconnaître et de refuser, à la fois, le manque du corps maternel; d’autre part, Lacan a observé le refus pervers à la place destinée au père dans le discours du sujet. Celles-ci seront des questions centrales dans le drame pervers, surtout, quand le père n’achemine pas le désir en tant qu’insigne du manque, et la mère prend l’enfant comme objet de jouissance. A partir de cela, à travers des notes cliniques nous fondamentorons la discussion dans trois aspects: les difficultés en établir un diagnostique de perversion; le maniement d’un transfert qui se maintient dans le défis constant à la place du psychanaliste; et les voies de direction du traitement. Ceci nous fait comprendre que pour que cette pratique se fasse, il est essentiel de reconnaître la souffrance, condition nécessaire pour déclencher le désir de l’analyste de réaliser la lecture d’un scénario marqué par un modèle strict et répétitif de récompense sexuelle. Dans ce sens, il sera à partir des effets réunis dans son analyse que le psychanalyste pourra affronter l’angoisse, le mépris, et la fascination implicite dans le transfert pervers. Donc, en “faisant face à la situation”, il ira établir les différences de places, en rendant possible au sujet, le droit à la parole, en viabilisant ainsi, la chute des images et mises en scène qui saisissent ses modalités de jouissance. / Essa pesquisa aborda o tema da perversão em suas relações com a filiação e o desejo do analista. Sua relevância se justifica do ponto de vista da clínica e de sua pertinência social. Mas, além disso, trata-se de uma questão de ordem ética, pois o campo das perversões, frequentemente, se encontra impregnado de moralismos, preconceitos e ideais de boa forma. Não são raros os posicionamentos no meio psi de que perversos não buscam análise, pois não sofrem, apenas gozam em função dos sofrimentos infligidos às suas vítimas. Esta, não é a nossa posição. Pelo contrário, a partir do desejo do analista e da ética que fundamenta sua práxis, sustentaremos a tese de que é possível uma clínica psicanalítica se operar com a perversão. Essa investigação é embasada na obra de Sigmund Freud e no ensino de Jacques Lacan, seguida de autores contemporâneos. Diante da complexidade da temática em questão, tomamos em companhia cinco obras: A filosofia na alcova, escrita pelo Marquês de Sade (1795), Em busca do tempo perdido, de Marcel Proust (1913), Lavoura arcaica, de autoria de Raduan Nassar (1979), Finnegans Wake, de James Joyce (1939), e O balcão, de Jean Genet (1955). Nossa proposta na articulação entre psicanálise e literatura visa a acolher aquilo que esses textos permitem aceder a diferentes registros da perversão na estrutura do sujeito. A partir dessas referências vamos sustentar que o imperativo de gozo do perverso implicará a recusa à filiação. Isto situará impasses em suas condições de amar, de reconhecer dívida com o outro e de suportar a diferença. Entretanto, Freud e Lacan, ao reconhecerem o aspecto constituinte da perversão, inauguraram as possibilidades de escuta dessa singular posição subjetiva em relação à castração. Então, se de um lado Freud apontou a lógica fetichista de reconhecer e recusar, simultaneamente, a falta no corpo materno; de outro, Lacan observou a recusa perversa ao lugar atribuído ao pai no discurso do sujeito. Estas serão questões centrais no drama perverso, sobretudo, quando o pai não vetoriza o desejo enquanto insígnia da falta, e a mãe toma o filho enquanto objeto de gozo. Diante disso, através de recortes clínicos, fundamentaremos a discussão em três aspectos: as dificuldades de se estabelecer um diagnóstico de perversão, o manejo de uma transferência que se mantém no constante desafio ao lugar do psicanalista e as vias de direção do tratamento. Isto nos fez compreender que para essa prática se dar, faz-se imprescindível reconhecer o sofrimento, condição necessária para acionar o desejo do analista de realizar a leitura de um enredo marcado por um padrão fixo, rígido e repetitivo de gratificação sexual. Nesse sentido, será a partir dos efeitos colhidos em sua análise que o psicanalista poderá lidar com a angústia, o repúdio, e o fascínio implícito na transferência perversa. Portanto, ao “fazer face à situação”, ele irá situar diferenças de lugares, possibilitando ao sujeito, o direito à palavra, viabilizando assim, a queda das imagens e atuações que capturam suas modalidades de gozo. / This research addresses the issue of perversion and its associations with filiation and the desire of the analyst. It is a relevant study from the perspective of clinical practice and also in the realm of society. In addition, such issue is an ethical one, because the field of perversions is often infused with moral judgement, prejudice and ideals of good morals. Not infrequently, an assumption among psychoanalysts is that perverse people do not seek pshycoanalysis because they do not suffer, but rather, only take pleasure in the pain they inflict upon their victims. This is not our point of view. On the contrary, based on the desire of the analyst and the ethical principles underpinning his praxis, we will discuss the premise that psychoanalytic clinical practice can actually be applied to perversion. Our research is grounded in the work of Sigmund Freud and the teachings of Jacques Lacan, followed by contemporary authors. Given the complexity of the subject in question, we draw on five particular works and their respective authors: Philosophy in the Bedroom, written by the Marquis de Sade (1795); In Search of Lost Time, by Marcel Proust (1913); Ancient Tillage, written by Raduan Nassar (1979) Finnegans Wake, by James Joyce (1939); and The Balcony, by Jean Genet (1955). By combining psychoanalysis and literature, we seek to embrace the contributions that such works can give towards clarifying the notion of perversion within the structure of the subject. Based on these references, we argue that denial of filiation is a prerequisite for the enjoyment of perversion. This will hinder the perverse patient’s ability to love, to recognize his debt to others and to tolerate differences. However, when Freud and Lacan recognized the constituent of perversion, they enabled this unique subjective perspective on castration to be attended to. So while Freud pointed out the fetishistic logic of recognizing and denying, at once, the lack of a penis in the mother’s body, Lacan observed the perverse denial of the place given to the father in the discourse of the subject. These are central issues in the perverse drama, especially when the father does not express desire as a sign of such lack, and the mother takes the child as an object of enjoyment. Thus, by means clinical observations, our discussion will focus on three aspects: the difficult task of giving a diagnosis of perversion, coping with transference that remains a constant challenge to the position of the psychoanalyst, and options for the direction of treatment. This enabled our understanding that, for this practice to take place, it is imperative to recognize pain, a necessary condition to trigger the desire of the analyst to interpret a scenario marked by a fixed, rigid and repetitive pattern of sexual gratification. In this sense, the analyst will use the results obtained from that analysis to deal with pain, rejection, and the implicit fascination with perverse transference. Therefore, when "dealing with the situation," the analyst will identify differences in locations, giving the subject the right to speech, thus enabling the eradication of images and acts that illustrate the patient’s modes of enjoyment.
|
233 |
Um esquema de segurança para quadros de controle em redes IEEE 802.11FRANÇA NETO, Ivan Luiz de 14 August 2015 (has links)
Submitted by Haroudo Xavier Filho (haroudo.xavierfo@ufpe.br) on 2016-03-11T14:34:26Z
No. of bitstreams: 2
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
DissertacaoIvanFranca.pdf: 1367108 bytes, checksum: 8ceed302b395b606d9ac49b5a05987db (MD5) / Made available in DSpace on 2016-03-11T14:34:26Z (GMT). No. of bitstreams: 2
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
DissertacaoIvanFranca.pdf: 1367108 bytes, checksum: 8ceed302b395b606d9ac49b5a05987db (MD5)
Previous issue date: 2015-08-14 / Os quadros de controle IEEE 802.11 desempenham funções importantes na rede sem fio. Dentre elas estão o controle de acesso ao meio de comunicação, a recuperação de quadros armazenados no Ponto de Acesso e a confirmação do recebimento de blocos de quadros ou de certos tipos de quadros. Apesar da importância dos quadros de controle, eles são vulneráveis a ataques de forjação, manipulação e reinjeção devido a inexistência de mecanismos de proteção. Este trabalho propõe um esquema de segurança para quadros de controle em redes IEEE 802.11 a fim de evitar esses ataques. A proposta se diferencia dos trabalhos relacionados por prover um alto grau de segurança em todos os seus módulos com baixo impacto na vazão da rede. Além disso, a proposta não incorre nas fraquezas que eles possuem na contenção dos ataques de reinjeção e no processo de geração e distribuição de chaves. / IEEE 802.11 control frames play important role in the wireless network. Among them are the medium access control, the retrieving of buffered frames in the Access Point, and the acknowledgment of block of frames or certain types of frames. Despite their importance, control frames remain vulnerable to forging, tampering, and replay attacks due to lack of protection mechanisms. This work proposes a security scheme for IEEE 802.11 control frames to prevent such attacks. Our proposal differs from related work by providing a high level of security in all modules along with low impact on network throughput. Furthermore, the proposal avoid the weaknesses that they have in the restraint the replay attacks and in the key generation and distribution process.
|
234 |
Vers une détection à la source des activités malveillantes dans les clouds publics : application aux attaques de déni de service / Toward a source based detection of malicious activities in public clouds : application to denial of service attacksHammi, Badis 29 September 2015 (has links)
Le cloud computing, solution souple et peu couteuse, est aujourd'hui largement adopté pour la production à grande échelle de services IT. Toutefois, des utilisateurs malveillants tirent parti de ces caractéristiques pour bénéficier d'une plate-forme d'attaque prête à l'emploi dotée d'une puissance colossale. Parmi les plus grands bénéficiaires de cette conversion en vecteur d’attaque, les botclouds sont utilisés pour perpétrer des attaques de déni de service distribuées (DDoS) envers tout tiers connecté à Internet.Si les attaques de ce type, perpétrées par des botnets ont été largement étudiées par le passé, leur mode opératoire et leur contexte de mise en œuvre sont ici différents et nécessitent de nouvelles solutions. Pour ce faire, nous proposons dans le travail de thèse exposé dans ce manuscrit, une approche distribuée pour la détection à la source d'attaques DDoS perpétrées par des machines virtuelles hébergées dans un cloud public. Nous présentons tout d'abord une étude expérimentale qui a consisté à mettre en œuvre deux botclouds dans un environnement de déploiement quasi-réel hébergeant une charge légitime. L’analyse des données collectées permet de déduire des invariants comportementaux qui forment le socle d'un système de détection à base de signature, fondé sur une analyse en composantes principales. Enfin, pour satisfaire au support du facteur d'échelle, nous proposons une solution de distribution de notre détecteur sur la base d'un réseau de recouvrement pair à pair structuré qui forme une architecture hiérarchique d'agrégation décentralisée / Currently, cloud computing is a flexible and cost-effective solution widely adopted for the large-scale production of IT services. However, beyond a main legitimate usage, malicious users take advantage of these features in order to get a ready-to-use attack platform, offering a massive power. Among the greatest beneficiaries of this cloud conversion into an attack support, botclouds are used to perpetrate Distributed Denial of Service (DDoS) attacks toward any third party connected to the Internet.Although such attacks, when perpetrated by botnets, have been extensively studied in the past, their operations and their implementation context are different herein and thus require new solutions. In order to achieve such a goal, we propose in the thesis work presented in this manuscript, a distributed approach for a source-based detection of DDoS attacks perpetrated by virtual machines hosted in a public cloud. Firstly, we present an experimental study that consists in the implementation of two botclouds in a real deployment environment hosting a legitimate workload. The analysis of the collected data allows the deduction of behavioural invariants that form the basis of a signature based detection system. Then, we present in the following a detection system based on the identification of principal components of the deployed botclouds. Finally, in order to deal with the scalability issues, we propose a distributed solution of our detection system, which relies on a mesh peer-to- peer architecture resulting from the overlap of several overlay trees
|
235 |
Service Availability in Cloud Computing : Threats and Best PracticesAdegoke, Adekunle, Osimosu, Emmanuel January 2013 (has links)
Cloud computing provides access to on-demand computing resources and storage space, whereby applications and data are hosted with data centers managed by third parties, on a pay-per-use price model. This allows organizations to focus on core business goals instead of managing in-house IT infrastructure. However, as more business critical applications and data are moved to the cloud, service availability is becoming a growing concern. A number of recent cloud service disruptions have questioned the reliability of cloud environments to host business critical applications and data. The impact of these disruptions varies, but, in most cases, there are financial losses and damaged reputation among consumers. This thesis aims to investigate the threats to service availability in cloud computing and to provide some best practices to mitigate some of these threats. As a result, we identified eight categories of threats. They include, in no particular order: power outage, hardware failure, cyber-attack, configuration error, software bug, human error, administrative or legal dispute and network dependency. A number of systematic mitigation techniques to ensure constant availability of service by cloud providers were identified. In addition, practices that can be applied by cloud customers and users of cloud services, to improve service availability were presented.
|
236 |
An exploration of the perceptions of non-admitting sex offenders of their family environmentDavids, Olivia Davene January 2014 (has links)
Magister Artium - MA / This study aims to explore the family environment of non-admitting sex offenders in order to gain insight into the family characteristics that could be contributing factors towards the behaviour of denial. However, the focus will not be on the families of the sex offenders, but rather on the non-admitting sex offenders’ views of their family environment. The theoretical framework used is the Social Learning Theory, because it supports the fact that most behaviour is learned through modelling the behaviour of others. The researcher used a qualitative approach and the aim of the study was to generate information that would describe the family environment of non-admitting sex offenders. The population of this study was incarcerated, sentenced sex offenders with specific focus on the non-admitting sex offender as the unit of analysis. Ten (10) participants were purposively
selected for the study and semi-structured interviews were conducted with each one in order to generate the needed information for the study
|
237 |
Rediscovering pastoral identity : the influence of church role expectations in undermining a pastor’s personal ministry identityBaston, Grant Alexander 17 June 2005 (has links)
This thesis explores the relationship between a pastor’s personal ministry identity and the church role expectations that he encounters in the local church within which he ministers and takes place in the context of the discipline of “Building up the local church”. It is the hypothesis of this thesis that many Baptist pastors within the Baptist Union of Southern Africa are compromising the integrity of their own personal ministry identities in an attempt to meet the church role expectations of their local churches. The study considers firstly the nature development of personal identity in general as a precursor to understanding the nature of development of a personal ministry identity. At least six key elements are identified as being important in the development of an authentic personal ministry identity namely, spiritual gifting, personality, natural talentsabilities, divine call, congregational influence and finally passion. Pastoral ministry can be understood as an interface of expectations between the church role expectations of the church and the pastor’s expectations derived from his personal ministry identity. The consequences of this interface of expectations may be both positive and negative and may include role confusion, conflict, collusion or congruence. Role negotiation and renegotiation may be used to address some of the negative consequences of this interface. Empirical research results obtained as part of the study that explored the relationship between a pastor’s personal ministry identity, church role expectations and the current approach to ministry, clearly indicate that church role expectations are far more influential on current pastoral practice than are the personal ministry identities, indicating that the identities of these pastors have been undermined by church role expectations. A correct understanding of the Biblical view of self-denial and self-esteem would result in a greater freedom on the part of pastors to resist the undermining of their personal ministry identities. Copyright 2005, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria. Please cite as follows: Baston, GA 2005, Rediscovering pastoral identity : the influence of church role expectations in undermining a pastor’s personal ministry identity, MA(Theol) dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://upetd.up.ac.za/thesis/available/etd-06172005-101131 / > / Dissertation (MA (Theology))--University of Pretoria, 2006. / Practical Theology / unrestricted
|
238 |
DNS traffic based classifiers for the automatic classification of botnet domainsStalmans, Etienne Raymond January 2014 (has links)
Networks of maliciously compromised computers, known as botnets, consisting of thousands of hosts have emerged as a serious threat to Internet security in recent years. These compromised systems, under the control of an operator are used to steal data, distribute malware and spam, launch phishing attacks and in Distributed Denial-of-Service (DDoS) attacks. The operators of these botnets use Command and Control (C2) servers to communicate with the members of the botnet and send commands. The communications channels between the C2 nodes and endpoints have employed numerous detection avoidance mechanisms to prevent the shutdown of the C2 servers. Two prevalent detection avoidance techniques used by current botnets are algorithmically generated domain names and DNS Fast-Flux. The use of these mechanisms can however be observed and used to create distinct signatures that in turn can be used to detect DNS domains being used for C2 operation. This report details research conducted into the implementation of three classes of classification techniques that exploit these signatures in order to accurately detect botnet traffic. The techniques described make use of the traffic from DNS query responses created when members of a botnet try to contact the C2 servers. Traffic observation and categorisation is passive from the perspective of the communicating nodes. The first set of classifiers explored employ frequency analysis to detect the algorithmically generated domain names used by botnets. These were found to have a high degree of accuracy with a low false positive rate. The characteristics of Fast-Flux domains are used in the second set of classifiers. It is shown that using these characteristics Fast-Flux domains can be accurately identified and differentiated from legitimate domains (such as Content Distribution Networks exhibit similar behaviour). The final set of classifiers use spatial autocorrelation to detect Fast-Flux domains based on the geographic distribution of the botnet C2 servers to which the detected domains resolve. It is shown that botnet C2 servers can be detected solely based on their geographic location. This technique is shown to clearly distinguish between malicious and legitimate domains. The implemented classifiers are lightweight and use existing network traffic to detect botnets and thus do not require major architectural changes to the network. The performance impact of implementing classification of DNS traffic is examined and it is shown that the performance impact is at an acceptable level.
|
239 |
Chased by the dragon : the experience of relapse in cocaine and heroin usersBain, Katherine Alison 19 October 2004 (has links)
The purpose of this study is to describe the subjective psychological experience of relapse in cocaine/crack and heroin users with the aim of identifying the significant cognitive, emotional and social themes involved in relapse. A better understanding of relapse may aid in providing more effective treatment for substance users. Both the intra- and interpsychic factors involved in relapse that emerge from the study are viewed from within a broad systems theory approach. In this study, not only the whole system is of relevance, but also the subsystems. Various sub systems are also identified to allow for the recognition of patterns, functions and recursive feedback loops that maintain substance-using behaviour. Due to the qualitative nature of the study, the context surrounding substance abuse and the substance users assumes vital importance. The interrelationships between the various intrapsychic structures, the family unit, the social contexts, the drugs themselves and the physiological aspects of substance abuse are identified. A qualitative research design was applied. In-depth semi-structured interviews were used to gather data from the eight participants, who were crack and heroin users who attended the in-patient rehabilitation programme at Phoenix House. Seven of the participants were still in the in-patient rehabilitation programme at the time of the interview, while one participant was in the aftercare programme. All have been through a rehabilitation process before and were at Phoenix House due to a relapse. A thematic analysis was conducted and the process of analysis settled on eight overall themes. Extensive descriptions of these themes are provided. The discussion highlights the role of relapse in the cycle of self-destruction that constitutes substance abuse, in addition to the role relapse plays in the process of recovery. Connection seems to be the key to breaking the cycle of alienation that users experience. Falling into the trap of rejecting users without looking beyond their behaviour allows them to continue functioning in a way that confirms their view of themselves as unlovable, which, in turn, maintains their behaviour. Although systems theory is an independent approach in its own right, the nature of its view allows for the incorporation of other approaches. Where possible and relevant, other theories are incorporated into the discussion of the results, with the aim of gaining an integrated understanding of the findings of the study within the broader field of substance abuse. / Dissertation (MA (Clinical Psychology))--University of Pretoria, 2005. / Psychology / unrestricted
|
240 |
A Targeted Denial of Service Attack on Data Caching NetworksGouge, Jeffrey B 01 January 2015 (has links)
With the rise of data exchange over the Internet, information-centric networks have become a popular research topic in computing. One major research topic on Information Centric Networks (ICN) is the use of data caching to increase network performance. However, research in the security concerns of data caching networks is lacking. One example of a data caching network can be seen using a Mobile Ad Hoc Network (MANET).
Recently, a study has shown that it is possible to infer military activity through cache behavior which is used as a basis for a formulated denial of service attack (DoS) that can be used to attack networks using data caching. Current security issues with data caching networks are discussed, including possible prevention techniques and methods. A targeted data cache DoS attack is developed and tested using an ICN as a simulator. The goal of the attacker would be to fill node caches with unpopular content, thus making the cache useless. The attack would consist of a malicious node that requests unpopular content in intervals of time where the content would have been just purged from the existing cache. The goal of the attack would be to corrupt as many nodes as possible without increasing the chance of detection. The decreased network throughput and increased delay would also lead to higher power consumption on the mobile nodes, thus increasing the effects of the DoS attack.
Various caching polices are evaluated in an ICN simulator program designed to show network performance using three common caching policies and various cache sizes. The ICN simulator is developed using Java and tested on a simulated network. Baseline data are collected and then compared to data collected after the attack. Other possible security concerns with data caching networks are also discussed, including possible smarter attack techniques and methods.
|
Page generated in 0.0387 seconds