Spelling suggestions: "subject:"moving ono"" "subject:"moving onn""
151 |
Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured AddressesDunlop, Matthew William 24 April 2012 (has links)
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An attacker can collect this information to build a profile of where people go, what their interests are, and even what they are saying to each other. For certain government and corporate entities, the exposure of this information could risk national security or loss of capital. This work identifies vulnerabilities in the way the Internet Protocol version 6 (IPv6) forms addresses. These vulnerabilities provide attackers with the ability to track a node's physical location, correlate network traffic with specific users, and even launch attacks against users' systems. A Moving Target IPv6 Defense (MT6D) that rotates through dynamically obscured network addresses while maintaining existing connections was developed to prevent these addressing vulnerabilities.MT6D is resistant to the IPv6 addressing vulnerabilities since addresses are not tied to host identities and continuously change. MT6D leverages the immense address space of IPv6 to provide an environment that is infeasible to search efficiently. Address obscuration in MT6D occurs throughout ongoing sessions to provide continued anonymity, confidentiality, and security to communicating hosts. Rotating addresses mid-session prevents an attacker from determining that the same two hosts are communicating. The dynamic addresses also force an attacker to repeatedly reacquire the target node before he or she can launch a successful attack. A proof of concept was developed that demonstrates the feasibility of MT6D and its ability to seamlessly bind new IPv6 addresses. Also demonstrated is MT6D's ability to rotate addresses mid-session without dropping or renegotiating sessions.This work makes three contributions to the state-of-the-art IPv6 research. First, it fully explores the security vulnerabilities associated with IPv6 address formation and demonstrates them on a production IPv6 network. Second, it provides a method for dynamically rotating network addresses that defeats these vulnerabilities. Finally, a functioning prototype is presented that proves how network addresses can be dynamically rotated without losing established network connections. If IPv6 is to be globally deployed, it must not provide additional attack vectors that expose user information. / Ph. D.
|
152 |
Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target DefenseMorrell, Christopher Frank 03 May 2016 (has links)
The amount of data that is shared on the Internet is growing at an alarming rate. Current estimates state that approximately 2.5 exabytes of data were generated every day in 2012. This rate is only growing as people continue to increase their on-line presence. As the amount of data grows, so too do the number of people who are attempting to gain access to the data. Attackers try many methods to gain access to information, including a number of attacks that occur at the network layer.
A network-based moving target defense is a technique that obfuscates the location of a machine on the Internet by arbitrarily changing its IP address periodically. MT6D is one of these techniques that leverages the size of the IPv6 address space to make it statistically impossible for an attacker to find a specific target machine. MT6D was designed with a number of limitations that include manually generated static configurations and support for only peer to peer networks. This work presents extensions to MT6D that provide dynamically generated configurations, a secure and dynamic means of exchanging configurations, and with these new features, an ability to function as a server supporting a large number of clients.
This work makes three primary contributions to the field of network-based moving target defense systems. First, it provides a means to exchange arbitrary information in a way that provides network anonymity, authentication, and security. Second, it demonstrates a technique that gives MT6D the capability to exchange configuration information by only sharing public keys. Finally, it introduces a session establishment protocol that clients can use to establish concurrent connections with an MT6D server. / Ph. D.
|
153 |
Strengthening MT6D Defenses with Darknet and Honeypot capabilitiesBasam, Dileep Kumar 09 December 2015 (has links)
With the ever increasing adoption of IPv6, there has been a growing concern for security and privacy of IPv6 networks. Mechanisms like the Moving Target IPv6 Defense (MT6D) leverage the immense address space available with the new 128-bit addressing scheme to improve security and privacy of IPv6 networks. MT6D allows participating hosts to hop onto new addresses, that are cryptographically computed, without any disruption to ongoing conversations. However, there is no feedback mechanism in the current MT6D implementation to substantiate the core strength of the scheme i.e., to find an attacker attempting to discover and target any MT6D addresses.
This thesis proposes a method to monitor the intruder activity targeting the relinquished addresses to extract information for reinforcing the defenses of the MT6D scheme. Our solution identifies and acquires IPv6 addresses that are being discarded by MT6D hosts on a local network, in addition to monitoring and visualizing the incoming traffic on these addresses. This is essentially equivalent to forming a darknet out of the discarded MT6D addresses. The solution's architecture also includes an ability to deploy a virtual (LXC-based) honeypot on-demand, based on any interesting traffic pattern observed on a discarded address.
With this solution in place, we can become cognizant of an attacker trailing an MT6D-host along the address changes, as well as understanding the composition of attack traffic hitting the discarded MT6D addresses. With the honeypot deployment capabilities, the solution can take the conversation forward with the attacker to collect more information on attacker methods and delay further tracking attempts. The solution architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON) object. This feature allows the MT6D host to identify any suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution's feasibility and scalability. / Master of Science
|
154 |
Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet of ThingsSherburne, Matthew Gilbert 07 May 2015 (has links)
The Internet of Things (IoT) is composed of billions of sensors and actuators that have varying tasks aimed at making industry, healthcare, and home life more efficient. These sensors and actuators are mainly low-powered and resource-constrained embedded devices with little room for implementing IP security in addition to their main function. With the fact that more of these devices are using IPv6 addressing, we seek to adapt a moving-target defense measure called Moving Target IPv6 Defense for use with embedded devices in order to add an additional layer of security. This adaptation, which we call Micro-Moving Target IPv6 Defense, operates within IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) which is used in IEEE 802.15.4 wireless networks in order to establish IPv6 communications. The purpose of this defense is to obfuscate the communications between a sensor and a server in order to thwart a potential attacker from performing eavesdropping, denial-of-service, or man-in-the-middle attacks. We present our work in establishing this security mechanism and analyze the required control overhead on the wireless network. / Master of Science
|
155 |
E-business strategy development: an FMCG sector case study.Webster, Margaret, Fouweather, Ian, Beach, Roger January 2006 (has links)
No / Purpose ¿ This paper sets out to discuss the development of an e-business strategy by a UK soft drinks company. It is based within the Fast Moving Consumer Goods (FMCG) sector (also known as Consumer Packaged Goods), which is characterised by powerful retailers, tier-1 suppliers of industrial end-products and ingredient/raw material producers further upstream. The paper aims to examine the tensions created at tier-1 level relating to the adoption of e-business solutions for B2B activities.
Design/methodology/approach ¿ The paper draws on the literature to describe the technological options for achieving e-commerce, focusing particularly on Electronic Data Interchange (EDI) and internet-mediated e-commerce. It then explores the current uptake of e-commerce, and the drivers and barriers that relate to its adoption. The theoretical issues identified are explored empirically using data gathered from a case study of Princes Soft Drinks. A detailed survey of organisations within its supply base was conducted in order to inform the development of its future e-business strategy.
Findings ¿ The results of the survey indicate a lack of enthusiasm among Princes' supply chain members for the adoption of e-commerce generally and for internet-mediated e-commerce solutions in particular.
Research limitations/implications ¿ The empirical survey is limited to the UK soft drinks sector and allows for the development of descriptive findings. These findings, discussed within the theoretical context of the paper, have potentially wider implications for the FMCG sector as a whole.
Practical implications ¿ The work has significant implications for the development of Princes' e-business strategy, and ¿ by extrapolation ¿ for other companies operating in similar commercial environments.
Originality/value ¿ The paper reports original empirical research in the commercially important FMCG sector. Its value stems in part from the examination of the supply chain tensions created at tier-1¿ between powerful e-committed retailers and e-reluctant industrial suppliers.
|
156 |
Multiagent Moving Target Search In Fully Visible Grid Environments With No Speed DifferenceErogul, Can 01 December 2006 (has links) (PDF)
In this thesis, a new real-time multi-agent moving target pursuit algorithm and a moving target algorithm are developed and implemented. The environment is a grid world, in which a coordinated team of agents cooperatively blocks the possible escape routes of an intelligent target in real-time.
Most of the moving target search algorithms presume that the agents are faster than the targets, so the pursuit is sure to end in favor of the agents. In this work, we relax this assumption and assume that all the moving objects have the same speed. This means that the agents must find a new approach for success in the pursuit, other than just chasing the targets. When the search agents and the moving targets are moving with the same speed, we need more than one search agent which can coordinate with the other agents to capture the target.
Agents are allowed to communicate with each other.
We propose a multi-agent search algorithm for this problem. To our best knowledge, there is no alternative algorithm designed based on these assumptions. The proposed algorithm is compared to the modified versions of its counterparts (A*, MTS and its derivatives) experimentally.
|
157 |
Limite de alerta! Ficção cientifica em atmosfera rarefeita : uma introdução ao estudo da FC no cinema brasileiro e em algumas cinematografias off-Hollywood / Alert limit! Science fiction in rarefied atmosphere : an introduction to the study of SF in the brazilian cinema and some off-Hollywood filmographiesSuppia, Alfredo Luiz Paes de Oliveira, 1975- 29 August 2007 (has links)
Orientador: Jose Mario Ortiz Ramos / Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Artes / Made available in DSpace on 2018-08-10T06:52:25Z (GMT). No. of bitstreams: 1
Suppia_AlfredoLuizPaesdeOliveira_D.pdf: 9340023 bytes, checksum: a06cd67c3581b1864a2be95dce072a73 (MD5)
Previous issue date: 2007 / Resumo: ¿A Ficção Científica no Brasil: Um planeta quase desabitado.¿ Esse é o título de um artigo do crítico e escritor Fausto Cunha1, referente à literatura de ficção científica, mas que poderia ser aplicado também à análise do gênero no cinema brasileiro. Na Europa, nos EUA e no Japão, o cinema de ficção científica encontra terreno fértil. Sua relevância estética e econômica é evidente, desde o período mudo, sendo até hoje freqüente objeto de estudo. No Brasil, entretanto, a situação é um pouco diferente, uma vez que a ficção científica cinematográfica tem sido frequentemente encarada como algo ¿fora de lugar¿. Afinal, podemos falar de ficção científica no cinema brasileiro? Esta tese traz uma resposta afirmativa a essa pergunta, muito embora tenhamos de levar em consideração algumas peculiaridades. Ao contrário dos EUA e Europa, o Brasil não tem grande tradição no estudo da ficção científica. Apesar disso, escritores brasileiros de ficção científica têm obtido reconhecimento internacional, e o cinema brasileiro tem tido experiências na produção de filmes do gênero. Por exemplo, manifestações da ficção científica no cinema brasileiro podem ser detectadas em comédias ou chanchadas dos anos 1940/50, distopias ecológicas dos anos 1970/80 e na produção mais recente, da retomada aos dias atuais. Mas por que o cinema brasileiro de ficção científica não tem tido maior desenvolvimento e visibilidade?
Esta e outras perguntas serão discutidas neste trabalho, com base em bibliografia geral e especializada, análise fílmica e entrevistas com autores, cineastas e pesquisadores. Em suma, o objetivo desta tese é levantar um novo debate mais detido acerca da ficção
científica no cinema brasileiro e demais cinematografias que não a hollywoodiana, apresentando um panorama que busca melhor compreender o passado, presente e futuro de um gênero que insiste em sobreviver numa atmosfera muitas vezes hostil e rarefeita / Abstract: ¿SF in Brazil: A barely inhabited planet¿ is the title of Fausto Cunha¿s essay on Brazilian science fiction literature, and the starting point for this paper, as this approach could be also applied to the study of Brazilian science fiction cinema. In Europe, the United States and Japan, science fiction film has a long history since the early days of cinema, and continues to find fertile ground still today. Its economical and aesthetical relevance is outstanding and widely recognized. However, in Brazil the situation is rather different, and a national science fiction cinema is usually overlooked by film critics and scholars. Then again, can one talk about science fiction in Brazilian cinema? This dissertation brings an affirmative answer to this question, even though considering some particular features. Contrary to the United States and Europe, Brazil does not have a tradition in science fiction studies. Despite this fact, Brazilian science fiction writers have been awarded around the world and Brazilian cinema does have experiences in science fiction
film production ¿ for example, from the 1940/50¿s comedies and chanchadas to 1970/80¿s ecological distopias and fin-de-siècle dark comedies. But why has Brazilian science fiction cinema been prevented from further development? This question, among others, will be
herein discussed, based on general and specific bibliography, film analysis and interviews with writers, scholars and filmmakers. In sum, the aim of this paper is to raise a new and careful discussion on science fiction in the Brazilian cinema and other off-Hollywood
filmographies, outlining a panorama that attempts to better understand the past, present and future of a genre that insists on surviving in a rather hostile and rarefied atmosphere / Doutorado / Doutor em Multimeios
|
158 |
Technická analýza / Technical AnalysisZáděra, David January 2013 (has links)
This thesis deals with trading using technical analysis. Mostly attention is paid shares traded on the Prague Stock Exchange. The practical part describes computer program, which gives recommendations for the purchase and sale of shares based on moving averages and methods of moving average convergence / divergence and relative strength index. The conclusion is stated financial comparison of the methods.
|
159 |
HE-MT6D: A Network Security Processor with Hardware Engine for Moving Target IPv6 Defense (MT6D) over 1 Gbps IEEE 802.3 EthernetSagisi, Joseph Lozano 28 July 2017 (has links)
Traditional static network addressing allows attackers the incredible advantage of taking time to plan and execute attacks against a network. To counter, Moving Target IPv6 Defense (MT6D) provides a network host obfuscation technique that dynamically obscures network and transport layer addresses. Software driven implementations have posed many challenges, namely, constant code maintenance to remain compliant with all library and kernel dependencies, less than optimal throughput, and the requirement for a dedicated general purpose hardware. The work of this thesis presents Network Security Processor and Hardware Engine for MT6D (HE-MT6D) to overcome these challenges. HE-MT6D is a soft core Intellectual Property (IP) block developed in full Register Transfer Level (RTL) and is the first hardware-oriented design of MT6D. Major contributions of HE-MT6D include the complete separation of the data and control planes, development of a nonlinear Complex Instruction Set Computer (CISC) Network Security Processor for in-flight packet modification, a specialized Packet Assembly language, a configurable and a parallelized memory search through tag-based Hybrid Content Addressable Memory (HCAM) L1 write-through cache, full RTL Network Time Protocol version 4 hardware module, and a modular crypto engine. HE-MT6D supports multiple nodes and provides 1,025% throughput performance increase over earlier C-based MT6D at 863 Mbps with full encapsulation and decapsulation, and it matches bare wire throughput performance for all other traffic. The HE-MT6D IP block can be configured as an independent physical gateway device, built as embedded Application Specific Integrated Circuit (ASIC), or serve as a System on Chip (SoC) integrated submodule. / Master of Science / Traditional static network addressing allows attackers the incredible advantage of taking time to plan and execute attacks against a network. One approach to counter this effect is dynamic addressing through Moving Target Defense, which the Department of Homeland Security Cyber Security Division (CSD) designated as one of the fourteen primary Technical Topic Areas for securing federal networks and the larger Internet. A specific application for Internet Protocol version 6 (IPv6) networks is Moving Target IPv6 Defense (MT6D). This provides tunneling and dynamic cryptographic network address translation, where new addresses are cryptographically generated every few seconds. The work of this thesis presents a Network Security Processor and Hardware Engine for MT6D (HE-MT6D). HE-MT6D is the first hardware-oriented implementation of MT6D developed in full Register Transfer Level (RTL) logic and provides 1,025% performance increase over earlier C-based MT6D at 863 Mbps full duplex throughput. It also provides support for multiple nodes. The HE-MT6D Intellectual Property (IP) block is modular for maximum flexibility towards system deployment: it can be configured as an independent physical gateway device, built as embedded Application Specific Integrated Circuit (ASIC), or serve as a System on Chip (SoC) integrated submodule.
|
160 |
Motivační struktura k pohybové aktivitě žáků 1. a 4. ročníků škol městských a vesnických v Ústeckém kraji / Motivation structure of moving activities for pupils in the 1st and in the 4th classroom, year of studies in town's and village's schools in Ustecky regionHladíková, Marcela January 2015 (has links)
The moving activity is an important part of human life, especially nowadays with the life style. The point of the work is to get knowledges of motivation to moving activities of younger children according to children and their parents. Based on this surveys to compare motivation to moving activities of pupils in the 1st and 4th classroom in town's and village's schools in region. I want to get imagination of children doing sport regularly and irregularly and find out what motivate them to move. What motivation do the parents use to support their children in moving activity. Find out if there is a different motivation of parents to pupil in the 1st a 4th classroom in the town and in the village. Keywords Moving, motivation, parent's attitude to moving of child, child's attitude to moving, comparing of motivation, influence of motivation, elementary school age.
|
Page generated in 0.0737 seconds