• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 7
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 29
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Model of Evasion Attack Detection using Finite State Machine

Su, Wen-De 09 August 2003 (has links)
With the electronic commerce is going popular, many enterprise turn their business to the internet. The electronic commerce brings many problems on security and the key point is the data of the enterprise and the privacy of the customer. Firewall is not enough and the IDS is needed to provide the acceptable security. With the network monitoring and intrusion detection techniques, we can detect the attacks, alarm the administrators, and write to log files. The log files can be analyzed to provide the prevention to the same types of attacks and protect the security of the system. Recently, some attacks are proposed which can avoid the familiar IDS such as SNORT. The attack will bring a serious damage to the system. We analyze one of these attacks and try to propose a model which can detect it. We believe that the model is useful in the research of the IDS.
2

Politics, economy and religion in a Near Eastern periphery : the region of Baḥrayn in East Arabia c. 1050 – c. 1400 CE

Alwazzan, Faisal Adel Ahmad January 2015 (has links)
The region of Baḥrayn in eastern Arabia during the post-Qarmāṭian era has received little attention from scholars because of the scarcity of local written sources and the daunting task of gathering scattered small pieces of information from other sources in more than one language. This thesis focuses on the politics, geopolitics, economy, literature and religion of Baḥrayn from c. 1050 to c. 1400 CE. It consists of eight chapters in addition to an introduction and a conclusion. The introduction presents the research framework of the thesis. World-systems Analysis in a pre-capitalist setting is used to analyse Baḥrayn’s hierarchical position in the Near East according to its economic, political and cultural characteristics. It also sets out the historical background and context of the region, presents the thesis’ questions and structure, reviews modern studies and summarises the extant literary and archaeological evidence. Chapter One describes the historical geography and economy of Baḥrayn and analyses the impact of the region’s geography and the wider economic context on its history. Chapter Two studies the two rebellions against the Qarāmiṭa on the island of Uwāl and in the city of al-Qaṭīf, which led to the establishment of the emirate of Āl al-Zajjāj and the emirate of Āl ʿAbbās. Chapters Three and Four deal with the rise and decline of the ʿUyūnid emirate (1077-1230s CE) and study the ʿUyūnids’ institutions, including their administration and army formation. Chapter Five concentrates on the powers that ruled the region of Baḥrayn after the fall of the ʿUyūnid emirate in 1230s CE: the ʿUqaylid emirate in al-Aḥsāʾ and the deserts of Baḥrayn and Najd, and the Iranian-based polities that ruled Uwāl and al-Qaṭīf. Chapter Six focuses on literature produced in Baḥrayn, presenting biographies of its poets and analyses of the commentary of the poetry collection of the poet ʿAlī ibn al-Muqarrab al-ʿUyūnī and Abū al-Buhlūl’s letter. It also examines the relationship between the poets and the emirs of the ʿUyūnid emirate. Finally, Chapters Seven and Eight shed light on religion in Baḥrayn. They examine the region’s communities of Shīʿites and Sunnis which appear to have adhered to popular forms of Ismāʿīlism, Twelverism, Ḥanafism and Shāfiʿism. The question of scholars and scholarship in Baḥrayn from the twelfth to the fourteenth century is revisited. It is argued that the current consensus that attributes a number of 12th-14th century Twelver scholars who held the nisba of al-Baḥrānī to Baḥrayn lacks early evidence, appeared in a Safavid context and indeed contrasts with the evidence for the region’s peripherality and other evidence that suggests a lack of scholars in the region.
3

The effects of socio-demographic factors on depression and perceived health status among a cohort of young people (15-24) in South Africa: evidence from the National Income Dynamics Study (NIDS) waves 1-5

Nkhoma, Nelly Ruth 17 February 2021 (has links)
Introduction: The prevalence of bad perceived health status and depression, their sociodemographic determinants (education level, employment status, relative household income, race, age and gender) and the modifying effect of depression on PHS have been investigated among a cohort of young adults using data from the South African National Income Dynamics Study (NIDS) waves 1-5. South Africa is a middle-income country, with very high levels of socioeconomic inequality and a history of apartheid. Both depression and PHS tend to be affected by socio-demographic and environmental factors. Methods: Depression was measured using the CES-D-10 scale and PHS was measured on a 5- point likert scale ranging from excellent to poor. A binary version of PHS was generated which groups the categories excellent, very good and good into good and the categories poor and fair into bad PHS. Descriptive analysis and Mixed Effects Regression analysis were conducted. MER is appropriate for unbalanced panels as this method is robust to irregularly spaced measurements. Results: A high prevalence of depression was found in the study with about 13%-20% of the cohort being depressed at each wave. Surprisingly, a low level of bad PHS has been found in the cohort with less than 5% of the young adults having bad PHS at all waves. Completion of secondary and tertiary education and being employed have been found to significantly lower the odds of being depressed and increase the chances of having good PHS. Africans were significantly more likely to be depressed, as compared to other racial groups. Finally, being depressed was found to reduce the likelihood of good PHS. Discussion: Education level completed and being employed have been found to significantly protect individuals from being depressed and to increase the likelihood of good PHS. In post-apartheid South Africa, the effects of inequalities arising from apartheid social and economic policies are still present with Africans being found more likely to be depressed.
4

A study of Centralized Network Intrusion Detection System using low end single board computers

Andersson, Michael, Mickols, Andreas January 2017 (has links)
The use of Intrusion Detection Systems is a normal thing today in bigger companies, butthe solutions that are to be found in market is often too expensive for the smallercompany. Therefore, we saw the need in investigating if there is a more affordablesolution. In this report, we will show that it is possible to use low cost single boardcomputers as part of a bigger centralized Intrusion Detection System. To investigate this,we set up a test system including 2 Raspberry Pi 3 Model B, a cloud server and the use oftwo home networks, one with port mirroring implemented in firmware and the other withdedicated span port. The report will show how we set up the environment and the testingwe have done to prove that this is a working solution.
5

An Ensemble Learning Based Multi-level Network Intrusion Detection System for Wi-Fi Dominant Networks

Francisco D. Vaca (6790182) 03 June 2019 (has links)
<div>Today, networks contribute signicantly to everyone's life. The enormous usefulness of networks for various services and data storage motivates adversaries to launch attacks on them. Network Intrusion Detection Systems (NIDSs) are used as security measure inside the organizational networks to identify any intrusions and generate alerts for them. The idea of deploying an NIDS is quite known and has been studied and adopted in both academia and industry. However, most of the NIDS literature have emphasized to detect the attacks that originate externally in a wired network infrastructure. In addition, Wi-Fi and wired networks are treated the same for the NIDSs. The open infrastructure in Wi-Fi network makes it different from the wired network. Several internal attacks that could happen in a Wi-Fi network are not pos-</div><div>sible in a wired network. The NIDSs developed using traditional approaches may fail to identify these internal attacks.</div><div><br></div><div><div>The thesis work attempts to develop a Multi-Level Network Intrusion Detection System (ML-NIDS) for Wi-Fi dominant networks that can detect internal attacks specic to Wi-Fi networks as well as the generic network attacks that are independent of network infrastructure. In Wi-Fi dominant networks, Wi-Fi devices (stations) are prevalent at the edge of campus and enterprise networks and integrated with the fixed wired infrastructure at the access. The implementation is proposed for Wi-Fi dominant networks; nevertheless, it aims to work for the wired network as well. We develop the ML-NIDS using an ensemble learning method that combines several weak</div><div>learners to create a strong learner.</div></div><div><br></div>
6

Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

Stegeby, Peter January 2023 (has links)
Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. Frågan som då kan uppstå är, hur kan vi skydda oss själva? Kunskapen som blivit insamlad i detta arbete pekar tydligt på att det finns saker vi kan göra vilket svarar på frågan, hur kan vi upptäcka intrång? Studien visar att mer avancerade Intrusion Detection System (IDS) kan bli implementerad på hemdatorer (och i företag). Det finns många alternativ att välja mellan, men de valda IDSer – OSSEC och Snort – kan upptäcka säkerhetsbrister på enskilda host-maskiner (eller på nätverket) i realtid tack vare avancerad loggningshanterings och övervakning. Svårighetsgraden av att använda och implementera dessa IDSer var utmanande men tillfredställande och konfigurationen var flexibel vilket tillåter IDSerna att bli installerade på en ensam host-dator eller i ett nätverk. Om ett enkelt-att-följa grafiskt översikt av felmeddelanden är vad man önskar så har OSSEC IDS, tillsammans med att skicka e-mail över felmeddelandet, den funktionaliteten. Snort, på andra sidan, har en enkel konfiguration och flexibilitet i att skriva regler. Det borde framgå tydligt att implementera en IDS på ert system inte gör det ogenomträngligt, inte heller löser det alla säkerhetsrelaterade problem, men det som kommer att hända är att vi får en bättre förståelse av de hot som uppstår i våra system. / Hackers keeps getting better at gaining unauthorized access to our computers and can avoid some of the most basic intrusion detection systems and firewalls on a standard computer. The gap between attackers and defenders seem to grow as intrusions increase in numbers every year, costing companies millions of dollars, so the question is posed, how can we protect ourselves? The research done in this work clearly points to that there are things that can be done which answers the question, how can we detect intrusions? The study has shown that a more advanced intrusion detection system (IDS) can be implemented on home computers (and in businesses). There are many options to choose from but the chosen IDSs – OSSEC and Snort – can detect security issues on the host computer (or on the network) in real-time by advanced logging management and monitoring. The implementation and usage difficulties of these IDSs are challenging but satisfying and the configurations are flexible allowing the IDSs to be installed on a single host or in a larger network. If an easy-to-follow graphical overview of the alerts on your system is what you are looking for then that, and sending e-mails of the alert, is found in the OSSEC IDS. Snort, on the other hand, has easy configurations and flexible rule-writing and the options of sniffing packets on the network. It should be clear that implementing an IDS on your system does not make it impenetrable nor solve all the security issues but what it will do is to give you a better understanding of the threats on your system.
7

Outils pour la parallélisation automatique

Boulet, Pierre 18 January 1996 (has links) (PDF)
La parallélisation automatique est une des approches visant une plus grande facilité d'utilisation des ordinateurs parallèles. La parallélisation consiste prendre un programme écrit pour une machine séquentielle (qui n'a qu'un processeur) et de l'adapter une machine parallèle. L'intérêt de faire faire cette parallélisation automatiquement par un programme appelé paralléliseur est qu'on pourrait alors réutiliser tout le code déjà écrit en Fortran pour machine séquentielles, après parallélisation, sur des machines parallèles. Nous n'y sommes pas encore, mais on s'en approche. C'est dans ce cadre que se situe mon travail. Une moitié approximativement de ma thèse est consacrée à la réalisation d'un logiciel qui parallélise automatiquement une classe réduite de programmes (les nids de boucles uniformes qui utilisent des translations comme accès aux tableaux de données) en HPF (High Performance Fortran). J'insiste surtout sur la partie génération de code HPF, qui est la partie la plus novatrice de ce programme. Outre la réalisation de Bouclettes, ma contribution au domaine est aussi théorique avec une étude sur un partitionnement des données appelé pavage par des parallélépipèdes et une étude de l'optimisation des calculs d' « expressions de tableaux » dans le langage High Performance Fortran. Le pavage est une technique permettant d'optimiser la taille des tâches qu'on répartit sur les processeurs pour diminuer le temps passé en communications. L'évaluation d'expressions de tableaux est une étape d'optimisation du compilateur parallèle (le programme qui traduit le code parallèle écrit dans un langage de haut niveau comme HPF en code machine directement exécutable par l'ordinateur parallèle).
8

An Evaluation of current IDS

Fernandez, Maria del Mar, Porres, Ignacio January 2008 (has links)
<p>With the possibility of connecting several computers and networks the necessity of protecting the whole data and machines from attackers (hackers) that try to get some confident information to use for their own benefit or just destroy or modify valuable information was born. At this point IDS appears to help users, companies or institutions to detect when they are getting compromised. This thesis will cover two main parts: the first one consists of an intense research study about the world of IDS and its environment. Subsequently, we will conclude this part with some points where IDS still needs to be questioned and show up desirable requirements for “the perfect” intrusion detection system. This “perfect” adjective can of course be discussed variously. The second part of the thesis approaches the implementation of the most used open source IDS: Snort. Some basic attacks on the machine where Snort is installed will be performed in order to make the future user see what kind of protection it ensures and the usability of this. There is a brief discussion about two of the main challenges in IDS will follow: analyzing big amounts of packets and encrypted traffic. Finally there are conclusions for a safe computer environment as well as the suggestion that some skilled programmer should give Snort a more friendly interface for every kind of users and a built in programme package which includes webserver, database and other libraries that are needed to run it properly with all its features.</p>
9

Contribution à l'étude du comportement acoustique de matériaux présentant des cavités débouchantes

Haÿne Lecocq, Bénédicte 12 1900 (has links) (PDF)
Le bruit dans l'environnement et dans l'habitat est une préoccupation majeure pour la population. Les entreprises, dans des secteurs aussi variés que l'automobile, l'électroménager ou l'aéronautique, travaillent de plus en plus la sonorité de leurs produits. Pour réduire les bruits, une des solutions est l'utilisation de matériaux absorbants acoustiques passifs, comme les mousses, les laines de verre ou de roche. D'autres matériaux offrent des propriétés absorbantes du fait de leur réactivité. Il s'agit de matériaux comportant par exemple des cavités résonnantes. Dans cette catégorie, les matériaux de type nids d'abeilles (NIDA) sont de plus en plus employés, non seulement pour leur rapport rigidité/poids particulièrement intéressant d'un point de vue mécanique, mais aussi pour leurs propriétés acoustiques, notamment dans les nacelles des réacteurs d'avions. Cependant, les phénomènes physiques intervenant dans cette atténuation ne sont pas bien connus et la maîtrise des comportements acoustiques de ces matériaux, à partir de leur dimensionnement, n'est pas totalement acquise. En ce sens, les travaux de recherche présentés dans cette thèse se veulent une contribution à la détermination de phénomènes physiques relatifs au comportement de cavités de Helmholtz et de matériaux NIDA lorsqu'ils sont soumis à diverses sollicitations: une onde acoustique, une onde acoustique couplée à un écoulement d'air, ou encore, à des vibrations. Cette étude, largement guidée par l'expérimentation, a nécessité la conception et la réalisation de nombreux bancs d'essais afin de comprendre et de mesurer les divers phénomènes pour valider les théories que nous avons proposées. Une nouvelle approche est élaborée dans la modélisation de matériaux NIDA qui prend en compte l'influence des cavités résonnantes de la structure par une analogie mécanique et, les résultats de la simulation sont comparés à ceux de l'expérimentation. La méthodologie des plans d'expériences a été utilisée pour rechercher les rapports de forme des cavités optimisant l'atténuation sonore globale. Enfin, une théorie novatrice sur les phénomènes physiques intervenant dans l'atténuation sonore provoquée par des cavités soumises à la fois à un écoulement d'air et à une onde acoustique est développée. Les expérimentations permettent de valider l'hypothèse selon laquelle il existe un contrôle réactif par auto-adaptation de la réponse de la cavité à l'excitation acoustique extérieure.
10

Modélisation flux de données et optimisation pour architecture multi-cœurs de motifs répétitifs

Piat, Jonathan 16 September 2010 (has links) (PDF)
Face au défi que représente la programmation des architectures multi-cœurs/processeurs, il est devenu nécessaire de proposer aux développeurs des outils adaptés permettant d'abstraire les notions inhérentes au parallélisme et facilitant le portage d'une application sur différentes architectures. La méthodologie AAA (Adéquation Algorithme Architecture) propose au développeur d'automatiser les étapes de partitionnement, ordonnancement à partir d'une description haut niveau de l'application et de l'architecture. Cette méthodologie permet donc le prototypage rapide d'une application sur différentes architectures avec un minimum d'effort et un résultat approchant l'optimal. Les apports de cette thèse se situent à la fois au niveau du modèle de spécification et de ses optimisations relatives au contexte des architectures parallèles. Le modèle flux de données répond aux problèmes de modélisation des applications fortement synchronisées par les données. Le sous-ensemble SDF (Synchronous Data Flow), limite l'expressivité du modèle mais apporte un complément d'information permettant une optimisation efficace et garantissant l'intégrité du calcul dans tous les contextes. Les travaux développés dans ce mémoire introduisent un nouveau modèle de hiérarchie dans SDF afin d'améliorer l'expressivité tout en préservant les propriétés du modèle initial. Ce modèle basé sur des interfaces, permet une approche plus naturelle pour le développeur accoutumé au langage C. Ce nouveau modèle apportant un complément d'information, nous proposons également un ensemble de traitement améliorant la prise en charge des motifs de répétition imbriqués. En effet le modèle de hiérarchie introduit en première partie permet la spécification de motifs dit de " nids de boucles " pouvant masquer le parallélisme potentiel. Il est donc nécessaire d'associer au modèle des traitements permettant de révéler ce parallélisme tout en préservant l'aspect factorisé du calcul. Les méthodes présentées sont adaptées du contexte des compilateurs pour supercalculateurs et de l'univers des réseaux systoliques.

Page generated in 0.0653 seconds