Linux Malware Obfuscation,
2023
University of Arkansas, Fayetteville
Linux Malware Obfuscation, Brian Roden
Computer Science and Computer Engineering Undergraduate Honors Theses
Many forms of malicious software use techniques and tools that make it harder for their functionality to be parsed, both by antivirus software and reverse-engineering methods. Historically, the vast majority of malware has been written for the Windows operating system due to its large user base. As such, most efforts made for malware detection and analysis have been performed on that platform. However, in recent years, we have seen an increase in malware targeting servers running Linux and other Unix-like operating systems resulting in more emphasis of malware research on these platforms. In this work, several obfuscation techniques for Linux …
Bluetooth Low Energy Indoor Positioning System,
2023
Whittier College
Bluetooth Low Energy Indoor Positioning System, Jackson T. Diamond, Jordan Hanson Dr
Whittier Scholars Program
Robust indoor positioning systems based on low energy bluetooth signals will service a wide range of applications. We present an example of a low energy bluetooth positioning system. First, the steps taken to locate the target with the bluetooth data will be reviewed. Next, we describe the algorithms of the set of android apps developed to utilize the bluetooth data for positioning. Similar to GPS, the algorithms use trilateration to approximate the target location by utilizing the corner devices running one of the apps. Due to the fluctuating nature of the bluetooth signal strength indicator (RSSI), we used an averaging …
Analysis Of Honeypots In Detecting Tactics, Techniques, And Procedure (Ttp) Changes In Threat Actors Based On Source Ip Address,
2023
Kennesaw State University
Analysis Of Honeypots In Detecting Tactics, Techniques, And Procedure (Ttp) Changes In Threat Actors Based On Source Ip Address, Carson Reynolds, Andy Green
Symposium of Student Scholars
The financial and national security impacts of cybercrime globally are well documented. According to the 2020 FBI Internet Crime Report, financially motivated threat actors committed 86% of reported breaches, resulting in a total loss of approximately $4.1 billion in the United States alone. In order to combat this, our research seeks to determine if threat actors change their tactics, techniques, and procedures (TTPs) based on the geolocation of their target’s IP address. We will construct a honeypot network distributed across multiple continents to collect attack data from geographically separate locations concurrently to answer this research question. We will configure the …
Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring,
2023
University of Granada
Interpretable Learning In Multivariate Big Data Analysis For Network Monitoring, José Camacho, Rasmus Bro, David Kotz
Dartmouth Scholarship
There is an increasing interest in the development of new data-driven models useful to assess the performance of communication networks. For many applications, like network monitoring and troubleshooting, a data model is of little use if it cannot be interpreted by a human operator. In this paper, we present an extension of the Multivariate Big Data Analysis (MBDA) methodology, a recently proposed interpretable data analysis tool. In this extension, we propose a solution to the automatic derivation of features, a cornerstone step for the application of MBDA when the amount of data is massive. The resulting network monitoring approach allows …
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps),
2023
Southern Methodist University
Self-Learning Algorithms For Intrusion Detection And Prevention Systems (Idps), Juan E. Nunez, Roger W. Tchegui Donfack, Rohit Rohit, Hayley Horn
SMU Data Science Review
Today, there is an increased risk to data privacy and information security due to cyberattacks that compromise data reliability and accessibility. New machine learning models are needed to detect and prevent these cyberattacks. One application of these models is cybersecurity threat detection and prevention systems that can create a baseline of a network's traffic patterns to detect anomalies without needing pre-labeled data; thus, enabling the identification of abnormal network events as threats. This research explored algorithms that can help automate anomaly detection on an enterprise network using Canadian Institute for Cybersecurity data. This study demonstrates that Neural Networks with Bayesian …
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation,
2023
Central University of South Bihar, Panchanpur, Gaya, Bihar
Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)
Library Philosophy and Practice (e-journal)
Abstract
Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …
Multipath Tcp, And New Packet Scheduling Method,
2023
University of Minnesota, Morris
Multipath Tcp, And New Packet Scheduling Method, Cole N. Maxwell
Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal
Today many devices contain hardware to transmit data across the internet via cellular, WiFi, and wired connections. Many of these devices communicate by using a protocol known as Transmission Control Protocol (TCP). TCP was developed when network resources were expensive, and it was rare for a typical network-aware device to have more than one connection to a network. An extension to TCP known as Multipath TCP (MPTCP) was developed to leverage the multiple network connections to which devices now have access. While the MPTCP extension has been successful in its goal of using multiple network connections to send data simultaneously, …
Generalizing Graph Neural Network Across Graphs And Time,
2023
Singapore Management University
Generalizing Graph Neural Network Across Graphs And Time, Zhihao Wen
Research Collection School Of Computing and Information Systems
Graph-structured data widely exist in diverse real-world scenarios, analysis of these graphs can uncover valuable insights about their respective application domains. However, most previous works focused on learning node representation from a single fixed graph, while many real-world scenarios require representations to be quickly generated for unseen nodes, new edges, or entirely new graphs. This inductive ability is essential for high-throughtput machine learning systems. However, this inductive graph representation problem is quite difficult, compared to the transductive setting, for that generalizing to unseen nodes requires new subgraphs containing the new nodes to be aligned to the neural network trained already. …
Effective Graph Kernels For Evolving Functional Brain Networks,
2023
Singapore Management University
Effective Graph Kernels For Evolving Functional Brain Networks, Xinlei Wang, Jinyi Chen, Bing Tian Dai, Junchang Xin, Yu Gu, Ge Yu
Research Collection School Of Computing and Information Systems
The graph kernel of the functional brain network is an effective method in the field of neuropsychiatric disease diagnosis like Alzheimer's Disease (AD). The traditional static brain networks cannot reflect dynamic changes of brain activities, but evolving brain networks, which are a series of brain networks over time, are able to seize such dynamic changes. As far as we know, the graph kernel method is effective for calculating the differences among networks. Therefore, it has a great potential to understand the dynamic changes of evolving brain networks, which are a series of chronological differences. However, if the conventional graph kernel …
Finding Forensic Evidence In The Operating System's Graphical User Interface,
2023
Louisiana State University and Agricultural and Mechanical College
Finding Forensic Evidence In The Operating System's Graphical User Interface, Edward X. Wilson Mr.
LSU Master's Theses
A branch of cyber security known as memory forensics focuses on extracting meaningful evidence from system memory. This analysis is often referred to as volatile memory analysis, and is generally performed on memory captures acquired from target systems. Inside of a memory capture is the complete state of a system under investigation, including the contents of currently running as well as previously executed applications. Analysis of this data can reveal a significant amount of activity that occurred on a system since the last reboot. For this research, the Windows operating system is targeted. In particular, the graphical user interface component …
A Novel Parking Management In Smart City Vehicular Datacenters,
2023
Old Dominion University
A Novel Parking Management In Smart City Vehicular Datacenters, Syed Rizvi, Susan Zehra, Steven Olariu
College of Sciences Posters
Researchers have shown that most vehicles spend the majority of their time parked in parking garages, lots, or driveways. During this time, their computing resources are unused and untapped. This has led to substantial interest in Vehicular Cloud, an area of research in which each vehicle acts as a computation node. The main difference between traditional cloud computing and vehicular cloud computing is the availability of nodes. In traditional clouds, nodes are available 24/7, while in vehicular clouds, nodes (vehicles) are only available while parked in parking lots. This creates a dynamic environment as vehicles enter and exit parking garages …
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks,
2023
University of Kentucky
A Secure And Distributed Architecture For Vehicular Cloud And Protocols For Privacy-Preserving Message Dissemination In Vehicular Ad Hoc Networks, Hassan Mistareehi
Theses and Dissertations--Computer Science
Given the enormous interest in self-driving cars, Vehicular Ad hoc NETworks (VANETs) are likely to be widely deployed in the near future. Cloud computing is also gaining widespread deployment. Marriage between cloud computing and VANETs would help solve many of the needs of drivers, law enforcement agencies, traffic management, etc. The contributions of this dissertation are summarized as follows: A Secure and Distributed Architecture for Vehicular Cloud: Ensuring security and privacy is an important issue in the vehicular cloud; if information exchanged between entities is modified by a malicious vehicle, serious consequences such as traffic congestion and accidents can …
Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion,
2023
Old Dominion University
Unmasking Deception In Vanets: A Decentralized Approach To Verifying Truth In Motion, Susan Zehra, Syed R. Rizvi, Steven Olariu
College of Sciences Posters
VANET, which stands for "Vehicular Ad Hoc Network," is a wireless network that allows vehicles to communicate with each other and with infrastructure, such as Roadside Units (RSUs), with the aim of enhancing road safety and improving the overall driving experience through real-time exchange of information and data. VANET has various applications, including traffic management, road safety alerts, and navigation. However, the security of VANET can be compromised if a malicious user alters the content of messages transmitted, which can harm both individual vehicles and the overall trust in VANET technology. Ensuring the correctness of messages is crucial for the …
Small Business Office Network,
2023
The University of Akron
Small Business Office Network, Michael Gerome
Williams Honors College, Honors Research Projects
This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …
Security And Routing In A Disconnected Delay Tolerant Network,
2023
San Jose State University
Security And Routing In A Disconnected Delay Tolerant Network, Anirudh Kariyatil Chandakara
Master's Projects
Providing internet access in disaster-affected areas where there is little to no internet connectivity is extremely difficult. This paper proposes an architecture that utilizes existing hardware and mobile applications to enable users to access the Internet while maintaining a high level of security. The system comprises a client application, a transport application, and a server running on the cloud. The client combines data from all supported applications into a single bundle, which is encrypted using an end-to-end encryption technique and sent to the transport. The transport physically moves the bundles to a connected area and forwards them to the server. …
Ubiquitous Application Data Collection In A Disconnected Distributed System,
2023
San Jose State University
Ubiquitous Application Data Collection In A Disconnected Distributed System, Deepak Munagala
Master's Projects
Despite some incredible advancements in technology, a significant population of the world does not have internet connectivity. These people lack access to crucial information that is easily available to the rest of the world. To solve this problem, we implement a Delay Tolerant Network (DTN) that allows users in disconnected regions access to the internet. This is enabled by collecting all data requests on the users’ phones and passing them to a device that can carry them to a connected region. This device can then collect the necessary information and give it back to the users in the disconnected region. …
Defense Of A Small Network,
2023
The University of Akron
Defense Of A Small Network, Isabella Adkins
Williams Honors College, Honors Research Projects
A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.
A Different Way To Penetrate Nba Defenses,
2023
The University of Akron
A Different Way To Penetrate Nba Defenses, Trey Trucksis
Williams Honors College, Honors Research Projects
This project proposal will document the design, configuration, and penetration testing of a network consisting of three routers (labeled as Lakers, Celtics, Cavaliers), one switch (labeled as NBA), and three end devices (labeled as Kali, Windows 10, and Ubuntu) each connected to one of three routers present on the network. Each router will be attached to a different subnet on the network. The network will be secured using encrypted passwords on the router interfaces, OSPF MD5 authentication between the routers, port security on the switch, as well as Access Control Lists to to control the privileges of each subnetwork accordingly. …
Automated Evaluation For Distributed System Assignments,
2023
San Jose State University
Automated Evaluation For Distributed System Assignments, Nimesh Nischal
Master's Projects
A distributed system can exist in numerous states, including many erroneous permutations that could have been addressed in the code. As distributed systems such as cloud computing and microservices gain popularity, involving distributed com- puting assignments is becoming increasingly crucial in Computer Science and related fields. However, designing such systems poses various challenges, such as considering parallel executions, error-inducing edge cases, and interactions with external systems. Typically, distributed assignments require students to implement a system and run multiple instances of the same code to behave as distributed. However, such assign- ments do not encourage students to consider the potential edge …
Vehicle-Based Disconnected Data Distribution,
2023
San Jose State University
Vehicle-Based Disconnected Data Distribution, Aditya Singhania
Master's Projects
The world today is highly connected and there is an immense dependency on this connectivity to accomplish basic everyday tasks. However much of the world lacks connectivity. Even in well-connected locations, natural disasters can cause infrastructure disruption. To combat these situations, Delay Tolerant Networks
(DTNs) employ to store and forward techniques along with intermittently connected transports to provide data connectivity. DTNs focus on intermittently connected networks however what if the regions are never connected? For example, Region A - is never connected to the internet, and Region B – has internet connectivity. Using a vehicle that travels between the two …
