8,878 research outputs found

    Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

    Full text link
    Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the cornerstone to facilitate freedom of speech and privacy. We present a proof of concept for a novel algorithm that could form the fundamental pillar of a darknet-capable Cyber Threat Intelligence platform. The solution can reduce anonymity of users of Tor, and considers the existing visibility of network traffic before optionally initiating targeted or widespread BGP interception. In combination with server HTTP response manipulation, the algorithm attempts to reduce the candidate data set to eliminate client-side traffic that is most unlikely to be responsible for server-side connections of interest. Our test results show that MITM manipulated server responses lead to expected changes received by the Tor client. Using simulation data generated by shadow, we show that the detection scheme is effective with false positive rate of 0.001, while sensitivity detecting non-targets was 0.016+-0.127. Our algorithm could assist collaborating organisations willing to share their threat intelligence or cooperate during investigations.Comment: 26 page

    Proactive threat detection for connected cars using recursive Bayesian estimation

    Get PDF
    Upcoming disruptive technologies around autonomous driving of connected cars have not yet been matched with appropriate security by design principles and lack approaches to incorporate proactive preventative measures in the wake of increased cyber-threats against such systems. In this paper, we introduce proactive anomaly detection to a use-case of hijacked connected cars to improve cyber-resilience. First, we manifest the opportunity of behavioral profiling for connected cars from recent literature covering related underpinning technologies. Then, we design and utilize a new data set file for connected cars influenced by the automatic dependent surveillance-broadcast surveillance technology used in the aerospace industry to facilitate data collection and sharing. Finally, we simulate the analysis of travel routes in real time to predict anomalies using predictive modeling. Simulations show the applicability of a Bayesian estimation technique, namely, Kalman filter. With the analysis of future state predictions based on the previous behavior, cyber-threats can be addressed with a vastly increased time window for a reaction when encountering anomalies. We discuss that detecting real-time deviations for malicious intent with the predictive profiling and behavioral algorithms can be superior in effectiveness than the retrospective comparison of known-good/known-bad behavior. When quicker action can be taken while connected cars encounter cyberattacks, more effective engagement or interception of command and control will be achieved

    A Chromosomal Deletion and New Frameshift Mutation Cause ARSACS in an African-American

    Get PDF
    Autosomal Recessive Spastic Ataxia of Charlevoix-Saguenay (ARSACS) is a rare, progressive, neurodegenerative disease characterized by ataxia, spasticity and polyneuropathy. First described in the French-Canadian population of Quebec in 1978, ARSACS has since been identified in multiple patients worldwide. In this clinical case report, we describe the evaluation of an 11-years-old African-American male who presented to neuromuscular clinic for assessment of a gait abnormality. He had a history of gross motor delay since early childhood, frequent falls and a below average IQ. Chromosomal microarray revealed a 1.422 megabase loss in the 13q12.12 region, which includes the SACS gene. Next Generation Sequencing then showed a novel, predicted to be pathogenic missense mutation (c.11824dup) of this gene. His clinical presentation and neurological imaging further confirmed the diagnosis of ARSACS. To our knowledge, this is the first reported case of this disease in the African-American population of the United States. This case report further highlights the growing trend of identifying genetic diseases previously restricted to single, ethnically isolated regions in many different ethnic groups worldwide

    Rhetoric and reality: critical perspectives on education in a 3D virtual world

    Get PDF
    The emergence of any new educational technology is often accompanied by inflated expectations about its potential for transforming pedagogical practice and improving student learning outcomes. A critique of the rhetoric accompanying the evolution of 3D virtual world education reveals a similar pattern, with the initial hype based more on rhetoric than research demonstrating the extent to which rhetoric matches reality. Addressed are the perceived gaps in the literature through a critique of the rhetoric evident throughout the evolution of the application of virtual worlds in education and the reality based on the reported experiences of experts in the field of educational technology, who are all members of the Australian and New Zealand Virtual Worlds Working Group. The experiences reported highlight a range of effective virtual world collaborative and communicative teaching experiences conducted in members’ institutions. Perspectives vary from those whose reality is the actuation of the initial rhetoric in the early years of virtual world education, to those whose reality is fraught with challenges that belie the rhetoric. Although there are concerns over institutional resistance, restrictions, and outdated processes on the one-hand, and excitement over the rapid emergence of innovation on the other, the prevailing reality seems to be that virtual world education is both persistent and sustainable. Explored are critical perspectives on the rhetoric and reality on the educational uptake and use of virtual worlds in higher education, providing an overview of the current and future directions for learning in virtual worlds

    Oral acyclovir suppression and neurodevelopment after neonatal herpes

    Get PDF
    corecore