Spot a bot to stop a botnet
2012-05-02
(Press-News.org) Computer scientists in India have developed a two-pronged algorithm that can detect the presence of a botnet on a computer network and block its malicious activities before it causes too much harm. The team describes details of the system in a forthcoming issue of the International Journal of Wireless and Mobile Computing.
One of the most significant threats faced by computer networks is from "bots". A bot is simply a program that runs on a computer without the owner's knowledge and carries out any of a number of tasks over the network and the wider internet. It can run the same tasks, such as sending emails or accessing a specific page on the internet, at a much higher rate than would be possible if a person were to carry out the task. A collection of bots in a network, used for malicious purposes, is a botnet and while they are often organized and run by a so-called botmaster there are bots that are available for hire for malicious and criminal activity.
Bots might be illicitly installed on computers in the home, schools, businesses, government buildings and other installations. They are usually carried into a particular computer through a malicious link on the internet, in an email or when a contaminated external storage device, such as a USB drive is attached to a computer that has no malware protection software installed.
Botnets are known to have been used to send mass emails, spam, numbering in the hundreds of millions, if not billions of deliveries. They have also been used in corporate spying, international surveillance and for carrying out attacks known as Distributed Denial of Service (DDoS) attacks, which can decommission whole computer networks by accessing their servers repeatedly and so blocking legitimate users.
Manoj Thakur of the Veermata Jijabai Technological Institute (VJTI), in Mumbai, India, and colleagues have developed a novel approach to detecting and combating bots. Their technique uses a two-pronged strategy involving a standalone and a network algorithm. The standalone algorithm runs independently on each node of the network and monitors active processes on the node. If it detects suspicious activity, it triggers the network algorithm. The network algorithm then analyzes the information being transferred to and from the hosts on the network to deduce whether or not the activity is due to a bot or a legitimate program on the system.
The standalone algorithm is heuristic in nature, the team says, which means it can spot previously unseen bot activity, whereas the network algorithm relies on network traffic analysis to carry out its detection. The two techniques working together can thus spot activity from known and unknown bots. This approach also has the advantage of reducing the number of false positives.
INFORMATION:
"Detection and prevention of botnets and malware in an enterprise network" in Int. J. Wireless and Mobile Computing, 2012, 5, 144-153
END
ELSE PRESS RELEASES FROM THIS DATE:
2012-05-02
Although supply chain officers are starting to crop up in the boardroom, they've usually been the behind-the-scenes types - you know, the bean-counters making sure everything gets everywhere so everyone can have everything they want. It's not a small job, and it's usually not a very glamorous one either.
And yet, with natural disasters causing major disruptions in the global supply chain and markets rollicking as a result, it's not the charismatic leaders who can get us where we need to be. It's the bean counters.
Good supply chain operations means getting the job ...
2012-05-02
EAST LANSING, Mich. — The use of stun guns by police significantly increases the chances of citizen injury, yet also protects the officers more than other restraint methods, according to the most comprehensive research to date into the safety of stun guns in a law enforcement setting.
William Terrill, lead researcher on the project and Michigan State University criminologist, said the federally funded research presents a dilemma for police agencies weighing use of the controversial weapon. Nationally, some 260,000 electronic control devices, or stun guns, are in use in ...
2012-05-02
Tony Guice, CPA, and Manager / Member of Gunther Roberts Consulting said, "We are always looking for opportunities to offer our clients a broader range of services around our core competencies of accounting, human resources, and IT. This new offering fits well within our HR suite of services and expands our footprint into the Transportation Industry. Companies in this industry need sound advice on compliance with the many DOT regulations that exist and a means to deliver that message to its employees. Given our background and over 15 years of experience in Industrial ...
2012-05-02
Dr. Remus Repta of Advanced Aesthetic Associates says he's not surprised that the Los Angeles County coroner found scars associated with breast implants on Whitney Houston's body, since breast augmentation in Phoenix and across the nation is extremely common.
What Dr. Repta finds interesting is the spin the media put on the results of the coroner's report, which indicated there were small scars associated with breast implants on Houston's breasts.
"Whitney Houston's tragic death was covered by news sources across the nation, but I was shocked to see that evidence ...
2012-05-02
A process that spins starch into fine strands could take the sting out of removing bandages, as well as produce less expensive and more environmentally-friendly toilet paper, napkins and other products, according to Penn State food scientists.
"There are many applications for starch fibers," said Lingyan Kong, graduate student, food science, "Starch is the most abundant and also the least expensive of natural polymers."
Kong, who worked with Greg Ziegler, professor of food science, used a solvent to dissolve the starch into a fluid that can then be spun into long strands, ...
2012-05-02
PITTSBURGH—The millions of "check-ins" generated by foursquare, the location-based social networking site, can be used to create a dynamic view of a city's workings and character, Carnegie Mellon University researchers say. In contrast to static neighborhood boundaries and dated census figures, these "Livehoods" reflect the ever-changing patterns of city life.
Researchers from the School of Computer Science (SCS) have developed an algorithm that takes the check-ins generated when foursquare members visit participating businesses or venues, and clusters them based on a ...
2012-05-02
Washington, April 30, 2012 -- The 2008 decision by the Centers for Medicare & Medicaid Services (CMS) to cease additional reimbursement to hospitals for certain healthcare-associated infections (HAIs) has led to enhanced focus on infection prevention and changes in practice by front-line staff, according to a national survey of infection preventionists published in the May issue of the American Journal of Infection Control, the official publication of the Association for Professionals in Infection Control and Epidemiology (APIC).
A team of researchers and public health ...
2012-05-02
Dr. Michael Menachof of The Center for Aesthetic Facial Surgery says the relatively high Worth It Rating for nose surgery on RealSelf.com, a popular online cosmetic surgery forum, does not surprise him considering the high level of satisfaction his Denver rhinoplasty patients experience.
"Rhinoplasty is an extremely effective procedure that is tailored to the personal needs of each patient," Dr. Menachof says. "The almost 80% Worth It Rating on RealSelf reflects how successful this procedure is for creating the desirable results."
Dr. Menachof, ...
2012-05-02
AMHERST, Mass. – Though the human genome has been sequenced, scientists are still trying to figure out how the accomplishment can help people, for example, how it can be used to treat disease. As University of Massachusetts Amherst geneticist Jacob Mayfield notes, "It was easy to think of the human genome as the big prize, but what we realize now is, it's just a foot in the door."
"What we're beginning to understand is that the information we're interested in knowing lies in comparisons between genomes," he adds. As society moves to personalized, genome-based medicine, ...
2012-05-02
Wrist, hand and finger trauma are the most common injuries presenting to emergency departments nationwide, yet only 7 percent of Tennessee hospitals have a hand specialist on call 24/7 to treat these patients, according to a Vanderbilt study published online today in the Annals of Plastic Surgery.
Patients from Tennessee, Arkansas, Mississippi and Alabama are traveling long distances to Vanderbilt University Medical Center for treatment and follow-up care.
Wesley Thayer, M.D., Ph.D., assistant professor of Plastic Surgery, and of Orthopaedic Surgery and Rehabilitation, ...
LAST 30 PRESS RELEASES:
[Press-News.org] Spot a bot to stop a botnet