Classification and Update Proposal for Modern Computer Worms, Based on Obfuscation

Author(s):  
Hernaldo Salazar ◽  
Cristian Barria
2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Nelson Ochieng ◽  
Waweru Mwangi ◽  
Ismail Ateya

The scope of this research is computer worm detection. Computer worm has been defined as a process that can cause a possibly evolved copy of it to execute on a remote computer. It does not require human intervention to propagate neither does it attach itself to an existing computer file. It spreads very rapidly. Modern computer worm authors obfuscate the code to make it difficult to detect the computer worm. This research proposes to use machine learning methodology for the detection of computer worms. More specifically, ensembles are used. The research deviates from existing detection approaches by using dark space network traffic attributed to an actual worm attack to train and validate the machine learning algorithms. It is also obtained that the various ensembles perform comparatively well. Each of them is therefore a candidate for the final model. The algorithms also perform just as well as similar studies reported in the literature.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


2020 ◽  
pp. 1-12
Author(s):  
Li Dongmei

English text-to-speech conversion is the key content of modern computer technology research. Its difficulty is that there are large errors in the conversion process of text-to-speech feature recognition, and it is difficult to apply the English text-to-speech conversion algorithm to the system. In order to improve the efficiency of the English text-to-speech conversion, based on the machine learning algorithm, after the original voice waveform is labeled with the pitch, this article modifies the rhythm through PSOLA, and uses the C4.5 algorithm to train a decision tree for judging pronunciation of polyphones. In order to evaluate the performance of pronunciation discrimination method based on part-of-speech rules and HMM-based prosody hierarchy prediction in speech synthesis systems, this study constructed a system model. In addition, the waveform stitching method and PSOLA are used to synthesize the sound. For words whose main stress cannot be discriminated by morphological structure, label learning can be done by machine learning methods. Finally, this study evaluates and analyzes the performance of the algorithm through control experiments. The results show that the algorithm proposed in this paper has good performance and has a certain practical effect.


2017 ◽  
Vol 2 (1) ◽  
pp. 80-87
Author(s):  
Puyda V. ◽  
◽  
Stoian. A.

Detecting objects in a video stream is a typical problem in modern computer vision systems that are used in multiple areas. Object detection can be done on both static images and on frames of a video stream. Essentially, object detection means finding color and intensity non-uniformities which can be treated as physical objects. Beside that, the operations of finding coordinates, size and other characteristics of these non-uniformities that can be used to solve other computer vision related problems like object identification can be executed. In this paper, we study three algorithms which can be used to detect objects of different nature and are based on different approaches: detection of color non-uniformities, frame difference and feature detection. As the input data, we use a video stream which is obtained from a video camera or from an mp4 video file. Simulations and testing of the algoritms were done on a universal computer based on an open-source hardware, built on the Broadcom BCM2711, quad-core Cortex-A72 (ARM v8) 64-bit SoC processor with frequency 1,5GHz. The software was created in Visual Studio 2019 using OpenCV 4 on Windows 10 and on a universal computer operated under Linux (Raspbian Buster OS) for an open-source hardware. In the paper, the methods under consideration are compared. The results of the paper can be used in research and development of modern computer vision systems used for different purposes. Keywords: object detection, feature points, keypoints, ORB detector, computer vision, motion detection, HSV model color


Author(s):  
V. Lymarenko

Trends in technology lead to an increasing of their role in the development of humanity. Exactly “cloud technologies”, which are the basis for the technological development of the information society now, also they play the role of the leading tool of informatization of education, especially united with “edutainment”.During the development and implementation of software and network technologies in professional artistic education, the following issues remain unsolved: the provision of modern computer equipment and software, technical support for the stable work of information products, and the provision of selective authorized access for students to specific network resources. The methodology based on “cloud calculates” technology provides an opportunity to overcome these difficulties. And the last, but not at least, students may be attracted to the most promising areas of the development of modern information products.Actuality, practical significance, and insufficient development of these problems caused the choice of the topic of our research: “Terms of use of “edutainment” and “cloud technologies” in professional artistic education “.The aim of the research is to determine the conditions of the use of “edutainment” and “cloud technologies” in the preparation of future teachers of musical art.Methods of research: analysis of psychological and pedagogical literature in order to determine the state of development of the problem; synthesis, comparison, generalization for justifying the concepts of “edutainment” and “cloud technologies” and methods of their use in the educational process.This article deals with issues of the use of edutainment technologies and “cloud technologies”. It is offered conditions of using edutainment and “cloud technologies” in post-nonclassical professional art education on the example of subject “Musical Art”. Actual “cloud” services are analyzed and examples of their integration to educational process of professional art establishments are proposed.


Author(s):  
Charles R. Ortloff

Charles Ortloff provides a new perspective on archaeological studies of the urban and agricultural water supply and distribution systems of the major ancient civilizations of South America, the Middle East, and South-East Asia, by using modern computer analysis methods to extract the true hydraulic/hydrological knowledge base available to these peoples. His many new revelations about the capabilities and innovations of ancient water engineers force us to re-evaluate what was known and practised in the hydraulic sciences in ancient times. Given our current concerns about global warming and its effect on economic stability, it is fascinating to observe how some ancient civilizations successfully coped with major climate change events by devising defensive agricultural survival strategies, while others, which did not innovate, failed to survive.


2021 ◽  
Vol 49 (3) ◽  
pp. 19-27
Author(s):  
Michael Heron ◽  
Pauline Belford

The Scandal in Academia [32] [33] [34] [35] is an extended fictional case-study intended for use as a teaching and discussion aid for educational practitioners looking to introduce elements of computer ethics into their curricula. Inspired by Epstein [17] [18] it is a full-cycle scenario involving many individuals which touches upon the complexity and interrelations of modern computer ethics. It has been trailed and evaluated as a teaching tool by the authors [36] and with multiple groups since then. However its utility as a general resource is limited without the academic context that supports deeper investigation of the material. It is to address this issue that the authors offer this commentary on the Scandal, with a focus on the ninth and tenth newspaper items presented within. Specifically these are Culture of Fear and Nepotism at University and Witch-Hunts at the University - IT Crackdown Causes Criticisms.


Author(s):  
Mikhail Selianinau

AbstractIn this paper, we deal with the critical problem of performing non-modular operations in the Residue Number System (RNS). The Chinese Remainder Theorem (CRT) is widely used in many modern computer applications. Throughout the article, an efficient approach for implementing the CRT algorithm is described. The structure of the rank of an RNS number, a principal positional characteristic of the residue code, is investigated. It is shown that the rank of a number can be represented by a sum of an inexact rank and a two-valued correction to it. We propose a new variant of minimally redundant RNS, which provides low computational complexity for the rank calculation, and its effectiveness analyzed concerning conventional non-redundant RNS. Owing to the extension of the residue code, by adding the excess residue modulo 2, the complexity of the rank calculation goes down from $O\left (k^{2}\right )$ O k 2 to $O\left (k\right )$ O k with respect to required modular addition operations and lookup tables, where k equals the number of non-redundant RNS moduli.


2021 ◽  
Vol 1889 (5) ◽  
pp. 052005
Author(s):  
D A Nikolenko ◽  
V D Munister ◽  
A L Zolkin ◽  
I L Khvatov ◽  
A A Karapetyan

Sign in / Sign up

Export Citation Format

Share Document