Inferring the Source of Encrypted HTTP Connections. Michael Lin CSE 544
|
|
- Reginald Harrison
- 5 years ago
- Views:
Transcription
1 Inferring the Source of Encrypted HTTP Connections Michael Lin CSE 544
2 Hiding your identity You can wear a mask, but some distinguishing characteristics are visible: Height Weight Hair Clothing Even if everyone looked the same, we can determine some things about people based on their habits People who go to school everyday are probably students or teachers If you follow a strict schedule everyday (school, coffee shop, gym), you can be identified to some degree of accuracy There are 10 people who follow this exact schedule everyday.
3 Profiling How would you identify someone in a world of clones? Determine their schedule Determine their habits Profiling allows us to identify something without knowing what it is
4 Hiding your online identity Encryption will save us from prying eyes. Or will it? We can hide the header and contents of a packet behind encryption But can we still say something about the packet itself? Packet size Packet direction What about traffic patterns? Packet arrival rate/distribution
5 HTTP traffic profiling Using only packet size and direction, create profiles of traces of HTTP traffic for certain websites Instance - <Packet size, direction> Class - URL Create sets of instances for each class and use these sets to identify other traces to unknown sites These sets are surprisingly unique
6 Comparing HTTP traces Two relatively simple methods to get a rating of the similarity of two sets Jaccard s coefficient Intersection of two sets divided by union of two sets Think about this and it makes sense Naive Bayes classifier (Idiot s Bayes) Naive because it assumes every event is independent A surprisingly good indicator of similarity Important: you need something to compare against!
7 Collecting HTTP traces Gathered 100,000 URLs from DNS server logs Used Firefox to access top 2000 pages over an SSH tunnel 4 times a day over 2 months Used tcpdump to collect header information from these connections Analyzed the logs to get packet length and direction for connections to each site Create a library of profiles for sites
8 This is where the magic happens Now we have two methods for comparing sets and a big library of site profiles Say we intercepted some encrypted HTTP traffic and want to guess where it s going... Compare with all sites in the library to find the best match or two or ten
9 How well does it work? Surprisingly well Lots of variables to play with: Size of training set - the data used to create the library profile Size of test set Time between collection of training and test set Desired accuracy (top 1 most likely site or top k, k = 2, 3, 5, 10...) Number of sites in library Jaccard s coefficient is generally better than naive Bayes Bottom line: for a training set of 4 samples and a test set of 4 samples, they got ~75% accuracy
10 Effect of variables Increasing size of training set up to 4 greatly improves accuracy, after 4 they get diminishing returns Increasing k increases accuracy (duh) Time between training set and test set matters, but the difference is less than 10%, even after 4 weeks It doesn t matter if the training set comes from before or after the test set The fewer total sites there are in the library, the better the accuracy, but the drop in accuracy is relatively slow from (will this hold true to 40 million?)
11 Is this good enough? This is a philosophical question Given the relatively small amount of data collected for each site, I think this is good enough to be interesting This kind of accuracy requires a training and test set of size 4+ How likely are you to get a test set of that size? Even with perfect data, a maximum of ~75% accuracy is limiting
12 How can we make it worse? This analysis is based entirely on packet size Change the packet size, change the results 4 simple packet size padding methods: Linear Exponential Mice & elephants MTU All increase packet sizes in a deterministic manner
13 The effectiveness of padding Linear padding cuts accuracy in half Padding Accuracy Size Exponential makes it useless Total data transmitted remains small for linear and exponential Results for 10-accuracy are much better none linear exp m & e MTU
14 The not so great... For this to be useful, you need a library of every website Collecting this much data isn t easy How accurate will this be? With 38 million websites there s going to be a lot of sites that look the same They show that trivial packet padding makes this useless No results for test sets of size < 4
15 Future work Current analysis is weak to packet padding, they are looking to use packet arrival times to overcome this Even for non-padded packets, packet timing can be important (but also hard to use) Padding packets non-deterministically may be even stronger against profiling How reasonable is building a huge library of profiles for the entire Internet? In the end, is 75% accuracy good enough?
16 Take away You can say a lot about a book by its cover.
Inferring the Source of Encrypted HTTP Connections
Inferring the Source of Encrypted HTTP Connections Marc Liberatore Brian Neil Levine 1 Private Communications? Does link encryption provide privacy? VPNs, SSH tunnels, WEP/WPA, etc. 2 Anonymous Communication?
More informationHow to Stay Safe on Public Wi-Fi Networks
How to Stay Safe on Public Wi-Fi Networks Starbucks is now offering free Wi-Fi to all customers at every location. Whether you re clicking connect on Starbucks Wi-Fi or some other unsecured, public Wi-Fi
More informationDefinition. Quantifying Anonymity. Anonymous Communication. How can we calculate how anonymous we are? Who you are from the communicating party
Definition Anonymous Communication Hiding identities of parties involved in communications from each other, or from third-parties Who you are from the communicating party Who you are talking to from everyone
More informationWithin Kodi you can add additional programs called addons. Each of these addons provides access to lots of different types of video content.
There are a lot of misconceptions in the Kodi world about what buffering is, what causes it, why it happens and how to help avoid it. So I wanted to write an article addressing some of the causes of buffering
More informationWelfare Navigation Using Genetic Algorithm
Welfare Navigation Using Genetic Algorithm David Erukhimovich and Yoel Zeldes Hebrew University of Jerusalem AI course final project Abstract Using standard navigation algorithms and applications (such
More informationOptimization and least squares. Prof. Noah Snavely CS1114
Optimization and least squares Prof. Noah Snavely CS1114 http://cs1114.cs.cornell.edu Administrivia A5 Part 1 due tomorrow by 5pm (please sign up for a demo slot) Part 2 will be due in two weeks (4/17)
More informationDepartment of Computer Science and Engineering. CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016
Department of Computer Science and Engineering CSE 3214: Computer Network Protocols and Applications Instructor: N. Vlajic Date: Feb 23, 2016 Midterm Examination Instructions: Examination time: 75 min.
More informationAsking for information (with three complex questions, so four main paragraphs)
Structures of different kinds of emails Write typical paragraph plans for the kinds of emails, describing the paragraphs in the body and what kinds of opening lines and closing lines you need. Asking for
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationBayes Classifiers and Generative Methods
Bayes Classifiers and Generative Methods CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington 1 The Stages of Supervised Learning To
More informationBIG-IP Analytics: Implementations. Version 12.1
BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting
More informationLoad Balancing 101: Nuts and Bolts
Load Balancing 101: Nuts and Bolts Load balancing technology is the basis on which today s Application Delivery Controllers operate. But the pervasiveness of load balancing technology does not mean it
More information15 Minute Traffic Formula. Contents HOW TO GET MORE TRAFFIC IN 15 MINUTES WITH SEO... 3
Contents HOW TO GET MORE TRAFFIC IN 15 MINUTES WITH SEO... 3 HOW TO TURN YOUR OLD, RUSTY BLOG POSTS INTO A PASSIVE TRAFFIC SYSTEM... 4 HOW I USED THE GOOGLE KEYWORD PLANNER TO GET 11,908 NEW READERS TO
More informationAnonymous Communication and Internet Freedom
Anonymous Communication and Internet Freedom CS 161: Computer Security Prof. David Wagner May 2, 2013 Goals For Today State-sponsored adversaries Anonymous communication Internet censorship State-Sponsored
More informationSymmetric-Key Cryptography Part 1. Tom Shrimpton Portland State University
Symmetric-Key Cryptography Part 1 Tom Shrimpton Portland State University Building a privacy-providing primitive I want my communication with Bob to be private -- Alice What kind of communication? SMS?
More informationTips & Tricks Making Accessible PowerPoint Presentations
Use Slide Layouts Why? Using the built-in slide layouts will ensure that the text you enter will be read correctly by a screen reader and will be shown in the Outline View. To add a new slide, select the
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationNetworking Past, Present and Future
Networking 1 Networking Past, Present and Future Networking is a crucial feature of many modern games Used (12+ years ago) to be mainly PC Halo 2 brought online to the consoles Core feature of all consoles
More informationSpam. Time: five years from now Place: England
Spam Time: five years from now Place: England Oh no! said Joe Turner. When I go on the computer, all I get is spam email that nobody wants. It s all from people who are trying to sell you things. Email
More information1 GSW Bridging and Switching
1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationName: Tutor s
Name: Tutor s Email: Bring a couple, just in case! Necessary Equipment: Black Pen Pencil Rubber Pencil Sharpener Scientific Calculator Ruler Protractor (Pair of) Compasses 018 AQA Exam Dates Paper 1 4
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationThree Types of Probability
CHAPTER Three Types of Probability This article is not so much about particular problems or problem solving tactics as it is about labels. If you think about it, labels are a big key to the way we organize
More informationDiode Lab vs Lab 0. You looked at the residuals of the fit, and they probably looked like random noise.
Diode Lab vs Lab In Lab, the data was from a nearly perfect sine wave of large amplitude from a signal generator. The function you were fitting was a sine wave with an offset, an amplitude, a frequency,
More informationBasic Reliable Transport Protocols
Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they
More informationLines of Symmetry. Grade 3. Amy Hahn. Education 334: MW 8 9:20 a.m.
Lines of Symmetry Grade 3 Amy Hahn Education 334: MW 8 9:20 a.m. GRADE 3 V. SPATIAL SENSE, GEOMETRY AND MEASUREMENT A. Spatial Sense Understand the concept of reflection symmetry as applied to geometric
More informationEECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta. 3. You have 120 minutes to complete the exam. Use your time judiciously.
EECS 3214 Midterm Test Winter 2017 March 2, 2017 Instructor: S. Datta Name (LAST, FIRST): Student number: Instructions: 1. If you have not done so, put away all books, papers, and electronic communication
More informationThe MailNinja 7-Step Success Formula For Sending Lead Generating Campaigns
The MailNinja 7-Step Success Formula For Sending Lead Generating Email Campaigns The MailNinja 7-Step Success Formula For Sending Lead Generating Email Campaigns Over the past 10 years we ve perfected
More information! " Lecture 5: Networking for Games (cont d) Packet headers. Packet footers. IP address. Edge router (cable modem, DSL modem)
Lecture 5: Networking for Games (cont d) Special Send case: to NAT 123.12.2.10 network 192.168.1.101 17.4.9.33 192.168.1.100 123.12.2.[0-128] IP address 23.11.3.10 Edge router (cable modem, DSL modem)
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries
More informationSearch Lesson Outline
1. Searching Lesson Outline 2. How to Find a Value in an Array? 3. Linear Search 4. Linear Search Code 5. Linear Search Example #1 6. Linear Search Example #2 7. Linear Search Example #3 8. Linear Search
More informationWhat are the most likely declarations of "month" in the old and new versions of the program?
All multiple choice questions are equally weighted. You can generally assume that code shown in the questions is syntactically correct, unless something in the question or one of the answers suggests otherwise.
More informationCSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management
CSE/EE 461 Lecture 13 Connections and Fragmentation Tom Anderson tom@cs.washington.edu Peterson, Chapter 5.2 TCP Connection Management Setup assymetric 3-way handshake Transfer sliding window; data and
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Sorting lower bound and Linear-time sorting Date: 9/19/17 5.1 Introduction You should all know a few ways of sorting in O(n log n)
More informationExcel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller
Excel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller Table of Contents Introduction!... 1 Part 1: Entering Data!... 2 1.a: Typing!... 2 1.b: Editing
More informationunderstanding media metrics WEB METRICS Basics for Journalists FIRST IN A SERIES
understanding media metrics WEB METRICS Basics for Journalists FIRST IN A SERIES Contents p 1 p 3 p 3 Introduction Basic Questions about Your Website Getting Started: Overall, how is our website doing?
More informationWhat did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation
Week 12 - Friday What did we talk about last time? Finished hunters and prey Class variables Constants Class constants Started Big Oh notation Here is some code that sorts an array in ascending order
More informationCSE 4215/5431: Mobile Communications Winter Suprakash Datta
CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted
More informationCS 354R: Computer Game Technology
CS 354R: Computer Game Technology AI Fuzzy Logic and Neural Nets Fall 2018 Fuzzy Logic Philosophical approach Decisions based on degree of truth Is not a method for reasoning under uncertainty that s probability
More informationMeeting 40. CEH Networking
Cyber@UC Meeting 40 CEH Networking If You re New! Join our Slack ucyber.slack.com SIGN IN! Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach, Recruitment
More informationAMP-Based Flow Collection. Greg Virgin - RedJack
AMP-Based Flow Collection Greg Virgin - RedJack AMP- Based Flow Collection AMP - Analytic Metadata Producer : Patented US Government flow / metadata producer AMP generates data including Flows Host metadata
More informationResearch on adaptive network theft Trojan detection model Ting Wu
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 215) Research on adaptive network theft Trojan detection model Ting Wu Guangdong Teachers College of Foreign
More informationLecture 10: Protocol Design
Lecture 10: Protocol Design Prof. Shervin Shirmohammadi SITE, University of Ottawa Fall 2005 CEG 4183 10-1 Introduction TCP and UDP are generic protocols: They fulfill the needs of a wide range of applications
More informationMA30SA Applied Math Unit D - Linear Programming Revd:
1 Introduction to Linear Programming MA30SA Applied Math Unit D - Linear Programming Revd: 120051212 1. Linear programming is a very important skill. It is a brilliant method for establishing optimum solutions
More informationch02 True/False Indicate whether the statement is true or false.
ch02 True/False Indicate whether the statement is true or false. 1. No matter what medium connects computers on a network copper wires, fiber-optic cables, or a wireless setup the same protocol must be
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationPre-Algebra Notes Unit 8: Graphs and Functions
Pre-Algebra Notes Unit 8: Graphs and Functions The Coordinate Plane A coordinate plane is formed b the intersection of a horizontal number line called the -ais and a vertical number line called the -ais.
More information1. Please, please, please look at the style sheets job aid that I sent to you some time ago in conjunction with this document.
1. Please, please, please look at the style sheets job aid that I sent to you some time ago in conjunction with this document. 2. W3Schools has a lovely html tutorial here (it s worth the time): http://www.w3schools.com/html/default.asp
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationComputer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017
Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes
More information17 February Given an algorithm, compute its running time in terms of O, Ω, and Θ (if any). Usually the big-oh running time is enough.
Midterm Review CSE 2011 Winter 2011 17 February 2011 1 Algorithm Analysis Given an algorithm, compute its running time in terms of O, Ω, and Θ (if any). Usually the big-oh running time is enough. Given
More informationPrivate Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes
Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,
More informationBreakdown of Some Common Website Components and Their Costs.
Breakdown of Some Common Website Components and Their Costs. Breakdown of Some Common Website Components and Their Costs. The cost of a website can vary dramatically based on the specific components included.
More informationMidterm. You have two and a half hours to complete this exam (but you shouldn t need it).
Midterm LBSC 690 October 29, 2012 Name: }{{} by writing my name I swear by the honor code Read all of the following information before starting the exam: Show all work, clearly and in order, if you want
More informationNearest Neighbors Classifiers
Nearest Neighbors Classifiers Raúl Rojas Freie Universität Berlin July 2014 In pattern recognition we want to analyze data sets of many different types (pictures, vectors of health symptoms, audio streams,
More informationNote. Some History 8/8/2011. TECH 6 Approaches in Network Monitoring ip/f: A Novel Architecture for Programmable Network Visibility
TECH 6 Approaches in Network Monitoring ip/f: A Novel Architecture for Programmable Network Visibility Steve McCanne - CTO riverbed Note This presentation is for information purposes only and is not a
More information1) Complete problems 1-65 on pages You are encouraged to use the space provided.
Dear Accelerated Pre-Calculus Student (017-018), I am excited to have you enrolled in our class for next year! We will learn a lot of material and do so in a fairly short amount of time. This class will
More informationCSE 461: Computer Networks John Zahorjan Justin Chan Rajalakshmi Nandkumar CJ Park
CSE 461: Computer Networks John Zahorjan zahorjan@cs Justin Chan jucha@cs Rajalakshmi Nandkumar rajaln@cs CJ Park cjparkuw@cs Course Staff Grading Assignments/Projects/Homeworks: 55% Midterm: 15% Final:
More informationWarm-Ups 2D & 3D Shapes 2D Shapes
Warm-Ups 2D & 3D Shapes The Mystery Shape Students are given 4 clues describing the mystery shape. Eg: I have 3 straight sides. What Am I? I drew a shape with 4 sides. What might my shape look like? It
More informationTRAFFIC STAT SETTINGS
TRAFFIC STAT SETTINGS If you have followed the SEO Breakthrough Strategy Overview document, you will have seen that traffic was a recommended step to have in place prior to any backlinking campaign. This
More informationIf you re serious about Cookie Stuffing, take a look at Cookie Stuffing Script.
Cookie Stuffing What is Cookie Stuffing? Cookie Stuffing is a very mild form of black hat marketing, because in all honesty, this one doesn t break any laws. Certainly, it goes against the terms of service
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationHow To Test Your Code A CS 1371 Homework Guide
Introduction After you have completed each drill problem, you should make it a habit to test your code. There are good ways of testing your code and there are bad ways of testing your code. This guide
More informationUNIVERSITY OF OSLO. Faculty of mathematics and natural sciences. INF3190/INF4190 Data Communications. All printed and written material, calculator
UNIVERSITY OF OSLO Faculty of mathematics and natural sciences Examination in Day of examination: 2nd June, 2004 Examination hours: 9.00 12.00 This problem set consists of 6 pages. Appendices: Permitted
More informationSerial-to-Ethernet Tunnel Application Note
Serial-to-Ethernet Tunnel Application Note Introduction This application note applies to the platforms listed below. SBL2e based Serial To Ethernet devices can also do serial tunneling but the default
More informationD2L Start Up! I. To log in... 2 II. Your Profile I. Main Navigation Bar... 3 II. News... 4 III. Role Switch... 4 IV. Calendar...
D2L Start Up! Objectives: Familiarize yourself with the Main Navigation Bar in D2L. Create your profile. Create and delete News Items. Set up notifications. Create modules and sub-modules. Upload documents
More informationCSE 565 Computer Security Fall 2018
CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based
More informationTransitioning Teacher Websites
Transitioning Teacher Websites Google sites is an online web building tool that can be accessed and updated from anywhere there is an internet connection. Here is a brief video introduction of Google sites.
More informationData Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi.
Data Structures and Algorithms Dr. Naveen Garg Department of Computer Science and Engineering Indian Institute of Technology, Delhi Lecture 18 Tries Today we are going to be talking about another data
More informationPart 2: The Material PART 2
PART 2 With the introduction of what an object is, now we are ready to learn the CONSTRUCTOR concept. Just to refresh our memory, let s take a look at what we have learned in part 1. A sample class declaration,
More informationUsing Visual Motifs to Classify Encrypted Traffic
Using Visual Motifs to Classify Encrypted Traffic VizSEC'06 - November 3, 2006 Charles V Wright Fabian Monrose Gerald M Masson Johns Hopkins University Information Security Institute Traffic Classification:
More informationCorrelation of Ontario Mathematics 2005 Curriculum to. Addison Wesley Mathematics Makes Sense
Correlation of Ontario Mathematics 2005 Curriculum to Addison Wesley Math Makes Sense 2 Number Sense and Numeration Overall Expectations By the end of Grade 2, students will: read, represent, compare,
More informationTHE FUTURE OF PERSONALIZATION IS VISUAL WHITE PAPER
WHITE PAPER The Future of Personalization is Visual 1 It s hard to believe that ecommerce has been around for more than two decades, and juggernaut sites like Amazon and ebay were first launched in the
More informationUsability Test Report: Bento results interface 1
Usability Test Report: Bento results interface 1 Summary Emily Daly and Ian Sloat conducted usability testing on the functionality of the Bento results interface. The test was conducted at the temporary
More informationNo, the bogus packet will fail the integrity check (which uses a shared MAC key).!
1. High level questions a. Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with
More informationUnit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?
Unit 9 Tech savvy? Lesson A Tech support 1 I have no idea why... A Unscramble the questions. 1. which battery / Do you know / should / buy / I? Do you know which battery I should buy? 2. they / where /
More informationBefore I show you this month's sites, I need to go over a couple of things, so that we are all on the same page.
Before I show you this month's sites, I need to go over a couple of things, so that we are all on the same page. You will be shown how to leave your link on each of the sites, but abusing the sites can
More informationWHITE PAPER. Best Practices for Web Application Firewall Management
WHITE PAPER Best Practices for Web Application Firewall Management WHITE PAPER Best Practices for Web Application Firewall Management.. INTRODUCTION 1 DEPLOYMENT BEST PRACTICES 2 Document your security
More informationArtificial Intelligence Naïve Bayes
Artificial Intelligence Naïve Bayes Instructors: David Suter and Qince Li Course Delivered @ Harbin Institute of Technology [M any slides adapted from those created by Dan Klein and Pieter Abbeel for CS188
More informationServer monitoring for Tor exit nodes
CASE STUDY Server monitoring for Tor exit nodes We had a chance to catch up with Kenan Sulayman, who runs some of the biggest Tor servers in the world. Read on to learn about server monitoring for highthroughput
More informationLesson 12 Lab Key Lab Exercises
Lab 1 Doing a Ping Test Lesson 12 Lab Key Lab Exercises The purpose of this lab is to familiarize the student with running a ping test. This lab will also help the student correctly interpret the results
More informationWEBINAR. Web Browsing 101 1/12/2012 WEBINAR TIPS:
Browsing 101 WEBINAR TIPS: 1. Power off cell phones. 2. If accessing webinar through telephone, turn down volume of computer speakers (or mute them.) 3. Conference attendees will be muted during webinar
More informationHandout 20 - Quiz 2 Solutions
Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.033 Computer Systems Engineering: Spring 2001 Handout 20 - Quiz 2 Solutions 20 Average: 81 Median: 83 Std.
More informationThe Activist Guide to Secure Communication on the Internet. Introduction
The Activist Guide to Secure Communication on the Internet Posted by: The Militant Posted on: September 3rd 2008 Updated on: September 8th 2008 Introduction 1 - Secure Internet Access 1.1 - Internet Cafes
More informationSeries. Student. Space and Shape. My name
Series Student Space and Shape My name Copyright 2009 3P Learning. All rights reserved. First edition printed 2009 in Australia. A catalogue record for this book is available from 3P Learning Ltd. ISN
More informationEasy VPN. About Easy VPN
This chapter describes how to configure any ASA as an Server, and the Cisco ASA with FirePOWER- 5506-X, 5506W-X, 5506H-X, and 5508-X models as an Remote hardware client. About, page 1 Configure Remote,
More informationApplication Layer Attacks. Application Layer Attacks. Application Layer. Application Layer. Internet Protocols. Application Layer.
Application Layer Attacks Application Layer Attacks Week 2 Part 2 Attacks Against Programs Application Layer Application Layer Attacks come in many forms and can target each of the 5 network protocol layers
More informationDe-identifying Facial Images using k-anonymity
De-identifying Facial Images using k-anonymity Ori Brostovski March 2, 2008 Outline Introduction General notions Our Presentation Basic terminology Exploring popular de-identification algorithms Examples
More informationCS140 Final Project. Nathan Crandall, Dane Pitkin, Introduction:
Nathan Crandall, 3970001 Dane Pitkin, 4085726 CS140 Final Project Introduction: Our goal was to parallelize the Breadth-first search algorithm using Cilk++. This algorithm works by starting at an initial
More informationQ: Which month has the lowest sale? Answer: Q:There are three consecutive months for which sale grow. What are they? Answer: Q: Which month
Lecture 1 Q: Which month has the lowest sale? Q:There are three consecutive months for which sale grow. What are they? Q: Which month experienced the biggest drop in sale? Q: Just above November there
More information«On the Internet, nobody knows you are a dog» Twenty years later
«On the Internet, nobody knows you are a dog» Twenty years later This lecture is about identity and authenticity, but also other security properties. It is largely about the Internet, but some of this
More informationSirindhorn International Institute of Technology Thammasat University
Name.............................. ID............... Section...... Seat No...... Sirindhorn International Institute of Technology Thammasat University Course Title: IT Security Instructor: Steven Gordon
More informationCS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance
: Computer Networks Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance TCP performance We ve seen how TCP the protocol works But there are a lot of tricks required to make it work well Indeed,
More informationThe Internet. Tim Capes. November 7, 2011
The Internet Tim Capes November 7, 2011 What is the Internet? The internet is a global system consisting of millions if interconnected networks. These individual networks are anything from local (a Home
More informationLearning Coding and Math with RoboBlockly Teaching Resource for Integrated Mathematics 1/Algebra I
Learning Coding and Math with RoboBlockly Teaching Resource for Integrated Mathematics 1/Algebra I Harry H. Cheng UC Davis Center for Integrated Computing and STEM Education (C-STEM) http://c-stem.ucdavis.edu
More informationF8-18 Finding the y-intercept from Ordered Pairs
F8-8 Finding the -intercept from Ordered Pairs Pages 5 Standards: 8.F.A., 8.F.B. Goals: Students will find the -intercept of a line from a set of ordered pairs. Prior Knowledge Required: Can add, subtract,
More informationHonors Algebra 2 Summer Packet
Honors Algebra Summer Packet Name Algebra 1 Teacher Geometry Teacher The start of Algebra is just around the corner, and after finishing a great year in Geometry, there are probably some Algebra skills
More informationONLINE EVALUATION FOR: Company Name
ONLINE EVALUATION FOR: Company Name Address Phone URL media advertising design P.O. Box 2430 Issaquah, WA 98027 (800) 597-1686 platypuslocal.com SUMMARY A Thank You From Platypus: Thank you for purchasing
More informationW[1]-hardness. Dániel Marx 1. Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary
W[1]-hardness Dániel Marx 1 1 Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI) Budapest, Hungary School on Parameterized Algorithms and Complexity Będlewo, Poland
More information