Detecting Anomalies in Service Logs by Using Geographic Tagging
|
|
- Lionel Cook
- 5 years ago
- Views:
Transcription
1 Detecting Anomalies in Service Logs by Using Geographic Tagging Roman Tekhov Abstract. This article explains what relevant information can be obtained from log files of well known formats, tells how geolocation information can be retrieved, briefly describes existing solutions, introduces the program created to solve the problem and summarizes result obtained from experiments.. Keywords: log analysis, geolocation 1 Introduction The user s credentials may get stolen and the person who accomplished this may use this information in order to impersonate the real owner. In today s globalized world, however, there is a great possibility that the real user and the impostor are physically separated by large distances, possibly located in different countries or even continents. If we could analyze the history of user s requests in terms of locations from which those requests were made, then we could probably detect cases of credential leakage. Service logs typically contain such information, so the problem boils down to the following series of actions: 1. Parse various log files. 2. Retrieve user request information from the logs, i.e. the source host or IP address and the time of each request. 3. Determine the geolocation of each source host or IP address. 4. Compose a scheme of user s movements and detect suspicious cases such as: a. Moving speed that is too large to be really feasible. b. Frequent random moving between different locations, especially distinct ones. c. Requests made from countries that are not considered trust-worthy. d. Movement activity that is too rapid when compared to an average user. Even if the movement takes place in one single city it might indicate that the account is used by multiple people. 2 Retrieving Information from Log Files In order to be useful for our case the log file must contain separate entries about client requests. Each such log entry must contain three things: the user identifier, the source host or IP from which the user performed the request and the exact time of the
2 request. Luckily all major web servers log their data using the corresponding structure. 2.1 Common Log File Format and Apache/NCSA Combined Log Format Common format is a W3C standard format which is used by the Apache server for example. The entries have the following structure: host rfc931 authuser [date] request status bytes The so-called combined log format can be used by Apache as an alternative. The structure is similar to the common format but three additional fields are added: host rfc931 authuser [date] request status bytes refferer user_agent cookie We are only interested in fields host (remote host from which the request was recieved), auhtuser (client username) and date (time of the request) 2.2 W3C Extended Log Format Another W3C standardized format which is used by the Microsoft Internet Information Server for example. This is format is highly customizable and can output lots of different information in custom order. Once again we are only interested in the following fields: c-ip (remote host or IP address), cs-username (username), two separate fields date and time (time of the request). 2.3 OpenVPN Status Log Format OpenVPN is a popular Virtual Private Network implementation. OpenVPN outputs information concerning its currently connected users to a so-called status log file. In case this log is rotated in order to save the history of user actions it is also theoretically possible to analyze the past entries. The structure of the status log entry is the following: Virtual Address,Common Name,Real Address,Last Ref Common Name identifies the user; Real Address represents the remote host and Last Ref the time of the last request.
3 3 Geolocation Once the IP address is obtained it becomes possible to analyze it in order to retrieve the geographical location that this address belongs to. The geolocation software is used to achieve this. Typically such software contains a database of corresponding IP addresses and geographical locations. When the user has an IP address and wishes to know what region it belongs to then he or she submits a query via some interface and the software performs a lookup in the database to retrieve the most probable match. There are several ways how to create such databases: Collect user-submitted data about their location together with the address they submitted from. E.g. in case of a weather forecast site people will most frequently request information concerning their actual whereabouts. Collect the IP addresses from which users connect most frequently together with addresses registered in their account profiles. Use databases of Internet Service Providers. Combine data from multiple different sources. Popular vendors of the geolocation software include Quova IP2Location MaxMind GeoIP All of these vendors offer commercial products. MaxMind also offers an alternative free database called GeoLite that is less accurate but is available for everyone to download. It also offers a number of open-source API-s for working with the database using various languages, e.g. C, Java and Python. Proxy Servers. If the client refers to the server not directly but via a proxy server, then the geolocation will not produce the right result since the real source IP address stays unknown. It is possible, however, to detect the usage of proxies and to report that fact as a sign of suspicion of its own. 4 Created Program The program called FraudDetector got implemented in Java. 4.1 Log File Format Configuration Section 2 of this report only describes some of the most widely spread formats that servers might use to log their data. In practice there are numerous possible ways how such data might be structured so the software has to be configurable enough to support any custom format. All standard formats, like those listed previously, have to be predefined to allow out-of-the-box usage.
4 Format Descriptions. Supported formats are described using a special XML structure in formats.xml file. So far only such formats where a separate single line represents a single user request are supported. Here is a sample description corresponding to Common Log File Format: <format> <name>common</name> <reg-exp> ^([\d.]+) (\S+) (\S+) \[([\w:/]+\s[+\-]\d{4})\] "(.+?)" (\d{3}) (\d+) </reg-exp> <host-part>1</host-part> <user-part>3</user-part> <date-part>4</date-part> <date-format>dd/mmm/yyyy:hh:mm:ss Z</date-format> <date-locale>en</date-locale> </format> Most of the fields provide instructions about how each line of the log should be parsed. The idea is to break the line into logically separated parts. The reg-exp element contains the Java regular expression used to do exactly that. Each part is included in parenthesis which is a way to tell the Java pattern matching mechanism to distinguish a separate group of characters. The host-part, user-part and date-part contain numbers of parts which contain the corresponding data portions. Elements date-format and date-locale serve the purpose of date parsing and contain the date pattern and locale to use. For example consider the following log entry: roman [02/Mar/2010:22:30: ] "GET /test.html HTTP/1.1" It will be broken in 7 parts from which are interested in 3: host ( , part 1), user (roman, part 3) and date (02/Mar/2010:22:30: , part 4). 4.2 Log File Reading and Processing The program can read data from one or multiple log files specified in configuration file. The files might be of different format: format.common=some-common.log, other-common.log format.combined=some-combined.log, other-combined.log The program processes each log in a separate thread parsing each line using the corresponding format description. In keeps track of all encountered users and populates a registry of them and all their requests discovered in logs.
5 4.3 Geolocation Once the data is gathered the program starts to analyze it. If some user has referred from multiple different hosts then there is a possibility of fraud. In this case geolocation of all that users remote hosts is performed using MaxMind database. It is possible to specify the location of the binary database file in the configuration. For development and experiments we use the freely available GeoLite City database. MaxMind open-source Java API is used for actual querying. The retrieved Location object contains information concerning the most probable match obtained from the database. This information includes the following useful fields: Country name and code. City name. Geographical coordinates (latitude and longitude). This information is already enough for applying some analysis metrics listed in introduction, e.g. determine whether the user has referred from lots of different distinct locations or from non trust-worthy countries. 4.4 Movement Calculation Since we have the exact time of each request and the coordinates of the location from which that request was made, it is possible to determine the speed of movements between those locations. Suppose we have 2 consecutive requests from the same user: 1. IP , date :30:23 2. IP , date :35:34 Time between these two requests is 5 minutes and 11 seconds or 0,086 hours. The first IP originates from Tartu, Estonia. The second belongs to Oslo, Norway. The distance between those cities is 926,559 km. It means that the speed of moving from Tartu to Oslo had to be 10725,443 km/h which is not likely to be feasible so there is a large possibility of fraud. At this stage all such suspicious cases are just printed to a specified file as an output. 5 Experiments Work in progress, summary will be present in the final version. 6 Conclusion Conclusion will be based on experiment results.
6 References 1. Logging Control In W3C httpd, 2. Extended Log File Format, 3. MaxMind,
Authentication. Katarina
Authentication Katarina Valalikova @KValalikova k.valalikova@evolveum.com 1 Agenda History Multi-factor, adaptive authentication SSO, SAML, OAuth, OpenID Connect Federation 2 Who am I? Ing. Katarina Valaliková
More informationWeb Services in Cincom VisualWorks. WHITE PAPER Cincom In-depth Analysis and Review
Web Services in Cincom VisualWorks WHITE PAPER Cincom In-depth Analysis and Review Web Services in Cincom VisualWorks Table of Contents Web Services in VisualWorks....................... 1 Web Services
More informationLooking Inside the Developer s Toolkit: Web Services for Everyday RPG Consumption. Charles Guarino XML. Charles Guarino
Looking Inside the Developer s Toolkit: Web Services for Everyday RPG Consumption Charles Guarino XML Charles Guarino Central Park Data Systems, Inc. Copyright Central Park Data Systems, Inc. 1 About the
More informationWhere is Geolocation of an IP Address?
WHAT IS MY IP HIDE IP CHANGE IP VPN PROXY DDOS WEB S KB FORUMS Where is Geolocation of an IP Address? Your public IP Address is 73.245.1.29. Hide IP with VPN IPv4, IPv6 or Domain Name IP Lookup Here are
More informationRelease Presentation. ODS Web Services Version Open Data Services Via Web Services. Release Date: 2014/09/30
Release Presentation ODS Web Services Version 1.1.1 Open Data Services Via Web Services Release Date: 2014/09/30 Deliverables The document represents a companion standard recommendation for interacting
More informationDATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016
DATABASE SYSTEMS Introduction to MySQL Database System Course, 2016 AGENDA FOR TODAY Administration Database Architecture on the web Database history in a brief Databases today MySQL What is it How to
More informationOleksandr Kuzomin, Bohdan Tkachenko
International Journal "Information Technologies Knowledge" Volume 9, Number 2, 2015 131 INTELLECTUAL SEARCH ENGINE OF ADEQUATE INFORMATION IN INTERNET FOR CREATING DATABASES AND KNOWLEDGE BASES Oleksandr
More informationgeoip2 Documentation Release Gregory Oschwald
geoip2 Documentation Release 2.9.0 Gregory Oschwald May 25, 2018 Contents 1 Description 1 2 Installation 3 2.1 Database Reader Extension....................................... 3 3 IP Geolocation Usage
More informationLocation-Based Social Software for Mobile Devices. Inventors: Dennis Crowley Alex Rainert New York, NY Brooklyn, NY 11231
Title: Location-Based Social Software for Mobile Devices Date: April 28, 2004 Inventors: Dennis Crowley Alex Rainert New York, NY 10002 Brooklyn, NY 11231 dens@dodgeball.com alex@dodgeball.com Abstract
More informationW3C Geolocation API. Making Websites Location-aware
W3C Geolocation API Making Websites Location-aware me Director of Consumer Products at Skyhook Wireless Founded Locationaware.org which eventually became W3C Geolocation API Working Group Follow @rsarver
More informationMagento 2 / Google Maps Integration User Guide For Extension Version 1.0.2
Magento 2 / Google Maps Integration User Guide For Extension Version 1.0.2 This document details the installation, configuration and functionality of the DP Extensions Google Maps Integration for Magento
More informationBusinessObjects OLAP Intelligence XI
Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft
More informationDIRAC distributed secure framework
Journal of Physics: Conference Series DIRAC distributed secure framework To cite this article: A Casajus et al 2010 J. Phys.: Conf. Ser. 219 042033 View the article online for updates and enhancements.
More informationE-Agricultural Services and Business
E-Agricultural Services and Business The Sustainable Web Portal for Observation Data Naiyana Sahavechaphan, Jedsada Phengsuwan, Nattapon Harnsamut Sornthep Vannarat, Asanee Kawtrakul Large-scale Simulation
More informationInventions on Extending LDAP functionality- A TRIZ based Analysis
From the SelectedWorks of Umakant Mishra August, 2006 Inventions on Extending LDAP functionality- A TRIZ based Analysis Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/60/ Inventions
More informationDIRAC Distributed Secure Framework
DIRAC Distributed Secure Framework A Casajus Universitat de Barcelona E-mail: adria@ecm.ub.es R Graciani Universitat de Barcelona E-mail: graciani@ecm.ub.es on behalf of the LHCb DIRAC Team Abstract. DIRAC,
More informationA quick guide to... List Segmentation
A quick guide to... List Segmentation In this guide... Learn how to create razor-sharp list segments based on precise combinations of conditions then use those segments to generate profitable email marketing
More informationConfiguring and Monitoring the GeoDB
CHAPTER 8 This chapter describes how to implement the GeoIP database (GeoDB) proximity computation mechanism in GSS. From the latitudinal and longitudinal information in the GeoDB, GSS decides the proximity,
More informationUnderstanding ACS 5.4 Configuration
CHAPTER 2 ACS 5.4 Configuration : This chapter explains the differences in configuration between ACS 3.x and 4.x and ACS 5.4 when you convert the existing 3.x and 4.x configurations to 5.4. This chapter
More informationFROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE
FROM A RELATIONAL TO A MULTI-DIMENSIONAL DATA BASE David C. Hay Essential Strategies, Inc In the buzzword sweepstakes of 1997, the clear winner has to be Data Warehouse. A host of technologies and techniques
More informationBig Data Analytics CSCI 4030
High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering data streams SVM Recommen der systems Clustering Community Detection Queries on streams
More informationAssignment #3 CSCI 201 Spring % of course grade Title Weathermeister Back-End API Integration
Assignment #3 CSCI 201 4.5% of course grade Title Weathermeister Back-End API Integration Topics Covered Java Classes HTML CSS Basic Java Topics Java Servlets JSP JavaScript AJAX Databases SQL JDBC Overview
More informationWildlife Enforcement Monitoring System. User Manual. Khoi Nguyen Remi Chandran Ng Chong. type date version. User Manual July 07, 2011 Version 1-1
Wildlife Enforcement Monitoring System User Manual Khoi Nguyen Remi Chandran Ng Chong type date version User Manual July 07, 2011 Version 1-1 Extensible Message Gateway User Manual ii About this Document
More informationGOOGLE ANALYTICS HELP PRESENTATION. We Welcome You to. Google Analytics Implementation Guidelines
GOOGLE ANALYTICS HELP PRESENTATION We Welcome You to Google Analytics Implementation Guidelines 05/23/2008 Ashi Avalon - Google Analytics Implementation Presentation Page 1 of 28 1) What Is Google Analytics?
More informationConfigure WSA to Upload Log Files to CTA System
Configure WSA to Upload Log Files to CTA System Last updated: January 30, 2018 Contents Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active
More informationLecture 9a: Sessions and Cookies
CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global
More informationSecure web proxy resistant to probing attacks
Technical Disclosure Commons Defensive Publications Series December 04, 2017 Secure web proxy resistant to probing attacks Benjamin Schwartz Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationChapter 1 Introduction to HTML, XHTML, and CSS
Chapter 1 Introduction to HTML, XHTML, and CSS MULTIPLE CHOICE 1. The world s largest network is. a. the Internet c. Newsnet b. the World Wide Web d. both A and B A PTS: 1 REF: HTML 2 2. ISPs utilize data
More informationTop 10 Considerations for Securing Private Clouds
Top 10 Considerations for Securing Private Clouds 1 Who s that knocking at my door? If you know who s accessing your cloud, you can head off many problems before they turn into disasters. You should ensure
More informationmole Documentation Release 1.0 Andrés J. Díaz
mole Documentation Release 1.0 Andrés J. Díaz May 27, 2013 CONTENTS 1 Installation 3 2 Getting started 5 2.1 1. Configure mole............................................ 5 2.2 2. Start daemons.............................................
More informationHomework: Spatial Search using Apache Solr, SIS and Google Maps Due Date: May 7, 2014
Homework: Spatial Search using Apache Solr, SIS and Google Maps Due Date: May 7, 2014 1. Introduction So, we re at the end of the road here with assignments. Let s recap what you ve done so far: 1. In
More informationConfigure WSA to Upload Log Files to CTA System
Configure WSA to Upload Log Files to CTA System Last updated: April 19, 2018 Conventions Introduction Prerequisites Requirements Components Used Configure Configure the Proxy Connect to Active Directory
More informationManagement Intranet: Integrating Web-based Network Management Applications
Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125
More informationCS6200 Information Retreival. Crawling. June 10, 2015
CS6200 Information Retreival Crawling Crawling June 10, 2015 Crawling is one of the most important tasks of a search engine. The breadth, depth, and freshness of the search results depend crucially on
More informationMobile Phone Monitoring System For Android Operating System
Mobile Phone Monitoring System For Android Operating System Ms.M.Kalpana Devi Asst.Professor,SRIT,CBE Ms.D.Vasuki Final Year M.C.A.,Student Abstract The Purpose of the project is to trace out the status
More informationBuild
Web Dashboard User Manual Build 2.2.0.1 2017-04-05 This is the official user manual on using SAMLite web dashboard to perform reporting and administrative tasks. This manual describes each section of reporting
More informationSoftware Release Communication 02/07/2014. Topics covered. Solutions You Can Count On
Topics covered Vea Web... 2 User Access Changes... 4 Dashboard Sharing... 7 Component Upgrade... 8 System Manager Geocode Function... 9 Installer Changes... 11 VEA WEB The initial version of Vea Web, included
More informationARCHITECTURE ARCHITECTURE OVERVIEW
ARCHITECTURE ARCHITECTURE OVERVIEW The personalization of the customer experience is in every marketer s mind and this requirement has strong impacts on customer data integration, across channels and applications.
More informationDSNP: A Protocol for Personal Identity and Communication on the Web
DSNP: A Protocol for Personal Identity and Communication on the Web Dr. Adrian D. Thurston Vancouver, British Columbia, Canada thurston@complang.org Abstract The social web is emerging as a pervasive communication
More informationStatistics, Data Analysis & Econometrics
ST009 PROC MI as the Basis for a Macro for the Study of Patterns of Missing Data Carl E. Pierchala, National Highway Traffic Safety Administration, Washington ABSTRACT The study of missing data patterns
More informationMSNPawn Footprinting, Profiling & Assessment with MSN Search. Introduction
MSNPawn Footprinting, Profiling & Assessment with MSN Search Introduction Any search engine database is a very powerful source of information for web applications. The Search Engine s spiders are well-powered
More informationPrivacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras
Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 25 Tutorial 5: Analyzing text using Python NLTK Hi everyone,
More informationThe INSERT INTO Method
Article: Transferring Data from One Table to Another Date: 20/03/2012 Posted by: HeelpBook Staff Source: Link Permalink: Link SQL SERVER TRANSFERRING DATA FROM ONE TABLE TO ANOTHER Every DBA needs to transfer
More informationScrew You and the Script You Rode in On
Screw You and the Script You Rode in On David Byrne Managing Consultant dbyrne@trustwave.com Presented by: Charles Henderson Director, Application Security Services chenderson@trustwave.com Introductions
More informationDeep Web Content Mining
Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased
More informationFamily Map Server Specification
Family Map Server Specification Acknowledgements Last Modified: January 5, 2018 The Family Map project was created by Jordan Wild. Thanks to Jordan for this significant contribution. Family Map Introduction
More informationSecurity Enterprise Identity Mapping
System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationHTML5 - INTERVIEW QUESTIONS
HTML5 - INTERVIEW QUESTIONS http://www.tutorialspoint.com/html5/html5_interview_questions.htm Copyright tutorialspoint.com Dear readers, these HTML5 Interview Questions have been designed specially to
More informationCS 361S - Network Security and Privacy Spring Homework #1
CS 361S - Network Security and Privacy Spring 2017 Homework #1 Due: 11am CST (in class), February 13, 2017 YOUR NAME: Collaboration policy No collaboration is permitted on this assignment. Any cheating
More informationProject #3. Computer Science 2334 Fall Create a Graphical User Interface and import/export software for a Hurricane Database.
User Request: Project #3 Computer Science 2334 Fall 2007 Milestones: Create a Graphical User Interface and import/export software for a Hurricane Database. 1. Create import software that can read the output
More informationTable of Contents. Cisco How NAT Works
Table of Contents How NAT Works...1 This document contains Flash animation...1 Introduction...1 Behind the Mask...2 Dynamic NAT and Overloading Examples...5 Security and Administration...7 Multi Homing...9
More informationWe start by providing you with an overview of the key feature of the IBM BPM Process Portal.
Lab 1 Process Portal 1.1 Overview This lab exercise will make you familiar with the key capabilities of the ready-to-use Process Portal included with IBM Business Process Manager (BPM). You will experience
More informationEZproxy v6.3.5 Release Notes
EZproxy v6.3.5 Release Notes Release Date: November 2017 Last updated: November 20, 2017 Table of Contents Operating System Requirements... 2 Recommended Actions... 2 Release Notes... 3 Administrative
More informationClicking on Analytics will bring you to the Overview page.
YouTube Analytics - formerly known as Insight - is an extremely powerful set of tools that can provide you with a lot of information about your videos, your audience, and your customers. Clicking on Analytics
More informationCHAPTER 7 WEB SERVERS AND WEB BROWSERS
CHAPTER 7 WEB SERVERS AND WEB BROWSERS Browser INTRODUCTION A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information
More information[GET] Mass GeoIP Lookup Tool + Source Code
[GET] Mass GeoIP Lookup Tool + Source Code 1. Good morning everyone \o/ here i've made a tool for easily auditing location data from large lists of IP addresses to use it, just copy any block of text containing
More informationUser Guide. Version 1.5 Copyright 2006 by Serials Solutions, All Rights Reserved.
User Guide Version 1.5 Copyright 2006 by Serials Solutions, All Rights Reserved. Central Search User Guide Table of Contents Welcome to Central Search... 3 Starting Your Search... 4 Basic Search & Advanced
More informationScholarOne Manuscripts. COGNOS Reports User Guide
ScholarOne Manuscripts COGNOS Reports User Guide 1-May-2018 Clarivate Analytics ScholarOne Manuscripts COGNOS Reports User Guide Page i TABLE OF CONTENTS USE GET HELP NOW & FAQS... 1 SYSTEM REQUIREMENTS...
More informationCisco Expressway Authenticating Accounts Using LDAP
Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4
More informationInformation Extraction Techniques in Terrorism Surveillance
Information Extraction Techniques in Terrorism Surveillance Roman Tekhov Abstract. The article gives a brief overview of what information extraction is and how it might be used for the purposes of counter-terrorism
More informationUsing the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5
Using the vrealize Orchestrator Operations Client vrealize Orchestrator 7.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationTalend Component tgoogledrive
Talend Component tgoogledrive Purpose and procedure This component manages files on a Google Drive. The component provides these capabilities: 1. Providing only the client for other tgoogledrive components
More informationFamily Map Server Specification
Family Map Server Specification Acknowledgements The Family Map project was created by Jordan Wild. Thanks to Jordan for this significant contribution. Family Map Introduction Family Map is an application
More informationFamily Map Server Specification
Family Map Server Specification Acknowledgements The Family Map project was created by Jordan Wild. Thanks to Jordan for this significant contribution. Family Map Introduction Family Map is an application
More informationDynamic code downloading using Java TM (Using the java.rmi.server.codebase Property)
Pagina 1 Dynamic code downloading using Java TM RMI (Using the java.rmi.server.codebase Property) This tutorial is organized as follows: 1. Starting out 2. What is a codebase? 3. How does it work? 4. Using
More informationMalware and Vulnerability Check Point. 1. Find Problems 2. Tell Vendors 3. Share with Community
Malware and Vulnerability Research @ Check Point 1. Find Problems 2. Tell Vendors 3. Share with Community TR-069 quick tour / DEF CON recap Motivation The TR-069 Census 2014 Research Highlights Mass Pwnage
More informationCS 3201 Computer Networks 2014/2015 Handout: Lab 4
CS 3201 Computer Networks 2014/2015 Handout: Lab 4 Lab Content: - IP Addressing - IP Ports TCP/IP Fundamentals TCP/IP Settings - TCP/IP is a protocol that requires a little bit of knowledge to configure
More informationDATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2018
DATABASE SYSTEMS Introduction to MySQL Database System Course, 2018 CAUTION! *This class is NOT a recitation* We will NOT discuss the course material relevant to the exam and homework assignment We have
More informationLMS Instructions. To watch a video simply click on a category, then select the title you would like to train on and click play.
LMS Instructions Welcome to our learning management system! This is a guide and will explain you the basic functions of the LMS. If you are not already logged in you will notice a login option up top in
More information5 Choosing keywords Initially choosing keywords Frequent and rare keywords Evaluating the competition rates of search
Seo tutorial Seo tutorial Introduction to seo... 4 1. General seo information... 5 1.1 History of search engines... 5 1.2 Common search engine principles... 6 2. Internal ranking factors... 8 2.1 Web page
More informationThe Evaluation of Just-In-Time Hypermedia Engine
The Evaluation of Just-In-Time Hypermedia Engine Zong Chen 1, Li Zhang 2 1 (School of Computer Sciences and Engineering, Fairleigh Dickinson University, USA) 2 (Computer Science Department, New Jersey
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationC exam. IBM C IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile. Version: 1.
C9510-319.exam Number: C9510-319 Passing Score: 800 Time Limit: 120 min File Version: 1.0 IBM C9510-319 IBM WebSphere Application Server Developer Tools V8.5 with Liberty Profile Version: 1.0 Exam A QUESTION
More informationDomain Setup Guide. NetBrain Integrated Edition 7.1. All-in-One Appliance
NetBrain Integrated Edition 7.1 Domain Setup Guide All-in-One Appliance Version 7.1a Last Updated 2018-09-27 Copyright 2004-2018 NetBrain Technologies, Inc. All rights reserved. Contents 1. Setting Up
More informationEbook : Overview of application development. All code from the application series books listed at:
Ebook : Overview of application development. All code from the application series books listed at: http://www.vkinfotek.com with permission. Publishers: VK Publishers Established: 2001 Type of books: Develop
More informationCTI-TC Weekly Working Sessions
CTI-TC Weekly Working Sessions Meeting Date: October 18, 2016 Time: 15:00:00 UTC Purpose: Weekly CTI-TC Joint Working Session Attendees: Agenda: Jordan - Moderator Darley Christian Hunt Rich Piazza TAXII
More informationWWW Applications for an Internet Integrated Service Architecture
WWW Applications for an Internet Integrated Service Architecture T. V. Do, B. Kálmán, Cs. Király, Zs. Mihály, Zs. Molnár, Zs. Pándi Department of Telecommunications Technical University of Budapest Fax:
More informationConfiguration Management for Component-based Systems
Configuration Management for Component-based Systems Magnus Larsson Ivica Crnkovic Development and Research Department of Computer Science ABB Automation Products AB Mälardalen University 721 59 Västerås,
More informationConfiguring Vulnerability Assessment Devices
CHAPTER 10 Revised: November 10, 2007 Vulnerability assessment (VA) devices provide MARS with valuable information about many of the possible targets of attacks and threats. They provide information useful
More informationDatto Disaster Tracking
Datto Disaster Tracking Design/Architecture Document Masters of Disaster Nsama Chipalo, Brandon Cole, Aaron Damrau, Jhossue Jimenez, Jacob Peterson Last Updated May 11th, 2015 Table of Contents Table of
More informationOracle. Exam Questions 1z Java Enterprise Edition 5 Web Services Developer Certified Professional Upgrade Exam. Version:Demo
Oracle Exam Questions 1z0-863 Java Enterprise Edition 5 Web Services Developer Certified Professional Upgrade Exam Version:Demo 1.Which two statements are true about JAXR support for XML registries? (Choose
More informationPrivacy Policy. Last Updated: August 2017
Privacy Policy Last Updated: August 2017 Here at ConsenSys we know how much you value privacy, and we realize that you care about what happens to the information you provide to us through our website,
More informationDATABASE SYSTEMS. Introduction to MySQL. Database System Course, 2016
DATABASE SYSTEMS Introduction to MySQL Database System Course, 2016 AGENDA FOR TODAY Administration Database Architecture on the web Database history in a brief Databases today MySQL What is it How to
More informationHow Facebook knows exactly what turns you on
How Facebook knows exactly what turns you on We have developed our anti tracking system to combat a culture of user data collection which, we believe, has gone too far. These systems operate hidden from
More informationScreen Scraping. Screen Scraping Defintions ( Web Scraping (
Screen Scraping Screen Scraping Defintions (http://www.wikipedia.org/) Originally, it referred to the practice of reading text data from a computer display terminal's screen. This was generally done by
More informationGenesys Mobile Services API Reference. Phone Number Validation API
Genesys Mobile Services API Reference Phone Number Validation API 9/25/2018 Contents 1 Phone Number Validation API 1.1 API Query Genesys Mobile Services API Reference 2 Phone Number Validation API This
More informationLecture 1: Perfect Security
CS 290G (Fall 2014) Introduction to Cryptography Oct 2nd, 2014 Instructor: Rachel Lin 1 Recap Lecture 1: Perfect Security Scribe: John Retterer-Moore Last class, we introduced modern cryptography and gave
More informationNUS-I2R: Learning a Combined System for Entity Linking
NUS-I2R: Learning a Combined System for Entity Linking Wei Zhang Yan Chuan Sim Jian Su Chew Lim Tan School of Computing National University of Singapore {z-wei, tancl} @comp.nus.edu.sg Institute for Infocomm
More informationTake Your SIEM to the Next Level with 3rd Party Tools and Scripts
Take Your SIEM to the Next Level with 3rd Party Tools and Scripts SIEM & Tactical Analytics SUMMIT November 2017 Who Am I? Austin Taylor Chief Security Research Engineer @ IronNet Cybersecurity Cyber Warfare
More informationAGRICULTURE BASED ANDROID APPLICATION
AGRICULTURE BASED ANDROID APPLICATION Prof.Aradhana D 1, Shiva Prasad K S 2, Shrivaishnavi J K 3, P. Sowmya 4, Tina Agarwal 5 1 Department of Computer Science & Engineering Ballari Institute of Technology
More informationSHORT NOTES / INTEGRATION AND MESSAGING
SHORT NOTES / INTEGRATION AND MESSAGING 1. INTEGRATION and MESSAGING is related to HOW to SEND data to and receive from ANOTHER SYSTEM or APPLICATION 2. A WEB SERVICE is a piece of software designed to
More informationOnline ID Checker. Version: Thundercat. Team 1
Version: Thundercat Skyler Beckman, Dylan Fistrovic, Assel Gabdullina, Alex Jahns, Mikhail Kim, Calvin Sauer, Almas Talgambayev 1 Table of Contents Purpose Summary of Requirements User Requirements Client
More informationWeb Application Footprinting & Assessment with MSN Search Tricks
Web Application Footprinting & Assessment with MSN Search Tricks Introduction Any search engine database is a very powerful source of information for web applications. The Search Engine s spiders are well-powered
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationCHAPTER - 3 PREPROCESSING OF WEB USAGE DATA FOR LOG ANALYSIS
CHAPTER - 3 PREPROCESSING OF WEB USAGE DATA FOR LOG ANALYSIS 48 3.1 Introduction The main aim of Web usage data processing is to extract the knowledge kept in the web log files of a Web server. By using
More informationTimelog System on Android OS
Degree project Timelog System on Android OS I Author: Mohammad Ali Rezaei Date: 2012-12-15 Subject: Computer Science Level: Master Course code: 5DV00E Abstract Usage of smart phones has become more common
More informationAn open source A-GNSS reference server
International Global Navigation Satellite Systems Society IGNSS Symposium 2007 The University of New South Wales, Sydney, Australia 4 6 December, 2007 An open source A-GNSS reference server Thomas S. Yan,
More informationThe Internet The Internet
The Internet The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number
More informationRSA NetWitness Logs. Cisco IronPort Web Security Appliance (WSA) Event Source Log Configuration Guide. Last Modified: Tuesday, January 9, 2018
RSA NetWitness Logs Event Source Log Configuration Guide Cisco IronPort Web Security Appliance (WSA) Last Modified: Tuesday, January 9, 2018 Event Source Product Information: Vendor: Cisco Event Source:
More informationQ&As. Microsoft MTA Software Development Fundamentals. Pass Microsoft Exam with 100% Guarantee
98-361 Q&As Microsoft MTA Software Development Fundamentals Pass Microsoft 98-361 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money
More information