8
8/8/2019 Semi Topics http://slidepdf.com/reader/full/semi-topics 1/8 HONEYPOTS The Internet is growing fast and doubling its number of websites every 53 days and the number of people using the internet is also growing. Hence, global communication is getting more important every day. At the same time, computer crimes are also increasing. Countermeasures are developed to detect or prevent attacks - most of these measures are based on known facts, known attack patterns. Countermeasures such as firewalls and network intrusion detection systems are based on prevention, detection and reaction mechanism; but is there enough information about the enemy? As in the military, it is important to know, who the enemy is, what kind of strategy he uses, what tools he utilizes and what he is aiming for. Gathering this kind of information is not easy but important. By knowing attack strategies, countermeasure scan be improved and vulnerabilities can be fixed. To gather as much information as possible is one main goal of a honeypot. Generally, such information gathering should be done silently, without alarming an attacker. All the gathered information leads to an advantage on the defending side and can therefore be used on productive systems to prevent attacks. A honeypot is primarily an instrument for information gathering and learning. Its primary purpose is not to be an ambush for the blackhat community to catch them in action and to press charges against them. The focus lies on a silent collection of as much information as possible about their attack patterns, used programs, purpose of attack and the blackhat community itself. All this information is used to learn more about the blackhat proceedings and motives, as well as their technical knowledge and abilities. This is just a primary purpose of a honeypot. There are a lot of other possibilities for a honeypot - divert hackers from productive systems or catch a hacker while conducting an attack are just two possible examples. They are not the perfect solution for solving or preventing computer crimes. Honeypots are hard to maintain and they need operators with good knowledge about operating systems and network security. In the right hands, a honeypot can be an effective tool for information gathering. In the wrong, unexperienced hands, a honeypot can become another infiltrated machine and an instrument for the blackhat community. This paper will present the basic concepts behind honeypots and also the legal aspects of honeypots. HONEYPOT BASICS Honeypots are an exciting new technology with enormous potential for the security community. The concepts were first introduced by several icons in computer security, specifically Cliff Stoll in the book "The Cuckoo's Egg" , and Bill Cheswick's paper "An Evening with Berferd". Since then, honeypots have continued to evolve, developing into the powerful security tools they are today. Honeypots are neither like Firewalls that are used to limit or control the traffic coming into the network and to deter attacks neither is it like IDS (Intrusion Detection Systems) which is used to detect attacks. However it can be used along with these. Honeypots does not solve a specific problem as such, it can be used to deter attacks, to detect attacks, to gather information, to act as an early warning or indication systems etc. They can do everything from detecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit card fraud. It is this flexibility that gives honeypots their true power. It is also this flexibility that can make them challenging to define and understand. The basic definition of honeypots is

Semi Topics

Embed Size (px)

Citation preview

Page 1: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 1/8

HONEYPOTS

The Internet is growing fast and doubling its number of websites every 53 days and the numberof people using the internet is also growing. Hence, global communication is getting moreimportant every day. At the same time, computer crimes are also increasing. Countermeasures

are developed to detect or prevent attacks - most of these measures are based on known facts,known attack patterns. Countermeasures such as firewalls and network intrusion detectionsystems are based on prevention, detection and reaction mechanism; but is there enoughinformation about the enemy?

As in the military, it is important to know, who the enemy is, what kind of strategy he uses,what tools he utilizes and what he is aiming for. Gathering this kind of information is not easybut important. By knowing attack strategies, countermeasure scan be improved andvulnerabilities can be fixed. To gather as much information as possible is one main goal of ahoneypot. Generally, such information gathering should be done silently, without alarming anattacker. All the gathered information leads to an advantage on the defending side and cantherefore be used on productive systems to prevent attacks.

A honeypot is primarily an instrument for information gathering and learning. Its primarypurpose is not to be an ambush for the blackhat community to catch them in action and topress charges against them. The focus lies on a silent collection of as much information aspossible about their attack patterns, used programs, purpose of attack and the blackhatcommunity itself. All this information is used to learn more about the blackhat proceedings andmotives, as well as their technical knowledge and abilities. This is just a primary purpose of ahoneypot. There are a lot of other possibilities for a honeypot - divert hackers from productivesystems or catch a hacker while conducting an attack are just two possible examples. They arenot the perfect solution for solving or preventing computer crimes.

Honeypots are hard to maintain and they need operators with good knowledge about operatingsystems and network security. In the right hands, a honeypot can be an effective tool forinformation gathering. In the wrong, unexperienced hands, a honeypot can become another

infiltrated machine and an instrument for the blackhat community.

This paper will present the basic concepts behind honeypots and also the legal aspects of honeypots.

HONEYPOT BASICS

Honeypots are an exciting new technology with enormous potential for the security community.The concepts were first introduced by several icons in computer security, specifically Cliff Stollin the book "The Cuckoo's Egg" , and Bill Cheswick's paper "An Evening with Berferd". Sincethen, honeypots have continued to evolve, developing into the powerful security tools they aretoday.

Honeypots are neither like Firewalls that are used to limit or control the traffic coming into thenetwork and to deter attacks neither is it like IDS (Intrusion Detection Systems) which is usedto detect attacks. However it can be used along with these. Honeypots does not solve aspecific problem as such, it can be used to deter attacks, to detect attacks, to gatherinformation, to act as an early warning or indication systems etc. They can do everything fromdetecting encrypted attacks in IPv6 networks to capturing the latest in on-line credit cardfraud. It is this flexibility that gives honeypots their true power. It is also this flexibility thatcan make them challenging to define and understand. The basic definition of honeypots is

Page 2: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 2/8

TOUCHSCREENSduction

A type of display screen that has a touch-sensitive transparent panel covering the screen.

Instead of using a pointing device such as a mouse or light pen, you can use your finger to point directly to objects on the screen.

Although touch screens provide a natural interface for computer novices, they areunsatisfactory for most applications because the finger is such a relatively large object. Itis impossible to point accurately to small areas of the screen. In addition, most users find

touch screens tiring to the arms after long use.

Touch-screens are typically found on larger displays, in phones with integrated PDA

features. Most are designed to work with either your finger or a special stylus. Tapping aspecific point on the display will activate the virtual button or feature displayed at that

location on the display.Some phones with this feature can also recognize handwriting

written on the screen using a stylus, as a way to quickly input lengthy or complexinformation

A touchscreen is an input device that allows users to operate a PC by simply touching the

display screen. Touch input is suitable for a wide variety of computing applications. A

touchscreen can be used with most PC systems as easily as other input devices such astrack balls or touch pads. Browse the links below to learn more about touch input

technology and how it can work for you.

History Of Touch Screen Technology

A touch screen is a special type of visual display unit with a screen which is sensitive to pressure or touching. The screen can detect the position of the point of touch. The design

of touch screens is best for inputting simple choices and the choices are programmable.

The device is very user-friendly since it 'talks' with the user when the user is picking upchoices on the screen.

Touch technology turns a CRT, flat panel display or flat surface into a dynamic data entry

device that replaces both the keyboard and mouse. In addition to eliminating these

separate data entry devices, touch offers an "intuitive" interface. In public kiosks, for example, users receive no more instruction than 'touch your selection.

Specific areas of the screen are defined as "buttons" that the operator selects simply by

touching them. One significant advantage to touch screen applications is that each screencan be customized to reflect only the valid options for each phase of an operation, greatly

reducing the frustration of hunting for the right key or function.

Pen-based systems, such as the Palm Pilot® and signature capture systems, also use touch

technology but are not included in this article. The essential difference is that the pressurelevels are set higher for pen-based systems than for touch.Touch screens come in a wide

range of options, from full color VGA and SVGA monitors designed for highly graphic

Windows® or Macintosh® applications to small monochrome displays designed for 

keypad replacement and enhancement.

Page 3: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 3/8

Specific figures on the growth of touch screen technology are hard to come by, but a

1995 study last year by Venture Development Corporation predicted overall growth of 

17%, with at least 10% in the industrial sector.Other vendors agree that touch screentechnology is becoming more popular because of its ease-of-use, proven reliability,

expanded functionality, and decreasing cost.

A touch screen sensor is a clear glass panel with a touch responsive surface. The touch

sensor/panel is placed over a display screen so that the responsive area of the panelcovers the viewable area of the video screen. There are several different touch sensor 

technologies on the market today, each using a different method to detect touch input.

The sensor generally has an electrical current or signal going through it and touching thescreen causes a voltage or signal change. This voltage change is used to determine the

location of the touch to the screen.

PSYCHOACOUSTICS

Introduction

Basics of Audio Compression

Advances in digital audio technology are fueled by two sources: hardware developments

and new signal processing techniques. When processors dissipated tens of watts of power and memory densities were on the order of kilobits per square inch, portable playback 

devices like an MP3 player were not possible. Now, however, power dissipation, memory

densities, and processor speeds have improved by several orders of magnitude.Advancements in signal processing are exemplified by Internet broadcast applications: if 

the desired sound quality for an internet broadcast used 16-bit PCM encoding at 44.1

KHz, such an application would require a 1.4 Mbps (2 x 16 x 44k) channel for a stereosignal! Fortunately new bit rate reduction techniques in signal processing for audio of thisquality are constantly being released.

Increasing hardware efficiency and an expanding array of digital audio representation

formats are giving rise to a wide variety of new digital audio applications. These

applications include portable music playback devices, digital surround sound for cinema,high-quality digital radio and television broadcast, Digital Versatile Disc (DVD), and

many others. This paper introduces digital audio signal compression, a technique

essential to the implementation of many digital audio applications. Digital audio signalcompression is the removal of redundant or otherwise irrelevant information from a

digital audio signal, a process that is useful for conserving both transmission bandwidthand storage space. We begin by defining some useful terminology. We then present atypical "encoder" (as compression algorithms are often called) and explain how it

functions. Finally consider some standards that employ digital audio signal compression,

and discuss the future of the field.

Psychoacoustics is the study of subjective human perception of sounds. Effectively, it isthe study of acoustical perception. Psychoacoustic modeling has long-since been an

Page 4: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 4/8

integral part of audio compression. It exploits properties of the human auditory system to

remove the redundancies inherent in audio signals that the human ear cannot perceive.

More powerful signals at certain frequencies 'mask' less powerful signals at nearbyfrequencies by de-sensitizing the human ear's basilar membrane (which is responsible for 

resolving the frequency components of a signal). The entire MP3 phenomenon is made

 possible by the confluence of several distinct but interrelated elements: a few simpleinsights into the nature of human psychoacoustics, a whole lot of number crunching, and

conformance to a tightly specified format for encoding and decoding audio into compact

 bitstreams.

Terminology

Audio Compression vs. Speech Compression

This paper focuses on audio compression techniques, which differ from those used in

speech compression. Speech compression uses a model of the human vocal tract to

express particular signal in a compressed format. This technique is not usually applied in

the field of audio compression due to the ast array of sounds that can be generated -models that represent audio generation would be too complex to implement. So instead of 

modeling the source of sounds, modern audio compression models the receiver, i.e., the

human ear.

Lossless vs. Lossy

When we speak of compression, we must distinguish between two different types:

lossless, and lossy. Lossless compression retains all the information in a given signal, i.e.,

a decoder can, perfectly reconstruct a compressed signal. In contrast, lossy compressioneliminates information, from the original signal. As a result, a reconstructed signal may

differ from the original. With audio signals, the differences between the original and

reconstructed signals only matter if they are detectable by the human ear. As we willexplore shortly, audio compression employs both lossy and lossless techniques.

Basic Building Blocks

Figure 1 shows a generic encoder or "compressor that takes blocks of sampled audio

signal as its input. These blocks typically consist of between 500 and 1500 samples per channel, depending on the encoder specification. For example, the MPEG-1 layer III

(MP3) specification takes 576 samples per channel per input block. The output is a

compressed representation of the input block (a "frame") that can be transmitted or storedfor subsequent decoding.

Page 5: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 5/8

ANIMATRONICS

Introduction

The first use of Audio-Animatronics was for Walt Disney's Enchanted Tiki Room inDisneyland, which opened in June, 1963. The Tiki birds were operated using digital

controls; that is, something that is either on or off. Tones were recorded onto tape, which

on playback would cause a metal reed to vibrate. The vibrating reed would close a circuitand thus operate a relay. The relay sent a pulse of energy (electricity) to the figure's

mechanism which would cause a pneumatic valve to operate, which resulted in the

action, like the opening of a bird's beak. Each action (e.g., opening of the mouth) had aneutral position, otherwise known as the "natural resting position" (e.g., in the case of the

Tiki bird it would be for the mouth to be closed). When there was no pulse of energy

forthcoming, the action would be in, or return to, the natural resting position.

This digital/tone-reed system used pneumatic valves exclusively--that is, everything wasoperated by air pressure. Audio-Animatronics' movements that were operated with this

system had two limitations. First, the movement had to be simple--on or off. (e.g., The

open and shut beak of a Tiki bird or the blink of an eye, as compared to the manydifferent positions of raising and lowering an arm.) Second, the movements couldn't

require much force or power. (e.g., The energy needed to open a Tiki Bird's beak could

easily be obtained by using air pressure, but in the case of lifting an arm, the pneumatic

system didn't provide enough power to accomplish the lift.) Walt and WED knew thatthis this pneumatic system could not sufficiently handle the more complicated shows of 

the World's Fair. A new system was devised.

In addition to the digital programming of the Tiki show, the Fair shows required analog programming. This new "analog system" involved the use of voltage regulation. The tonewould be on constantly throughout the show, and the voltage would be varied to create

the movement of the figure. This "varied voltage" signal was sent to what was referred to

as the "black box." The black boxes had the electronic equipment that would receive thesignal and then activate the pneumatic and hydraulic valves that moved the performing

figures. The use of hydraulics allowed for a substantial increase in power, which was

needed for the more unwieldy and demanding movements. (Hydraulics were usedexclusively with the analog system, and pneumatics were used only with the tone-

reed/digital system.)

There were two basic ways of programming a figure. The first used two differentmethods of controlling the voltage regulation. One was a joystick-like device called atransducer, and the other device was a potentiometer (an instrument for measuring an

unknown voltage or potential difference by comparison to a standard voltage--like the

volume control knob on a radio or television receiver). If this method was used, when afigure was ready to be programmed, each individual action--one at a time-- would be

refined, rehearsed, and then recorded. For instance, the programmer, through the use of 

Page 6: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 6/8

the potentiometer or transducer, would repeatedly rehearse the gesture of lifting the arm,

until it was ready for a "take."

IONTOPHORESIS

Iontophoresis is an effective and painless method of delivering medication to a localized

tissue area by applying electrical current to a solution of the medication. The delivered

dose depends on the current flowing and its duration.Iontophoresis is a recognized therapeutic method for delivering ionic compounds, i.e.

drugs, into and through the skin by applying electrical current. It has proven to be a

 beneficial treatment for many localized skin disorders such as; nail diseases, Herpies

lesions, psoriasis, eczematous, and cutaneous T-cell lymphoma. The method has also been reported useful for topical anesthesia to the skin prior to cut-down for artificial

kidney dialysis, insertion of tracheotomy tubes and infiltration of lidocaine into the skin

 prior to venipuncture.

Treatment of various musculoskeletal disorders with anti-inflammatory agents has beenreported in the literature. Iontophoresis enhances the transdermal delivery of ionized

drugs through the skin's outermost layer (stratum corneum) which is the main barrier to

drug transport. The absorption rate of the drug is increased, however, once the drug passes through the skin barrier natural diffusion and circulation are required to shuttle the

drug to its proper location. The mechanism by which iontophoresis works is based upon

the knowledge that like electrical charges repel. Application of a positive current from anelectrode to a solution applied to a skin surface will drive the positively charged drug

ions away from the electrode and into the skin. Obviously, negatively charged ions will

 behave in the same manner.

Page 7: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 7/8

ABSTRACT

"Money in the 21st century will surely prove to be as different from the money of thecurrent century as our money is from that of the previous century. Just as fiat money

replaced specie-backed paper currencies, electronically initiated debits and credits will

 become the dominant payment modes, creating the potential for private money tocompete

with government-issued currencies." Just as every thing is getting under the shadow of 

"e" today we have paper currency being replaced by electronic money or e-cash.

Hardly a day goes by without some mention in the financial press of new developmentsin "electronic money". In the emerging field of electronic commerce, novel buzzwords

like smartcards, online banking, digital cash, and electronic checks are being used todiscuss money. But how are these brand-new forms of payment secure? And mostimportantly, which of these emerging secure electronic money technologies will survive

into the next century?

These are some of the tough questions to answer but here's a solution, which provides a

form of security to these modes of currency exchange using the "BiometricsTechnology". The Money Pad introduced here uses the biometrics technology for Finger 

Print recognition. Money Pad is a form of credit card or smartcard, which we name so.

Every time the user wants to access the Money Pad he has to make an impression of his

fingers which will be scanned and matched with the one in the hard disk of data baseserver. If the finger print matches with the user's he will be allowed to access and use the

Pad other wise the Money Pad is not accessible. Thus providing a form of security to the

ever-lasting transaction currency of the future "e-cash".

Money Pad - A form of credit card or smart card similar to floppy disk, which isintroduced to provide, secure e-cash transactions.

Page 8: Semi Topics

8/8/2019 Semi Topics

http://slidepdf.com/reader/full/semi-topics 8/8

Speed detection of moving vehicles using speed

camera

Definition

Although there is good road safety performance the number of people killed and injured

on our roads remain unacceptably high. So the roads safety strategy was published or introduced to support the new casualty reduction targets. The road safety strategy

includes all forms of invention based on the engineering and education and enforcement

and recognizes that there are many different factors that lead to traffic collisions and

casualties. The main reason is speed of vehicle. We use traffic lights and other trafficmanager to reduce the speed. One among them is speed cameras.

Speed cameras on the side of urban and rural roads, usually placed to catch transgressors

of the stipulated speed limit for that road. The speed cameras, the solely to identify and

 prosecute those drivers that pass by the them when exceed the stipulated speed limit.

At first glance this seemed to be reasonable that the road users do not exceed the speed

limit must be a good thing because it increases road safety, reduces accidents and protect

other road users and pedestrians.So speed limits are good idea. To enforce these speed limit; laws are passed making

speed an offence and signs are erected were of to indicate the maximum permissible

speeds. The police can't be every where to enforce the speed limit and so enforcement

cameras art director to do this work; on one who's got an ounce of Commons sense, thedeliberately drive through speed camera in order fined and penalized .

So nearly everyone slowdown for the speed Camera. We finally have a solution to the

speeding problem. Now if we are to assume that speed cameras are the only way to makedriver's slowdown, and they work efficiently, then we would expect there to be a great

number of these every were and that day would be highly visible and identifiable to make

a drivers slow down.