Researchers from Oxford University’s Computing Laboratory have developed techniques to spot malicious attacks on computer networks, that include the use of Inductive Logic Programming (ILP) techniques to automatically determine the semantics of novel attack strategies.
Intrusions often take place where there are vulnerabilities within computer systems. For example, one of the most common of these is the buffer overflow, where an attacker sends overly long transactions to a server. The aim is to overflow the server’s buffer with code that runs automatically, allowing the attacker to execute malicious commands via the network.
A recent example was the “Code Red” worm released on Friday 13th July 2001. The attack caused havoc for programmes running on Microsoft Internet Information Server and slowed down Internet traffic considerably. No one was able to stop it automatically; few recognised what strategy the attack was using and system administrators had to look for it manually in the registers of their systems.
Jennifer Johnson | alfa
Micropatterning OLEDs using electron beam technology
27.04.2016 | Fraunhofer-Institut für Organische Elektronik, Elektronenstrahl- und Plasmatechnik FEP
Quantum computing closer as RMIT drives towards first quantum data bus
18.04.2016 | RMIT University
Using an ultra fast-scanning atomic force microscope, a team of researchers from the University of Basel has filmed “living” nuclear pore complexes at work for the first time. Nuclear pores are molecular machines that control the traffic entering or exiting the cell nucleus. In their article published in Nature Nanotechnology, the researchers explain how the passage of unwanted molecules is prevented by rapidly moving molecular “tentacles” inside the pore.
Using high-speed AFM, Roderick Lim, Argovia Professor at the Biozentrum and the Swiss Nanoscience Institute of the University of Basel, has not only directly...
If a person pushes a broken-down car alone, there is a certain effect. If another person helps, the result is the sum of their efforts. If two micro-particles are pushing another microparticle, however, the resulting effect may not necessarily be the sum their efforts. A recent study published in Nature Communications, measured this odd effect that scientists call “many body.”
In the microscopic world, where the modern miniaturized machines at the new frontiers of technology operate, as long as we are in the presence of two...
Researchers from the Max Planck Institute Stuttgart have developed self-propelled tiny ‘microbots’ that can remove lead or organic pollution from contaminated water.
Working with colleagues in Barcelona and Singapore, Samuel Sánchez’s group used graphene oxide to make their microscale motors, which are able to adsorb lead...
Neutron scattering and computational modeling have revealed unique and unexpected behavior of water molecules under extreme confinement that is unmatched by any known gas, liquid or solid states.
In a paper published in Physical Review Letters, researchers at the Department of Energy's Oak Ridge National Laboratory describe a new tunneling state of...
Honeycomb structures as the basic building block for industrial applications presented using holo pyramid
Researchers of the Alfred Wegener Institute (AWI) will introduce their latest developments in the field of bionic lightweight design at Hannover Messe from 25...
27.04.2016 | Event News
15.04.2016 | Event News
12.04.2016 | Event News
03.05.2016 | Physics and Astronomy
03.05.2016 | Life Sciences
03.05.2016 | Physics and Astronomy