Weems: An extensible HTTP honeypot
- Pearson, Deon, Irwin, Barry V W, Herbert, Alan
- Authors: Pearson, Deon , Irwin, Barry V W , Herbert, Alan
- Date: 2017
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428396 , vital:72508 , https://researchspace.csir.co.za/dspace/bitstream/handle/10204/9691/Pearson_19652_2017.pdf?sequence=1andisAllowed=y
- Description: Malicious entities are constantly trying their luck at exploiting known vulnera-bilities in web services, in an attempt to gain access to resources unauthor-ized access to resources. For this reason security specialists deploy various network defenses with the goal preventing these threats; one such tool used are web based honeypots. Historically a honeypot will be deployed facing the Internet to masquerade as a live system with the intention of attracting at-tackers away from the valuable data. Researchers adapted these honeypots and turned them into a platform to allow for the studying and understanding of web attacks and threats on the Internet. Having the ability to develop a honeypot to replicate a specific service meant researchers can now study the behavior patterns of threats, thus giving a better understanding of how to de-fend against them. This paper discusses a high-level design and implemen-tation of Weems, a low-interaction web based modular HTTP honeypot sys-tem. It also presents results obtained from various deployments over a period of time and what can be interpreted from these results.
- Full Text:
- Date Issued: 2017
- Authors: Pearson, Deon , Irwin, Barry V W , Herbert, Alan
- Date: 2017
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428396 , vital:72508 , https://researchspace.csir.co.za/dspace/bitstream/handle/10204/9691/Pearson_19652_2017.pdf?sequence=1andisAllowed=y
- Description: Malicious entities are constantly trying their luck at exploiting known vulnera-bilities in web services, in an attempt to gain access to resources unauthor-ized access to resources. For this reason security specialists deploy various network defenses with the goal preventing these threats; one such tool used are web based honeypots. Historically a honeypot will be deployed facing the Internet to masquerade as a live system with the intention of attracting at-tackers away from the valuable data. Researchers adapted these honeypots and turned them into a platform to allow for the studying and understanding of web attacks and threats on the Internet. Having the ability to develop a honeypot to replicate a specific service meant researchers can now study the behavior patterns of threats, thus giving a better understanding of how to de-fend against them. This paper discusses a high-level design and implemen-tation of Weems, a low-interaction web based modular HTTP honeypot sys-tem. It also presents results obtained from various deployments over a period of time and what can be interpreted from these results.
- Full Text:
- Date Issued: 2017
A sharing platform for Indicators of Compromise
- Rudman, Lauren, Irwin, Barry V W
- Authors: Rudman, Lauren , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427831 , vital:72465 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622961_A_sharing_platform_for_Indicators_of_Compromise/links/5b9a1ad1a6fdcc59bf8dfe51/A-sharing-platform-for-Indicators-of-Compromise.pdf
- Description: In this paper, we will describe the functionality of a proof of concept sharing platform for sharing cyber threat information. Information is shared in the Structured Threat Information eXpression (STIX) language displayed in HTML. We focus on the sharing of network Indicators of Compromise generated by malware samples. Our work is motivated by the need to provide a platform for exchanging comprehensive network level Indicators. Accordingly we demonstrate the functionality of our proof of concept project. We will discuss how to use some functions of the platform, such as sharing STIX Indicators, navigating around and downloading defense mechanisims. It will be shown how threat information can be converted into different formats to allow them to be used in firewall and Intrusion Detection System (IDS) rules. This is an extension to the sharing platform and makes the creation of network level defense mechanisms efficient. Two API functions of the platform will be successfully tested and are useful because this can allow for the bulk sharing and of threat information.
- Full Text:
- Date Issued: 2016
- Authors: Rudman, Lauren , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427831 , vital:72465 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622961_A_sharing_platform_for_Indicators_of_Compromise/links/5b9a1ad1a6fdcc59bf8dfe51/A-sharing-platform-for-Indicators-of-Compromise.pdf
- Description: In this paper, we will describe the functionality of a proof of concept sharing platform for sharing cyber threat information. Information is shared in the Structured Threat Information eXpression (STIX) language displayed in HTML. We focus on the sharing of network Indicators of Compromise generated by malware samples. Our work is motivated by the need to provide a platform for exchanging comprehensive network level Indicators. Accordingly we demonstrate the functionality of our proof of concept project. We will discuss how to use some functions of the platform, such as sharing STIX Indicators, navigating around and downloading defense mechanisims. It will be shown how threat information can be converted into different formats to allow them to be used in firewall and Intrusion Detection System (IDS) rules. This is an extension to the sharing platform and makes the creation of network level defense mechanisms efficient. Two API functions of the platform will be successfully tested and are useful because this can allow for the bulk sharing and of threat information.
- Full Text:
- Date Issued: 2016
Assimilation of organic and inorganic nutrients by Erica root fungi from the fynbos ecosystem
- Bizabani, Christine, Dames, Joanna F
- Authors: Bizabani, Christine , Dames, Joanna F
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/444079 , vital:74183 , https://doi.org/10.1016/j.funbio.2015.11.006
- Description: Erica dominate the fynbos ecosystem, which is characterized by acidic soils that are rich in organic matter. The ericaceae associate with ericoid mycorrhizal (ERM) fungi for survival. In this study fungal biomass accumulation in vitro was used to determine nutrient utilisation of various inorganic and organic substrates. This is an initial step towards establishment of the ecological roles of typical ERM fungi and other root fungi associated with Erica plants, with regard to host nutrition. Meliniomyces sp., Acremonium implicatum, Leohumicola sp., Cryptosporiopsis erica, Oidiodendron maius and an unidentified Helotiales fungus were selected from fungi previously isolated and identified from Erica roots. Sole nitrogen sources ammonium, nitrate, arginine and Bovine Serum Albumin (BSA) were tested. Meliniomyces and Leohumicola species were able to utilise BSA effectively. Phosphorus nutrition was tested using orthophosphate, sodium inositol hexaphosphate and DNA. Most isolates preferred orthophosphate. Meliniomyces sp. and A. implicatum were able to accumulate significant biomass using DNA. Carbon utilisation was tested using glucose, cellobiose, carboxymethylcellulose, pectin and tannic acid substrates. All fungal isolates produced high biomass on glucose and cellobiose. The ability to utilize organic nutrient sources in culture, illustrates their potential role of these fungi in host nutrition in the fynbos ecosystem.
- Full Text:
- Date Issued: 2016
- Authors: Bizabani, Christine , Dames, Joanna F
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/444079 , vital:74183 , https://doi.org/10.1016/j.funbio.2015.11.006
- Description: Erica dominate the fynbos ecosystem, which is characterized by acidic soils that are rich in organic matter. The ericaceae associate with ericoid mycorrhizal (ERM) fungi for survival. In this study fungal biomass accumulation in vitro was used to determine nutrient utilisation of various inorganic and organic substrates. This is an initial step towards establishment of the ecological roles of typical ERM fungi and other root fungi associated with Erica plants, with regard to host nutrition. Meliniomyces sp., Acremonium implicatum, Leohumicola sp., Cryptosporiopsis erica, Oidiodendron maius and an unidentified Helotiales fungus were selected from fungi previously isolated and identified from Erica roots. Sole nitrogen sources ammonium, nitrate, arginine and Bovine Serum Albumin (BSA) were tested. Meliniomyces and Leohumicola species were able to utilise BSA effectively. Phosphorus nutrition was tested using orthophosphate, sodium inositol hexaphosphate and DNA. Most isolates preferred orthophosphate. Meliniomyces sp. and A. implicatum were able to accumulate significant biomass using DNA. Carbon utilisation was tested using glucose, cellobiose, carboxymethylcellulose, pectin and tannic acid substrates. All fungal isolates produced high biomass on glucose and cellobiose. The ability to utilize organic nutrient sources in culture, illustrates their potential role of these fungi in host nutrition in the fynbos ecosystem.
- Full Text:
- Date Issued: 2016
Cytotoxic activity of marine sponge extracts from the sub-Antarctic Islands and the Southern Ocean
- Olsen, Elisabeth, De Cerf, Christopher, Dziwornu, Godwin A, Puccinelli, Eleonora, Parker-Nance, Shirley, Ansorge, Isabelle J, Samaai, Toufiek, Dingle, Laura M K, Edkins, Adrienne L, Sunassee, Suthananda N
- Authors: Olsen, Elisabeth , De Cerf, Christopher , Dziwornu, Godwin A , Puccinelli, Eleonora , Parker-Nance, Shirley , Ansorge, Isabelle J , Samaai, Toufiek , Dingle, Laura M K , Edkins, Adrienne L , Sunassee, Suthananda N
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66300 , vital:28931 , https://doi.org/10.17159/sajs.2016/20160202
- Description: publisher version , Over the past 50 years, marine invertebrates, especially sponges, have proven to be a valuable source of new and/or bioactive natural products that have the potential to be further developed as lead compounds for pharmaceutical applications. Although marine benthic invertebrate communities occurring off the coast of South Africa have been explored for their biomedicinal potential, the natural product investigation of marine sponges from the sub-Antarctic Islands in the Southern Ocean for the presence of bioactive secondary metabolites has been relatively unexplored thus far. We report here the results for the biological screening of both aqueous and organic extracts prepared from nine specimens of eight species of marine sponges, collected from around Marion Island and the Prince Edward Islands in the Southern Ocean, for their cytotoxic activity against three cancer cell lines. The results obtained through this multidisciplinary collaborative research effort by exclusively South African institutions has provided an exciting opportunity to discover cytotoxic compounds from sub-Antarctic sponges, whilst contributing to our understanding of the biodiversity and geographic distributions of these cold-water invertebrates. Therefore, we acknowledge here the various contributions of the diverse scientific disciplines that played a pivotal role in providing the necessary platform for the future natural products chemistry investigation of these marine sponges from the sub- Antarctic Islands and the Southern Ocean. Significance: This study will contribute to understanding the biodiversity and geographic distributions of sponges in the Southern Ocean. This multidisciplinary project has enabled the investigation of marine sponges for the presence of cytotoxic compounds. Further investigation will lead to the isolation and identification of cytotoxic compounds present in the active sponge extracts. , University of Cape Town; South African Medical Research Council; National Research Foundation (South Africa); CANSA; Rhodes University; Department of Science and Technology; Department of Environmental Affairs; SANAP
- Full Text:
- Date Issued: 2016
- Authors: Olsen, Elisabeth , De Cerf, Christopher , Dziwornu, Godwin A , Puccinelli, Eleonora , Parker-Nance, Shirley , Ansorge, Isabelle J , Samaai, Toufiek , Dingle, Laura M K , Edkins, Adrienne L , Sunassee, Suthananda N
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66300 , vital:28931 , https://doi.org/10.17159/sajs.2016/20160202
- Description: publisher version , Over the past 50 years, marine invertebrates, especially sponges, have proven to be a valuable source of new and/or bioactive natural products that have the potential to be further developed as lead compounds for pharmaceutical applications. Although marine benthic invertebrate communities occurring off the coast of South Africa have been explored for their biomedicinal potential, the natural product investigation of marine sponges from the sub-Antarctic Islands in the Southern Ocean for the presence of bioactive secondary metabolites has been relatively unexplored thus far. We report here the results for the biological screening of both aqueous and organic extracts prepared from nine specimens of eight species of marine sponges, collected from around Marion Island and the Prince Edward Islands in the Southern Ocean, for their cytotoxic activity against three cancer cell lines. The results obtained through this multidisciplinary collaborative research effort by exclusively South African institutions has provided an exciting opportunity to discover cytotoxic compounds from sub-Antarctic sponges, whilst contributing to our understanding of the biodiversity and geographic distributions of these cold-water invertebrates. Therefore, we acknowledge here the various contributions of the diverse scientific disciplines that played a pivotal role in providing the necessary platform for the future natural products chemistry investigation of these marine sponges from the sub- Antarctic Islands and the Southern Ocean. Significance: This study will contribute to understanding the biodiversity and geographic distributions of sponges in the Southern Ocean. This multidisciplinary project has enabled the investigation of marine sponges for the presence of cytotoxic compounds. Further investigation will lead to the isolation and identification of cytotoxic compounds present in the active sponge extracts. , University of Cape Town; South African Medical Research Council; National Research Foundation (South Africa); CANSA; Rhodes University; Department of Science and Technology; Department of Environmental Affairs; SANAP
- Full Text:
- Date Issued: 2016
Design of a Configurable Embedded Network Tap Flow Generation using NetFlow v9 and IPFIX Formats
- Pennefather, Sean, Irwin, Barry V W
- Authors: Pennefather, Sean , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427756 , vital:72460 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622779_Design_of_a_Configurable_Embedded_Network_Tap_Flow_Generation_using_NetFlow_v9_and_IPFIX_Formats/links/5b9a19f2299bf14ad4d6a591/Design-of-a-Configurable-Embedded-Network-Tap-Flow-Generation-using-NetFlow-v9-and-IPFIX-Formats.pdf
- Description: This paper describes the design of a $200 hardware apparatus capable of passively monitoring network transmission at wire speeds of 100Mbit/s and generating NetFlow v9 or IPFIX compliant network flows for a downstream monitoring infrastructure. Testing of the apparatus hardware confirmed no network disruptions regardless of operational or power state while still being capable of correctly monitoring network traffic when configured. System testing under situations of heavy load confirmed apparatus capability at monitoring network traffic and correct generation of network flows compliant with either NetFlow v9 or IPFIX standards.
- Full Text:
- Date Issued: 2016
- Authors: Pennefather, Sean , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427756 , vital:72460 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622779_Design_of_a_Configurable_Embedded_Network_Tap_Flow_Generation_using_NetFlow_v9_and_IPFIX_Formats/links/5b9a19f2299bf14ad4d6a591/Design-of-a-Configurable-Embedded-Network-Tap-Flow-Generation-using-NetFlow-v9-and-IPFIX-Formats.pdf
- Description: This paper describes the design of a $200 hardware apparatus capable of passively monitoring network transmission at wire speeds of 100Mbit/s and generating NetFlow v9 or IPFIX compliant network flows for a downstream monitoring infrastructure. Testing of the apparatus hardware confirmed no network disruptions regardless of operational or power state while still being capable of correctly monitoring network traffic when configured. System testing under situations of heavy load confirmed apparatus capability at monitoring network traffic and correct generation of network flows compliant with either NetFlow v9 or IPFIX standards.
- Full Text:
- Date Issued: 2016
E-Government as a Means to Support Communal, Large ICT Infrastructure in Poor Areas
- Gumbo, Sibukelo, Terzoli, Alfredo, Tsietsi, Mosiuoa
- Authors: Gumbo, Sibukelo , Terzoli, Alfredo , Tsietsi, Mosiuoa
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431287 , vital:72761 , https://www.academic-bookshop.com/ourshop/prod_5067238-ECEG-2016-Proceedings-of-the-16th-European-Conference-on-eGovernment.html
- Description: Citizen-facing e-Government appears inevitable given current technol-ogy trends, and certainly has many advantages. One overlooked bene-fit, in our opinion, is its potential to make financially viable communal “large ICT” installations, which would diffuse ICT in poor communities where ICT is currently absent.(By “large ICT” we refer to end-user equipment such as desktops or laptops, on which would be possible to produce content, including software. The presence of “large ICT” in a community is critical in our opinion for the empowerment of the commu-nity, especially its younger component.) This paper explores this poten-tial in e-Government, describing a model conceptualized in the Siyakhu-la Living Lab in South Africa and partially implemented, through an inte-gration platform named “TeleWeaver”. The model behind TeleWeaver is an adaptation of the classic Internet business model-whereby users of services do not directly pay for the services they use. This model is especially relevant currently in South Africa, because of the an-nouncement by the government to pilot connecting to the internet gov-ernment facilities, including schools, in eight poor district municipalities.
- Full Text:
- Date Issued: 2016
- Authors: Gumbo, Sibukelo , Terzoli, Alfredo , Tsietsi, Mosiuoa
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431287 , vital:72761 , https://www.academic-bookshop.com/ourshop/prod_5067238-ECEG-2016-Proceedings-of-the-16th-European-Conference-on-eGovernment.html
- Description: Citizen-facing e-Government appears inevitable given current technol-ogy trends, and certainly has many advantages. One overlooked bene-fit, in our opinion, is its potential to make financially viable communal “large ICT” installations, which would diffuse ICT in poor communities where ICT is currently absent.(By “large ICT” we refer to end-user equipment such as desktops or laptops, on which would be possible to produce content, including software. The presence of “large ICT” in a community is critical in our opinion for the empowerment of the commu-nity, especially its younger component.) This paper explores this poten-tial in e-Government, describing a model conceptualized in the Siyakhu-la Living Lab in South Africa and partially implemented, through an inte-gration platform named “TeleWeaver”. The model behind TeleWeaver is an adaptation of the classic Internet business model-whereby users of services do not directly pay for the services they use. This model is especially relevant currently in South Africa, because of the an-nouncement by the government to pilot connecting to the internet gov-ernment facilities, including schools, in eight poor district municipalities.
- Full Text:
- Date Issued: 2016
Land acquisition for and local livelihood implications of biofuel development in Zimbabwe
- Authors: Thondhlana, Gladman
- Date: 2016
- Subjects: Biomass energy -- Government policy -- Zimbabwe Biomass energy -- Economic aspects -- Zimbabwe Biomass energy -- Environmental aspects -- Zimbabwe
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/49940 , vital:25944
- Description: In recent years, proponents of 'green and clean fuel' have argued that the costs of overreliance on fossil fuels could be reduced through transition to biofuels such as bio-ethanol. Global biofuel discourses suggest that any transition to biofuel invariably results in significant benefits, including energy independence, job creation, development of agro-industrial centres at local level and high revenue generations for the state with minimum negative impacts on the environment. With many risks and costs associated with traditional 'dirty' fuels, it is likely that many countries, particularly African countries, will move towards the 'green and clean fuel' alternative. However, until recently research has arguably paid limited attention to the local livelihood impacts related to land acquisition for biofuel development or the policy frameworks required to maximise biofuel benefits. With regards to biofuel benefits, some recent studies suggest that the much bandied potential for greater tax revenue, lowered fuel costs and wealth distribution from biofuel production have all been perverted with relatively little payoff in wage labour opportunities in return (e.g. Richardson, 2010; Wilkinson and Herrera, 2010). Based on work done in Chisumbanje communal lands of Zimbabwe (Thondhlana, 2015), this policy brief highlights the local livelihood impacts of biofuel development and discusses policy implications of the findings. By highlighting the justifications of biofuel development at any cost by the state, the study sheds some light on the conflicts between state interests and local livelihood needs.
- Full Text:
- Date Issued: 2016
- Authors: Thondhlana, Gladman
- Date: 2016
- Subjects: Biomass energy -- Government policy -- Zimbabwe Biomass energy -- Economic aspects -- Zimbabwe Biomass energy -- Environmental aspects -- Zimbabwe
- Language: English
- Type: text
- Identifier: http://hdl.handle.net/10962/49940 , vital:25944
- Description: In recent years, proponents of 'green and clean fuel' have argued that the costs of overreliance on fossil fuels could be reduced through transition to biofuels such as bio-ethanol. Global biofuel discourses suggest that any transition to biofuel invariably results in significant benefits, including energy independence, job creation, development of agro-industrial centres at local level and high revenue generations for the state with minimum negative impacts on the environment. With many risks and costs associated with traditional 'dirty' fuels, it is likely that many countries, particularly African countries, will move towards the 'green and clean fuel' alternative. However, until recently research has arguably paid limited attention to the local livelihood impacts related to land acquisition for biofuel development or the policy frameworks required to maximise biofuel benefits. With regards to biofuel benefits, some recent studies suggest that the much bandied potential for greater tax revenue, lowered fuel costs and wealth distribution from biofuel production have all been perverted with relatively little payoff in wage labour opportunities in return (e.g. Richardson, 2010; Wilkinson and Herrera, 2010). Based on work done in Chisumbanje communal lands of Zimbabwe (Thondhlana, 2015), this policy brief highlights the local livelihood impacts of biofuel development and discusses policy implications of the findings. By highlighting the justifications of biofuel development at any cost by the state, the study sheds some light on the conflicts between state interests and local livelihood needs.
- Full Text:
- Date Issued: 2016
Sha-1 and the strict avalanche criterion
- Motara, Yusuf, M, Irwin, Barry V W
- Authors: Motara, Yusuf, M , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429010 , vital:72553 , https://ieeexplore.ieee.org/abstract/document/7802926
- Description: The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the degree to which compression function of the SHA-1 hash meets the SAC. The results (P 0.01) are heartening: SHA-1 closely tracks the SAC after the first 24 rounds, and demonstrates excellent properties of confusion and diffusion throughout.
- Full Text:
- Date Issued: 2016
- Authors: Motara, Yusuf, M , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429010 , vital:72553 , https://ieeexplore.ieee.org/abstract/document/7802926
- Description: The Strict Avalanche Criterion (SAC) is a measure of both confusion and diffusion, which are key properties of a cryptographic hash function. This work provides a working definition of the SAC, describes an experimental methodology that can be used to statistically evaluate whether a cryptographic hash meets the SAC, and uses this to investigate the degree to which compression function of the SHA-1 hash meets the SAC. The results (P 0.01) are heartening: SHA-1 closely tracks the SAC after the first 24 rounds, and demonstrates excellent properties of confusion and diffusion throughout.
- Full Text:
- Date Issued: 2016
A review of current DNS TTL practices
- Van Zyl, Ignus, Rudman, Lauren, Irwin, Barry V W
- Authors: Van Zyl, Ignus , Rudman, Lauren , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427813 , vital:72464 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622760_A_review_of_current_DNS_TTL_practices/links/5b9a16e292851c4ba8181b7f/A-review-of-current-DNS-TTL-practices.pdf
- Description: This paper provides insight into legitimate DNS domain Time to Live (TTL) activity captured over two live caching servers from the period January to June 2014. DNS TTL practices are identified and compared between frequently queried domains, with respect to the caching servers. A breakdown of TTL practices by Resource Record type is also given, as well as an analysis on the TTL choices of the most frequent Top Level Domains. An analysis of anomalous TTL values with respect to the gathered data is also presented.
- Full Text:
- Date Issued: 2015
- Authors: Van Zyl, Ignus , Rudman, Lauren , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427813 , vital:72464 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622760_A_review_of_current_DNS_TTL_practices/links/5b9a16e292851c4ba8181b7f/A-review-of-current-DNS-TTL-practices.pdf
- Description: This paper provides insight into legitimate DNS domain Time to Live (TTL) activity captured over two live caching servers from the period January to June 2014. DNS TTL practices are identified and compared between frequently queried domains, with respect to the caching servers. A breakdown of TTL practices by Resource Record type is also given, as well as an analysis on the TTL choices of the most frequent Top Level Domains. An analysis of anomalous TTL values with respect to the gathered data is also presented.
- Full Text:
- Date Issued: 2015
An investigation into the signals leakage from a smartcard based on different runtime code
- Frieslaar, Ibraheem, Irwin, Barry V W
- Authors: Frieslaar, Ibraheem , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427845 , vital:72466 , https://www.researchgate.net/profile/Ibraheem-Fries-laar/publication/307918229_An_investigation_into_the_signals_leakage_from_a_smartcard_based_on_different_runtime_code/links/57d1996008ae0c0081e04fd5/An-investigation-into-the-signals-leakage-from-a-smartcard-based-on-different-runtime-code.pdf
- Description: This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the output affect the amount of the information leaked. The investigation determines that as the length of the output is increased more bus lines are switched from a precharge state to a high state. This is related to the output array in the code increasing its length. Furthermore, this work shows that the output for different characters generates a different pattern. This is due to the fact that various characters needs different amount of bytes to be executed since they have different binary value. Additionally, the information leaked out can be directly linked to the smartcard’s interpreter.
- Full Text:
- Date Issued: 2015
- Authors: Frieslaar, Ibraheem , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427845 , vital:72466 , https://www.researchgate.net/profile/Ibraheem-Fries-laar/publication/307918229_An_investigation_into_the_signals_leakage_from_a_smartcard_based_on_different_runtime_code/links/57d1996008ae0c0081e04fd5/An-investigation-into-the-signals-leakage-from-a-smartcard-based-on-different-runtime-code.pdf
- Description: This paper investigates the power leakage of a smartcard. It is intended to answer two vital questions: what information is leaked out when different characters are used as output; and does the length of the output affect the amount of the information leaked. The investigation determines that as the length of the output is increased more bus lines are switched from a precharge state to a high state. This is related to the output array in the code increasing its length. Furthermore, this work shows that the output for different characters generates a different pattern. This is due to the fact that various characters needs different amount of bytes to be executed since they have different binary value. Additionally, the information leaked out can be directly linked to the smartcard’s interpreter.
- Full Text:
- Date Issued: 2015
Characterization and analysis of NTP amplification based DDoS attacks
- Rudman, Lauren, Irwin, Barry V W
- Authors: Rudman, Lauren , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429285 , vital:72573 , 10.1109/ISSA.2015.7335069
- Description: Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Python based tools, the dataset is analysed according to specific parts of the packet headers. These include the source IP address and Time-to-live (TTL) values. The analysis found the top source addresses and looked at the TTL values observed for each address. These TTL values can be used to calculate the probable operating system or DDoS attack tool used by an attacker. We found that each TTL value seen for an address can indicate the number of hosts attacking the address or indicate minor routing changes. The Time-to-Live values, as a whole, are then analysed to find the total number used throughout each attack. The most frequent TTL values are then found and show that the migratory of them indicate the attackers are using an initial TTL of 255. This value can indicate the use of a certain DDoS tool that creates packets with that exact initial TTL. The TTL values are then put into groups that can show the number of IP addresses a group of hosts are targeting.
- Full Text:
- Date Issued: 2015
- Authors: Rudman, Lauren , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429285 , vital:72573 , 10.1109/ISSA.2015.7335069
- Description: Network Time Protocol based DDoS attacks saw a lot of popularity throughout 2014. This paper shows the characterization and analysis of two large datasets containing packets from NTP based DDoS attacks captured in South Africa. Using a series of Python based tools, the dataset is analysed according to specific parts of the packet headers. These include the source IP address and Time-to-live (TTL) values. The analysis found the top source addresses and looked at the TTL values observed for each address. These TTL values can be used to calculate the probable operating system or DDoS attack tool used by an attacker. We found that each TTL value seen for an address can indicate the number of hosts attacking the address or indicate minor routing changes. The Time-to-Live values, as a whole, are then analysed to find the total number used throughout each attack. The most frequent TTL values are then found and show that the migratory of them indicate the attackers are using an initial TTL of 255. This value can indicate the use of a certain DDoS tool that creates packets with that exact initial TTL. The TTL values are then put into groups that can show the number of IP addresses a group of hosts are targeting.
- Full Text:
- Date Issued: 2015
Data Centre vulnerabilities physical, logical and trusted entity security
- Swart, Ignus, Grobler, Marthie, Irwin, Barry V W
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427859 , vital:72467 , https://www.researchgate.net/profile/Ignus-Swart/publication/305442546_Data_Centre_vulnerabilities_physical_logical_trusted_entity_security/links/578f38c108aecbca4cada6bf/Data-Centre-vulnerabilities-physical-logical-trusted-entity-security.pdf
- Description: Data centres are often the hub for a significant number of disparate interconnecting systems. With rapid advances in virtualization, the use of data centres have increased significantly and are set to continue growing. Systems hosted typically serve the data needs for a growing number of organizations ranging from private individuals to mammoth governmental departments. Due to this centralized method of operation, data centres have become a prime target for attackers. These attackers are not only after the data contained in the data centre but often the physical infrastructure the systems run on is the target of attack. Down time resulting from such an attack can affect a wide range of entities and can have severe financial implications for the owners of the data centre. To limit liability strict adherence to standards are prescribed. Technology however develops at a far faster pace than standards and our ability to accurately measure information security has significant hidden caveats. This allows for a situation where the defenders dilemma is exacerbated by information overload, a significant increase in attack surface and reporting tools that show only limited views. This paper investigates the logical and physical security components of a data centre and introduces the notion of third party involvement as an increase in attack surface due to the manner in which data centres typically operate.
- Full Text:
- Date Issued: 2015
- Authors: Swart, Ignus , Grobler, Marthie , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427859 , vital:72467 , https://www.researchgate.net/profile/Ignus-Swart/publication/305442546_Data_Centre_vulnerabilities_physical_logical_trusted_entity_security/links/578f38c108aecbca4cada6bf/Data-Centre-vulnerabilities-physical-logical-trusted-entity-security.pdf
- Description: Data centres are often the hub for a significant number of disparate interconnecting systems. With rapid advances in virtualization, the use of data centres have increased significantly and are set to continue growing. Systems hosted typically serve the data needs for a growing number of organizations ranging from private individuals to mammoth governmental departments. Due to this centralized method of operation, data centres have become a prime target for attackers. These attackers are not only after the data contained in the data centre but often the physical infrastructure the systems run on is the target of attack. Down time resulting from such an attack can affect a wide range of entities and can have severe financial implications for the owners of the data centre. To limit liability strict adherence to standards are prescribed. Technology however develops at a far faster pace than standards and our ability to accurately measure information security has significant hidden caveats. This allows for a situation where the defenders dilemma is exacerbated by information overload, a significant increase in attack surface and reporting tools that show only limited views. This paper investigates the logical and physical security components of a data centre and introduces the notion of third party involvement as an increase in attack surface due to the manner in which data centres typically operate.
- Full Text:
- Date Issued: 2015
Design and Fabrication of a Low Cost Traffic Manipulation Hardware Platform
- Pennefather, Sean, Irwin, Barry V W
- Authors: Pennefather, Sean , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427873 , vital:72468 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622941_Design_and_Fabrication_of_a_Low_Cost_Traffic_Manipulation_Hardware/links/5b9a1625458515310583fc8c/Design-and-Fabrication-of-a-Low-Cost-Traffic-Manipulation-Hardware.pdf
- Description: This paper describes the design and fabrication of a dedicated hardware platform for network traffic logging and modification at a production cost of under $300. The context of the device is briefly discussed before characteristics relating to hardware development are explored. The paper concludes with three application examples to show some to the potential functionality of the platform. Testing of the device shows an average TCP throughput of 84.44 MiB/s when using the designed Ethernet modules.
- Full Text:
- Date Issued: 2015
- Authors: Pennefather, Sean , Irwin, Barry V W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427873 , vital:72468 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622941_Design_and_Fabrication_of_a_Low_Cost_Traffic_Manipulation_Hardware/links/5b9a1625458515310583fc8c/Design-and-Fabrication-of-a-Low-Cost-Traffic-Manipulation-Hardware.pdf
- Description: This paper describes the design and fabrication of a dedicated hardware platform for network traffic logging and modification at a production cost of under $300. The context of the device is briefly discussed before characteristics relating to hardware development are explored. The paper concludes with three application examples to show some to the potential functionality of the platform. Testing of the device shows an average TCP throughput of 84.44 MiB/s when using the designed Ethernet modules.
- Full Text:
- Date Issued: 2015
Facile synthesis and biological evaluation of assorted indolyl-3-amides and esters from a single, stable carbonyl nitrile intermediate
- Veale, Clinton G L, Edkins, Adrienne L, de la Mare, Jo-Anne, de Kock, Carmen, Smith, Peter J, Khanye, Setshaba D
- Authors: Veale, Clinton G L , Edkins, Adrienne L , de la Mare, Jo-Anne , de Kock, Carmen , Smith, Peter J , Khanye, Setshaba D
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66221 , vital:28919 , https://doi.org/10.1016/j.tetlet.2015.02.090
- Description: publisher version , The synthesis of biologically relevant amides and esters is routinely conducted under complex reaction conditions or requires the use of additional catalysts in order to generate sensitive electrophilic species for attack by a nucleophile. Here we present the synthesis of different indolic esters and amides from indolyl-3-carbonyl nitrile, without the requirement of anhydrous reaction conditions or catalysts. Additionally, we screened these compounds for potential in vitro antimalarial and anticancer activity, revealing 1H-indolyl-3-carboxylic acid 3-(indolyl-3-carboxamide)aminobenzyl ester to have moderate activity against both lines.
- Full Text: false
- Date Issued: 2015
- Authors: Veale, Clinton G L , Edkins, Adrienne L , de la Mare, Jo-Anne , de Kock, Carmen , Smith, Peter J , Khanye, Setshaba D
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/66221 , vital:28919 , https://doi.org/10.1016/j.tetlet.2015.02.090
- Description: publisher version , The synthesis of biologically relevant amides and esters is routinely conducted under complex reaction conditions or requires the use of additional catalysts in order to generate sensitive electrophilic species for attack by a nucleophile. Here we present the synthesis of different indolic esters and amides from indolyl-3-carbonyl nitrile, without the requirement of anhydrous reaction conditions or catalysts. Additionally, we screened these compounds for potential in vitro antimalarial and anticancer activity, revealing 1H-indolyl-3-carboxylic acid 3-(indolyl-3-carboxamide)aminobenzyl ester to have moderate activity against both lines.
- Full Text: false
- Date Issued: 2015
FPGA Based Implementation of a High Performance Scalable NetFlow Filter
- Herbert, Alan, Irwin, Barry V W, Otten, D F, Balmahoon, M R
- Authors: Herbert, Alan , Irwin, Barry V W , Otten, D F , Balmahoon, M R
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427887 , vital:72470 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622948_FPGA_Based_Implementation_of_a_High_Perfor-mance_Scalable_NetFlow_Filter/links/5b9a17a192851c4ba8181ba5/FPGA-Based-Implementation-of-a-High-Performance-Scalable-NetFlow-Filter.pdf
- Description: Full packet analysis on firewalls and intrusion detection, although effec-tive, has been found in recent times to be detrimental to the overall per-formance of networks that receive large volumes of throughput. For this reason partial packet analysis algorithms such as the NetFlow protocol have emerged to better mitigate these bottlenecks. This research delves into implementing a hardware accelerated, scalable, high per-formance system for NetFlow analysis and attack mitigation. Further-more, this implementation takes on attack mitigation through collection and processing of network flows produced at the source, rather than at the site of incident. This research platform manages to scale out its back-end through dis-tributed analysis over multiple hosts using the ZeroMQ toolset. Fur-thermore, ZeroMQ allows for multiple NetFlow data publishers, so that plug-ins can subscribe to the publishers that contain the relevant data to further increase the overall performance of the system. The dedicat-ed custom hardware optimizes the received network flows through cleaning, summarization and re-ordering into an easy to pass form when given to the sequential component of the system; this being the back-end.
- Full Text:
- Date Issued: 2015
- Authors: Herbert, Alan , Irwin, Barry V W , Otten, D F , Balmahoon, M R
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427887 , vital:72470 , https://www.researchgate.net/profile/Barry-Ir-win/publication/327622948_FPGA_Based_Implementation_of_a_High_Perfor-mance_Scalable_NetFlow_Filter/links/5b9a17a192851c4ba8181ba5/FPGA-Based-Implementation-of-a-High-Performance-Scalable-NetFlow-Filter.pdf
- Description: Full packet analysis on firewalls and intrusion detection, although effec-tive, has been found in recent times to be detrimental to the overall per-formance of networks that receive large volumes of throughput. For this reason partial packet analysis algorithms such as the NetFlow protocol have emerged to better mitigate these bottlenecks. This research delves into implementing a hardware accelerated, scalable, high per-formance system for NetFlow analysis and attack mitigation. Further-more, this implementation takes on attack mitigation through collection and processing of network flows produced at the source, rather than at the site of incident. This research platform manages to scale out its back-end through dis-tributed analysis over multiple hosts using the ZeroMQ toolset. Fur-thermore, ZeroMQ allows for multiple NetFlow data publishers, so that plug-ins can subscribe to the publishers that contain the relevant data to further increase the overall performance of the system. The dedicat-ed custom hardware optimizes the received network flows through cleaning, summarization and re-ordering into an easy to pass form when given to the sequential component of the system; this being the back-end.
- Full Text:
- Date Issued: 2015
How general-purpose can a GPU be?
- Authors: Machanick, Philip
- Date: 2015
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/61180 , vital:27988 , http://dx.doi.org/10.18489/sacj.v0i57.347
- Description: The use of graphics processing units (GPUs) in general-purpose computation (GPGPU) is a growing field. GPU instruction sets, while implementing a graphics pipeline, draw from a range of single instruction multiple datastream (SIMD) architectures characteristic of the heyday of supercomputers. Yet only one of these SIMD instruction sets has been of application on a wide enough range of problems to survive the era when the full range of supercomputer design variants was being explored: vector instructions. Supercomputers covered a range of exotic designs such as hypercubes and the Connection Machine (Fox, 1989). The latter is likely the source of the snide comment by Cray: it had thousands of relatively low-speed CPUs (Tucker & Robertson, 1988). Since Cray won, why are we not basing our ideas on his designs (Cray Inc., 2004), rather than those of the losers? The Top 500 supercomputer list is dominated by general-purpose CPUs, and nothing like the Connection Machine that headed the list in 1993 still exists.
- Full Text:
- Date Issued: 2015
- Authors: Machanick, Philip
- Date: 2015
- Language: English
- Type: article , text
- Identifier: http://hdl.handle.net/10962/61180 , vital:27988 , http://dx.doi.org/10.18489/sacj.v0i57.347
- Description: The use of graphics processing units (GPUs) in general-purpose computation (GPGPU) is a growing field. GPU instruction sets, while implementing a graphics pipeline, draw from a range of single instruction multiple datastream (SIMD) architectures characteristic of the heyday of supercomputers. Yet only one of these SIMD instruction sets has been of application on a wide enough range of problems to survive the era when the full range of supercomputer design variants was being explored: vector instructions. Supercomputers covered a range of exotic designs such as hypercubes and the Connection Machine (Fox, 1989). The latter is likely the source of the snide comment by Cray: it had thousands of relatively low-speed CPUs (Tucker & Robertson, 1988). Since Cray won, why are we not basing our ideas on his designs (Cray Inc., 2004), rather than those of the losers? The Top 500 supercomputer list is dominated by general-purpose CPUs, and nothing like the Connection Machine that headed the list in 1993 still exists.
- Full Text:
- Date Issued: 2015
How General-Purpose can a GPU be?
- Authors: Machanick, Philip
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/439294 , vital:73563 , https://hdl.handle.net/10520/EJC181693
- Description: The use of graphics processing units (GPUs) in general-purpose computation (GPGPU) is a growing field. GPU instruction sets, while implementing a graphics pipeline, draw from a range of single instruction multiple data stream (SIMD) architectures characteristic of the heyday of supercomputers. Yet only one of these SIMD instruction sets has been of application on a wide enough range of problems to survive the era when the full range of supercomputer design variants was being explored: vector instructions.
- Full Text:
- Date Issued: 2015
- Authors: Machanick, Philip
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/439294 , vital:73563 , https://hdl.handle.net/10520/EJC181693
- Description: The use of graphics processing units (GPUs) in general-purpose computation (GPGPU) is a growing field. GPU instruction sets, while implementing a graphics pipeline, draw from a range of single instruction multiple data stream (SIMD) architectures characteristic of the heyday of supercomputers. Yet only one of these SIMD instruction sets has been of application on a wide enough range of problems to survive the era when the full range of supercomputer design variants was being explored: vector instructions.
- Full Text:
- Date Issued: 2015
Human myiasis in rural South Africa is under-reported
- Kuria, Simon K, Villet, Martin H, Kingu, H J C, Dhaffala, A
- Authors: Kuria, Simon K , Villet, Martin H , Kingu, H J C , Dhaffala, A
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442425 , vital:73983 , https://www.ajol.info/index.php/samj/article/view/114028
- Description: Background. Myiasis is the infestation of live tissue of humans and other vertebrates by larvae of flies. Worldwide, myiasis of humans is seldom reported, although the trend is gradually changing in some countries. Reports of human myiasis in Africa are few. Several cases of myiasis were recently seen at the Mthatha Hospital Complex, Mthatha, Eastern Cape Province, South Africa (SA).
- Full Text:
- Date Issued: 2015
- Authors: Kuria, Simon K , Villet, Martin H , Kingu, H J C , Dhaffala, A
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/442425 , vital:73983 , https://www.ajol.info/index.php/samj/article/view/114028
- Description: Background. Myiasis is the infestation of live tissue of humans and other vertebrates by larvae of flies. Worldwide, myiasis of humans is seldom reported, although the trend is gradually changing in some countries. Reports of human myiasis in Africa are few. Several cases of myiasis were recently seen at the Mthatha Hospital Complex, Mthatha, Eastern Cape Province, South Africa (SA).
- Full Text:
- Date Issued: 2015
Influence of mouth status on population structure of southern African endemic estuarine-spawning ichthyofauna in a temperate, temporarily open/closed estuary
- Tweddle, Gavin P, Froneman, P William
- Authors: Tweddle, Gavin P , Froneman, P William
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68071 , vital:29195 , https://doi.org/10.2989/16085914.2015.1051940
- Description: Publisher version , The effect of mouth status on the population structure of three endemic estuarine-spawning fish species was assessed using seine nets from November 2005 to October 2007 in the temporarily open/closed Mpekweni Estuary, Eastern Cape, South Africa. Collectively, these three species accounted for more than 60% of the total fish abundance within the estuary. Monthly length frequency data were analysed. Two species, Gilchristella aestuaria and Glossogobius callidus, displayed normally distributed populations throughout, with recruitment/abundance peaks between spring and autumn, and were unaffected by open mouth and extended marine connection conditions. Atherina breviceps, however, displayed multiple modal peaks in its combined population distribution, suggesting a greater influence of mouth condition on its population structure. Retrospective analyses of the various cohorts for A. breviceps identified peaks in recruitment/abundance during summer, coinciding with open-mouth conditions and, to a lesser extent, with overwash events. This study highlights the importance of mouth phase, not only on the recruitment and population distribution of marine-spawning species, but also on estuarine-spawning fish in temporarily open/closed estuaries along the South African coastline.
- Full Text: false
- Date Issued: 2015
- Authors: Tweddle, Gavin P , Froneman, P William
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68071 , vital:29195 , https://doi.org/10.2989/16085914.2015.1051940
- Description: Publisher version , The effect of mouth status on the population structure of three endemic estuarine-spawning fish species was assessed using seine nets from November 2005 to October 2007 in the temporarily open/closed Mpekweni Estuary, Eastern Cape, South Africa. Collectively, these three species accounted for more than 60% of the total fish abundance within the estuary. Monthly length frequency data were analysed. Two species, Gilchristella aestuaria and Glossogobius callidus, displayed normally distributed populations throughout, with recruitment/abundance peaks between spring and autumn, and were unaffected by open mouth and extended marine connection conditions. Atherina breviceps, however, displayed multiple modal peaks in its combined population distribution, suggesting a greater influence of mouth condition on its population structure. Retrospective analyses of the various cohorts for A. breviceps identified peaks in recruitment/abundance during summer, coinciding with open-mouth conditions and, to a lesser extent, with overwash events. This study highlights the importance of mouth phase, not only on the recruitment and population distribution of marine-spawning species, but also on estuarine-spawning fish in temporarily open/closed estuaries along the South African coastline.
- Full Text: false
- Date Issued: 2015
Making media theory from the South:
- Authors: Garman, Anthea
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158873 , vital:40236 , https://doi.org/10.1080/23743670.2015.1008186
- Description: Like many other academics who have joined the digital age I have pages and uploads on Academia.edu, Researchgate, LinkedIn and a Google Scholar-aggregated thing (that seemed to trawl the net for my papers, do it for me and then invite me to view my own collection!). So, I get lots of email alerts telling me when someone has looked at my work and downloaded my papers. I appreciate this virtual community and enjoy participating in it, but the aspect of this that perplexes me is the need to ‘endorse’’ someone for their skills – a practice that seems to stem from LinkedIn’s businessmindedness aimed at youngsters trying to find a foothold on the career ladder. I don’t do endorsements unless the programme forces me to go through this step in order to do what I want to do on the site.
- Full Text:
- Date Issued: 2015
- Authors: Garman, Anthea
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/158873 , vital:40236 , https://doi.org/10.1080/23743670.2015.1008186
- Description: Like many other academics who have joined the digital age I have pages and uploads on Academia.edu, Researchgate, LinkedIn and a Google Scholar-aggregated thing (that seemed to trawl the net for my papers, do it for me and then invite me to view my own collection!). So, I get lots of email alerts telling me when someone has looked at my work and downloaded my papers. I appreciate this virtual community and enjoy participating in it, but the aspect of this that perplexes me is the need to ‘endorse’’ someone for their skills – a practice that seems to stem from LinkedIn’s businessmindedness aimed at youngsters trying to find a foothold on the career ladder. I don’t do endorsements unless the programme forces me to go through this step in order to do what I want to do on the site.
- Full Text:
- Date Issued: 2015