Evaluating the multi-threading countermeasure
- Frieslaar, Ibrahim, Irwin, Barry V W
- Authors: Frieslaar, Ibrahim , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428352 , vital:72505 , https://researchspace.csir.co.za/dspace/bitstream/handle/10204/9041/Frieslaar_2016.pdf?sequence=1andisAllowed=y
- Description: This research investigates the resistance of the multi-threaded coun-termeasure to side channel analysis (SCA) attacks. The multi-threaded countermeasure is attacked using the Correlation Power Analysis (CPA) and template attacks. Additionally, it is compared to the existing hiding countermeasure. Furthermore, additional signal processing techniques are used to increase the attack success ratio. It is demon-strated that the multi-threaded countermeasure is able to outperform the existing countermeasures by withstanding the CPA and template at-tacks. Furthermore, the multi-threaded countermeasure is unaffected by the elastic alignment and filtering techniques as opposed to the existing countermeasures. The research concludes that the multithreaded coun-termeasure is indeed a secure implementation to mitigate SCA attacks.
- Full Text:
- Date Issued: 2016
- Authors: Frieslaar, Ibrahim , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428352 , vital:72505 , https://researchspace.csir.co.za/dspace/bitstream/handle/10204/9041/Frieslaar_2016.pdf?sequence=1andisAllowed=y
- Description: This research investigates the resistance of the multi-threaded coun-termeasure to side channel analysis (SCA) attacks. The multi-threaded countermeasure is attacked using the Correlation Power Analysis (CPA) and template attacks. Additionally, it is compared to the existing hiding countermeasure. Furthermore, additional signal processing techniques are used to increase the attack success ratio. It is demon-strated that the multi-threaded countermeasure is able to outperform the existing countermeasures by withstanding the CPA and template at-tacks. Furthermore, the multi-threaded countermeasure is unaffected by the elastic alignment and filtering techniques as opposed to the existing countermeasures. The research concludes that the multithreaded coun-termeasure is indeed a secure implementation to mitigate SCA attacks.
- Full Text:
- Date Issued: 2016
Parallel visions: Byron, Géricault and the Medusa
- Authors: Beard, Margot
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147792 , vital:38673 , https://doi.org/10.1080/00043389.1999.11761285
- Description: Martin Meisel has noted that Delacroix's 1841 painting A Shipwreck was recognised as uniting Gericault and Byron. for not only does the painting illustrate that moment in Don Juan when lots are drawn for the human sacrifice {2, 75) but it also invokes comparison with Gericault' s 1819 painting entitled Raft of the Medusa(Meisel1988:601).1 would like to argue in this paper that Gericault' s famous painting and Byron's shipwreck stanzas in the second canto of Don Juan have other points of comparison. Gericault used the Savigny and Correard Narrative of a Voyage to Senegal ( 1817) as the primary source of information for his treatment of the Medusa incident (Eitner 1971: 117). Byron used multiple sources when he researched material for his shipwreck stanzas but it is highly probable that the Savigny and Correard text was one of them. Thus, the cause celebre of the wreck of the Medusa is directly treated by Gericault and indirectly by Byron - two artists temperamentally and artistically attuned.
- Full Text:
- Date Issued: 2016
- Authors: Beard, Margot
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/147792 , vital:38673 , https://doi.org/10.1080/00043389.1999.11761285
- Description: Martin Meisel has noted that Delacroix's 1841 painting A Shipwreck was recognised as uniting Gericault and Byron. for not only does the painting illustrate that moment in Don Juan when lots are drawn for the human sacrifice {2, 75) but it also invokes comparison with Gericault' s 1819 painting entitled Raft of the Medusa(Meisel1988:601).1 would like to argue in this paper that Gericault' s famous painting and Byron's shipwreck stanzas in the second canto of Don Juan have other points of comparison. Gericault used the Savigny and Correard Narrative of a Voyage to Senegal ( 1817) as the primary source of information for his treatment of the Medusa incident (Eitner 1971: 117). Byron used multiple sources when he researched material for his shipwreck stanzas but it is highly probable that the Savigny and Correard text was one of them. Thus, the cause celebre of the wreck of the Medusa is directly treated by Gericault and indirectly by Byron - two artists temperamentally and artistically attuned.
- Full Text:
- Date Issued: 2016
Principles of Control Protocol Design and Implementation
- Eales, Andrew, Foss, Richard
- Authors: Eales, Andrew , Foss, Richard
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426801 , vital:72392 , https://www.aes.org/e-lib/online/browse.cfm?elib=18238
- Description: Control protocols are used within audio networks to manage both audio streams and networked audio devices. A number of control protocols for audio devices have been recently developed, including the AES standards AES64-2012 and AES70-2015. Despite these developments, an ontology of control protocol design and implementation does not exist. This paper proposes design and implementation heuristics for control protocols. Different categories of control protocol design and implementation heuristics are presented and the implications of individual heuristics are discussed. These heuristics allow the features provided by different control protocols to be compared and evaluated and provide guidelines for future control protocol development.
- Full Text:
- Date Issued: 2016
- Authors: Eales, Andrew , Foss, Richard
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426801 , vital:72392 , https://www.aes.org/e-lib/online/browse.cfm?elib=18238
- Description: Control protocols are used within audio networks to manage both audio streams and networked audio devices. A number of control protocols for audio devices have been recently developed, including the AES standards AES64-2012 and AES70-2015. Despite these developments, an ontology of control protocol design and implementation does not exist. This paper proposes design and implementation heuristics for control protocols. Different categories of control protocol design and implementation heuristics are presented and the implications of individual heuristics are discussed. These heuristics allow the features provided by different control protocols to be compared and evaluated and provide guidelines for future control protocol development.
- Full Text:
- Date Issued: 2016
Quantitative analysis of time-resolved infrared stimulated luminescence in feldspars
- Pagonis, Vasilis, Ankjærgaard, Christina, Jain, Mayank, Chithambo, Makaiko L
- Authors: Pagonis, Vasilis , Ankjærgaard, Christina , Jain, Mayank , Chithambo, Makaiko L
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124616 , vital:35638 , DOI: 10.1016/j.physb.2016.06.013
- Description: Time-resolved infrared-stimulated luminescence (TR-IRSL) from feldspar samples is of importance in the field of luminescence dating, since it provides information on the luminescence mechanism in these materials. In this paper we present new analytical equations which can be used to analyze TR-IRSL signals, both during and after short infrared stimulation pulses. The equations are developed using a recently proposed kinetic model, which describes localized electronic recombination via tunneling between trapped electrons and recombination centers in luminescent materials. Recombination is assumed to take place from the excited state of the trapped electron to the nearest-neighbor center within a random distribution of luminescence recombination centers. Different possibilities are examined within the model, depending on the relative importance of electron de-excitation and recombination. The equations are applied to experimental TR-IRSL data of natural feldspars, and good agreement is found between experimental and modeling results.
- Full Text:
- Date Issued: 2016
- Authors: Pagonis, Vasilis , Ankjærgaard, Christina , Jain, Mayank , Chithambo, Makaiko L
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124616 , vital:35638 , DOI: 10.1016/j.physb.2016.06.013
- Description: Time-resolved infrared-stimulated luminescence (TR-IRSL) from feldspar samples is of importance in the field of luminescence dating, since it provides information on the luminescence mechanism in these materials. In this paper we present new analytical equations which can be used to analyze TR-IRSL signals, both during and after short infrared stimulation pulses. The equations are developed using a recently proposed kinetic model, which describes localized electronic recombination via tunneling between trapped electrons and recombination centers in luminescent materials. Recombination is assumed to take place from the excited state of the trapped electron to the nearest-neighbor center within a random distribution of luminescence recombination centers. Different possibilities are examined within the model, depending on the relative importance of electron de-excitation and recombination. The equations are applied to experimental TR-IRSL data of natural feldspars, and good agreement is found between experimental and modeling results.
- Full Text:
- Date Issued: 2016
The network society: A model for computing infrastructure in South African schools
- Siebörger, Ingrid, Terzoli, Alfredo
- Authors: Siebörger, Ingrid , Terzoli, Alfredo
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430651 , vital:72706 , 10.1109/ISTAFRICA.2016.7530673
- Description: Worldwide computers are being used in schools for, amongst other things, developing the knowledge and skills required for citizens to be able to operate within the 21st Century Information Age. Realising the potential of technology in uplifting the lives of its citizens the South Afri-can government has proposed the National Broadband Plan (SA Con-nect). However, unfortunately this plan only addresses the networking aspect of Information Communication Technologies (ICTs). In this pa-per we investigate appropriate Information Technologies for schools in the light of SA Connect, and propose a model for the computing infra-structure required in South African schools in order to support access to and adoption of technology and networks. This model is based on our multi-year experimentation in the Siyakhula Living Lab.
- Full Text:
- Date Issued: 2016
- Authors: Siebörger, Ingrid , Terzoli, Alfredo
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430651 , vital:72706 , 10.1109/ISTAFRICA.2016.7530673
- Description: Worldwide computers are being used in schools for, amongst other things, developing the knowledge and skills required for citizens to be able to operate within the 21st Century Information Age. Realising the potential of technology in uplifting the lives of its citizens the South Afri-can government has proposed the National Broadband Plan (SA Con-nect). However, unfortunately this plan only addresses the networking aspect of Information Communication Technologies (ICTs). In this pa-per we investigate appropriate Information Technologies for schools in the light of SA Connect, and propose a model for the computing infra-structure required in South African schools in order to support access to and adoption of technology and networks. This model is based on our multi-year experimentation in the Siyakhula Living Lab.
- Full Text:
- Date Issued: 2016
The pattern-richness of graphical passwords
- Vorster, Johannes, Van Heerden, Renier, Irwin, Barry V W
- Authors: Vorster, Johannes , Van Heerden, Renier , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68322 , vital:29238 , https://doi.org/10.1109/ISSA.2016.7802931
- Description: Publisher version , Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most significant such pattern - reported by many researchers - is hotspot clustering. This paper qualitatively analyses more than 200 graphical passwords for patterns other than the classically reported hotspots. The qualitative analysis finds that a significant percentage of passwords fall into a small set of patterns; patterns that can be used to form attack models against GPs. In counter action, these patterns can also be used to educate users so that future password selection is more secure. It is the hope that the outcome from this research will lead to improved behaviour and an enhancement in graphical password security.
- Full Text: false
- Date Issued: 2016
- Authors: Vorster, Johannes , Van Heerden, Renier , Irwin, Barry V W
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68322 , vital:29238 , https://doi.org/10.1109/ISSA.2016.7802931
- Description: Publisher version , Conventional (text-based) passwords have shown patterns such as variations on the username, or known passwords such as “password”, “admin” or “12345”. Patterns may similarly be detected in the use of Graphical passwords (GPs). The most significant such pattern - reported by many researchers - is hotspot clustering. This paper qualitatively analyses more than 200 graphical passwords for patterns other than the classically reported hotspots. The qualitative analysis finds that a significant percentage of passwords fall into a small set of patterns; patterns that can be used to form attack models against GPs. In counter action, these patterns can also be used to educate users so that future password selection is more secure. It is the hope that the outcome from this research will lead to improved behaviour and an enhancement in graphical password security.
- Full Text: false
- Date Issued: 2016
Thermoluminescence of kunzite: a study of kinetic processes and dosimetry characteristics
- Ogundare, F O, Alatishe, M A, Chithambo, Makaiko L, Costin, G
- Authors: Ogundare, F O , Alatishe, M A , Chithambo, Makaiko L , Costin, G
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124701 , vital:35650 , https://doi.org/10.1016/j.nimb.2016.02.059
- Description: Since the use of natural minerals for dating and dose reconstruction using luminescence techniques is well-established and always of interest, we present thermoluminescence characteristics of kunzite, a gem variety of spodumene. The chemical composition of the sample was determined using an Electron Probe MicroAnalyzer.
- Full Text: false
- Date Issued: 2016
- Authors: Ogundare, F O , Alatishe, M A , Chithambo, Makaiko L , Costin, G
- Date: 2016
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124701 , vital:35650 , https://doi.org/10.1016/j.nimb.2016.02.059
- Description: Since the use of natural minerals for dating and dose reconstruction using luminescence techniques is well-established and always of interest, we present thermoluminescence characteristics of kunzite, a gem variety of spodumene. The chemical composition of the sample was determined using an Electron Probe MicroAnalyzer.
- Full Text: false
- Date Issued: 2016
A Connection Management System to Enable the Wireless Transmission of MIDI Messages
- Authors: Shaw, Brent , Foss, Richard
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426829 , vital:72394 , https://www.aes.org/e-lib/browse.cfm?elib=18030
- Description: This paper examines the design and implementation of a wireless system for the distribution of MIDI messages for show control and studio environments. The system makes use of the MIDI and MIDINet protocols, creating wireless nodes that will enable the transmission of MIDI between devices on a wireless network with connection management capabilities through the use of embedded web servers. The paper describes the current state of the art, configuration of the system, hardware architectures, software design, and implementation.
- Full Text:
- Date Issued: 2015
- Authors: Shaw, Brent , Foss, Richard
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426829 , vital:72394 , https://www.aes.org/e-lib/browse.cfm?elib=18030
- Description: This paper examines the design and implementation of a wireless system for the distribution of MIDI messages for show control and studio environments. The system makes use of the MIDI and MIDINet protocols, creating wireless nodes that will enable the transmission of MIDI between devices on a wireless network with connection management capabilities through the use of embedded web servers. The paper describes the current state of the art, configuration of the system, hardware architectures, software design, and implementation.
- Full Text:
- Date Issued: 2015
A description of gametogenesis in the panga Pterogymnus laniarius (Pisces: Sparidae) with comments on changes in maturity patterns over the past two decades
- Booth, Anthony J, Hecht, Thomas
- Authors: Booth, Anthony J , Hecht, Thomas
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123542 , vital:35452 , https://doi.org/10.1080/02541858.1997.11448428
- Description: A description of gametogenesis in the panga Pferogymnus laniarius, a common endemic seabream species inhabiting the Agulhas Bank, South Africa, is presented. After sexual maturity, oogenesis and spermatogenesis continued throughout the year and were found to be similar to these processes in other seabream species and teleosts in general. Analysis of maturity data over the past two decades revealed a significant change in both age and size-at-maturity, a response to fishing pressure.
- Full Text:
- Date Issued: 2015
- Authors: Booth, Anthony J , Hecht, Thomas
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/123542 , vital:35452 , https://doi.org/10.1080/02541858.1997.11448428
- Description: A description of gametogenesis in the panga Pferogymnus laniarius, a common endemic seabream species inhabiting the Agulhas Bank, South Africa, is presented. After sexual maturity, oogenesis and spermatogenesis continued throughout the year and were found to be similar to these processes in other seabream species and teleosts in general. Analysis of maturity data over the past two decades revealed a significant change in both age and size-at-maturity, a response to fishing pressure.
- Full Text:
- Date Issued: 2015
DDoS Attack Mitigation Through Control of Inherent Charge Decay of Memory Implementations
- Herbert, Alan, Irwin, Barry V W, van Heerden, Renier P
- Authors: Herbert, Alan , Irwin, Barry V W , van Heerden, Renier P
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430339 , vital:72684 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: DDoS (Distributed Denial of Service) attacks over recent years have shown to be devastating on the target systems and services made publicly available over the Internet. Furthermore, the backscatter1 caused by DDoS attacks also affects the available bandwidth and responsiveness of many other hosts within the Internet. The unfortunate reality of these attacks is that the targeted party cannot fight back due to the presence of botnets and malware-driven hosts. These hosts that carry out the attack on a target are usually controlled remotely and the owner of the device is unaware of it; for this reason one cannot attack back directly as this will serve little more than to disable an innocent party. A proposed solution to these DDoS attacks is to identify a potential attacking address and ignore communication from that address for a set period of time through time stamping.
- Full Text:
- Date Issued: 2015
- Authors: Herbert, Alan , Irwin, Barry V W , van Heerden, Renier P
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430339 , vital:72684 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: DDoS (Distributed Denial of Service) attacks over recent years have shown to be devastating on the target systems and services made publicly available over the Internet. Furthermore, the backscatter1 caused by DDoS attacks also affects the available bandwidth and responsiveness of many other hosts within the Internet. The unfortunate reality of these attacks is that the targeted party cannot fight back due to the presence of botnets and malware-driven hosts. These hosts that carry out the attack on a target are usually controlled remotely and the owner of the device is unaware of it; for this reason one cannot attack back directly as this will serve little more than to disable an innocent party. A proposed solution to these DDoS attacks is to identify a potential attacking address and ignore communication from that address for a set period of time through time stamping.
- Full Text:
- Date Issued: 2015
Immersive audio content creation using mobile devices and ethernet avb
- Rouget, Antoine, Foss, Richard
- Authors: Rouget, Antoine , Foss, Richard
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426786 , vital:72391 , https://www.aes.org/e-lib/browse.cfm?elib=18009
- Description: The goal of immersive sound systems is to localize multiple sound sources such that listeners are enveloped in sound. This paper describes an immersive sound system that allows for the creation of immersive sound content and real time control over sound source localization. It is a client/server system where the client is a mobile device. The server receives localization control messages from the client and uses an Ethernet AVB network to distribute appropriate mix levels to speakers with in-built signal processing.
- Full Text:
- Date Issued: 2015
- Authors: Rouget, Antoine , Foss, Richard
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426786 , vital:72391 , https://www.aes.org/e-lib/browse.cfm?elib=18009
- Description: The goal of immersive sound systems is to localize multiple sound sources such that listeners are enveloped in sound. This paper describes an immersive sound system that allows for the creation of immersive sound content and real time control over sound source localization. It is a client/server system where the client is a mobile device. The server receives localization control messages from the client and uses an Ethernet AVB network to distribute appropriate mix levels to speakers with in-built signal processing.
- Full Text:
- Date Issued: 2015
Incipient genetic isolation of a temperate migratory coastal sciaenid fish (Argyrosomus inodorus) within the Benguela Cold Current system
- Henriques, Romina, Potts, Warren M, Sauer, Warwick H H, Shaw, Paul W
- Authors: Henriques, Romina , Potts, Warren M , Sauer, Warwick H H , Shaw, Paul W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124710 , vital:35652 , https://doi.10.1080/17451000.2014.952309
- Description: The Benguela Cold Current system, located in the south-eastern Atlantic, features cold sea surface temperatures, bounded to the north and south by tropical currents (the Angola and Agulhas Currents, respectively) and a perennial upwelling cell off central Namibia that divides the region into two sub-systems with different characteristics (Shannon 1985; Hutchings et al. 2009). The colder sea surface temperatures of the Benguela Current have been considered an important biogeographic barrier, isolating tropical and warm-temperate fauna of the Atlantic and Indo-Pacific Oceans (Avise 2000; Floeter et al. 2008). However, recent studies revealed that other oceanographic features, such as the perennial upwelling cell, may also play an important role in shaping the population structure of warm temperate fish populations within the Benguela system, as complete disruption of gene flow was documented both in Lichia amia (Linnaeus, 1758) and Atractoscion aequidens (Cuvier, 1830) (Henriques et al. 2012, 2014). Little is known, however, regarding the influence of the Benguela system on genetic population connectivity of cold-water-tolerant species.
- Full Text:
- Date Issued: 2015
- Authors: Henriques, Romina , Potts, Warren M , Sauer, Warwick H H , Shaw, Paul W
- Date: 2015
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/124710 , vital:35652 , https://doi.10.1080/17451000.2014.952309
- Description: The Benguela Cold Current system, located in the south-eastern Atlantic, features cold sea surface temperatures, bounded to the north and south by tropical currents (the Angola and Agulhas Currents, respectively) and a perennial upwelling cell off central Namibia that divides the region into two sub-systems with different characteristics (Shannon 1985; Hutchings et al. 2009). The colder sea surface temperatures of the Benguela Current have been considered an important biogeographic barrier, isolating tropical and warm-temperate fauna of the Atlantic and Indo-Pacific Oceans (Avise 2000; Floeter et al. 2008). However, recent studies revealed that other oceanographic features, such as the perennial upwelling cell, may also play an important role in shaping the population structure of warm temperate fish populations within the Benguela system, as complete disruption of gene flow was documented both in Lichia amia (Linnaeus, 1758) and Atractoscion aequidens (Cuvier, 1830) (Henriques et al. 2012, 2014). Little is known, however, regarding the influence of the Benguela system on genetic population connectivity of cold-water-tolerant species.
- Full Text:
- Date Issued: 2015
Multi sensor national cyber security data fusion
- Swart, Ignus, Irwin, Barry V W, Grobler, Marthie
- Authors: Swart, Ignus , Irwin, Barry V W , Grobler, Marthie
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430393 , vital:72688 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear view of a country’s information security posture and to improve on it. The potential attack surface of a nation is extremely large however and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a nation. There are however a variety of specialised data sources that are rich enough in relevant cyber security information to assess the state of a nation in at least key areas such as botnets, spam servers and incorrectly configured hosts present in a country. While informative both from an offensive and defensive point of view, the data sources range in a variety of factors such as accuracy, completeness, representation, cost and data availability. These factors add complexity when attempting to present a clear view of the combined intelligence of the data.
- Full Text:
- Date Issued: 2015
- Authors: Swart, Ignus , Irwin, Barry V W , Grobler, Marthie
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430393 , vital:72688 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: A proliferation of cyber security strategies have recently been published around the world with as many as thirty five strategies documented since 2009. These published strategies indicate the growing need to obtain a clear view of a country’s information security posture and to improve on it. The potential attack surface of a nation is extremely large however and no single source of cyber security data provides all the required information to accurately describe the cyber security readiness of a nation. There are however a variety of specialised data sources that are rich enough in relevant cyber security information to assess the state of a nation in at least key areas such as botnets, spam servers and incorrectly configured hosts present in a country. While informative both from an offensive and defensive point of view, the data sources range in a variety of factors such as accuracy, completeness, representation, cost and data availability. These factors add complexity when attempting to present a clear view of the combined intelligence of the data.
- Full Text:
- Date Issued: 2015
Observed correlations of unsolicited network traffic over five distinct IPv4 netblocks
- Nkhumeleni, Thiswilondi M, Irwin, Barry V W
- Authors: Nkhumeleni, Thiswilondi M , Irwin, Barry V W
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430408 , vital:72689 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: Using network telescopes to monitor unused IP address space provides a favorable environment for researchers to study and detect malware, denial of service and scanning activities within global IPv4 address space. This research focuses on comparative and correlation analysis of traffic activity across the network of telescope sensors. Analysis is done using data collected over a 12 month period on five network telescopes each with an aperture size of/24, operated in disjoint IPv4 address space. These were considered as two distinct groupings. Time series’ representing time-based traffic activity observed on these sensors was constructed. Using the cross-and auto-correlation methods of time series analysis, moderate correlation of traffic activity was achieved between telescope sensors in each category. Weak to moderate correlation was calculated when comparing category A and category B network telescopes’ datasets. Results were significantly improved by considering TCP traffic separately. Moderate to strong correlation coefficients in each category were calculated when using TCP traffic only. UDP traffic analysis showed weaker correlation between sensors, however the uniformity of ICMP traffic showed correlation of traffic activity across all sensors. The results confirmed the visual observation of traffic relativity in telescope sensors within the same category and quantitatively analyzed the correlation of network telescopes’ traffic activity.
- Full Text:
- Date Issued: 2015
- Authors: Nkhumeleni, Thiswilondi M , Irwin, Barry V W
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430408 , vital:72689 , https://www.academic-bookshop.com/ourshop/prod_3774091-ICCWS-2015-10th-International-Conference-on-Cyber-Warfare-and-Security-Kruger-National-Park-South-Africa-PRINT-ver-ISBN-978191030996.html
- Description: Using network telescopes to monitor unused IP address space provides a favorable environment for researchers to study and detect malware, denial of service and scanning activities within global IPv4 address space. This research focuses on comparative and correlation analysis of traffic activity across the network of telescope sensors. Analysis is done using data collected over a 12 month period on five network telescopes each with an aperture size of/24, operated in disjoint IPv4 address space. These were considered as two distinct groupings. Time series’ representing time-based traffic activity observed on these sensors was constructed. Using the cross-and auto-correlation methods of time series analysis, moderate correlation of traffic activity was achieved between telescope sensors in each category. Weak to moderate correlation was calculated when comparing category A and category B network telescopes’ datasets. Results were significantly improved by considering TCP traffic separately. Moderate to strong correlation coefficients in each category were calculated when using TCP traffic only. UDP traffic analysis showed weaker correlation between sensors, however the uniformity of ICMP traffic showed correlation of traffic activity across all sensors. The results confirmed the visual observation of traffic relativity in telescope sensors within the same category and quantitatively analyzed the correlation of network telescopes’ traffic activity.
- Full Text:
- Date Issued: 2015
The development of an e-Health system for health awareness campaigns in poor areas
- Gremu, Chikumbutso, Terzoli, Alfredo, Tsietsi, Mosiuoa
- Authors: Gremu, Chikumbutso , Terzoli, Alfredo , Tsietsi, Mosiuoa
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430638 , vital:72705 , 10.1109/ISTAFRICA.2015.7190527
- Description: This paper discusses work to develop an e-Health system called HealthAware to assist health service organisations to carry out targeted health awareness campaigns in poor areas. The system comprises two components called the Dashboard and the Health Messenger, which are web-based, Java applications that run in a peer-to-peer fashion. The Dashboard is used to create, manage, and publish awareness campaigns. The HealthMessenger facilitates end-users' access to the relevant awareness campaigns. A targeted communication strategy which splits the target population into subgroups based on their demo-graphic characteristics and geographic locations is used to determine relevant campaigns for a user. The HealthMessenger is hosted on an application service integration platform called TeleWeaver, while the Dashboard is hosted independently of TeleWeaver. Message queuing is used to ensure reliable communication between the Dashboard and the HealthMessenger. The implementation of HealthAware contributes knowledge on developing a system that ensures that users access only the information that is relevant to them. This addresses the challenge of sifting through potentially irrelevant information before arriving at the important information which is posed by generic materials.
- Full Text:
- Date Issued: 2015
- Authors: Gremu, Chikumbutso , Terzoli, Alfredo , Tsietsi, Mosiuoa
- Date: 2015
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430638 , vital:72705 , 10.1109/ISTAFRICA.2015.7190527
- Description: This paper discusses work to develop an e-Health system called HealthAware to assist health service organisations to carry out targeted health awareness campaigns in poor areas. The system comprises two components called the Dashboard and the Health Messenger, which are web-based, Java applications that run in a peer-to-peer fashion. The Dashboard is used to create, manage, and publish awareness campaigns. The HealthMessenger facilitates end-users' access to the relevant awareness campaigns. A targeted communication strategy which splits the target population into subgroups based on their demo-graphic characteristics and geographic locations is used to determine relevant campaigns for a user. The HealthMessenger is hosted on an application service integration platform called TeleWeaver, while the Dashboard is hosted independently of TeleWeaver. Message queuing is used to ensure reliable communication between the Dashboard and the HealthMessenger. The implementation of HealthAware contributes knowledge on developing a system that ensures that users access only the information that is relevant to them. This addresses the challenge of sifting through potentially irrelevant information before arriving at the important information which is posed by generic materials.
- Full Text:
- Date Issued: 2015
An Associative Shared Memory Approach to Audio Connection Management
- Eales, Andrew, Foss, Richard
- Authors: Eales, Andrew , Foss, Richard
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426841 , vital:72395 , https://www.aes.org/e-lib/browse.cfm?elib=17539
- Description: A distributed, associative memory that advertises audio streams and represents audio connections between networked audio devices is described. Characteristic features of a shared, associative memory are discussed, and three parameter-based models that represent audio signals and audio connections are introduced. Connection management is then discussed with reference to a distributed, associative memory environment. This environment allows changes made to audio connections to be automatically propagated to all networked devices, while also eliminating potential race conditions between connection requests. Additionally, connection management applications can be shared between different networked devices and controllers.
- Full Text:
- Date Issued: 2014
- Authors: Eales, Andrew , Foss, Richard
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/426841 , vital:72395 , https://www.aes.org/e-lib/browse.cfm?elib=17539
- Description: A distributed, associative memory that advertises audio streams and represents audio connections between networked audio devices is described. Characteristic features of a shared, associative memory are discussed, and three parameter-based models that represent audio signals and audio connections are introduced. Connection management is then discussed with reference to a distributed, associative memory environment. This environment allows changes made to audio connections to be automatically propagated to all networked devices, while also eliminating potential race conditions between connection requests. Additionally, connection management applications can be shared between different networked devices and controllers.
- Full Text:
- Date Issued: 2014
On the viability of pro-active automated PII breach detection: A South African case study
- Swart, Ignus, Irwin, Barry V W, Grobler, Marthie
- Authors: Swart, Ignus , Irwin, Barry V W , Grobler, Marthie
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430235 , vital:72676 , https://doi.org/10.1145/2664591.2664600
- Description: Various reasons exist why certain types of information is deemed personal both by legislation and society. While crimes such as identity theft and impersonation have always been in existence, the rise of the internet and social media has exacerbated the problem. South Africa has recently joined the growing ranks of countries passing legislation to ensure the privacy of certain types of data. As is the case with most implemented security enforcement systems, most appointed privacy regulators operate in a reactive way. While this is a completely acceptable method of operation, it is not the most efficient. Research has shown that most data leaks containing personal information remains available for more than a month on average before being detected and reported. Quite often the data is discovered by a third party who selects to notify the responsible organisation but can just as easily copy the data and make use of it. This paper will display the potential benefit a privacy regulator can expect to see by implementing pro-active detection of electronic personally identifiable information (PII). Adopting pro-active detection of PII exposed on public networks can potentially contribute to a significant reduction in exposure time. The results discussed in this paper were obtained by means of experimentation on a custom created PII detection system.
- Full Text:
- Date Issued: 2014
- Authors: Swart, Ignus , Irwin, Barry V W , Grobler, Marthie
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430235 , vital:72676 , https://doi.org/10.1145/2664591.2664600
- Description: Various reasons exist why certain types of information is deemed personal both by legislation and society. While crimes such as identity theft and impersonation have always been in existence, the rise of the internet and social media has exacerbated the problem. South Africa has recently joined the growing ranks of countries passing legislation to ensure the privacy of certain types of data. As is the case with most implemented security enforcement systems, most appointed privacy regulators operate in a reactive way. While this is a completely acceptable method of operation, it is not the most efficient. Research has shown that most data leaks containing personal information remains available for more than a month on average before being detected and reported. Quite often the data is discovered by a third party who selects to notify the responsible organisation but can just as easily copy the data and make use of it. This paper will display the potential benefit a privacy regulator can expect to see by implementing pro-active detection of electronic personally identifiable information (PII). Adopting pro-active detection of PII exposed on public networks can potentially contribute to a significant reduction in exposure time. The results discussed in this paper were obtained by means of experimentation on a custom created PII detection system.
- Full Text:
- Date Issued: 2014
Temporal and spatial variability in the abundance, biomass and distribution of Palaemon peringueyi (Decapoda: Crustacea) are influenced by biological but not physico-chemical factors in the permanently open Kariega Estuary, South Africa
- Nyalungu, Nonhlanhla P, Hodgson, Alan N, Froneman, P William, Dopolo, M, Masubelele, M
- Authors: Nyalungu, Nonhlanhla P , Hodgson, Alan N , Froneman, P William , Dopolo, M , Masubelele, M
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68106 , vital:29200 , https://doi.org/10.2989/16085914.2014.960792
- Description: Publisher version , Biological and physico-chemical factors affecting abundance and biomass of shrimp Palaemon peringueyi were investigated in 2010–2011 in the lower, middle and upper reaches of the freshwater-deprived permanently open Kariega Estuary. Shrimp abundance and biomass ranged from 0 to 88 ind. m−2 and 0 to 4.4 g wwt m−2, respectively. Shrimps were most abundant in the lower reach, and highest abundances and biomasses were recorded in the lower reach in June when salinities were low. The shrimps were almost always absent in the upper reach. Juveniles were found mostly in the lower and middle reaches, whereas adults were distributed in all three reaches. Regression analyses showed no statistically significant relationship for either abundance or biomass of the shrimps with temperature, salinity and dissolved oxygen (p > 0.05). The relationship between shrimp abundance and biomass and vegetation cover was positive and statistically significant (R2 = 0.109 and 0.185, respectively; p < 0.05). Vegetation cover plays an important role in determining the presence, distribution and abundance or biomass of P. peringueyi in this estuary.
- Full Text: false
- Date Issued: 2014
- Authors: Nyalungu, Nonhlanhla P , Hodgson, Alan N , Froneman, P William , Dopolo, M , Masubelele, M
- Date: 2014
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/68106 , vital:29200 , https://doi.org/10.2989/16085914.2014.960792
- Description: Publisher version , Biological and physico-chemical factors affecting abundance and biomass of shrimp Palaemon peringueyi were investigated in 2010–2011 in the lower, middle and upper reaches of the freshwater-deprived permanently open Kariega Estuary. Shrimp abundance and biomass ranged from 0 to 88 ind. m−2 and 0 to 4.4 g wwt m−2, respectively. Shrimps were most abundant in the lower reach, and highest abundances and biomasses were recorded in the lower reach in June when salinities were low. The shrimps were almost always absent in the upper reach. Juveniles were found mostly in the lower and middle reaches, whereas adults were distributed in all three reaches. Regression analyses showed no statistically significant relationship for either abundance or biomass of the shrimps with temperature, salinity and dissolved oxygen (p > 0.05). The relationship between shrimp abundance and biomass and vegetation cover was positive and statistically significant (R2 = 0.109 and 0.185, respectively; p < 0.05). Vegetation cover plays an important role in determining the presence, distribution and abundance or biomass of P. peringueyi in this estuary.
- Full Text: false
- Date Issued: 2014
Towards a Sandbox for the Deobfuscation and Dissection of PHP Malware
- Wrench, Peter M, Irwin, Barry V W
- Authors: Wrench, Peter M , Irwin, Barry V W
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429700 , vital:72633 , 10.1109/ISSA.2014.6950504
- Description: The creation and proliferation of PHP-based Remote Access Trojans (or web shells) used in both the compromise and post exploitation of web platforms has fuelled research into automated methods of dissecting and analysing these shells. Current malware tools disguise themselves by making use of obfuscation techniques designed to frustrate any efforts to dissect or reverse engineer the code. Advanced code engineering can even cause malware to behave differently if it detects that it is not running on the system for which it was originally targeted. To combat these defensive techniques, this paper presents a sandbox-based environment that aims to accurately mimic a vulnerable host and is capable of semi-automatic semantic dissection and syntactic deobfuscation of PHP code.
- Full Text:
- Date Issued: 2014
- Authors: Wrench, Peter M , Irwin, Barry V W
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429700 , vital:72633 , 10.1109/ISSA.2014.6950504
- Description: The creation and proliferation of PHP-based Remote Access Trojans (or web shells) used in both the compromise and post exploitation of web platforms has fuelled research into automated methods of dissecting and analysing these shells. Current malware tools disguise themselves by making use of obfuscation techniques designed to frustrate any efforts to dissect or reverse engineer the code. Advanced code engineering can even cause malware to behave differently if it detects that it is not running on the system for which it was originally targeted. To combat these defensive techniques, this paper presents a sandbox-based environment that aims to accurately mimic a vulnerable host and is capable of semi-automatic semantic dissection and syntactic deobfuscation of PHP code.
- Full Text:
- Date Issued: 2014
Towards building an indigenous knowledge platform to enable culturally-sensitive education underpinned by technological pedagogical and content knowledge (TPACK)
- Ntšekhe, Mathe, Terzoli, Alfredo, Thinyane, Mamello
- Authors: Ntšekhe, Mathe , Terzoli, Alfredo , Thinyane, Mamello
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431424 , vital:72773 , http://proceedings.e-skillsconference.org/2014/e-skills275-284Ntsekhe821.pdf
- Description: The everyday use of Information and Communication Technologies (ICTs) is ingrained to the fabric of today’s society. A question open for debate is whether this use is or can be optimized to engender authentic solutions, which are aligned to the natural environment of the people? In this paper, we examine at the question from the vantage point of ed-ucating the rural African child. We engage with the sub-question: can ICTs facilitate education grounded in people's own realities, especially those of the marginalized rural poor? We believe this is possible under specific conditions, which include making Indigenous Knowledge (IK) readily available. We propose building an ICT platform that allows injec-tion of IK into the education process: develop a solution that valorizes IK, but also supports efforts to use ICTs in education driven by Tech-nology, Pedagogy, and Content Knowledge (TPACK) framework. The main goal of this framework is to facilitate effective teaching with tech-nology. TPACK partially embeds IK within pedagogical knowledge and ‘contexts’ of learning; we argue for explicit inclusion of IK within the framework to complement the other knowledges.
- Full Text:
- Date Issued: 2014
- Authors: Ntšekhe, Mathe , Terzoli, Alfredo , Thinyane, Mamello
- Date: 2014
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/431424 , vital:72773 , http://proceedings.e-skillsconference.org/2014/e-skills275-284Ntsekhe821.pdf
- Description: The everyday use of Information and Communication Technologies (ICTs) is ingrained to the fabric of today’s society. A question open for debate is whether this use is or can be optimized to engender authentic solutions, which are aligned to the natural environment of the people? In this paper, we examine at the question from the vantage point of ed-ucating the rural African child. We engage with the sub-question: can ICTs facilitate education grounded in people's own realities, especially those of the marginalized rural poor? We believe this is possible under specific conditions, which include making Indigenous Knowledge (IK) readily available. We propose building an ICT platform that allows injec-tion of IK into the education process: develop a solution that valorizes IK, but also supports efforts to use ICTs in education driven by Tech-nology, Pedagogy, and Content Knowledge (TPACK) framework. The main goal of this framework is to facilitate effective teaching with tech-nology. TPACK partially embeds IK within pedagogical knowledge and ‘contexts’ of learning; we argue for explicit inclusion of IK within the framework to complement the other knowledges.
- Full Text:
- Date Issued: 2014