Unlocking the armour: enabling intrusion detection and analysis of encrypted traffic streams
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
- Authors: Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428845 , vital:72540
- Description: In the interests of maintaining end to end security, increasing volumes of information are being encrypted while in transit. Many organisations and users will make use of secure encrypted protocols for information interchange given an option. The very security that is provided by these transport protocols, such as IPSEC, HTTPS and SSH also acts against the security monitoring of an organisation’s traffic. Intrusion detection systems are no longer easily able to inspect the payload of encrypted protocols. Similarly these protocols can potentially be difficult for securi-ty and network administrators to debug, validate and analyse. This pa-per discusses the need for a means of a trusted third party being able to unpack encrypted data traversing a network and a proposes an ar-chitecture which would enable this to be achieved through the extrac-tion and sharing of the appropriate encipherment tokens, based on the assumption that an organisation has legitimate access to one side of a communication entering or exiting its network. This problem also has particular relevance to honey-net research and for investigators trying to perform real-time monitoring of an intruder which is making use of such a protected protocol. A proof of concept implementation of the proposed architecture is also discussed.
- Full Text:
Using a FreeBSD "cluster" to provide network services
- Authors: Siebörger, David
- Date: 2005
- Language: English
- Type: Conference paper
- Identifier: vital:6611 , http://hdl.handle.net/10962/d1009524
- Description: A presentation on how FreeBSD might be used in a load-balancing cluster, using work done at Rhodes University as a case study. Presented to a community of higher education IT practitioners in September 2005.
- Full Text:
- Authors: Siebörger, David
- Date: 2005
- Language: English
- Type: Conference paper
- Identifier: vital:6611 , http://hdl.handle.net/10962/d1009524
- Description: A presentation on how FreeBSD might be used in a load-balancing cluster, using work done at Rhodes University as a case study. Presented to a community of higher education IT practitioners in September 2005.
- Full Text:
Using aspects of game theory for enhanced stakeholder participation perspectives in integrated water resource management: a Kat River Valley case study
- Authors: Mbatha, Cyril
- Date: 2005
- Subjects: Water resources development -- Case studies , Water-supply -- South Africa -- Kat River Valley -- Management , Economic development -- Case studies , Water-supply -- Government policy -- South Africa , Economic development -- South Africa -- Kat River Valley , Game theory
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:971 , http://hdl.handle.net/10962/d1002705 , Water resources development -- Case studies , Water-supply -- South Africa -- Kat River Valley -- Management , Economic development -- Case studies , Water-supply -- Government policy -- South Africa , Economic development -- South Africa -- Kat River Valley , Game theory
- Description: South Africa is a water poor region and yet, like in many other developing countries, water resources are a valuable production input in socially important industries such as agriculture and mining (Nieuwoudt et al., 2004:162-182). With a mean annual rainfall and runoff of 502mm and 42mm (420m³ per hectare per annum) respectively, Briers and Powell (1993:1) speculate that water shortages will limit South Africa’s economic development in the twenty-first century. In response to the challenges of water resource scarcity and socio-economic inequalities, in 1997 the South African Department of Water Affairs and Forestry (DWAF), following international trends, formulated a National Water Policy (NWP) based on Integrated Water Resource Management (IWRM) principles (Palmer et al., 2003). The main objectives of the NWP (1997) are to protect national water resources from degradation, provide economically disadvantaged communities with access to water resources and promote economic development, through the devolution of water management responsibilities to locally established water institutions (NWP, 1997). The pursuit of these objectives requires a thorough investigation of biophysical, sociopolitical and economic characteristics of the demarcated water areas. For such an investigation to provide accurate and locally relevant results, broad stakeholder participation is of paramount importance. The thesis discusses economic measures required in pursuing enhanced stakeholder participation levels at local levels. A socio-economic survey investigation describing major participation trends against reported property rights and Willingness to Pay values was conducted in the Kat River Valley, Eastern Cape province. From the investigation, observed participation trends driven by economic interests were identified and used in recommendations proposed for the policy implementation process. Using game theoretic arguments as guidelines in soliciting cooperative behaviour in the use and consumption of common resources (Ostrom, 1990), the thesis proposes the introduction of water related public works projects as employment creating vehicles for individuals and communities targeted for economic empowerment and participation in the water policy. However, for sustainable stakeholder participation levels, it is argued that the employment positions created through the projects need to be designed in a manner that would encourage an evolution of long-term relationships between stakeholders and the water management institutions.
- Full Text:
- Authors: Mbatha, Cyril
- Date: 2005
- Subjects: Water resources development -- Case studies , Water-supply -- South Africa -- Kat River Valley -- Management , Economic development -- Case studies , Water-supply -- Government policy -- South Africa , Economic development -- South Africa -- Kat River Valley , Game theory
- Language: English
- Type: Thesis , Masters , MA
- Identifier: vital:971 , http://hdl.handle.net/10962/d1002705 , Water resources development -- Case studies , Water-supply -- South Africa -- Kat River Valley -- Management , Economic development -- Case studies , Water-supply -- Government policy -- South Africa , Economic development -- South Africa -- Kat River Valley , Game theory
- Description: South Africa is a water poor region and yet, like in many other developing countries, water resources are a valuable production input in socially important industries such as agriculture and mining (Nieuwoudt et al., 2004:162-182). With a mean annual rainfall and runoff of 502mm and 42mm (420m³ per hectare per annum) respectively, Briers and Powell (1993:1) speculate that water shortages will limit South Africa’s economic development in the twenty-first century. In response to the challenges of water resource scarcity and socio-economic inequalities, in 1997 the South African Department of Water Affairs and Forestry (DWAF), following international trends, formulated a National Water Policy (NWP) based on Integrated Water Resource Management (IWRM) principles (Palmer et al., 2003). The main objectives of the NWP (1997) are to protect national water resources from degradation, provide economically disadvantaged communities with access to water resources and promote economic development, through the devolution of water management responsibilities to locally established water institutions (NWP, 1997). The pursuit of these objectives requires a thorough investigation of biophysical, sociopolitical and economic characteristics of the demarcated water areas. For such an investigation to provide accurate and locally relevant results, broad stakeholder participation is of paramount importance. The thesis discusses economic measures required in pursuing enhanced stakeholder participation levels at local levels. A socio-economic survey investigation describing major participation trends against reported property rights and Willingness to Pay values was conducted in the Kat River Valley, Eastern Cape province. From the investigation, observed participation trends driven by economic interests were identified and used in recommendations proposed for the policy implementation process. Using game theoretic arguments as guidelines in soliciting cooperative behaviour in the use and consumption of common resources (Ostrom, 1990), the thesis proposes the introduction of water related public works projects as employment creating vehicles for individuals and communities targeted for economic empowerment and participation in the water policy. However, for sustainable stakeholder participation levels, it is argued that the employment positions created through the projects need to be designed in a manner that would encourage an evolution of long-term relationships between stakeholders and the water management institutions.
- Full Text:
Wireless communication for previously disadvantaged secondary schools in Grahamstown, South Africa.
- Brandt, Ingrid, Terzoli, Alfredo, Hodgkinson-Williams, Cheryl
- Authors: Brandt, Ingrid , Terzoli, Alfredo , Hodgkinson-Williams, Cheryl
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427615 , vital:72451 , https://citeseerx.ist.psu.edu/document?repid=rep1andtype=pdfanddoi=2520d49f684e821c84350ae8c504572f35186d2f
- Description: With an alarmingly low teledensity in South Africa, less than 5% in some rural areas, and not much hope of further wired infrastructure, as the costs incurred are high compared to potential revenue, wireless connec-tivity could be a great asset and service in South Africa. This paper looks at how wireless communication technologies, 802.11, WiMAX and VSAT, can be used to allow broadband connectivity of schools to the Internet, with special reference to experimental work that is being done in Grahamstown schools.
- Full Text:
- Authors: Brandt, Ingrid , Terzoli, Alfredo , Hodgkinson-Williams, Cheryl
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/427615 , vital:72451 , https://citeseerx.ist.psu.edu/document?repid=rep1andtype=pdfanddoi=2520d49f684e821c84350ae8c504572f35186d2f
- Description: With an alarmingly low teledensity in South Africa, less than 5% in some rural areas, and not much hope of further wired infrastructure, as the costs incurred are high compared to potential revenue, wireless connec-tivity could be a great asset and service in South Africa. This paper looks at how wireless communication technologies, 802.11, WiMAX and VSAT, can be used to allow broadband connectivity of schools to the Internet, with special reference to experimental work that is being done in Grahamstown schools.
- Full Text:
Wireless Network Visualization Using Radio Propagation Modelling
- Janse van Rensburg, Johanna, Irwin, Barry V W
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428859 , vital:72541 , https://d1wqtxts1xzle7.cloudfront.net/81589186/Papers_5CJanse_van_Rensburg_Wireless_Radio_Prop-libre.pdf?1646243170=esponse-content-disposi-tion=inline%3B+filename%3DWireless_Network_Visualization_Using_Rad.pdfExpires=1714748958Signature=OF69CzUsXIaE9WuVUQ~p01LV8Fdm4EOpX1eudE3qomWEWQ9jngy36AuZ38dZEAfIhWWFgO7byMtmx8hOUE3uYjjqLLGziqWV05r~K2n~DdSHAO1x2omrK53ew3lSW2AJ677zsqOIcRb-yVr7kE2PbAw1QolptUWQVI2YpAHEKdg5EQXm2iAW~FrQ7ljJxuwZTKaVLoubxj4HRLwJxTPIS9iN9nHn3sNKyIojfG6duWnCQ0dpkIKiKWTY6HVioBQCiN1vSdLUagXnTeRthoOFGyfo2kd3XG1Pi3tttIwFviPCh5H1297BCpMruY-h6XjSnPBGgAG33dOnkClBFnyAKg__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Wireless technologies have had an enormous impact on networking in re-cent years. It can create new business oppurtunities and allow users to communicate and share data in a new fashion. Wireless Networks de-crease installation costs, reduce the deployment time of a network and overcome physical barrier problems inherent in wiring. Unfortunately this flexibility comes at a price. The deployment, installation and setup of a WLAN is not a simple task and a number of factors need to be considered. Wireless Networks are notorious for being insecure due to signal spill, ad-hoc unauthorized access points and varying encryption strengths and standards. RF (Radio Frequency) interference and physical barriers sup-press a signal. In addition the channel frequencies each access point will be using in order to provide maximum roaming but minimum inter access point interference need to be considered. It is a complex balancing act to take these factors into account while still maintaining coverage, perfor-mance and security requirements. In this paper the benefits and feasibility of a model will be discussed that will enable the network administrator to visualize the coverage footprint of their wireless network when the above factors are taken into consideration. The program will be able to predict the strength, propagation and unwanted spill of signals which could compro-mise the security of an organisation prior to the deployment of a WLAN. In addition the model will provide functionality to visualize a signal from audit data once the WLAN is operational. The end result will be a program that can aid in the configuration, installation and management of a secure WLAN.
- Full Text:
- Authors: Janse van Rensburg, Johanna , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428859 , vital:72541 , https://d1wqtxts1xzle7.cloudfront.net/81589186/Papers_5CJanse_van_Rensburg_Wireless_Radio_Prop-libre.pdf?1646243170=esponse-content-disposi-tion=inline%3B+filename%3DWireless_Network_Visualization_Using_Rad.pdfExpires=1714748958Signature=OF69CzUsXIaE9WuVUQ~p01LV8Fdm4EOpX1eudE3qomWEWQ9jngy36AuZ38dZEAfIhWWFgO7byMtmx8hOUE3uYjjqLLGziqWV05r~K2n~DdSHAO1x2omrK53ew3lSW2AJ677zsqOIcRb-yVr7kE2PbAw1QolptUWQVI2YpAHEKdg5EQXm2iAW~FrQ7ljJxuwZTKaVLoubxj4HRLwJxTPIS9iN9nHn3sNKyIojfG6duWnCQ0dpkIKiKWTY6HVioBQCiN1vSdLUagXnTeRthoOFGyfo2kd3XG1Pi3tttIwFviPCh5H1297BCpMruY-h6XjSnPBGgAG33dOnkClBFnyAKg__Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA
- Description: Wireless technologies have had an enormous impact on networking in re-cent years. It can create new business oppurtunities and allow users to communicate and share data in a new fashion. Wireless Networks de-crease installation costs, reduce the deployment time of a network and overcome physical barrier problems inherent in wiring. Unfortunately this flexibility comes at a price. The deployment, installation and setup of a WLAN is not a simple task and a number of factors need to be considered. Wireless Networks are notorious for being insecure due to signal spill, ad-hoc unauthorized access points and varying encryption strengths and standards. RF (Radio Frequency) interference and physical barriers sup-press a signal. In addition the channel frequencies each access point will be using in order to provide maximum roaming but minimum inter access point interference need to be considered. It is a complex balancing act to take these factors into account while still maintaining coverage, perfor-mance and security requirements. In this paper the benefits and feasibility of a model will be discussed that will enable the network administrator to visualize the coverage footprint of their wireless network when the above factors are taken into consideration. The program will be able to predict the strength, propagation and unwanted spill of signals which could compro-mise the security of an organisation prior to the deployment of a WLAN. In addition the model will provide functionality to visualize a signal from audit data once the WLAN is operational. The end result will be a program that can aid in the configuration, installation and management of a secure WLAN.
- Full Text:
woman working
- Authors: Berold, Robert
- Date: 2005
- Subjects: To be catalogued
- Language: English
- Type: text , poem
- Identifier: http://hdl.handle.net/10962/462547 , vital:76313 , ISBN 0028-4459 , https://journals.co.za/doi/epdf/10.10520/EJC47772
- Description: New Coin is one of South Africa's most established and influential poetry journals. It publishes poetry, and poetry-related reviews, commentary and interviews. New Coin places a particular emphasis on evolving forms and experimental use of the English language in poetry in the South African context. In this sense it has traced the most exciting trends and currents in contemporary poetry in South Africa for a decade of more. The journal is published twice a year in June and December by the Institute for the Study of English in Africa (ISEA), Rhodes University.
- Full Text:
- Authors: Berold, Robert
- Date: 2005
- Subjects: To be catalogued
- Language: English
- Type: text , poem
- Identifier: http://hdl.handle.net/10962/462547 , vital:76313 , ISBN 0028-4459 , https://journals.co.za/doi/epdf/10.10520/EJC47772
- Description: New Coin is one of South Africa's most established and influential poetry journals. It publishes poetry, and poetry-related reviews, commentary and interviews. New Coin places a particular emphasis on evolving forms and experimental use of the English language in poetry in the South African context. In this sense it has traced the most exciting trends and currents in contemporary poetry in South Africa for a decade of more. The journal is published twice a year in June and December by the Institute for the Study of English in Africa (ISEA), Rhodes University.
- Full Text:
Writing, identity, and change : a narrative case study of the use of journals to promote reflexivity within a Drama Studies curriculum
- Authors: Sutherland, Alexandra
- Date: 2005
- Subjects: Drama -- Study and teaching (Higher) -- South Africa Drama in education Scholarly publishing Academic writing Reflection (Philosophy) Playwriting
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:1845 , http://hdl.handle.net/10962/d1004384
- Description: The study adopts a case study examination of three student reflective joumals written about class and field based applied Drama experiences over one year. The journals were written as part of a curriculum outcome to develop reflective practice, for one Drama Honours paper (Educational Drama and Theatre) at Rhodes University Drama Department, South Africa. Based on a narrative inquiry approach, the study documents the changes in identity, discourse, and representation of self and other, which emerge through the journal writing process. The research analyses how identities are constructed through reflective writing practices, and how these identities might relate to the arguments for the development of reflexivity. The development of reflexivity is seen as integral to contemporary educational policies associated with lifelong learning, and the skills required of graduates in South Africa's emerging democracy. These policies centre on means of preparing students for a world characterised by change and instability, or what Barnett (2000) has termed a "supercomplex world". The research findings suggest that journal writing within a Drama Studies curriculum, allows students to construct subjectivities which support Barnett's claim that "the main pedagogical task in a university is not that of the transmission of knowledge but of promoting forms of human being appropriate to the conditions of supercomplexity" (Barnett, 2000b: 164). In addition, the development of different writing genres within a Drama Studies curriculum allows students to develop disciplinarily relevant ways of discussing and researching artistic processes and products. A reflective journal is a potential site for students to interrogate and construct emerging identities which enable them to negotiate diversity, thus preparing them for their lives beyond the university.
- Full Text:
- Authors: Sutherland, Alexandra
- Date: 2005
- Subjects: Drama -- Study and teaching (Higher) -- South Africa Drama in education Scholarly publishing Academic writing Reflection (Philosophy) Playwriting
- Language: English
- Type: Thesis , Masters , MEd
- Identifier: vital:1845 , http://hdl.handle.net/10962/d1004384
- Description: The study adopts a case study examination of three student reflective joumals written about class and field based applied Drama experiences over one year. The journals were written as part of a curriculum outcome to develop reflective practice, for one Drama Honours paper (Educational Drama and Theatre) at Rhodes University Drama Department, South Africa. Based on a narrative inquiry approach, the study documents the changes in identity, discourse, and representation of self and other, which emerge through the journal writing process. The research analyses how identities are constructed through reflective writing practices, and how these identities might relate to the arguments for the development of reflexivity. The development of reflexivity is seen as integral to contemporary educational policies associated with lifelong learning, and the skills required of graduates in South Africa's emerging democracy. These policies centre on means of preparing students for a world characterised by change and instability, or what Barnett (2000) has termed a "supercomplex world". The research findings suggest that journal writing within a Drama Studies curriculum, allows students to construct subjectivities which support Barnett's claim that "the main pedagogical task in a university is not that of the transmission of knowledge but of promoting forms of human being appropriate to the conditions of supercomplexity" (Barnett, 2000b: 164). In addition, the development of different writing genres within a Drama Studies curriculum allows students to develop disciplinarily relevant ways of discussing and researching artistic processes and products. A reflective journal is a potential site for students to interrogate and construct emerging identities which enable them to negotiate diversity, thus preparing them for their lives beyond the university.
- Full Text:
XML digital signature and RDF
- Cloran, Russell, Irwin, Barry V W
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
- Authors: Cloran, Russell , Irwin, Barry V W
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/428874 , vital:72542 , https://digifors.cs.up.ac.za/issa/2005/Proceedings/Poster/026_Article.pdf
- Description: The XML Signature working group focuses on the canonicalisation of XML, and the syntax used to sign an XML document. This process focuses on the semantics intro-duced by the XML language itself, but ignores semantics which a particular applica-tion of XML may add. The Resource Description Framework (RDF) is a language for representing information about resources on the Web. RDF has a number of possi-ble serialisations, including an XML serialisation (RDF/XML), popularly used as the format for exchanging RDF data. In general, the order of statements in RDF is not important, and thus the order in which XML tags occur in RDF/XML can vary greatly whilst still preserving semantics. This paper examines some of the issues surround-ing the canonicalisation of RDF/XML and the signing of it, discussing nesting, node identifiers and the ordering of nodes. Existing RDF serialisation formats are consid-ered as case studies of partially canonical RDF formats.
- Full Text:
You can’t be serious:
- Strelitz, Larry N, Steenveld, Lynette N
- Authors: Strelitz, Larry N , Steenveld, Lynette N
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/159215 , vital:40278 , https://hdl.handle.net/10520/EJC146377
- Description: As well as pandering to the lowest common denominator and simplifying complex issues, tabloids are also condemned for generally failing to provide information that citizens need in order to make informed political judgements - the latter being the raison d'etre of serious newspapers. In summary, tabloids "lower the standards of public discourse" (Ornerbring and Jonson, 2004: 283).
- Full Text:
- Authors: Strelitz, Larry N , Steenveld, Lynette N
- Date: 2005
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/159215 , vital:40278 , https://hdl.handle.net/10520/EJC146377
- Description: As well as pandering to the lowest common denominator and simplifying complex issues, tabloids are also condemned for generally failing to provide information that citizens need in order to make informed political judgements - the latter being the raison d'etre of serious newspapers. In summary, tabloids "lower the standards of public discourse" (Ornerbring and Jonson, 2004: 283).
- Full Text:
Awarded the Order of Mapungbwe
- Authors: Nyokong, Tebello
- Identifier: vital:7222 , http://hdl.handle.net/10962/d1005899
- Description: Awarded the Order of Mapungbwe: Bronze by the President of South Africa, His Excellency Mr Thabo Mbeki.
- Full Text: false
- Authors: Nyokong, Tebello
- Identifier: vital:7222 , http://hdl.handle.net/10962/d1005899
- Description: Awarded the Order of Mapungbwe: Bronze by the President of South Africa, His Excellency Mr Thabo Mbeki.
- Full Text: false
Order of Mapungubwe
- Authors: Nyokong, Tebello
- Identifier: vital:7166 , http://hdl.handle.net/10962/d1005916
- Description: Professor Nyokong was bestowed with the Order of Mapungubwe: Bronze by the State President Thabo Mbeki - 2005
- Full Text: false
- Authors: Nyokong, Tebello
- Identifier: vital:7166 , http://hdl.handle.net/10962/d1005916
- Description: Professor Nyokong was bestowed with the Order of Mapungubwe: Bronze by the State President Thabo Mbeki - 2005
- Full Text: false