Dynamics of malware spread in decentralized peer to peer network Computer Science Assignment Help

Dynamics of malware spread in decentralized peer to peer network Computer Science Assignment Help. Dynamics of malware spread in decentralized peer to peer network Computer Science Assignment Help.

Literature Review is a critical evaluation of peer-reviewed articles, texts, and other sources relevant to your research. Most Research topics are very specific, you will most likely need to generalize your topics. The paper must contain a minimum of eight (8) peer-reviewed references published within the past 5 years.

Literature Review Content:

  • Subject or issue overview (do not rewrite the introduction)
  • Categorized or themed presentation of material supporting and refuting the subject or issue
  • Critical review and comparison of each referenced work
  • Conclusions based on the facts in the literature review

Note: 3 pages (diagrams or any charts would not be included)

0% plagiarism

eight (8) peer-reviewed references published within the past 5 years.

Paragraph in-text citation

look into the introduction paper for detailed paper.

Introduction

To characterize the spread of malware in P2P networks, an analytical model is formulated, which studies the dynamics associated with the spread of malware. The system parameters of the network conditions, under which the network reaches a malware-free equilibrium, are derived using a compartmental model, which also evaluates the effect of control strategies like node quarantine to stifle the malware. Also, the malware spread in smartphones in reference to P2P networks is brought under the study.

Problem

The use of peer-to-peer (P2P) networks as a vehicle to spread malware offers some important advantages over worms that spread by scanning for vulnerable hosts. This is primarily due to the methodology employed by the peer to search for content. For instance, in decentralized P2P architecture such as Gnutella where search is done by flooding the network, a peer forwards the query to it’s immediate neighbors and the process is repeated until a specified threshold time-to-live, TTL is reached. Here TTL is the threshold representing the number of overlay links that a search query travels. A relevant example here is the Mandragore worm that affected Gnutella users. Having infected a host in the network, the worm cloaks itself for other Gnutella users. Every time a Gnutella user searches for media files in the infected computer, the virus will appears as an answer to the request, leading the user to believe that it is the file the user searched for. The design of the search technique has the following implications: first, the worms can spread much faster, since they do not have to probe for susceptible hosts and second, the rate of failed connections is less. Thus, rapid proliferation of malware can pose a serious security threat to the functioning of P2P networks.

Understanding the factors affecting the malware spread can help facilitate network designs that are resilient to attacks, ensuring the protection of the networking infrastructure. This paper addresses this issue and develops an analytic framework for modeling the spread of malware in P2P networks while accounting for the architectural, topological, and user related factors. We also model the impact of malware control strategies like node quarantine.

Concerns with the Current System

Prior simulation model used a combo of deterministic/stochastic epidemic models large-scale attack simulation. This current system, which uses general stochastic model, makes it difficult to obtain results, which could be used for worm containment. Prior study was used for worm detection, based on trend rather than the rate of the anomalous traffic via a filter.

Proposed System

The new model allows for the development of immediate worm containment that prevents the worm spreading in its earlier stages.The maximum count probability of hosts effected by the worm is calculated. This includes both fast and slow scan worms without the knowledge of the signature previously. The automatic containment is relatively more effective.

Dynamics of malware spread in decentralized peer to peer network Computer Science Assignment Help[supanova_question]

Week 5 discussion Business Finance Assignment Help

Part 1: Primary Task

Within the Discussion Forum area, write at least 250 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Your final capstone submission is due next week. This is your opportunity to share and request resources.

In the Discussion Forum, you are required to submit at least 2 forms, tools, or Websites you found useful in the course of the creation of this project. Resources such as non-credible search engines, wikis, dictionaries, definitions and other non-credible sources as defined by APA formatting cannot be used.

In addition, you are required to request information on a specific area of the project.

[supanova_question]

ATMega168 Microprocessor – Timers Engineering Assignment Help

The ‘delay’ function as used in the workshops is limited because it depends on approximate timing
based on how long the processor takes to execute the ‘NOP’ instruction, and the limitations of the size
of an integer means that the maximum delay will be approximately 65 seconds. Furthermore, the
processor cannot do anything else while the delay is going on, and any interrupts run during the ‘delay’
will cause the delay to be longer than intended.
The Atmel ATmega168 does provide the facility to maintain more accurate and longer timings through
the use of the crystal oscillator and the timer/counter circuitry in the processor.
Your task is to work out how to use these components so that programs can be written to accurately
trigger events after an amount of time, specified in minutes and seconds. The system should be able to
handle delays from a minimum of 1 second up to at least 60 minutes after ‘set’. The function should
allow for the timer interval to be set (input) in minutes and seconds.
Note: Assume the processor is setup as in the lab sessions (including crystal oscillator used with the
frequency specified in Nerdkit Guide).

Your solution should include the following:
1. Overall description of the principles of operation of your solution
2. Description of all timer/counters, registers, and interrupts used and their function
3. Details of all configuration information to get the processor to perform this function (e.g. what
needs to be written to different configuration registers, including explanations on WHY
particular bits are set or cleared)
4. Description of the overall algorithm(s) to implement the function
Note: This can be in the form of pseudocode. Code fragments (lines of code) can be used to
demonstrate where appropriate.
Note: You do NOT have to write the whole program for this assignment.

[supanova_question]

Question and Problem Sets Business Finance Assignment Help

Complete the Questions and Problems in the Questions and Problems Excel Spreadsheet. I have prepared this spreadsheet as trial for week one. I have put of the problems in the file and created tabs for each problems. Please note question #1, #2 and #8 have templates to help you solve the problem. What you need to do is the following:

  1. Complete problems 1-8 on the tab labled for that problem, then put the answer for each problem on Tab 1 This allows me to ensure I am seeing your correct final answer making accurate grading. Please make sure on the tab for the problem you show all work.

[supanova_question]

Provide a comprehensive overview of RFID and its current uses Business Finance Assignment Help

Note the following specifics:

1. Typically three periods are used.

2. Space between first initial & middle initial.

3. The & before the last author’s last name.

4. Typically we capitalize the first letter in the first word after :

5. Italicize the journal name.

6. Italicize the volume number (but not the issue number).

7. Some times the volume number and issue number are not readily available on the PDF file, but pay attention to the file name. I added all the necessary information so that you can list it 100% correctly in APA style

Zhang, X., Nickels, D. W., & Stafford, T. F. (2010). Understanding the organizational impact of radio frequency identification technology: A holistic view. Pacific Asia Journal of the Association for Information Systems, 2(2), 1-17.

Purpose (What are the objectives for writing the paper?):

Provide an overview of RFID technology and its uses and to propose its effects on an organization’s IT infrastructure, business intelligence, and decision making.

Design / Methodology / Approach (How are the objectives achieved? Include the main methods used for the research and the approach to the topic.):

  • Provide a comprehensive overview of RFID and its current uses
  • Propose general effects of using RFID on IT infrastructure, business intelligence, and decision making in the form of propositions
  • Propose a theory dubbed the “IT Decision Chain” employing and linking the propositions

Main Points / Findings / Conclusions (What are the main points? What was found in the course of the work, and what are the major conclusions? This will refer to analysis, discussion, or results.):

  • RFID is a diverse architecture with unlimited uses for tracking objects
  • RFID presents challenges to existing IT systems during design and implementation
  • RFID can increase the level and efficiency of real time data in a retail supply change
  • There are assertions (propositions) that can be made regarding the effects of an RFID based system on IT infrastructure, business intelligence, and decision making.
  • The effects (propositions) on a business using an RFID based system can be linked into a decision chain
  • The creative use of the data from an RFID system is the real value, not the technology itself.

Implications to Practice and Knowledge (What outcomes and implications for practice and knowledge as well as applications and consequences are identified?):

The contribution to knowledge consists of a comprehensive literature research summary of RFID technology and its uses. The literature research is used as the basis to assert propositions to the effects that an RFID infrastructure and the resulting data can have on the firms overall IT infrastructure, business intelligence, and decision making. The propositions are then linked into an information technology decision chain that establishes a hypothesis for understanding the organizational impacts of employing RFID.

Critique (Which parts of the paper you like, and which parts of the paper you don’t like? Why?):

The article overall read well and flowed nicely through three major phases: literature research, establishment of the propositions, and IT Decision Chain hypothesis. One key area for IT that appeared to have been somewhat overlooked in the literature review was the use of RFID for security of assets outside of the supply chain. Transferring and moving of capital assets within a company not related to supply chain operations for large companies can benefit greatly by the establishment of an RFID infrastructure, perhaps a secondary benefit to establishing the infrastructure from which value could be attributed to. Proposition 1 includes data abstraction at the data source but this is fairly well established already as the basic tag has just a simple number while the data system can return detailed information about the tagged item. The paper and hypothesis also seem to be directed specifically at retail supply chains although that is only explicitly detailed at times. It does appear that retail supply chains would benefit most by current RFID infrastructure while tracking of small parts and raw resources for manufacturing would benefit only at the container level.

I did like the assertion of the propositions. They progressed logically through the establishment of the infrastructure and data gathering up through the high level decision making process. In particular Proposition 4 regarding the increased use of data mining appeared the most important proposition established. Data mining especially for customer relations management could benefit greatly by more “real time” data management. This aspect of the data gathered by the infrastructure could be the most valuable as now more than ever companies try to establish a competitive edge realized by more up to date customer data. I am not that versed in business intelligence so I had to take Propositions 5 and 6 at face value as they do make logical sense. I thought overall that the logical progression through the eight propositions assisted in establishing the benefits of moving to an RFID infrastructure as there is value established by the propositions at all three levels: infrastructure, business intelligence, and decision making.

[supanova_question]

[supanova_question]

Creating a Brochure or Newsletter Computer Science Assignment Help

Assignment Two- Creating a Brochure or Newsletter

Due: Sep 26, 2017, 11:59 PM

This assignment assesses your ability to apply Microsoft Word in your daily work. Please prepare a brochure, newsletter or flyer using MS Word templates in support of a business (can be your own), an organization or a cause that you care about. Include appropriate graphics, information (you should be the original author), to produce a tasteful item. This item could become a piece of your writing portfolio that employers may request. The brochure or flyer should demonstrate an understanding of the topic, well organized, and attractive. It should also be computer generated with strong visual appeal, imaginative, and use multimedia to bring your topic “come alive.”

Sample att

Creating a Brochure or Newsletter Computer Science Assignment Help[supanova_question]

What community resources and programs will you draw on for this offender Business Finance Assignment Help

Offender Crummey is being released from a minimum security facility next month and has been assigned to your caseload. Your group represents the offender’s treatment team upon release. Review the presentence investigation (PSI). As a team, research the community resources and programs available for this offender, and assess his home plan. Develop a detailed treatment plan with measurable goals and objectives. Remember that goals are broader and more long-term, while objectives are the smaller steps that clients take to meet the overall goal.

Write a paper of 4-6 pages that addresses the following:

  • What areas does the offender need to address to be successful upon re-entry? Make sure that the goals you develop for him can be measured.
  • What community resources and programs will you draw on for this offender?
  • Is his home plan appropriate to ensure a successful re-entry? Identify any changes that you would require before approving it.
  • Also, discuss how often you would require the offender to check in with you.
  • How would you determine whether or not the offender is making progress on his goals and objectives?
  • Identify the evolving core of case management functions in terms of focus, tools, and roles
  • Identify knowledge and teamwork skills necessary to meet departmental and individual targets

[supanova_question]

analyze arrival and processing time data for a production process Business Finance Assignment Help

1.You are asked to analyze arrival and processing time data for a production process. Your manager wants to see a chart of the coefficient of variation for arrival and processing times by day of week, like the one pictured below. Recreate this chart using the data on the “Arrival and Processing Data” sheet.

Download the spreadsheet “HW2 Problem 6” and create the graphic below. Your spreadsheet should have a table with the “Ca” and “Cp” values that the graphic reads from. Save and turn in your spreadsheet via Blackboard. Grading will be as follows: almost exactly the same – 20 pts; major elements – 15 pts; some attempt – 10 pts; no spreadsheet turned in – 0 pts.

[supanova_question]

answers in depth Business Finance Assignment Help

1. Using Web browser, search for “incident response training.” Look through the first five results and identify one or two companies that offer such training. Pick one company and look at the course offerings. Locate a course that an train you to create a CSIRT. How many days will that course take?

2. Using a Web Browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?

3. Visit the Web site at www.first.org/global/practices. Look for information about best practices contests. When was the last one held and in which city? What value would such a contest have for individuals interested in incident response?

[supanova_question]

Subject : Data Visualization Computer Science Assignment Help

Subject : Data Visualization

For this assignment, you will take observations in time and produce visualizations (using the code in the R graph cookbook – Harishi V Mittal Pdf chapter – 4)

To do this, you will follow the steps in the R Cookbook PDF that is provided. You are
not expected to come away an expert in R (or in time series) but to have in your tool
belt the understanding of how R can be used to visualize data and how to focus upon
a problem to be solved, collect relevant data for that problem, create visualizations,
and provide a summary for management.
After you are through with the exercise, write a paper, one to two pages (not
including cover and images), about the visualization and what it represents.

I have attached the two pdfs please refer that and also provided the data set

[supanova_question]

Dynamics of malware spread in decentralized peer to peer network Computer Science Assignment Help

Dynamics of malware spread in decentralized peer to peer network Computer Science Assignment Help