Sponsored Content
Special Forums UNIX and Linux Applications Virtualization and Cloud Computing No Brave Bot Hunters in CEP Land? Post 302269597 by Linux Bot on Thursday 18th of December 2008 05:50:02 AM
Old 12-18-2008
No Brave Bot Hunters in CEP Land?

Tim Bass
12-18-2008 03:43 AM
In August of this year, we issued the challenge,* The Bot Hunter: An Event Processing Challenge (Bot or Not). Not surprisingly, none of the “self-described CEP vendors” with grand claims of CEP greatness, responded.* Real-time detection of threats and opportunities, the core premise of CEP, is very different than algo trading, order routing and process orchestration. Solving real problems is quite different than marketing.

One would think that vendors would take advantage of a real CEP challenge to “show their stuff” versus the releasing marketing fluffy awards. * Folks believe in solutions tested by independent experts, not self-proclaimed proclaimations of greatness.* Every major company has a web site, so it is quite useful to create a CEP solution that can accurately detect automated bots in real-time (with low false positives and false negatives) and then block the bots with high confidence.

One problem is that it is non-trivial to write a set of rules that examine all the real-time web log entries and determine, with high confidence, which transactions are from bots and which are from humans.* This useful application is a bit “complex” and hence, a great CEP application.** Unfortunately,* CEP vendors, claiming “quick, low coding application development” can’t silence their critics!

Readers might recall from The Attack of the Spiders from the Clouds my musings on how cloud computing services can easily be used as a platform for massive denial-of-service attacks.* This is a real-time threat, ripe for a CEP solutions, but we cannot find a single CEP vendor that can meet the challenge.



Source...
 

We Also Found This Discussion For You

1. Shell Programming and Scripting

Newbee lost in unix land

I am writing a shell script and I am calling wc -l. I need to assign the results of this call to a varaible and it's not working the way I think it should: xx= wc -l $1 What am I doing wrong? Thanx (1 Reply)
Discussion started by: dortoh
1 Replies
ykchalresp(1)						      General Commands Manual						     ykchalresp(1)

NAME
ykchalresp - Perform challenge-response operation with YubiKey SYNOPSIS
ykchalresp [-1 | -2] [-H] [-Y] [-N] [-x] [-v] [-h] OPTIONS
Send a challenge to a YubiKey, and read the response. The YubiKey can be configured with two different C/R modes -- the standard one is a 160 bits HMAC-SHA1, and the other is a YubiKey OTP mimicing mode, meaning two subsequent calls with the same challenge will result in dif- ferent responses. -1 send the challenge to slot 1. This is the default. -2 send the challenge to slot 2. -H send a 64 byte HMAC challenge. This is the default. -Y send a 6 byte Yubico OTP challenge. -N non-blocking mode -- abort if the YubiKey is configured to require a key press before sending the response. -x challenge is hex encoded. -v enable verbose mode. EXAMPLE
The YubiKey challenge-response operation can be demonstrated using the NIST PUB 198 A.2 test vector. First, program a YubiKey with the test vector : $ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -a 303132333435363738393a3b3c3d3e3f40414243 ... Commit? (y/n) [n]: y $ Now, send the NIST test challenge to the YubiKey and verify the result matches the expected : $ ykchalresp -2 'Sample #2' 0922d3405faa3d194f82a45830737d5cc6c75d24 $ BUGS
Report ykchalresp bugs in the issue tracker <https://github.com/Yubico/yubikey-personalization/issues> SEE ALSO
The ykpersonalize home page <http://code.google.com/p/yubikey-personalization/> YubiKeys can be obtained from Yubico <http://www.yubico.com/>. yubikey-personalization Febuary 2011 ykchalresp(1)
All times are GMT -4. The time now is 01:08 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy