Sponsored Content
Special Forums UNIX and Linux Applications Virtualization and Cloud Computing No Brave Bot Hunters in CEP Land? Post 302269597 by Linux Bot on Thursday 18th of December 2008 05:50:02 AM
Old 12-18-2008
No Brave Bot Hunters in CEP Land?

Tim Bass
12-18-2008 03:43 AM
In August of this year, we issued the challenge,* The Bot Hunter: An Event Processing Challenge (Bot or Not). Not surprisingly, none of the “self-described CEP vendors” with grand claims of CEP greatness, responded.* Real-time detection of threats and opportunities, the core premise of CEP, is very different than algo trading, order routing and process orchestration. Solving real problems is quite different than marketing.

One would think that vendors would take advantage of a real CEP challenge to “show their stuff” versus the releasing marketing fluffy awards. * Folks believe in solutions tested by independent experts, not self-proclaimed proclaimations of greatness.* Every major company has a web site, so it is quite useful to create a CEP solution that can accurately detect automated bots in real-time (with low false positives and false negatives) and then block the bots with high confidence.

One problem is that it is non-trivial to write a set of rules that examine all the real-time web log entries and determine, with high confidence, which transactions are from bots and which are from humans.* This useful application is a bit “complex” and hence, a great CEP application.** Unfortunately,* CEP vendors, claiming “quick, low coding application development” can’t silence their critics!

Readers might recall from The Attack of the Spiders from the Clouds my musings on how cloud computing services can easily be used as a platform for massive denial-of-service attacks.* This is a real-time threat, ripe for a CEP solutions, but we cannot find a single CEP vendor that can meet the challenge.



Source...
 

We Also Found This Discussion For You

1. Shell Programming and Scripting

Newbee lost in unix land

I am writing a shell script and I am calling wc -l. I need to assign the results of this call to a varaible and it's not working the way I think it should: xx= wc -l $1 What am I doing wrong? Thanx (1 Reply)
Discussion started by: dortoh
1 Replies
OPENSSL_SPKI_EXPORT_CHALLENGE(3)					 1					  OPENSSL_SPKI_EXPORT_CHALLENGE(3)

openssl_spki_export_challenge - Exports the challenge assoicated with a signed public key and challenge

SYNOPSIS
string openssl_spki_export_challenge (string &$spkac) DESCRIPTION
Exports challenge from encoded signed public key and challenge PARAMETERS
o $spkac - Expects a valid signed public key and challenge RETURN VALUES
Returns the associated challenge string or NULL on failure. ERRORS
/EXCEPTIONS Emits an E_WARNING level error if an invalid argument is passed via the $spkac parameter. EXAMPLES
Example #1 openssl_spki_export_challenge(3) example Extracts the associated challenge string or NULL on failure. <?php $pkey = openssl_pkey_new('secret password'); $spkac = openssl_spki_new($pkey, 'challenge string'); $challenge = openssl_spki_export_challenge(preg_replace('/SPKAC=/', '', $spkac)); ?> Example #2 openssl_spki_export_challenge(3) example from <keygen> Extracts the associated challenge string issued from the <keygen> element <?php $challenge = openssl_spki_export_challenge(preg_replace('/SPKAC=/', '', $_POST['spkac'])); ?> <keygen name="spkac" challenge="challenge string" keytype="RSA"> SEE ALSO
openssl_spki_new(3), openssl_spki_verify(3), openssl_spki_export(3), openssl_md_method(3), openssl_csr_new(3), openssl_csr_sign(3). PHP Documentation Group OPENSSL_SPKI_EXPORT_CHALLENGE(3)
All times are GMT -4. The time now is 10:13 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy