Matching Items (173)
153487-Thumbnail Image.png
Description
Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL,

Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL, browsers like Mozilla Firefox and Google Chrome display an 'active' warning message in an attempt to stop the user from making a potentially dangerous decision of visiting the website and sharing confidential information like username-password, credit card information, social security number etc.

However, these warnings are not always successful at safeguarding the user from a phishing attack. On several occasions, users ignore these warnings and 'click through' them, eventually landing at the potentially dangerous website and giving away confidential information. Failure to understand the warning, failure to differentiate different types of browser warnings, diminishing trust on browser warnings due to repeated encounter are some of the reasons that make users ignore these warnings. It is important to address these factors in order to eventually improve a user’s reaction to these warnings.

In this thesis, I propose a novel design to improve the effectiveness and reliability of phishing warning messages. This design utilizes the name of the target website that a fake website is mimicking, to display a simple, easy to understand and interactive warning message with the primary objective of keeping the user away from a potentially spoof website.
ContributorsSharma, Satyabrata (Author) / Bazzi, Rida (Thesis advisor) / Walker, Erin (Committee member) / Gaffar, Ashraf (Committee member) / Arizona State University (Publisher)
Created2015
150212-Thumbnail Image.png
Description
This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management

This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management systems (DBMS). Also, unlike other client-driven work, this approach provides support for a richer set of schema updates including vertical split (normalization), horizontal split, vertical and horizontal merge (union), difference and intersection. The update process automatically generates a runtime update client from a mapping between the old the new schemas. The solution has been validated by testing it on a relatively small database of around 300,000 records per table and less than 1 Gb, but with limited memory buffer size of 24 Mb. This thesis presents the study of the overhead of the update process as a function of the transaction rates and the batch size used to copy data from the old to the new schema. It shows that the overhead introduced is minimal for medium size applications and that the update can be achieved with no more than one minute of downtime.
ContributorsTyagi, Preetika (Author) / Bazzi, Rida (Thesis advisor) / Candan, Kasim S (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
150895-Thumbnail Image.png
Description
Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged

Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged subscribers. Minimal Perfect Hash Families (PHFs) have been shown to provide a basis for the construction of memory-efficient t-resilient Key Pre-distribution Schemes (KPSs) from multiple instances of 1-resilient KPSs. Using this technique, the task of constructing a large t-resilient BES is reduced to finding a near-minimal PHF of appropriate parameters. While combinatorial and probabilistic constructions exist for minimal PHFs with certain parameters, the complexity of constructing them in general is currently unknown. This thesis introduces a new type of hash family, called a Scattering Hash Family (ScHF), which is designed to allow for the scalable and ingredient-independent design of memory-efficient BESs for large parameters, specifically resilience and total number of subscribers. A general BES construction using ScHFs is shown, which constructs t-resilient KPSs from other KPSs of any resilience ≤w≤t. In addition to demonstrating how ScHFs can be used to produce BESs , this thesis explores several ScHF construction techniques. The initial technique demonstrates a probabilistic, non-constructive proof of existence for ScHFs . This construction is then derandomized into a direct, polynomial time construction of near-minimal ScHFs using the method of conditional expectations. As an alternative approach to direct construction, representing ScHFs as a k-restriction problem allows for the indirect construction of ScHFs via randomized post-optimization. Using the methods defined, ScHFs are constructed and the parameters' effects on solution size are analyzed. For large strengths, constructive techniques lose significant performance, and as such, asymptotic analysis is performed using the non-constructive existential results. This work concludes with an analysis of the benefits and disadvantages of BESs based on the constructed ScHFs. Due to the novel nature of ScHFs, the results of this analysis are used as the foundation for an empirical comparison between ScHF-based and PHF-based BESs . The primary bases of comparison are construction efficiency, key material requirements, and message transmission overhead.
ContributorsO'Brien, Devon James (Author) / Colbourn, Charles J (Thesis advisor) / Bazzi, Rida (Committee member) / Richa, Andrea (Committee member) / Arizona State University (Publisher)
Created2012
154142-Thumbnail Image.png
Description
A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems

A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems are hard to manage and force network administrators to scale up (replacing with more powerful but expensive hardware) when their system can not handle the growing traffic. Software-based solutions have a limitation when dealing with a single large TCP flow. In recent years, with the fast developments of virtualization technology, a new trend of network function virtualization (NFV) is being adopted. Instead of using proprietary hardware, an NFV network infrastructure uses virtual machines running to implement network functions such as load balancers, firewalls, etc. In this thesis, a new load balancing system is designed and evaluated. This system is high performance and flexible. It can fully utilize the bandwidth between a load balancer and back end servers compared to traditional load balancers such as HAProxy. The experimental results show that using this NFV load balancer could have $n$ ($n$ is the number of back end servers) times better performance than HAProxy. Also, an extract, transform and load (ETL) application was implemented to demonstrate that this load balancer can shorten data load time. The experiment shows that when loading a large data set (18.3GB), our load balancer needs only 28\% less time than traditional load balancer.
ContributorsWu, Jinxuan (Author) / Syrotiuk, Violet R. (Thesis advisor) / Bazzi, Rida (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2015
157028-Thumbnail Image.png
Description
Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness,

Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness, but limited studies compared different statistical techniques with latest frameworks, and interpreted models in a unified approach.

In this thesis, several data mining algorithms have been applied to analyze students’ code assignment submission data from a real classroom study. The goal of this work is to explore

and predict students’ performances. Multiple machine learning models and the model accuracy were evaluated based on the Shapley Additive Explanation.

The Cross-Validation shows the Gradient Boosting Decision Tree has the best precision 85.93% with average 82.90%. Features like Component grade, Due Date, Submission Times have higher impact than others. Baseline model received lower precision due to lack of non-linear fitting.
ContributorsTian, Wenbo (Author) / Hsiao, Ihan (Thesis advisor) / Bazzi, Rida (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2019
133342-Thumbnail Image.png
Description
An ethical dilemma is not a matter of “right” versus “wrong,” but rather it is a situation of conflicting values. A common ethical dilemma is that of honesty versus loyalty—is it better to tell the truth, or remain loyal to the company? In the Japanese culture, truth is

An ethical dilemma is not a matter of “right” versus “wrong,” but rather it is a situation of conflicting values. A common ethical dilemma is that of honesty versus loyalty—is it better to tell the truth, or remain loyal to the company? In the Japanese culture, truth is circumstantial and can vary with different situations. In a way, the Japanese idea of honesty reflects how highly they value loyalty. This overlap of values results in the lack of an ethical dilemma for the Japanese, which creates a new risk for fraud. Without this struggle, a Japanese employee does not have strong justification against committing fraud if it aligns with his values of honesty and loyalty.
This paper looks at the Japanese values relating to honesty and loyalty to show how much these ideas overlap. The lack of a conflict of values creates a risk for fraud, which will be shown through an analysis of the scandals of two Japanese companies, Toshiba and Olympus. These scandals shine light on the complexity of the ethical dilemma for the Japanese employees; since their sense of circumstantial honesty encourages them to lie if it maintains the harmony of the group, there is little stopping them from committing the fraud that their superiors asked them to commit.
In a global economy, understanding the ways that values impact business and decisions is important for both interacting with others and anticipating potential conflicts, including those that may result in or indicate potential red flags for fraud.
ContributorsTabar, Kelly Ann (Author) / Samuelson, Melissa (Thesis director) / Goldman, Alan (Committee member) / WPC Graduate Programs (Contributor) / W.P. Carey School of Business (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133357-Thumbnail Image.png
Description
The purpose of this study was to create a screening tool specifically for the identification of sex trafficking victims in the medical setting through the analysis of existing human trafficking screening tool studies geared towards use in the medical setting. Screening questions from these studies were compiled and modified into

The purpose of this study was to create a screening tool specifically for the identification of sex trafficking victims in the medical setting through the analysis of existing human trafficking screening tool studies geared towards use in the medical setting. Screening questions from these studies were compiled and modified into a survey that was distributed to healthcare professionals through the nationwide HEAL (Health Professional Education, Advocacy, Linkage) Trafficking listserv. Each screening tool study demonstrated benefits and disadvantages that were helpful in the sampling and selection of screening tool questions. The small sample size and a lack of data on the attitudes of medical professionals on sex trafficked victims were noted as limitations to this study. Further implications for this study would include validating the screening tool questions in a medical setting to determine the sensitivity of the survey in identifying patients as possible sex trafficking victims.
ContributorsCatano, Karen Samantha (Co-author) / Byun, Jiwon (Co-author) / Roe-Sepowitz, Dominique (Thesis director) / Lee, Maurice (Committee member) / School for the Science of Health Care Delivery (Contributor) / College of Integrative Sciences and Arts (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133358-Thumbnail Image.png
Description
Amidst transition are the citizens living and forging identity. This thesis is divided into three portions including Scotland, the Czech Republic, and Taiwan. Each section includes a history, literature, and interview investigation.
The analysis of Scotland includes the examination of identity as a consequence of Scottish history, the Scottish Referendum, and

Amidst transition are the citizens living and forging identity. This thesis is divided into three portions including Scotland, the Czech Republic, and Taiwan. Each section includes a history, literature, and interview investigation.
The analysis of Scotland includes the examination of identity as a consequence of Scottish history, the Scottish Referendum, and the Brexit Referendum. National identity is explored through literature and through the analysis of Dr. Neal McGarvey, a Scottish Economic Councilman, and Arizona State University exchange student Scott Fyfe. Scotland expressed strong political activism realized through their political participation and open discussions. Yet, their ability to demand change is hindered by the United Kingdom and will continue to be unless drastic changes occur.
The analysis of the Czech Republic includes Czech history from World War II through the Prague Spring, the Velvet Revolution, the split of Czechoslovakia, and the current Communist party. National identity defined by literature is observed in conjunction with interviews of Lukáš Rumian, an Arizona State University exchange student, the Čižmár family with a unique military background and split support for Communism, an anonymous family with multigenerational viewpoints, and lastly, a former refugee with strong opinions on immigration and cultural preservation. The findings of the Czech Republic are of an apathetic country with few avenues for political discussion or education. The generations face massive difference in their mindsets as they continue to be influenced by their Communist past.
The examination of Taiwanese independence includes a look at centuries of domination, the Chinese Kuomintang party, and the Sunflower Revolution. National identity highlighted through literature is paired with the interviews of Kun Baba, a Taiwanese orchard owner, an anonymous set of a college student, his girlfriend, and his father, and a Taiwanese aboriginal who openly explores the “bullying” of China. Findings of Taiwan establish a growing sense of Taiwanese identity and an outward-looking approach to preserving their independence from China.
These three countries each shared a desire to forge their futures yet took different approaches. Scotland being vocal but limited by government. The Czech Republic apathetic, yet citizens take advantage of democratic freedoms. Taiwan is creating political stances through elections, yet is finding these stances to be inadequate in securing a future of continued independence. Thus they search for international assistance. In each country, I realized the importance global citizenship has in promoting political discussions in a quest to understand the needs and desires of citizens internationally. With a deepened understanding of a nation’s political climate, global citizens can help citizens voice their opinion, increase literature of citizen opinion, receive government recognition, and secure the change they desire.
Note: The interview participants range from college students to retirees, ages 17-78. Many asked for anonymous reporting to protect their identity and employment status.
ContributorsCrynes, Victoria Elianna Navarette (Author) / Eaton, John (Thesis director) / Brashears, William (Committee member) / Monson, Angela (Committee member) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133361-Thumbnail Image.png
Description
Nuclear weapons possess enormous potential to inflict damage on our world. The majority of countries in the world denounce the proliferation of these weapons, but a minority of countries have a desire to proliferate. This essay analyzes the impact of regime type and alliance strength to a nuclear state on

Nuclear weapons possess enormous potential to inflict damage on our world. The majority of countries in the world denounce the proliferation of these weapons, but a minority of countries have a desire to proliferate. This essay analyzes the impact of regime type and alliance strength to a nuclear state on protégé proliferation decisions. Prior research focuses on single factors in proliferation decisions and fails to take in to account the multi-faceted factors that influence the international system that states operate in. The analysis finds that regime type gives an indication about a state’s likelihood to proliferate, but does not explain proliferation choices comprehensively. Alliance strength plays a large role in a state’s security calculations and must be analyzed in conjunction to regime type to understand proliferation decisions.
ContributorsHsu, Kai Nalu (Author) / Wright, Thorin (Thesis director) / Thies, Cameron (Committee member) / W.P. Carey School of Business (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133363-Thumbnail Image.png
Description
An in-depth analysis on the effects vortex generators cause to the boundary layer separation that occurs when an internal flow passes through a diffuser is presented. By understanding the effects vortex generators demonstrate on the boundary layer, they can be utilized to improve the performance and efficiencies of diffusers and

An in-depth analysis on the effects vortex generators cause to the boundary layer separation that occurs when an internal flow passes through a diffuser is presented. By understanding the effects vortex generators demonstrate on the boundary layer, they can be utilized to improve the performance and efficiencies of diffusers and other internal flow applications. An experiment was constructed to acquire physical data that could assess the change in performance of the diffusers once vortex generators were applied. The experiment consisted of pushing air through rectangular diffusers with half angles of 10, 20, and 30 degrees. A velocity distribution model was created for each diffuser without the application of vortex generators before modeling the velocity distribution with the application of vortex generators. This allowed the two results to be directly compared to one another and the improvements to be quantified. This was completed by using the velocity distribution model to find the partial mass flow rate through the outer portion of the diffuser's cross-sectional area. The analysis concluded that the vortex generators noticeably increased the performance of the diffusers. This was best seen in the performance of the 30-degree diffuser. Initially the diffuser experienced airflow velocities near zero towards the edges. This led to 0.18% of the mass flow rate occurring in the outer one-fourth portion of the cross-sectional area. With the application of vortex generators, this percentage increased to 5.7%. The 20-degree diffuser improved from 2.5% to 7.9% of the total mass flow rate in the outer portion and the 10-degree diffuser improved from 11.9% to 19.2%. These results demonstrate an increase in performance by the addition of vortex generators while allowing the possibility for further investigation on improvement through the design and configuration of these vortex generators.
ContributorsSanchez, Zachary Daniel (Author) / Takahashi, Timothy (Thesis director) / Herrmann, Marcus (Committee member) / Mechanical and Aerospace Engineering Program (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05