Table of Contents Tobacco

Total Page:16

File Type:pdf, Size:1020Kb

Table of Contents Tobacco Alcohol .................................................... 14 Other Drugs ............................................ 15 Table of Contents Tobacco .................................................. 15 WKU Vision Statement: ................................. 5 Educational Sanctions ................................. 15 WKU Mission Statement: .............................. 5 Alcohol 101 ............................................. 15 Purpose: ........................................................ 5 Prime for Life .......................................... 15 Statement of Ethical Principles and Standards: ..................................................... 5 (Any student with a 2nd violation of the alcohol or 1st violation drug code of conduct) THE UNIVERSITY ................................................. 7 ..................................................................... 15 UNIVERSITY TRADITIONS ................................... 7 Prime for Life Class Information ............. 16 The Spirit of WKU .......................................... 7 University Sanctions ............................... 16 Alma Mater ................................................... 8 State of Kentucky Sanctions ................... 16 THE WESTERN CREED ......................................... 9 United States Sanctions for illegal ABOUT WKU PRESIDENT GARY A. RANSDELL .. 10 Possession and Trafficking ...................... 17 BOARD OF REGENTS ........................................ 11 Notice of Drug Related Convictions ........ 17 CAMPUS DIRECTORY ........................................ 11 STUDENT CODE OF CONDUCT ..................... 17 COLLEGES & DEPARTMENTS ............................ 11 Purpose of the Student Code of Conduct ................................................................ 17 CAMPUS MAP .................................................. 11 Office of Judicial Affairs Campus OFFICE OF JUDICIAL AFFAIRS ........................... 11 Responsibility.......................................... 17 General Philosophy ..................................... 11 Student Rights and Responsibilities........ 18 Maintenance of Student Records ................ 12 STUDENT CODE OF CONDUCT .......................... 18 "Three Strikes" Alcohol Policy ..................... 12 OFF-CAMPUS JURISDICTION........................ 22 Zero Tolerance Drug Policy ......................... 12 SANCTION DETERMINATION ....................... 23 Western Kentucky University as a Drug-Free JUDICIAL ACTIONS/SANCTIONS ................... 23 Institution .................................................... 13 Emergency Measures ............................. 25 Alcohol and Drug Abuse Policy.................... 13 Interim Suspension from University Distribution of Policy ................................... 13 Housing ................................................... 25 Health Risks Associated with Alcohol and Procedures Followed In Disciplinary Drug Abuse .................................................. 13 Conferences; Judicial Affairs Flowchart .. 26 Penalties and Sanctions .............................. 13 Policy on Parental Notification .................... 27 Internal ................................................... 13 THE UNIVERSITY DISCIPLINARY COMMITTEE External .................................................. 14 ..................................................................... 28 Resources for Education and Treatment .... 14 Preliminary Procedures .......................... 28 Review of the University Program and Policy Disciplinary Conference Procedures ....... 29 .................................................................... 14 Conditions for Appeal ............................. 29 Required Reporting for Drug Related Procedures for Appeal Through The Convictions .................................................. 14 President To The Board Of Regents ........ 29 Standards of Conduct .................................. 14 1 JUDICIAL PROCESS FOR SEXUAL Statement of Policy and Principles of MISCONDUCT .............................................. 30 Residence Hall Living ................................... 38 Rights of Complainants in the University Room Entry-Inspection Search and Seizure 38 Judicial Process ....................................... 31 INFORMATION TECHNOLOGY .......................... 39 Rights of the Accused in the University Violation of Rights ....................................... 39 Judicial Process ....................................... 31 Threats, Coercion, Harassment, Intimidation, PROCESS FOR ACADEMIC OFFENSES ........... 31 or Hostile Communication .......................... 39 Dishonesty .............................................. 31 University Computing Resources ................ 39 Academic Integrity ................................. 31 Computing & Copyright Facts...................... 40 Academic Dishonesty ............................. 31 Recent Statistics .......................................... 40 Plagiarism ............................................... 32 Illegal File Sharing ........................................ 40 Cheating ................................................. 32 Computer Systems Security ........................ 41 Other Types of Academic Dishonesty ..... 32 Punitive Action ............................................ 42 INFORMATION FOR SUSPENDED STUDENTS Information Resource Page at Western .................................................................... 32 Kentucky University ..................................... 42 For Recently Suspended Students .......... 32 Security: Anti-Virus Software ................. 42 For Suspended Students Living On Campus Acceptable Use ....................................... 43 ................................................................ 32 Support of Web Pages ............................ 43 Information Regarding Course Registration, Financial Aid and Tuition ... 32 DIVISION OF STUDENT AFFAIRS ....................... 43 Career Services ....................................... 33 CAMPUS PARTNERS TEAM (CPT) ................. 44 Returning To WKU after A Suspension ... 33 FERPA Issues ................................................ 45 Not Returning To WKU? ......................... 33 Policies and Procedures for Dealing with Students Displaying Behavior Due To ACADEMICS ...................................................... 33 Emotional Disturbance ................................ 45 Academic Standing ...................................... 33 WESTERN KENTUCKY UNIVERSITY’S SEXUAL Appeal Procedure ........................................ 34 OFFENSE POLICY ............................................... 50 Registration ................................................. 34 Statement .................................................... 50 Class Attendance ......................................... 34 Definitions Associated with Sexual Offenses ..................................................................... 50 Schedule Changes ....................................... 35 Crisis Response ............................................ 51 Student Complaint Procedure ..................... 35 Medical Assistance to Sexual Assault Victims Procedure for Withdrawal .......................... 36 ..................................................................... 52 Transcripts ................................................... 36 Legal or Judicial Reporting Options ........ 52 HOUSING AND RESIDENCE LIFE ....................... 37 Grievance Procedures ................................. 52 Mission ........................................................ 37 Criminal Prosecution ................................... 53 Assessment ................................................. 37 Civil Complaint ............................................ 53 Housing on Campus..................................... 37 Anonymous Report ..................................... 53 Residence Hall Maintenance ....................... 37 Law Enforcement ........................................ 53 2 Reporting Requirements ............................. 53 Formal Grievance Procedures ................ 62 Campus and Community Resources ............ 53 Student Grievance Committee Hearing Procedures .................................................. 63 Awareness and Prevention of Sexual Assaults .................................................................... 54 President’s Review and Decision ................. 64 Risk Reduction ............................................. 54 Confidentiality of Hearing Procedure .......... 64 WESTERN KENTUCKY UNIVERSITY SEXUAL Student Grievance Procedure Deadlines: HARASSMENT POLICY ...................................... 55 Failure to Conform ...................................... 64 Statement of Position ................................. 55 GENERAL POLICIES AND INFORMATION .......... 64 Definition of Sexual Harassment ................. 56 Campus Resources ...................................... 64 Reporting Suspected Sexual Harassment .... 56 Community Resources................................. 65 University Ombudspersons ......................... 56 Fire Safety .................................................... 65 Responsibilities of Ombudsmen .................. 56 Earthquake Safety ....................................... 66 Procedures for Investigation and Resolution Tornado Safety ............................................ 66 of Sexual Harassment Complaints ............... 57 Identification Card ....................................... 66 Amendments
Recommended publications
  • Lithium Hosting, Llc
    Lithium Hosting, llc Acceptable Use Policy This Acceptable Use Policy ("AUP") governs your use of the Services and is incorporated by reference into Lithium Hosting, llc's Customer Master Agreement / Terms of Service. Unless otherwise stated, defined terms in this AUP have the meanings provided in the Terms of Service. Lithium Hosting, llc may modify this document at any time without notice. This document sets forth the principles, guidelines and requirements of the Acceptable Use Policy of Lithium Hosting, llc ("Company") governing the use by the Customer ("Customer") of the Company's products and services ("Products and Services"). The Purpose of the Lithium Hosting, llc Acceptable Use Policy, hereinafter referred to as the AUP, is to comply with all federal, state, and local laws coupled with protecting the network security, network availability, physical security, Customer privacy, and other factors affecting the services provided by Lithium Hosting, llc. Lithium Hosting, llc reserves the right to impose reasonable rules and regulations regarding the use of its services provided to all Customers and such rules and regulations are subject to change. Such rules and regulations are located on the Internet at https://lithiumhosting.com/acceptable-use-policy. The AUP is not an all inclusive exhaustive list and Lithium Hosting, llc reserves the right to modify the AUPs at any time as needed, effective upon either the posting of the modified AUPs to https://lithiumhosting.com/acceptable-use-policy or notification to the Customer via their client portal. Acceptance and execution of the Customer Master Agreement / Terms of Service binds all parties to Lithium Hosting, llc stated AUP at the time the contract is executed and as modified from time to time.
    [Show full text]
  • Machine Learning and Cybersecurity: Studying Network Behaviour to Detect Anomalies
    Machine Learning and Cybersecurity: Studying network behaviour to detect anomalies Jiawen Chen July 25, 2018 MSc in High Performance Computing with Data Science The University of Edinburgh Year of Presentation: 2018 Abstract Cybersecurity is an indispensable part of the Internet nowadays as almost everything can be connected by Internet. Individual privacy and property will face great danger if they are attacked by malware. This project aims to use the machine learning knowledge to build a classifier that can detect malware behaviour and avoid further damage to the network and its entity. The dataset used in this project is the CTU-13 dataset[1], which is NetFlow traffic from the normal, malware infected and background hosts. The classifier is built with the labelled normal and infected NetFlow, then applied to the unlabelled background NetFlow. This project follows the O’Neil & Schutt data science process[7] to process the data. The data is cleaned and processed, then aggregate based on time window to create a new dataset with the extracted features. This new dataset is the inputs of the following machine learning classification model: logistic regression, decision tree and random forest. Random forest model with an optimal threshold turns out to be the best model with an accuracy of 0.946 on the test dataset. Further application with this model is also implemented to the background traffic to detect potential malware. Keywords: Cybersecurity, NetFlow, Data science, Machine learning, Model building Contents Chapter 1 Introduction .......................................................................................................
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • Web 2.0 Enabled Classroom
    7/16/2010 Agenda Market Evolution and Trends Where to Begin Web Questions?2.0 Enabled Introduction to Unified Performance Management Case Studies Classroom © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 1 7/16/2010 Exinda at a Glance Founded in 2002 Melbourne based Leading provider of WAN optimization solutions Privately held with venture capital financing Market Evolution Over 3,000 customers Questions? Several thousand appliances deployed in 40+ countries & Trends Worldwide distribution © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 2 7/16/2010 Market Evolution & Trends Market Evolution & Trends Top five bandwidth heavy websites were: 1. YouTube – 10% of all bandwidth used 2. Facebook – 4.5% 3. Windows Update – 3.3% “On average, 37% of network capacity has 4. Yimg (Yahoo!'s image server) – 2.7% been occupied by traffic that is not business- 5. Google – 2.5% critical.” - Aberdeen Group, “Application Performance Management: When 250 IT managers were asked about their biggest Getting IT on the C-Level Agenda”, March 2009 security concerns, the top answer was "employees using applications on social networks" while at work. Source: Network Box, 20th April, 2010 © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 3 7/16/2010 Market Evolution & Trends Market Evolution & Trends The Council of Australian University Directors Australia Is Social Networking Capital Of The World of Information Technology (CAUDIT) have TELEGRAPH.CO.UK - Mar 3 - According to Nielsen, indicated that traffic is typically doubling Australia's web users are at the forefront of the social networking craze, posting, poking and every nine months (250 per cent a year).
    [Show full text]
  • Men Are Only As Good As Their Technical Development I
    "Men are only as good as their technical development I I allows them to be." I I - George- Orwell ----- -7 - g-7-4 Editor-In-Chief . Emmanuel Goldstein Layout and Design ShapeShifter Cover Design Dabu Ch'wald Office Manager Tampruf Writers: Bernie S., Billsf, Bland Inquisitor, Eric Corley, Dalai, Dragorn, John Drake, Paul Estev, Mr. French, Javaman, Joe630, Kingpin, Lucky225, Kevin Mitnick, The Prophet, David Ruderman, Screamer Chaotix, Seraf, Silent Switchman, StankDawg, Mr. Upsetter Webmasters: Juintz, Kerry Network Operations: css, mlc Broadcast Coordinators: Juintz, Pete, daRonin, Digital Mercenary, Kobold, w3rd, Gehenna, Brilldon, lee, Logix, Pytey, Mighty Industries, DJ Riz, Dave IRC Admins: daRonin, Digital Mercenary, Shardy, The Electronic Delinquent Inspirational Music: Manu Chao, Phil Ochs, Combustible Edison, Sparks, Philip Glass, 386DX Shout Outs: Woz, kdm, Jello, Dan Morgan, Visual Goodness, Lazlow, Cheshire, Adrian --- \ Shockers When this issue is released, our fifth press via thc Intcrnct. ;~itthori(y li!:~tr(*\ conference will have been held in New York everywhcre will start to clamp down on what City. We named it, fittingly, The Fifth HOPE. can he said and how. When digital technol- For those unfamiliar, HOPE is an acronym ogy allows perfect copies of audio and vit1r.o for Hackers On Planet Earth. This also marks to be created and shared, the status quo is jlo the tenth anniversary of the first HOPE con- ing to be threatened and panic will enwc.. ference in 1994, the first time ever that hack- When computers and databases become ers gathered in such large numbers in the more and more integrated, our private infor- United States.
    [Show full text]
  • And “Fall” of the Mp3scene: a Global and Virtual Organization
    The “rise” and “fall” of the MP3scene: A Global and Virtual Organization An organizational, social relational and technological analysis Research thesis June 2009 Student: Jan Adriaan van der Wal Study: Information Science Mentor: dr. Ard Huizing Abstract. The scene, a synonym for the ‘Warez’1 scene, is a global and virtual organization where people copy, crack and distribute copyrighted digital material. The scene is split up into different areas, each with its own specific organizational structure, genre and practice. Amongst these areas are the games, MP3 (music), movies and software scene. The scene is a quite closed and fairly unknown organization that operates on the Internet. Unique organizational structures and many complex social relational and technological processes make this organisation an interesting phenomenon to study. This research is aimed at the MP3scene and describes the development and evolution from the start until its state today from an academic point of view. The objective of this research is to gain more insights in the ongoing organizational, social relational and technological processes within a global and virtual organization like the MP3scene. Acknowledgement. Individuals: Ard H., Steven G., Paul G., Bart B., Lir, D.H., xenner, toma, ktaakt. Groups: MS, MiM, SE Keywords: community, practice, emerging, structure-agency, complex global microstructures, sociality, institutionalizing, engagement, identity, social learning, passion and anarchy Author: J.A. van der Wal, [email protected] 1 ‘Warez’ is a term to define pirated material. Tetzlaf, D. (2000). Yo-Ho-Ho and a Server of Warez: Internet Software Piracy and the New Global Information Economy. In A. Herman, & T.
    [Show full text]
  • Hexchat Documentation Release 2.14.3
    HexChat Documentation Release 2.14.3 TingPing May 24, 2021 Contents 1 Getting Started 1 1.1 Quick Start................................................1 1.2 Frequently Asked Questions.......................................6 1.3 Changelog................................................ 13 2 Settings 37 2.1 Config Files............................................... 37 2.2 Network List............................................... 37 2.3 Channel Options............................................. 38 2.4 Preferences................................................ 38 2.5 Set Command.............................................. 39 2.6 List of Settings.............................................. 40 3 Commands 47 3.1 User Commands............................................. 47 3.2 List of Commands............................................ 47 4 Appearance 49 4.1 Theme Files............................................... 49 4.2 Theming................................................. 49 4.3 Buttons, Menus, and Popups....................................... 51 5 Addons 53 5.1 Exec................................................... 53 5.2 FISHLiM................................................. 53 5.3 Update Checker............................................. 54 5.4 Sysinfo.................................................. 54 5.5 Checksum................................................ 54 5.6 Winamp................................................. 54 6 Tips & Tricks 55 6.1 Spell Check................................................ 55 6.2
    [Show full text]
  • Damming the Flood
    Agenda • Introduction • Background Damming The Flood: • History A Current Threat • Functionality • mIRC Scott Molenkamp • Bot Senior Research Engineer • Targets / Methods used Computer Associates • Problems • The Future Overview Background • ‘Global Threat’ bot • IRC – Internet Relay Chat • Rising trend in malware • Created in 1988 by Jarkko Oikarinen • Real time chat • Powerful scripting language • Defined by RFC1459 in 1993 • Open source • RFC2810 • Worm like ability • Architecture • Windows flaws • RFC2811 • Weak security • Channel management • RFC2812 • Client protocol • RFC2813 • Server protocol Background (cont) Background (cont) • IRC bot • Bot-net • Non human client • Gathered under control of a common • Programmed responses to events overseer • Recently more nefarious • IRC is the communication medium associations © 2003 Computer Associates International, Inc. (CA). All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 1 History History (cont) • mIRC was originally unpopular • Subseven 2.1 (November 1999) • Must be running • Controlled via IRC bot • Worms exploited flaw • Rectified in 5.3 (12/1997) • Common method used today • More expansive commands • Backdoors • IRC related commands • IRC bots • Run local files • IRCII client also abused • Compromised user query • Oct 2000 mIRC Functionality mIRC Functionality (cont) • mIRC scripting • Many other scripting capabilities • Powerful language • String manipulation • Wide ranging functionality • Regular expressions • React to IRC server events • Tokenizers (remotes) • File manipulation • Timers • Execute repeatedly with delay • Raw socket connections • timer1 0 10 /msg #chan1 hello • Version 5.5 (01/1999) • timer2 5 10 /msg #chan2 hello • TCP / UDP mIRC Functionality (cont) mIRC Functionality (cont) • Variables (Prefixed by %) • Access levels • /set /unset • Events • %variable • Users • /auser /ruser • Identifiers (Prefixed by $) • Return specific values • Restrict / Allow • $null • Access to events • .
    [Show full text]
  • The Network Is the Infection: Botnet Detection and Response
    Motivation/Overview Taxonomy Detection Response Botnet Detection and Response The Network is the Infection David Dagon [email protected] Georgia Institute of Technology College of Computing OARC Workshop, 2005 David Dagon Botnet Detection and Response Motivation/Overview Taxonomy Detection Response Outline based on joint work with: UMass CS: Cliff Zou GaTech CS: Sanjeev Dwivedi, Robert Edmonds, Wenke Lee, Richard Lipton, and Merrick Furst GaTech ECE: Julian Grizzard Georgia Tech Campus (Cross Sectional View) David Dagon Botnet Detection and Response Motivation/Overview Taxonomy Detection Response Outline 1 Motivation/Overview Definitions The Network is the Infection 2 Taxonomy Propagation Command and Control 3 Detection The Rallying Problem Detection Opportunities 4 Response David Dagon Botnet Detection and Response Motivation/Overview Taxonomy Definitions Detection The Network is the Infection Response Definition: Bots Hard to Define; Easy to Detect Definitions, Examples Definition: autonomous programs automatically performing tasks, absent a real user. Benign bots countless examples at http://www.botknowledge.com/ Gray-area bots Blogbots, e.g., wikipedia, xanga Note: http://en.wikipedia.org/wiki/Wikipedia:Bots Other examples: xdcc, fserve bots for IRC Trainer bots (MMORPGs) Malicious bots Key characteristics: process forking, with network and file access, and propagation potential. David Dagon Botnet Detection and Response Motivation/Overview Taxonomy Definitions Detection The Network is the Infection Response Definition: Botnets Botnets:
    [Show full text]
  • Irc Software for Mac
    Irc software for mac click here to download Mac IRC clients are all grown up and have entered the new era of free cloud computing and the Mac App Store. Most apps in this list are free or just a few dollars. This is a radical change from just a few years ago, when the best apps were shareware worth $30 or more. All of these apps are stable and usable, and that ​Colloquy · ​Textual · ​Snak. Tab, Complete nickname. Ctrl+Tab Opt+Space, Move to the next unread channel. Ctrl+Shift+Tab Opt+Shift+Space, Move to the previous unread channel. Opt+Tab, Move back to the previously selected channel. Cmd+Up/Down Cmd+Opt+Up/Down Cmd+{/}, Move to the previous/next active channel. Ctrl+Up/Down, Move to. Traditionally, chat clients on the Mac have been anything but glamorous. Colloquy is an advanced IRC, SILC & ICB client which aims to fill this void. By adhering to Mac OS X interface conventions, Colloquy has the look and feel of a quality Mac application. AppleScript. A powerful dictionary for easy scripting. IRC, SILC. Get the answer to "What are the best IRC clients for Mac?" See a list of the top 8 options and learn their pros and cons. Textual is an IRC client created specifically for macOS. I've read good things about Colloquy but i was hoping to get some info from someone with some first hand knowledge. Thanks! Hey all, I'm just wondering what is a good IRC client for Mac. I use it sometimes but don't really use it too much.
    [Show full text]
  • A Botnet to Evade Active Detection
    ActiBot: A Botnet to Evade Active Detection A Writing Project Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for the Degree Master of Science Submitted By: Xinjun Zhang December 2011 1 © 2011 Xinjun Zhang ALL RIGHTS RESERVED 2 APPROVED FOR THE DEPARTMENT OF COMPUTER SCIENCE ______________________________________________________________ Dr. Mark Stamp _______________________________________________________________ Dr. Sami Khuri _______________________________________________________________ Dr. Richard Low APPROVED FOR THE UNIVERSITY ________________________________________________________________ 3 ACKNOWLEDGEMENTS I am indebted to my advisor, Dr. Mark Stamp, for helping me to complete this paper and giving me a lot of useful and valuable advice, he is so nice and generous to provide his kind help whenever I turn to him. Dr. Mark Stamp always supported me when I working in my master program. And thanks to Dr. Sami Khuri and Dr. Richard Low for serving on my defense committee. Thanks to my family and friends, especially my mom and dad, for supporting my studies and my life since I was born. 4 Abstract In recent years, botnets have emerged as a serious threat on the Internet. Botnets are commonly used for exploits such as distributed denial of service (DDoS) attacks, identity theft, spam, and click fraud. The immense size of botnets, some consisting of hundreds of thousands of compromised computers, increases the speed and severity of attacks. Unlike passive behavior anomaly detection techniques, active botnet detection aims to collect evidence actively, in order to reduce detection time and increase accuracy. In this project, we develop and analyze a botnet that we call ActiBot, which can evade some types of active detection mechanisms.
    [Show full text]