Poisoning of Online Learning Filters: Ddos Attacks and Countermeasures

Total Page:16

File Type:pdf, Size:1020Kb

Poisoning of Online Learning Filters: Ddos Attacks and Countermeasures Poisoning of Online Learning Filters: DDoS Attacks and Countermeasures Wesley Joon-Wie Tann & Ee-Chien Chang Department of Computer Science, National University of Singapore [email protected],[email protected] Abstract—The recent advancements in machine learning have against them. Online approaches typically perform incremental led to a wave of interest in adopting online learning-based ap- updates as more attack requests are observed to mitigate the proaches for long-standing attack mitigation issues. In particular, malicious requests rapidly during an attack. However, such DDoS attacks remain a significant threat to network service avail- online learning methods assume that the attackers are static and ability even after more than two decades. These attacks have been that their behaviors stay the same during an attack. While these well studied under the assumption that malicious traffic originates approaches are applicable to a static attacker, what if “crafty” from a single attack profile. Based on this premise, malicious traffic characteristics are assumed to be considerably different attackers can dynamically change their attack behavior? We from legitimate traffic. Consequently, online filtering methods are focus on studying such shifting attacks on online learning- designed to learn network traffic distributions adaptively and based DDoS filtering. rank requests according to their attack likelihood. During an attack, requests rated as malicious are precipitously dropped Existing online learning-based filtering mechanisms can by the filters. In this paper, we conduct the first systematic be broadly categorized into two groups. In one group, the study on the effects of data poisoning attacks on online DDoS approaches [7], [19], [3] either employ simple decision tree filtering; introduce one such attack method, and propose practical methods or basic machine learning algorithms. The other protective countermeasures for these attacks. We investigate group [29], [4] takes a deep learning approach, where the latest an adverse scenario where the attacker is “crafty”, switching work [29] proposed two online filtering methods designed to be profiles during attacks and generating erratic attack traffic that computationally efficient to respond in a real-time environment is ever-shifting. This elusive attacker generates malicious requests where time constraint is a crucial consideration. Conversely, by manipulating and shifting traffic distribution to poison the there is minimal literature that analyzes the effectiveness of training data and corrupt the filters. To this end, we present a fluctuating DDoS attacks on filtering methods. One study [18] generative model MIMICSHIFT, capable of controlling traffic gen- eration while retaining the originating regular traffic’s intrinsic found that adaptive statistical filters cannot effectively mitigate properties. Comprehensive experiments show that online learning malicious traffic from attackers that dynamically change their filters are highly susceptible to poisoning attacks, sometimes behavior, performing much worse against a dynamic attacker performing much worse than a random filtering strategy in than if the attacker was static. Most other works [11], [32], [6], this attack scenario. At the same time, our proposed protective [24], [24], [10], [20] perform adversarial attacks on targeted countermeasure effectively minimizes the attack impact. DDoS detection systems. However, there is no study on the effects of erratic attack traffic on online learning DDoS filters. I. INTRODUCTION In this paper, we study the effects of poisoning attacks on With the accelerating adoption of machine learning in online learning-based filtering, where the attacker dynamically the enterprise, poisoning attacks [16], [35], [12] on learning changes its behavior and generates fluctuating requests that systems are increasingly common. These attacks generally vary from one time interval to the next. Our investigation of compromise the integrity of a learning system by injecting the elusive DDoS attack scenario is much more elaborate than unsanitized malicious samples into the training dataset, leading those considered in existing online filtering approaches [29], arXiv:2107.12612v1 [cs.CR] 27 Jul 2021 to terrible system performance. As a result, it poses a serious [7], [19], [3]. In particular, we study a sophisticated setting problem for online cyberattack mitigation systems. One such where the attacker is “crafty”, shifting its attack behavior (e.g., cyberattack, the Distributed Denial-of-Service (DDoS), denies distribution of requests and features) periodically to corrupt the legitimate users access to resources on a target network by adaptive filters. The attacker models the attack traffic on the sending an overwhelmingly large amount of traffic to exhaust normal-day traffic N and generates malicious traffic At with the victim network’s resources. As a result, legitimate users different distributions in short timeframes t’s while mimicking receive severely degraded to no service. As recent as Q1 2020, properties of normal traffic. Amazon Web Services (AWS) reported the largest publicly disclosed attack on record at 2.3 Tbps (https://aws-shield-tlr.s3. Under this shifting attack setting (see Figure 1), the online amazonaws.com/2020-Q1 AWS Shield TLR.pdf). The previ- learning filters utilize traffic data from two operational periods, N A ous record was held by the GitHub Memcached-based DDoS (1) normal-day traffic , and (2) the attack-day traffic to attack, which peaked at 1.35 Tbps in February 2018. learn and update its filtering policy. Normal traffic behavior can be learned by performing intensive processing on N . As more and more present-day adaptive DDoS filtering However, during an attack, the incoming traffic A is divided methods adopt an online machine learning approach, we into short intervals of ` minutes (e.g., ` = 1). The attack traffic anticipate the growing urgency to study the effects of poi- (A0; A1; A2;:::), where At contains the traffic during the t-th soning attacks on DDoS filters and find practical defenses interval, will be used for the online training and update of the separate DDoS attacks from these datasets, containing both generated traffic and anonymized traffic traces from a real- world attack, respectively. In the experiments, we first train a filtering model N based on anomaly detection techniques. It uses only the normal traffic for learning to determine if requests during an attack are legitimate or malicious. This model sets a baseline for Fig. 1: Illustration of fluctuating DDoS traffic: In this case, us to compare MIMICSHIFT. Empirical results show that a “crafty” attacker is not only able to learn from the normal MIMICSHIFT can generate attack traffic that eludes online traffic N to generate attack traffic that mimics characteristics filtering systems, attaining close to 100% false-negative rates of normal traffic; the attacker constantly shifts the attack traffic at times (see Table IV, Figures 3 and 4 for experiment details). At data distribution from one interval to the next, in order to It effectively negates the filtering capabilities, making the corrupt and elude online learning filtering methods. performance worse than a 50-50 random guess. Next, we introduce a simple yet effective protective countermeasure that greatly minimizes the attack impact, achieving a significant boost in filtering performance (see Table VIII). It serves as a filters to learn attack traffic behavior. The filters then use these starting point for the future research of robust countermeasures. last updated models to create and identify a blacklist of attack identities (e.g., IP addresses), and filter them accordingly. Furthermore, our experiments also show that the dif- ferent acceptance or rejection thresholds significantly affect To this end, we formulate a controllable generative method the filtering performance. A slight change in the acceptance that captures the sophisticated attack setting described above. threshold could considerably affect the false-negative rate, We present MIMICSHIFT, a conditional generative method for allowing markedly more attack requests to be accepted. The controlling network traffic generation to generate shifting and result powerfully demonstrates the robustness of MIMICSHIFT. unpredictable traffic. Our method is inspired by a controllable Interestingly, even when we only use a random combination approach [28] that is based on a conditional generative ad- of three Markov model parameter settings for the different versarial network, and it addresses the challenge of generat- attack traffic distributions, it severely degrades the online ing network requests of varying distributions. It is achieved filtering performance. While this may appear counter-intuitive, by using request features such as Request Len and TCP we believe that two reasons can explain the results. (1) The Window Size that capture the intrinsic request properties. primary objective of the MIMICSHIFT generative method is These features form the condition that we control to guide to learn from the normal traffic and replicate it as closely as the traffic generative process. The method introduces control possible, and (2) the online filtering methods are designed to by leveraging the conditions, managed with a transparent adapt quickly to new data and place higher importance on Markov model, as a control vector. It allows us to influence the latest observed attack traffic. Hence, online learning filters the generative process. By specifying the density distribution
Recommended publications
  • Captain America
    The Star-spangled Avenger Adapted from Wikipedia, the free encyclopedia Captain America first appeared in Captain America Comics #1 (Cover dated March 1941), from Marvel Comics' 1940s predecessor, Timely Comics, and was created by Joe Simon and Jack Kirby. For nearly all of the character's publication history, Captain America was the alter ego of Steve Rogers , a frail young man who was enhanced to the peak of human perfection by an experimental serum in order to aid the United States war effort. Captain America wears a costume that bears an American flag motif, and is armed with an indestructible shield that can be thrown as a weapon. An intentionally patriotic creation who was often depicted fighting the Axis powers. Captain America was Timely Comics' most popular character during the wartime period. After the war ended, the character's popularity waned and he disappeared by the 1950s aside from an ill-fated revival in 1953. Captain America was reintroduced during the Silver Age of comics when he was revived from suspended animation by the superhero team the Avengers in The Avengers #4 (March 1964). Since then, Captain America has often led the team, as well as starring in his own series. Captain America was the first Marvel Comics character adapted into another medium with the release of the 1944 movie serial Captain America . Since then, the character has been featured in several other films and television series, including Chris Evans in 2011’s Captain America and The Avengers in 2012. The creation of Captain America In 1940, writer Joe Simon conceived the idea for Captain America and made a sketch of the character in costume.
    [Show full text]
  • The Star a Window to the Widow
    The Star Section: Lifestyle Ad Value: RM 47,105 3-Aug-2021 Size : 936cm2 PR Value: RM 141,315 A window to the Widow WORLDS OF WONDER A window to the Widow By ANDREW A. SMITH The Malaysian release of the Black Widow film may have been delayed again, but THE saga of Natalia Alianovna Romanova, aka Natasha Romanoff; while waiting, here are 10 things to know about Natasha Romanoff. has come to its bittersweet end wifli the Black Widow movie. Probably. But here are 10 Fun Facts to AOPEP wju. e MT «OP.PiEC» V MAT TEH pt co VW/ST- Y I 6FFKGT1V6 I Know and Tell about Marvel's MY PPWEJ» Z Superspy Avenger from the comics that spawned her. AN^THIN^! 1. Romanova wasn't Marvel's first Black Widow Back in 1940, when Marvel was called Timely Comics, it trotted out a character named Black Widow, who appeared a total of five times. Her story begins when she is still mortal, a medium called Claire Voyant (let's be kind and assume it's a stage name). After she puts a curse on some nonbelievers, she is murdered and goes to hell. And Satan is fiiere to greet her! “Come,“ he says, "Let me show you my kingdom of eternal pain!" It isn't really clear why Claire is bad enough to be damned for eter­ nity, nor why the devil takes such a Natasha finally got her trademark leather catsuit in 1967. personal interest in her. But he gives her a costume (basically a black onesie, severe eye makeup and boots) and sends her back to Earth.
    [Show full text]
  • How the Supreme Court Failed to Save Spider-Man
    Loyola of Los Angeles Law Review Volume 49 Number 3 Article 8 Fall 2016 With Great Power Comes Ignored Responsibility: How the Supreme Court Failed to Save Spider-Man Maya Zagayer Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Supreme Court of the United States Commons Recommended Citation Maya Zagayer, With Great Power Comes Ignored Responsibility: How the Supreme Court Failed to Save Spider-Man, 49 Loy. L.A. L. Rev. 751 (2016). This Comments is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. WITH GREAT POWER COMES IGNORED RESPONSIBILITY: HOW THE SUPREME COURT FAILED TO SAVE SPIDER-MAN Maya Zagayer I. INTRODUCTION In the famous words of Spider-Man’s Uncle Ben, “[I]n this world, with great power there must also come—great responsibility.”1 The Supreme Court may be endowed with inordinate power, but it ignored its responsibility to properly interpret and apply the law in its recent decision, Kimble v. Marvel Entertainment, LLC.2 The Court was given the opportunity to right a long-standing wrong by overturning erroneous precedent; instead the Court unjustifiably applied a “superpowered form of stare decisis,”3 thereby reaffirming the flawed decision. In a 6-3 split, the Court reiterated the
    [Show full text]
  • Wealth, Power, American Dream, Iron Man 1
    Running head: WEALTH, POWER, AMERICAN DREAM, IRON MAN 1 Wealth, Power, American Dream, Iron Man Jenny Schlender University of Wisconsin Superior WEALTH, POWER, AMERICAN DREAM, IRON MAN 2 ABSTRACT The darkened theatre is where our imaginations come to life, a place we all go to escape. American audiences have sought out movies since the beginning of the twentieth century. The superhero emerged first in comic books, and later transferred to film. While conforming to genre norms, the Iron Man films convey meanings and beliefs of dominant culture. These values established in Iron Man offer a view of class, gender, sex, and race. These values are viewed and explained through the lens of contemporary capitalism. WEALTH, POWER, AMERICAN DREAM, IRON MAN 3 Heroes are not born. They are built. (Favreau, Iron Man, 2008) Purpose The purpose of this research is to analyze two popular box office hits, Iron Man I and Iron Man II, laying bare the cultural themes and ideology prevalent in these Hollywood superhero films. The goal is to explore the values established in the film medium allowing for a better understanding of each of the films. The creation of film is a collaboration of artistic vision and incorporation of cultural norms providing within the film texts the story which often mirrors actual cultural practices. These mirrored practices can provide a venue for communication that would help discern cultural beliefs and ideals. Movies not only provide a narrative for specific discourses of race, gender, sex, and class, but they also provide a shared experience, a common staring point from which diverse audiences can dialogue about these charged issues (hooks, 1996).
    [Show full text]
  • A Mimicry Privacy Shield a System’S Approach to Data Privacy on Public Cloud
    Mimesis Aegis: A Mimicry Privacy Shield A System’s Approach to Data Privacy on Public Cloud Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, and Alexandra Boldyreva College of Computing, Georgia Institute of Technology, Atlanta, GA 30332 fbilly, pchung, csong84, yeongjin.jang, wenke, [email protected] Abstract on Android: imperceptible encryption/decryption la- Users are increasingly storing, accessing, and ex- tency and a low and adjustable false positive rate when changing data through public cloud services such as searching over encrypted data. those provided by Google, Facebook, Apple, and Mi- crosoft. Although users may want to have faith in cloud 1 Introduction providers to provide good security protection, the confi- dentiality of any data in public clouds can be violated, A continuously increasing number of users now utilize and consequently, while providers may not be “doing mobile devices [2] to interact with public cloud services evil,” we can not and should not trust them with data con- (PCS) (e.g. Gmail, Outlook, and WhatsApp) as an es- fidentiality. sential part of their daily lives. While the user’s con- To better protect the privacy of user data stored in the nectivity to the Internet is improved with mobile plat- cloud, in this paper we propose a privacy-preserving sys- forms, the problem of preserving data privacy while in- tem called Mimesis Aegis (M-Aegis) that is suitable for teracting with PCS remains unsolved. In fact, news about mobile platforms. M-Aegis is a new approach to user the US government’s alleged surveillance programs re- data privacy that not only provides isolation but also pre- minds everybody about a very unsatisfactory status quo: serves the user experience through the creation of a con- while PCS are essentially part of everyday life, the de- ceptual layer called Layer 7.5 (L-7.5), which is inter- fault method of utilizing them exposes users to privacy posed between the application (OSI Layer 7) and the user breaches, because it implicitly requires the users to trust (Layer 8).
    [Show full text]
  • PRESS Graphic Designer
    © 2021 MARVEL CAST Natasha Romanoff /Black Widow . SCARLETT JOHANSSON Yelena Belova . .FLORENCE PUGH Melina . RACHEL WEISZ Alexei . .DAVID HARBOUR Dreykov . .RAY WINSTONE Young Natasha . .EVER ANDERSON MARVEL STUDIOS Young Yelena . .VIOLET MCGRAW presents Mason . O-T FAGBENLE Secretary Ross . .WILLIAM HURT Antonia/Taskmaster . OLGA KURYLENKO Young Antonia . RYAN KIERA ARMSTRONG Lerato . .LIANI SAMUEL Oksana . .MICHELLE LEE Scientist Morocco 1 . .LEWIS YOUNG Scientist Morocco 2 . CC SMIFF Ingrid . NANNA BLONDELL Widows . SIMONA ZIVKOVSKA ERIN JAMESON SHAINA WEST YOLANDA LYNES Directed by . .CATE SHORTLAND CLAUDIA HEINZ Screenplay by . ERIC PEARSON FATOU BAH Story by . JAC SCHAEFFER JADE MA and NED BENSON JADE XU Produced by . KEVIN FEIGE, p.g.a. LUCY JAYNE MURRAY Executive Producer . LOUIS D’ESPOSITO LUCY CORK Executive Producer . VICTORIA ALONSO ENIKO FULOP Executive Producer . BRAD WINDERBAUM LAUREN OKADIGBO Executive Producer . .NIGEL GOSTELOW AURELIA AGEL Executive Producer . SCARLETT JOHANSSON ZHANE SAMUELS Co-Producer . BRIAN CHAPEK SHAWARAH BATTLES Co-Producer . MITCH BELL TABBY BOND Based on the MADELEINE NICHOLLS MARVEL COMICS YASMIN RILEY Director of Photography . .GABRIEL BERISTAIN, ASC FIONA GRIFFITHS Production Designer . CHARLES WOOD GEORGIA CURTIS Edited by . LEIGH FOLSOM BOYD, ACE SVETLANA CONSTANTINE MATTHEW SCHMIDT IONE BUTLER Costume Designer . JANY TEMIME AUBREY CLELAND Visual Eff ects Supervisor . GEOFFREY BAUMANN Ross Lieutenant . KURT YUE Music by . LORNE BALFE Ohio Agent . DOUG ROBSON Music Supervisor . DAVE JORDAN Budapest Clerk . .ZOLTAN NAGY Casting by . SARAH HALLEY FINN, CSA Man In BMW . .MARCEL DORIAN Second Unit Director . DARRIN PRESCOTT Mechanic . .LIRAN NATHAN Unit Production Manager . SIOBHAN LYONS Mechanic’s Wife . JUDIT VARGA-SZATHMARY First Assistant Director/ Mechanic’s Child . .NOEL KRISZTIAN KOZAK Associate Producer .
    [Show full text]
  • Children of the Atom Is the First Guidebook Star-Faring Aliens—Visited Earth Over a Million Alike")
    CONTENTS Section 1: Background............................... 1 Gladiators............................................... 45 Section 2: Mutant Teams ........................... 4 Alliance of Evil ....................................... 47 X-Men...................................... 4 Mutant Force ......................................... 49 X-Factor .................................. 13 Section 3: Miscellaneous Mutants ........................ 51 New Mutants .......................... 17 Section 4: Very Important People (VIP) ................. 62 Hellfire Club ............................. 21 Villains .................................................. 62 Hellions ................................. 27 Supporting Characters ............................ 69 Brotherhood of Evil Mutants ... 30 Aliens..................................................... 72 Freedom Force ........................ 32 Section 5: The Mutant Menace ................................79 Fallen Angels ........................... 36 Section 6: Locations and Items................................83 Morlocks.................................. 39 Section 7: Dreamchild ...........................................88 Soviet Super-Soldiers ............ 43 Maps ......................................................96 Credits: Dinosaur, Diamond Lil, Electronic Mass Tarbaby, Tarot, Taskmaster, Tattletale, Designed by Colossal Kim Eastland Converter, Empath, Equilibrius, Erg, Willie Tessa, Thunderbird, Time Bomb. Edited by Scintilatin' Steve Winter Evans, Jr., Amahl Farouk, Fenris, Firestar,
    [Show full text]
  • Biomimicry Comic Strip Keywords Biomimicry Superheroes
    Biomimicry Comic Strip Keywords 1. Move 12. Stability 2. Store 13. Color 3. Make 14. Camouflage 4. Create 15. Strength 5. Break down 16. Flexibility 6. Change 17. Time 7. Heal 18. Temperature 8. Grow 19. Strategy 9. Protect 20. Success 10. Community 21. Defense 11. Diversity Biomimicry Superheroes KLARA PRAST Klara’s ability is to control or “talk to” plants. Her name is a play on the word chloroplast, relating to her plant powers. She uses “Chlorokinesis” to manipulate the growth and movement of plants at will and with incredible ease. Lesson Extensions Drawn to Nature 5 GROOT This Guardian of the Galaxy comes from a race of tree-like beings that were once thought to be extinct. When damaged, he can regenerate limbs and even regrow his entire body from a single splinter—speaking to the resilience and healing strategies of trees. ANT MAN Ant-Man can shrink to the size of an ant and use antennae built into his helmet to send pheromones to actual ants. As a result, he can communicate with them, join their colony and work alongside them to stop evil in its tracks! Lesson Extensions Drawn to Nature 6 CAPTAIN PLANET In situations that the Planeteers cannot resolve alone, they can combine their powers to summon the title superhero, Captain Planet, a superhero who possesses all of their powers: earth, fire, wind, water (and heart). As a result, he can mimic intense weather events and geological changes to protect the earth. BEAST BOY Beast Boy has the ability to morph and transform into any animal that he has seen.
    [Show full text]
  • Eliciting Malicious Behavior in Browser Extensions
    Hulk: Eliciting Malicious Behavior in Browser Extensions Alexandros Kapravelos, University of California, Santa Barbara; Chris Grier, University of California, Berkeley, and International Computer Science Institute; Neha Chachra, University of California, San Diego; Christopher Kruegel and Giovanni Vigna, University of California, Santa Barbara; Vern Paxson, University of California, Berkeley, and International Computer Science Institute https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/kapravelos This paper is included in the Proceedings of the 23rd USENIX Security Symposium. August 20–22, 2014 • San Diego, CA ISBN 978-1-931971-15-7 Open access to the Proceedings of the 23rd USENIX Security Symposium is sponsored by USENIX Hulk: Eliciting Malicious Behavior in Browser Extensions † ‡ Alexandros Kapravelos Chris Grier ∗ Neha Chachra Christopher Kruegel † Giovanni Vigna Vern Paxson ∗ † ‡ UC Santa Barbara UC Berkeley UC San Diego ∗International Computer Science Institute kapravel, chris, vigna @cs.ucsb.edu grier, vern @cs.berkeley.edu [email protected] { } { } Abstract to monetize a victim’s web browsing session and readily access web-related content and private data. We present Hulk, a dynamic analysis system that de- Our work examines extensions for Google Chrome tects malicious behavior in browser extensions by mon- that are designed with malicious intent—a threat dis- itoring their execution and corresponding network activ- tinct from that posed by attackers exploiting bugs in be- ity. Hulk elicits malicious behavior in extensions in two nign extensions, which has seen prior study [6, 5]. Ex- ways. First, Hulk leverages HoneyPages, which are dy- tensions for Google Chrome are primarily distributed namic pages that adapt to an extension’s expectations in through the Chrome Web Store.1 Like app stores for web page structure and content.
    [Show full text]
  • X-Men Legacy: Salvage Pdf, Epub, Ebook
    X-MEN LEGACY: SALVAGE PDF, EPUB, EBOOK Mike Carey,Scot Eaton,Philip Briones | 168 pages | 25 Nov 2009 | Marvel Comics | 9780785138761 | English | New York, United States X-men Legacy: Salvage PDF Book X-men Legacy: Emplate Daniel Acuna. Q: I just read about the deaths in the Uncanny Avengers, and I wanted to know if Rogue is still dead? Professor X and Magneto have extremely different views about the future of mutants, but both of them have been right on occasion. All in all though, just a bit of a let down. In with issue , the title was re-titled X-Men Legacy. Xavier trying to fix his wrongs [promises un-kept] good stuff. Charles Xavier formed a team of X-Men to bring these personalities in. In general, it seemed much more like the comic books than the others, despite it not following a major story line found in the comics. From Age of X aftermath , several personalities in Legion's mind went rogue, manifesting physically. In , Frenzy participated in a mission to stop warlords, in the process saving a girl from her abusive husband. In the aftermath of an epic battle with the Frost Giants, Thor stands trial for murder - and the verdict will fill him with rage! Mike Carey. This is also the final issue of X-Men: Legacy. Any size contribution will help keep CBH alive and full of new comics guides and content. If he's using a character, no matter how obscure, he seems to make it a point to know their history, to know how they would react to a situation, or, more specifically, another character.
    [Show full text]
  • Vs. System 2PCG out of Game Piles Name How You
    Vs. System 2PCG Out of Game Piles Public or Name How You Get This Pile Fixed or Variable When to Announce Private Variable: You choose a Level 1, Level 2, and Level 3 Main Absorption History Character each with a different card title with from among Angel, During Setup (step #2) when you reveal Pile Mimic is your main character. Beast, Cyclops, Iceman, Jean Grey, and Professor X. Mimic is your main character. Private Battleworld Pile The game is using the Battleworld Variable: Players randomly select exactly 12 total different N/A (The players will have agreed to play (game mode) Game Mode. Battleworld Domains. this game mode ahead of time.) Private The Grandmaster (with Welcome Battleworld Pile to Battleworld) is your main When The Grandmaster uses his The (The Grandmaster) character. Variable: You choose exactly 12 different Battleworld Domains. Contest of Champions power. Private You have one copy of the Behind the Camera Mandarin (MCU) supporting Pile character in your deck. Fixed: Two Trevors and one The Ten Rings. When Mandarin gets KO'd. Private Scarlet Spider is your main Fixed: Starts empty. (Gains characters from your Spider Web Clone Pile character. pile.) When Scarlet Spider levels up. Public You have at least one Hope Summers (with Pluripotent Variable: You choose three different supporting characters that Echophraxia) supporting don't share any names. One must be Brotherhood, one Mutant Echo Pile character in your deck. Resistance, and one X-Men. When you recruit Hope Summers. Public When you play a Mu and choose to transform your Fin Fang Foom main You are playing Boss Battle with Fixed: Up to one Fin Fang Foom (Monsters Unleashed) character into the Fin Fang Foom Fin Fang Foom Pile Fin Fang Foom as the Boss.
    [Show full text]
  • What Does Psychology Know and Understand About the Psychological Effects of Reading Superhero Comic Books?: an Exploration Study
    WHAT DOES PSYCHOLOGY KNOW AND UNDERSTAND ABOUT THE PSYCHOLOGICAL EFFECTS OF READING SUPERHERO COMIC BOOKS?: AN EXPLORATION STUDY By PARKER T SHAW Bachelor of Science in Psychology Oklahoma State University Stillwater, Oklahoma 2009 Master of Science in Educational Psychology Oklahoma State University Stillwater, Oklahoma 2013 Submitted to the Faculty of the Graduate College of the Oklahoma State University in partial fulfillment of the requirements for the Degree of DOCTOR OF PHILOSOPHY July, 2017 WHAT DOES PSYCHOLOGY KNOW AND UNDERSTAND ABOUT THE PSYCHOLOGICAL EFFECTS OF READING SUPERHERO COMIC BOOKS?: AN EXPLORATION STUDY Dissertation Approved: John Romans, Ph.D. Dissertation Chair Tonya Hammer, Ph.D. Dissertation Advisor Al Carlozzi, Ed.D. Committee Member Hugh Crethar, Ph.D. Committee Member Larry Mullins, Ph.D. Outside Committee Member ii ACKNOWLEDGEMENTS I am so very grateful for all those who sacrificed so that I may have this opportunity. Your sacrifice and support through these years has been so very special to me. I am thankful for my loving wife Katie and my darling daughter Penny Lane. You are my best accomplishments to date. I’m so blessed that you are here with me on this journey. Thank you to my wonderful parents for all the opportunities you gave me through your sacrifices. I hope to carry your legacy with grace. I would like to thank my committee for their guidance and support during this journey. It has been an honor to work alongside you all and learn. Lastly, thank you superheroes. Thank you for always being there. iii Acknowledgements reflect the views of the author and are not endorsed by committee members or Oklahoma State University.
    [Show full text]