Skip to main content

Showing 1–4 of 4 results for author: Born, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2501.00001  [pdf, other

    cs.CE physics.chem-ph

    Mathematical modelling of flow and adsorption in a gas chromatograph

    Authors: A. Cabrera-Codony, A. Valverde, K. Born, O. A. I. Noreldin, T. G. Myers

    Abstract: In this paper, a mathematical model is developed to describe the evolution of the concentration of compounds through a gas chromatography column. The model couples mass balances and kinetic equations for all components. Both single and multiple-component cases are considered with constant or variable velocity. Non-dimensionalisation indicates the small effect of diffusion. The system where diffusi… ▽ More

    Submitted 7 October, 2024; originally announced January 2025.

    Comments: 35 pages, 4 figures, 3 tables, 2 appendix, 37 references. Submitted to Partial Differential Equations in Applied Mathematics

  2. arXiv:1004.4359  [pdf

    cs.CR

    NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis

    Authors: Kenton Born, David Gustafson

    Abstract: This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of legitimate traffic. Both quantitative analysis and visual aids are provided that allow the user to make determinations about the legitimacy of the DNS traffic.

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: In Proceedings of the the 6th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, April 21-23, 2010

    ACM Class: C.2.3

  3. arXiv:1004.4358  [pdf

    cs.CR

    Detecting DNS Tunnels Using Character Frequency Analysis

    Authors: Kenton Born, David Gustafson

    Abstract: High-bandwidth covert channels pose significant risks to sensitive and proprietary information inside company networks. Domain Name System (DNS) tunnels provide a means to covertly infiltrate and exfiltrate large amounts of information passed network boundaries. This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of domai… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: In Proceedings of the 9th Annual Security Conference, Las Vegas, NV, April 7-8, 2010

  4. arXiv:1004.4357  [pdf

    cs.CR

    Browser-Based Covert Data Exfiltration

    Authors: Kenton Born

    Abstract: Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats regarding the collection and exfiltration of data. Many methods of covert communication involve crafting custom packets, typically requiring both the necessary software and elevated privileges on the system. By exploiting the functionality of a browser, covert channels for da… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: In Proceedings of the 9th Annual Security Conference, Las Vegas, NV, April 7-8, 2010