WorldWideScience

Sample records for attack aircraft

  1. Nonlinear analysis of NPP safety against the aircraft attack

    Science.gov (United States)

    Králik, Juraj; Králik, Juraj

    2016-06-01

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  2. A NASA study of the impact of technology on future sea based attack aircraft

    Science.gov (United States)

    Hahn, Andrew S.

    1992-01-01

    A conceptual aircraft design study was recently completed evaluating carrier-based, subsonic attack aircraft using contemporary and future technology assumptions. The study examined a configuration matrix that was made up of light and medium bomb loads, one and two man crews, internal and external weapons carriage, as well as conventional and flying wing planforms. Use of common technology assumptions, engine cycle simulation code, design mission, and consistent application of methods allow for direct comparison of the aircraft. This paper describes the design study ground rules and the aircraft designed. The aircraft descriptions include weights, dimensions, layout, design mission, design constraints, maneuver performance, and fallout mission performance. The strengths, and weaknesses of each aircraft are highlighted.

  3. Delayed detached eddy simulations of fighter aircraft at high angle of attack

    Institute of Scientific and Technical Information of China (English)

    Guoliang Xu; Xiong Jiang; Gang Liu

    2016-01-01

    The massively separated flows over a realistic air-craft configuration at 40◦, 50◦, and 60◦angles of attack are studied using the delayed detached eddy simulation (DDES). The calculations are carried out at experimental conditions corresponding to a mean aerodynamic chord-based Reynolds number of 8.93 × 105 and Mach number of 0.088. The influ-ence of the grid size is investigated using two grids, 20.0×106 cells and 31.0 × 106 cells. At the selected conditions, the lift, drag, and pitching moment from DDES predictions agree with the experimental data better than that from the Reynolds-averaged Navier–Stokes. The effect of angle of attack on the flow structure over the general aircraft is also studied, and it is found that the dominated frequency associated with the vortex shedding process decreases with increasing angle of attack.

  4. Lattice Boltzmann Method used for the aircraft characteristics computation at high angle of attack

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Traditional Finite Volume Method(FVM)and Lattice Boltzmann Method(LBM)are both used to compute the high angle attack aerodynamic characteristics of the benchmark aircraft model named CT-1.Even though the software requires flow on the order of Ma<0.4,simulation at Ma=0.5 is run in PowerFLOW after theoretical analysis.The consistency with the wind tunnel testing is satisfied,especially for the LBM which can produce perfect results at high angle attack.PowerFLOW can accurately capture the detail of flows because it is inherently time-dependent and parallel and suits large-scale computation very well.

  5. Top-mounted inlet performance for a V/STOL fighter/attack aircraft configuration

    Science.gov (United States)

    Smeltzer, Donald B.

    1987-01-01

    Inlet flow-field and compressor-face performance data were obtained for a 0.095-scale model of vertical/short take-off landing (V/STOL) fighter/attack aircraft configuration with twin top-mounted inlets. Tests were conducted at Mach numbers from 0.6 to 2.0 and angles of attack and sideslip up to 27 deg. and 12 deg., respectively. Reynolds number was held constant at 9.8 x 10 to the 6th power per meter. The effects of inlet location, wing leading-edge extension (LEX) planform area, canopy-dorsal integration, variable incidence canards, and wing leading- and trailing-edge flap deflections were determined. The results show that at Mach numbers up to 0.9, distortion is relatively low (20% or less) at all angles of attack and sideslip. However, at Mach numbers of 1.2 and above, operation may be restricted because of either high distortion or low pressure recovery (80% or less), or both. These difficulties may be overcome with alterations to the LEX/canopy/body juncture.

  6. Bifurcation analysis and stability design for aircraft longitudinal motion with high angle of attack

    Directory of Open Access Journals (Sweden)

    Xin Qi

    2015-02-01

    Full Text Available Bifurcation analysis and stability design for aircraft longitudinal motion are investigated when the nonlinearity in flight dynamics takes place severely at high angle of attack regime. To predict the special nonlinear flight phenomena, bifurcation theory and continuation method are employed to systematically analyze the nonlinear motions. With the refinement of the flight dynamics for F-8 Crusader longitudinal motion, a framework is derived to identify the stationary bifurcation and dynamic bifurcation for high-dimensional system. Case study shows that the F-8 longitudinal motion undergoes saddle node bifurcation, Hopf bifurcation, Zero-Hopf bifurcation and branch point bifurcation under certain conditions. Moreover, the Hopf bifurcation renders series of multiple frequency pitch oscillation phenomena, which deteriorate the flight control stability severely. To relieve the adverse effects of these phenomena, a stabilization control based on gain scheduling and polynomial fitting for F-8 longitudinal motion is presented to enlarge the flight envelope. Simulation results validate the effectiveness of the proposed scheme.

  7. Lift-enhancing surfaces on several advanced V/STOL fighter/attack aircraft concepts

    Science.gov (United States)

    Durston, D. A.; Smith, S. C.

    1981-01-01

    An analysis of the relative influences of forward lift-enhancing surfaces on the overall lift and drag characteristics of three wind-tunnel models representative of V/STOL fighter/attack aircraft is presented. Two of the models are canard-wing configurations and one has a wing leading-edge extension (LEX) as the forward lifting surface. Data are taken from wind-tunnel tests of each model covering Mach numbers from 0.4 to 1.4. Overall lift and drag characteristics of these models and the generally favorable interactions of the forward surfaces with the wings are highlighted. Results indicate that larger LEX's and canards generally give greater lift and drag improvements than ones that are smaller relative to the wings.

  8. Lift Enhancing Surfaces on Several Advanced V/STOL Fighter/Attack Aircraft Concepts

    Science.gov (United States)

    Durston, Donald A.; Smith, Stephen C.

    1981-01-01

    An analysis of the relative influences of for-ward lift-enhancing surfaces on the overall lift and drag characteristics of three wind-tunnel models representative of V/STOL fighter/attack aircraft is presented. Two of the models are canard-wing configurations and one has a wing leading-edge extension (LEX) as the forward lifting surface. Data are taken from wind-tunnel tests of each model covering Mach numbers from 0.4 to 1.4. Overall lift and drag characteristics of these models and the generally favorable interactions of the forward surfaces with the wings are highlighted. Results indicate surface that larger LFX's and canards generally give greater lift and drag improvements than ones that are smaller relative to the wings.

  9. Quasi-periodic dynamics of a high angle of attack aircraft

    Science.gov (United States)

    Rohith, G.; Sinha, Nandan K.

    2017-01-01

    High angle of attack maneuvers closer to stall is a commonly accessed flight regime especially in case of fighter aircrafts. Stall and post-stall dynamics are dominated by nonlinearities which make the analysis difficult. Presence of external factors such as wind makes the system even more complex. Rich nonlinearities point to the possibility of existence of chaotic solutions. Past studies in this area confirm the development of such solutions. These studies are mainly concentrated on very high angle of attack regimes, which may not be practically easily accessible. This paper examines the possibility of existence of chaotic solutions in the lower, more accessible areas in the post stall domain. The analysis is composed of the study of effect of external wind as an agent to drive the system towards the possibility of a chaotic solution. Investigations reveal presence of quasi-periodic solutions, which are characterized by two incommensurate frequencies. This solution appears in the time simulation by varying the control parameter viz., wind. The solutions correspond to the values in the lower region of the angle of attack versus elevator bifurcation curve in the post-stall region. A steady wind is considered for the analysis and explores the possibility of chaotic motion by increasing the wind in a step wise manner. It is found that wind adds extra energy to the system which in turn drives the system in to chaos. The analysis is done with the help of phase portrait, Poincare map and amplitude spectrum and a quasi-periodic route to chaos via torus doubling is also presented.

  10. Bifurcation analysis and stability design for aircraft longitudinal motion with high angle of attack

    Institute of Scientific and Technical Information of China (English)

    Xin Qi; Shi Zhongke

    2015-01-01

    Bifurcation analysis and stability design for aircraft longitudinal motion are investigated when the nonlinearity in flight dynamics takes place severely at high angle of attack regime. To pre-dict the special nonlinear flight phenomena, bifurcation theory and continuation method are employed to systematically analyze the nonlinear motions. With the refinement of the flight dynam-ics for F-8 Crusader longitudinal motion, a framework is derived to identify the stationary bifurca-tion and dynamic bifurcation for high-dimensional system. Case study shows that the F-8 longitudinal motion undergoes saddle node bifurcation, Hopf bifurcation, Zero-Hopf bifurcation and branch point bifurcation under certain conditions. Moreover, the Hopf bifurcation renders ser-ies of multiple frequency pitch oscillation phenomena, which deteriorate the flight control stability severely. To relieve the adverse effects of these phenomena, a stabilization control based on gain scheduling and polynomial fitting for F-8 longitudinal motion is presented to enlarge the flight envelope. Simulation results validate the effectiveness of the proposed scheme.

  11. Inlet and airframe compatibility for a V/STOL fighter/attack aircraft with top-mounted inlets

    Science.gov (United States)

    Durston, D. A.; Smeltzer, D. B.

    1982-01-01

    Aerodynamic force and inlet pressure data are obtained for 9.5% force and pressure models of a V/STOL fighter/attack aircraft configuration with top mounted twin inlets. Data are presented from tests conducted in the Ames Unitary Wind Tunnels at Mach numbers of 0.6, 0.9, and 1.2 at angles of attack up to 27 deg. and angles of sideslip up to 12 deg. Trimmed aerodynamic characteristics and inlet performance are compared for three different leading edge extension (LEX) configurations. The effects of wing leading and trailing-edge flaps on the inlet are also determined. Maneuver perfromance is calculated form combined force and inlet pressure data. The largest of the three LEX sizes tested gives the best airplane maneuver performance. Wing flap deflections improved inlet recovery at all Mach numbers.

  12. Surface Pressure Estimates for Pitching Aircraft Model at High Angles-of-attack (Short Communication)

    OpenAIRE

    A.A. Pashilkar

    2002-01-01

    The surface pressure on a pitching delta wing aircraft is estimated from the normal force and the pitching moment characteristics. The pressure model is based on parametrising the surface pressure distribution on a simple delta wing. This model is useful as a first approximation of the load distribution on the aircraft wing. Leeward surface pressure distributions computed by this method are presented.

  13. Surface Pressure Estimates for Pitching Aircraft Model at High Angles-of-attack (Short Communication

    Directory of Open Access Journals (Sweden)

    A. A. Pashilkar

    2002-10-01

    Full Text Available The surface pressure on a pitching delta wing aircraft is estimated from the normal force and the pitching moment characteristics. The pressure model is based on parametrising the surface pressure distribution on a simple delta wing. This model is useful as a first approximation of the load distribution on the aircraft wing. Leeward surface pressure distributions computed by this method are presented.

  14. Studies of aircraft differential maneuvering. Report 75-27: Calculating of differential-turning barrier surfaces. Report 75-26: A user's guide to the aircraft energy-turn and tandem-motion computer programs. Report 75-7: A user's guide to the aircraft energy-turn hodograph program. [numerical analysis of tactics and aircraft maneuvers of supersonic attack aircraft

    Science.gov (United States)

    Kelley, H. J.; Lefton, L.

    1976-01-01

    The numerical analysis of composite differential-turn trajectory pairs was studied for 'fast-evader' and 'neutral-evader' attitude dynamics idealization for attack aircraft. Transversality and generalized corner conditions are examined and the joining of trajectory segments discussed. A criterion is given for the screening of 'tandem-motion' trajectory segments. Main focus is upon the computation of barrier surfaces. Fortunately, from a computational viewpoint, the trajectory pairs defining these surfaces need not be calculated completely, the final subarc of multiple-subarc pairs not being required. Some calculations for pairs of example aircraft are presented. A computer program used to perform the calculations is included.

  15. Aircraft

    Science.gov (United States)

    Hibbs, B.D.; Lissaman, P.B.S.; Morgan, W.R.; Radkey, R.L.

    1998-09-22

    This disclosure provides a solar rechargeable aircraft that is inexpensive to produce, is steerable, and can remain airborne almost indefinitely. The preferred aircraft is a span-loaded flying wing, having no fuselage or rudder. Travelling at relatively slow speeds, and having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing`s top surface, the aircraft uses only differential thrust of its eight propellers to turn. Each of five sections of the wing has one or more engines and photovoltaic arrays, and produces its own lift independent of the other sections, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface. The aircraft is capable of a top speed of about ninety miles per hour, which enables the aircraft to attain and can continuously maintain altitudes of up to sixty-five thousand feet. Regenerative fuel cells in the wing store excess electricity for use at night, such that the aircraft can sustain its elevation indefinitely. A main spar of the wing doubles as a pressure vessel that houses hydrogen and oxygen gases for use in the regenerative fuel cell. The aircraft has a wide variety of applications, which include weather monitoring and atmospheric testing, communications, surveillance, and other applications as well. 31 figs.

  16. Rezultati modeliranja borbenog manevra napada aviona na zemaljski cilj iz oštrog obrušavanja / The results of combat attack maneuver modelling on ground target using aircraft steep diving

    Directory of Open Access Journals (Sweden)

    Nikola Pekić

    2005-11-01

    Full Text Available U ovom radu prikazani su rezultati matematičkog modeliranja kretanja aviona u borbenom manevru pri napadu na zemaljski cilj iz oštrog obrušavanja. Kretanje aviona razmatrano je kao kretanje materijalne tačke u prostoru. Takođe, prikazane su prednosti aviona sa otklonom vektora potiska i njegove primene u manevru u odnosu na avion sa klasičnom pogonskom grupom i klasičnim aerodinamičkim upravljačkim površinama. / This paper presents the results of mathematical modeling of aircraft movement in combat maneuver during attack on ground target using steep diving. Aircraft movement is considered as movement of a material point in space. Also, the advantages of aircraft with thrust vector deflection and its applications during maneuver when compared to the aircraft with classical engines and classical aerodynamic controls.

  17. 小迎角纵向不稳定飞机起飞安全性分析%Take-off safety analysis of aircraft with longitudinal static instability at low angles of attack

    Institute of Scientific and Technical Information of China (English)

    耿建中; 姚海林; 段卓毅

    2013-01-01

    由于螺旋桨滑流的影响,某运输机起飞构型在小迎角时纵向稳定性裕度不足,甚至不稳定,给飞机带来安全隐患.分析了某运输机起飞构型纵向力矩特性,讨论了螺旋桨滑流对纵向静稳定性的影响、影响飞机起飞时的安全因素和进入小迎角飞行的条件,建立了飞机起飞的数学仿真模型,通过大量的仿真计算,研究了突风和驾驶员误操纵对飞机起飞安全性的影响,给出了起飞时飞机所能抗御的最大突风速度.研究结果表明,某运输机小迎角稳定裕度不足,不稳定对飞机安全起飞的影响可以不予考虑.%The propeller slipstream result in longitudinal stability margin insufficient,even static instability at low angles of attack of an aircraft,which may cause potential problem. In order to study the effect of the static instability on take-off safety,the effect of propeller slipstream on longitudinal static stability was discussed. The pitching moment characteristic,the factor which has effect on safe take-off,and the con-ditons which may cause an aircraft flying at low angles attack were analyzed. Building dynamic model,the influence of gust and the pilot misoperation on the take-off safety were studied through computation and simulation. The maximum velocity of gust that an aircraft can resist was given. The result indicates the effect of the static instability on the take-off safety can be neglected.

  18. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  19. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  20. 基于改进AHP的多机协同多目标攻击威胁评估算法分析%Threat Assessment Algorithm on Multi-aircraft Cooperative and Multi-target Attack

    Institute of Scientific and Technical Information of China (English)

    雷蕾

    2016-01-01

    现代空战需要先进的火控计算,目标威胁评估是其重要的组成部分。文章通过建立威胁评估体系模型,再提出威胁因子及权值计算方法,从而构建了一套完整的目标威胁评估算法。最后针对一个多机协同多目标攻击态势,利用建立的算法进行威胁矩阵的计算,计算结果表明该方法是有效可行的。%Modern air combat needs advanced ifre control calculation, and the target threat assessment is an important part of the ifre control system. Through the establishment of threat assessment system model, and then put forward the threat factor and weight calculation method. Thus,construct a complete target threat assessment algorithm. Finally, according to the situation of multi Aircraft Cooperative multi target attack, the method is used to calculate the threat matrix. The results show that the proposed method is effective and feasible.

  1. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  2. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  3. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  4. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  5. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  6. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...information (in many cases real-time) among many users at a very low cost . The number of networks the DoD uses to execute its mission has increased...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  9. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  10. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. Aircraft Design

    Science.gov (United States)

    Bowers, Albion H. (Inventor); Uden, Edward (Inventor)

    2016-01-01

    The present invention is an aircraft wing design that creates a bell shaped span load, which results in a negative induced drag (induced thrust) on the outer portion of the wing; such a design obviates the need for rudder control of an aircraft.

  13. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  14. Non-linear Flight Dynamics at High Angles of Attack

    DEFF Research Database (Denmark)

    Granasy, P.; Sørensen, C.B.; Mosekilde, Erik;

    1998-01-01

    The methods of nonlinear dynamics are applied to the longitudinal motion of a vectored thrust aircraft, in particular the behavior at high angles of attack. Our model contains analytic nonlinear aerodynamical coefficients based on NASA windtunnel experiments on the F-18 high-alpha research vehicle...

  15. A NASA study of the impact of technology on future multimission aircraft

    Science.gov (United States)

    Samuels, Jeffrey J.

    1992-01-01

    A conceptual aircraft design study was recently completed which compared three supersonic multimission tactical aircraft. The aircraft were evaluated in two technology timeframes and were sized with consistent methods and technology assumptions so that the aircraft could be compared in operational utility or cost analysis trends. The three aircraft are a carrier-based Fighter/Attack aircraft, a land-based Multirole Fighter, and a Short Takeoff/Vertical Landing (STOVL) aircraft. This paper describes the design study ground rules used and the aircraft designed. The aircraft descriptions include weights, dimensions and layout, design mission and maneuver performance, and fallout mission performance. The effect of changing technology and mission requirements on the STOVL aircraft and the impact of aircraft navalization are discussed. Also discussed are the effects on the STOVL aircraft of both Thrust/Weight required in hover and design mission radius.

  16. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  17. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  18. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  19. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  20. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  2. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  3. Amphibious Aircraft

    Data.gov (United States)

    National Aeronautics and Space Administration — A brief self composed research article on Amphibious Aircrafts discussing their use, origin and modern day applications along with their advantages and disadvantages...

  4. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  5. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  6. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  7. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  8. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  9. Investigation of normal force and moment coefficients for an AUV at nonlinear angle of attack and sideslip range

    Digital Repository Service at National Institute of Oceanography (India)

    Barros, E.A. de; Dantas, J.L.D.; Pascoal, A.M.; Desa, E.S.

    of angles of attack considered. In contrast with the traditional ASE formulations used in naval and aircraft fields, an improved methodology is introduced that takes advantage of the qualitative information obtained from CFD flow visualizations...

  10. Aircraft cybernetics

    Science.gov (United States)

    1977-01-01

    The use of computers for aircraft control, flight simulation, and inertial navigation is explored. The man-machine relation problem in aviation is addressed. Simple and self-adapting autopilots are described and the assets and liabilities of digital navigation techniques are assessed.

  11. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  12. 34 CFR 674.64 - Discharge of student loan indebtedness for survivors of victims of the September 11, 2001, attacks.

    Science.gov (United States)

    2010-07-01

    ... victims of the September 11, 2001, attacks. 674.64 Section 674.64 Education Regulations of the Offices of... survivors of victims of the September 11, 2001, attacks. (a) Definition of terms. As used in this section... the aircraft or any subsequent fire, explosions, or building collapses. Generally, this includes...

  13. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  14. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  15. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  16. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  17. Sensor Technology and Futuristic Of Fighter Aircraft

    Directory of Open Access Journals (Sweden)

    Emmanuel Rugambage Ndayishimiye

    2016-08-01

    Full Text Available The Next Generation fighter Aircraft seeks a fighter with higher abilities in areas such as reach, persistence, survivability, net-centricity, situation awareness, human system integration and weapons effects. The future system will have to counter foe armed with next generation advanced electronic attack, sophisticated integrated air defense systems, directed energy weapons, passive detection, integrated self-protection and cyber-attack capabilities. It must be capable to operate in the anti-access area-denial (A2/AD environment that will exist in the next coming years.

  18. High performance forward swept wing aircraft

    Science.gov (United States)

    Koenig, David G. (Inventor); Aoyagi, Kiyoshi (Inventor); Dudley, Michael R. (Inventor); Schmidt, Susan B. (Inventor)

    1988-01-01

    A high performance aircraft capable of subsonic, transonic and supersonic speeds employs a forward swept wing planform and at least one first and second solution ejector located on the inboard section of the wing. A high degree of flow control on the inboard sections of the wing is achieved along with improved maneuverability and control of pitch, roll and yaw. Lift loss is delayed to higher angles of attack than in conventional aircraft. In one embodiment the ejectors may be advantageously positioned spanwise on the wing while the ductwork is kept to a minimum.

  19. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  20. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  1. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  2. A Systems Engineering Methodology for the Advanced Tactical Aircraft.

    Science.gov (United States)

    1985-09-01

    became apparent that this aircraft was not compatable with Hauy requirements, a new platforn was required. This integration and development effort...Reuiew, U. 1. No. 4, Autunn 1977. 31. Hall, U. 0., " Hauy Aduances RTA Start, [ulls fl-GE Upgrade Retrofit," Rerospace Daily, U. 129, p. 161, 2 October...1984. 32. " Hauy Explores Heu Subsonic Attack Aircraft to Replace A-6,’" Nuiation Meek a Space Technoloo, p. 28, 22 April 1985. 33. Dornhein 11. N

  3. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  4. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  5. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  6. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  7. Aircraft Carriers

    DEFF Research Database (Denmark)

    Nødskov, Kim; Kværnø, Ole

    in Asia and will balance the carrier acquisitions of the United States, the United Kingdom, Russia and India. China’s current military strategy is predominantly defensive, its offensive elements being mainly focused on Taiwan. If China decides to acquire a large carrier with offensive capabilities......, then the country will also acquire the capability to project military power into the region beyond Taiwan, which it does not possess today. In this way, China will have the military capability to permit a change of strategy from the mainly defensive, mainland, Taiwan-based strategy to a more assertive strategy...... catapult with which to launch the fi ghter aircraft, not to mention the possible development of a nuclear power plant for the ship. The Russian press has indicated that China is negotiating to buy SU-33 fi ghters, which Russia uses on the Kuznetsov carrier. The SU-33 is, in its modernized version...

  8. Aircraft Electric Secondary Power

    Science.gov (United States)

    1983-01-01

    Technologies resulted to aircraft power systems and aircraft in which all secondary power is supplied electrically are discussed. A high-voltage dc power generating system for fighter aircraft, permanent magnet motors and generators for aircraft, lightweight transformers, and the installation of electric generators on turbine engines are among the topics discussed.

  9. High angle of attack aerodynamics subsonic, transonic, and supersonic flows

    CERN Document Server

    Rom, Josef

    1992-01-01

    The aerodynamics of aircraft at high angles of attack is a subject which is being pursued diligently, because the modern agile fighter aircraft and many of the current generation of missiles must perform well at very high incidence, near and beyond stall. However, a comprehensive presentation of the methods and results applicable to the studies of the complex aerodynamics at high angle of attack has not been covered in monographs or textbooks. This book is not the usual textbook in that it goes beyond just presenting the basic theoretical and experimental know-how, since it contains reference material to practical calculation methods and technical and experimental results which can be useful to the practicing aerospace engineers and scientists. It can certainly be used as a text and reference book for graduate courses on subjects related to high angles of attack aerodynamics and for topics related to three-dimensional separation in viscous flow courses. In addition, the book is addressed to the aerodynamicist...

  10. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  11. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  12. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  13. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  14. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  15. Propulsion controlled aircraft computer

    Science.gov (United States)

    Cogan, Bruce R. (Inventor)

    2010-01-01

    A low-cost, easily retrofit Propulsion Controlled Aircraft (PCA) system for use on a wide range of commercial and military aircraft consists of an propulsion controlled aircraft computer that reads in aircraft data including aircraft state, pilot commands and other related data, calculates aircraft throttle position for a given maneuver commanded by the pilot, and then displays both current and calculated throttle position on a cockpit display to show the pilot where to move throttles to achieve the commanded maneuver, or is automatically sent digitally to command the engines directly.

  16. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  18. Design of a Three Surfaces R/C Aircraft Model

    Directory of Open Access Journals (Sweden)

    D. P. Coiro

    2002-01-01

    Full Text Available Design of a three lifting surfaces radio-controlled model has been carried out at Dipartimento di Progettazione Aeronautica (DPA by the authors in the last year. The model is intended to be a UAV prototype and is now under construction. The main goal of this small aircraft's design is to check the influence of the canard surface on the aircraft's aerodynamic characteristics and flight behavior, especially at high angles of attack. The aircraft model is also intended to be a flying platform to test sensors, measurement and acquisition systems for research purposes and a valid and low-cost teaching instrument for flight dynamics and flight maneuvering. The aircraft has been designed to fly with and without canard, and all problems relative to aircraft balance and stability have been carefully analyzed and solved. The innovative configuration and the mixed wooden-composite material structure has been obtained with very simple shapes and all the design is focused on realizing a low-cost model. A complete aerodynamic analysis of the configuration up to high angles of attack and a preliminary aircraft stability and performance prediction will be presented.

  19. Unmanned aircraft systems

    Science.gov (United States)

    Unmanned platforms have become increasingly more common in recent years for acquiring remotely sensed data. These aircraft are referred to as Unmanned Airborne Vehicles (UAV), Remotely Piloted Aircraft (RPA), Remotely Piloted Vehicles (RPV), or Unmanned Aircraft Systems (UAS), the official term used...

  20. A NASA study of the impact of technology on future carrier based tactical aircraft - Overview

    Science.gov (United States)

    Wilson, S. B., III

    1992-01-01

    This paper examines the impact of technology on future carrier based tactical aircraft. The results were used in the Center for Naval Analysis Future Carrier Study. The NASA Team designed three classes of aircraft ('Fighter', 'Attack', and 'Multimission') with two different technology levels. The Multimission aircraft were further analyzed by examining the penalty on the aircraft for both catapult launch/arrested landing recovery (Cat/trap) and short take-off/vertical landing (STOVL). The study showed the so-called STOVL penalty was reduced by engine technology and the next generation Strike Fighter will pay more penalty for Cat/trap than for STOVL capability.

  1. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  2. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  3. Nonlinear feedback control of highly manoeuvrable aircraft

    Science.gov (United States)

    Garrard, William L.; Enns, Dale F.; Snell, S. A.

    1992-01-01

    This paper describes the application of nonlinear quadratic regulator (NLQR) theory to the design of control laws for a typical high-performance aircraft. The NLQR controller design is performed using truncated solutions of the Hamilton-Jacobi-Bellman equation of optimal control theory. The performance of the NLQR controller is compared with the performance of a conventional P + I gain scheduled controller designed by applying standard frequency response techniques to the equations of motion of the aircraft linearized at various angles of attack. Both techniques result in control laws which are very similar in structure to one another and which yield similar performance. The results of applying both control laws to a high-g vertical turn are illustrated by nonlinear simulation.

  4. B-52 Launch Aircraft in Flight

    Science.gov (United States)

    2001-01-01

    NASA's venerable B-52 mothership is seen here photographed from a KC-135 Tanker aircraft. The X-43 adapter is visible attached to the right wing. The B-52, used for launching experimental aircraft and for other flight research projects, has been a familiar sight in the skies over Edwards for more than 40 years and is also both the oldest B-52 still flying and the aircraft with the lowest flight time of any B-52. NASA B-52, Tail Number 008, is an air launch carrier aircraft, 'mothership,' as well as a research aircraft platform that has been used on a variety of research projects. The aircraft, a 'B' model built in 1952 and first flown on June 11, 1955, is the oldest B-52 in flying status and has been used on some of the most significant research projects in aerospace history. Some of the significant projects supported by B-52 008 include the X-15, the lifting bodies, HiMAT (highly maneuverable aircraft technology), Pegasus, validation of parachute systems developed for the space shuttle program (solid-rocket-booster recovery system and the orbiter drag chute system), and the X-38. The B-52 served as the launch vehicle on 106 X-15 flights and flew a total of 159 captive-carry and launch missions in support of that program from June 1959 to October 1968. Information gained from the highly successful X-15 program contributed to the Mercury, Gemini, and Apollo human spaceflight programs as well as space shuttle development. Between 1966 and 1975, the B-52 served as the launch aircraft for 127 of the 144 wingless lifting body flights. In the 1970s and 1980s, the B-52 was the launch aircraft for several aircraft at what is now the Dryden Flight Research Center, Edwards, California, to study spin-stall, high-angle-of attack, and maneuvering characteristics. These included the 3/8-scale F-15/spin research vehicle (SRV), the HiMAT (Highly Maneuverable Aircraft Technology) research vehicle, and the DAST (drones for aerodynamic and structural testing). The aircraft supported

  5. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  6. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  7. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  8. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst ...

  9. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  10. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  11. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  12. LG-ANALYST: linguistic geometry for master air attack planning

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg

    2003-09-01

    We investigate the technical feasibility of implementing LG-ANALYST, a new software tool based on the Linguistic Geometry (LG) approach. The tool will be capable of modeling and providing solutions to Air Force related battlefield problems and of conducting multiple experiments to verify the quality of the solutions it generates. LG-ANALYST will support generation of the Fast Master Air Attack Plan (MAAP) with subsequent conversion into Air Tasking Order (ATO). An Air Force mission is modeled employing abstract board games (ABG). Such a mission may include, for example, an aircraft strike package moving to a target area with the opposing side having ground-to-air missiles, anti-aircraft batteries, fighter wings, and radars. The corresponding abstract board captures 3D air space, terrain, the aircraft trajectories, positions of the batteries, strategic features of the terrain, such as bridges, and their status, radars and illuminated space, etc. Various animated views are provided by LG-ANALYST including a 3D view for realistic representation of the battlespace and a 2D view for ease of analysis and control. LG-ANALYST will allow a user to model full scale intelligent enemy, plan in advance, re-plan and control in real time Blue and Red forces by generating optimal (or near-optimal) strategies for all sides of a conflict.

  13. Micro-cantilever flow sensor for small aircraft

    KAUST Repository

    Ghommem, Mehdi

    2013-10-01

    We extend the use of cantilever beams as flow sensors for small aircraft. As such, we propose a novel method to measure the airspeed and the angle of attack at which the air travels across a small flying vehicle. We measure beam deflections and extract information about the surrounding flow. Thus, we couple a nonlinear beam model with a potential flow simulator through a fluid-structure interaction scheme. We use this numerical approach to generate calibration curves that exhibit the trend for the variations of the limit cycle oscillations amplitudes of flexural and torsional vibrations with the air speed and the angle of attack, respectively. © The Author(s) 2013.

  14. Aircraft Noise Prediction

    OpenAIRE

    2014-01-01

    This contribution addresses the state-of-the-art in the field of aircraft noise prediction, simulation and minimisation. The point of view taken in this context is that of comprehensive models that couple the various aircraft systems with the acoustic sources, the propagation and the flight trajectories. After an exhaustive review of the present predictive technologies in the relevant fields (airframe, propulsion, propagation, aircraft operations, trajectory optimisation), the paper add...

  15. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  16. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  17. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  18. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  19. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    is foreseeable while the rounds are performed. ECC (Elliptic Curve Cryptography) is used as a public key crypto system with the key purpose of creating a private shared between two participants in a communication network. Attacks on ECC include the Pohlig-Hellman attack and the Pollard's rho attack. Furthermore......AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  20. A Perspective into Regulatory Requirements for Intentional Aircraft Crash

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Sang Yun; Park, Jong Seuk; Chung, Yun Suk [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Inn Seock [ISSA Technology, Maryland (Korea, Republic of); Choi, Eong Soo; Kim, Jong Hyun [ACT Co., Daejeon (Korea, Republic of)

    2010-10-15

    In the aftermath of the 9/11 terrorist attacks on the United States, there was heightened interest worldwide in protecting nuclear power plants against intentional aircraft attack by terrorists. This paper presents our perspective into regulatory requirements for intentional aircraft crash that were set forth in foreign countries, including the latest rulemaking by the U.S. Nuclear Regulatory Commission (NRC), i.e., 10 CFR 50.54(hh) and 10 CFR 50.150 that have been made effective in May and July of 2009, respectively. In light of these international efforts to further enhance safety of NPPs, a study is also underway at the Korea Institute of Nuclear Safety (KINS) to establish an effective and efficient regulatory approach in consideration of the state of the art in this area

  1. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  2. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  3. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  4. Estimation of nonlinear aerodynamic derivatives of a variable geometry fighter aircraft from flight data

    Science.gov (United States)

    Ramachandran, S.; Wells, W. R.

    1974-01-01

    This paper is concerned with the estimation of stability and control parameters of a high performance fighter aircraft from data obtained from high angle of attack flight. The estimation process utilizes a maximum likelihood algorithm derived for the case of a nonlinear aerodynamic force and moment model. The aircraft used was a high speed variable sweep heavy weight fighter with twin vertical tails. Comparisons of results from the nonlinear analysis are made with linear theory and wind tunnel results when available.

  5. Air Base Attacks and Defensive Counters: Historical Lessons and Future Challenges

    Science.gov (United States)

    2015-01-01

    V. S. Jagan Mohan and Samir Chopra, Eagles over Bangladesh : The Indian Air Force in the 1971 Liberation War, Noida, India: HarperCollins Publishers...Bosnia and Herzegovina, Croatia, Kosovo, Macedonia, Serbia, Argentina, Chile, Cuba, Peru, Ethiopia, Djibouti, South Africa, Bangladesh , India, and...aircraft storage and servicing facility” in Kosovo during OAF in 1999.145 The feasibility of such attacks varies with local geology and entrance

  6. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  7. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  8. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  9. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  10. Cable Tensiometer for Aircraft

    Science.gov (United States)

    Nunnelee, Mark (Inventor)

    2008-01-01

    The invention is a cable tensiometer that can be used on aircraft for real-time, in-flight cable tension measurements. The invention can be used on any aircraft cables with high precision. The invention is extremely light-weight, hangs on the cable being tested and uses a dual bending beam design with a high mill-volt output to determine tension.

  11. Aircraft operations management manual

    Science.gov (United States)

    1992-01-01

    The NASA aircraft operations program is a multifaceted, highly diverse entity that directly supports the agency mission in aeronautical research and development, space science and applications, space flight, astronaut readiness training, and related activities through research and development, program support, and mission management aircraft operations flights. Users of the program are interagency, inter-government, international, and the business community. This manual provides guidelines to establish policy for the management of NASA aircraft resources, aircraft operations, and related matters. This policy is an integral part of and must be followed when establishing field installation policy and procedures covering the management of NASA aircraft operations. Each operating location will develop appropriate local procedures that conform with the requirements of this handbook. This manual should be used in conjunction with other governing instructions, handbooks, and manuals.

  12. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  13. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  14. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  15. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  16. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  17. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  18. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  19. Predicting Visibility of Aircraft

    Science.gov (United States)

    Watson, Andrew; Ramirez, Cesar V.; Salud, Ellen

    2009-01-01

    Visual detection of aircraft by human observers is an important element of aviation safety. To assess and ensure safety, it would be useful to be able to be able to predict the visibility, to a human observer, of an aircraft of specified size, shape, distance, and coloration. Examples include assuring safe separation among aircraft and between aircraft and unmanned vehicles, design of airport control towers, and efforts to enhance or suppress the visibility of military and rescue vehicles. We have recently developed a simple metric of pattern visibility, the Spatial Standard Observer (SSO). In this report we examine whether the SSO can predict visibility of simulated aircraft images. We constructed a set of aircraft images from three-dimensional computer graphic models, and measured the luminance contrast threshold for each image from three human observers. The data were well predicted by the SSO. Finally, we show how to use the SSO to predict visibility range for aircraft of arbitrary size, shape, distance, and coloration. PMID:19462007

  20. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  1. Tropospheric sampling with aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Daum, P.H.; Springston, S.R.

    1991-03-01

    Aircraft constitute a unique environment which places stringent requirements on the instruments used to measure the concentrations of atmospheric trace gases and aerosols. Some of these requirements such as minimization of size, weight, and power consumption are general; others are specific to individual techniques. This review presents the basic principles and considerations governing the deployment of trace gas and aerosol instrumentation on an aircraft. An overview of common instruments illustrates these points and provides guidelines for designing and using instruments on aircraft-based measurement programs.

  2. Lightning hazards to aircraft

    Science.gov (United States)

    Corn, P. B.

    1978-01-01

    Lightning hazards and, more generally, aircraft static electricity are discussed by a representative for the Air Force Flight Dynamics Laboratory. An overview of these atmospheric electricity hazards to aircraft and their systems is presented with emphasis on electrical and electronic subsystems. The discussion includes reviewing some of the characteristics of lightning and static electrification, trends in weather and lightning-related mishaps, some specific threat mechanisms and susceptible aircraft subsystems and some of the present technology gaps. A roadmap (flow chart) is presented to show the direction needed to address these problems.

  3. SOLAR AIRCRAFT DESIGN

    OpenAIRE

    RAHMATI, Sadegh; GHASED, Amir

    2015-01-01

    Abstract. Generally domain Aircraft uses conventional fuel. These fuel having limited life, high cost and pollutant. Also nowadays price of petrol and other fuels are going to be higher, because of scarcity of those fuels. So there is great demand of use of non-exhaustible unlimited source of energy like solar energy. Solar aircraft is one of the ways to utilize solar energy. Solar aircraft uses solar panel to collect the solar radiation for immediate use but it also store the remaining part ...

  4. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  5. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  6. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  7. Depreciation of aircraft

    Science.gov (United States)

    Warner, Edward P

    1922-01-01

    There is a widespread, and quite erroneous, impression to the effect that aircraft are essentially fragile and deteriorate with great rapidity when in service, so that the depreciation charges to be allowed on commercial or private operation are necessarily high.

  8. Essentials of aircraft armaments

    CERN Document Server

    Kaushik, Mrinal

    2017-01-01

    This book aims to provide a complete exposure about armaments from their design to launch from the combat aircraft. The book details modern ammunition and their tactical roles in warfare. The proposed book discusses aerodynamics, propulsion, structural as well as navigation, control, and guidance of aircraft armament. It also introduces the various types of ammunition developed by different countries and their changing trends. The book imparts knowledge in the field of design, and development of aircraft armaments to aerospace engineers and covers the role of the United Nations in peacekeeping and disarmament. The book will be very useful to researchers, students, and professionals working in design and manufacturing of aircraft armaments. The book will also serve air force and naval aspirants, and those interested in working on defence research and developments organizations. .

  9. Solar thermal aircraft

    Science.gov (United States)

    Bennett, Charles L.

    2007-09-18

    A solar thermal powered aircraft powered by heat energy from the sun. A heat engine, such as a Stirling engine, is carried by the aircraft body for producing power for a propulsion mechanism, such as a propeller. The heat engine has a thermal battery in thermal contact with it so that heat is supplied from the thermal battery. A solar concentrator, such as reflective parabolic trough, is movably connected to an optically transparent section of the aircraft body for receiving and concentrating solar energy from within the aircraft. Concentrated solar energy is collected by a heat collection and transport conduit, and heat transported to the thermal battery. A solar tracker includes a heliostat for determining optimal alignment with the sun, and a drive motor actuating the solar concentrator into optimal alignment with the sun based on a determination by the heliostat.

  10. Aircraft electromagnetic compatibility

    Science.gov (United States)

    Clarke, Clifton A.; Larsen, William E.

    1987-06-01

    Illustrated are aircraft architecture, electromagnetic interference environments, electromagnetic compatibility protection techniques, program specifications, tasks, and verification and validation procedures. The environment of 400 Hz power, electrical transients, and radio frequency fields are portrayed and related to thresholds of avionics electronics. Five layers of protection for avionics are defined. Recognition is given to some present day electromagnetic compatibility weaknesses and issues which serve to reemphasize the importance of EMC verification of equipment and parts, and their ultimate EMC validation on the aircraft. Proven standards of grounding, bonding, shielding, wiring, and packaging are laid out to help provide a foundation for a comprehensive approach to successful future aircraft design and an understanding of cost effective EMC in an aircraft setting.

  11. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems.The facility allows for the simulation of a...

  12. Aircraft Fire Protection Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Navy Aircraft Protection Laboratory provides complete test support for all Navy air vehicle fire protection systems. The facility allows for the simulation of a...

  13. Prediction of anthropometric accommodation in aircraft cockpits

    Science.gov (United States)

    Zehner, Gregory Franklin

    Designing aircraft cockpits to accommodate the wide range of body sizes existing in the U.S. population has always been a difficult problem for Crewstation Engineers. The approach taken in the design of military aircraft has been to restrict the range of body sizes allowed into flight training, and then to develop standards and specifications to ensure that the majority of the pilots are accommodated. Accommodation in this instance is defined as the ability to: (1) Adequately see, reach, and actuate controls; (2) Have external visual fields so that the pilot can see to land, clear for other aircraft, and perform a wide variety of missions (ground support/attack or air to air combat); and (3) Finally, if problems arise, the pilot has to be able to escape safely. Each of these areas is directly affected by the body size of the pilot. Unfortunately, accommodation problems persist and may get worse. Currently the USAF is considering relaxing body size entrance requirements so that smaller and larger people could become pilots. This will make existing accommodation problems much worse. This dissertation describes a methodology for correcting this problem and demonstrates the method by predicting pilot fit and performance in the USAF T-38A aircraft based on anthropometric data. The methods described can be applied to a variety of design applications where fitting the human operator into a system is a major concern. A systematic approach is described which includes: defining the user population, setting functional requirements that operators must be able to perform, testing the ability of the user population to perform the functional requirements, and developing predictive equations for selecting future users of the system. Also described is a process for the development of new anthropometric design criteria and cockpit design methods that assure body size accommodation is improved in the future.

  14. Automatic aircraft recognition

    Science.gov (United States)

    Hmam, Hatem; Kim, Jijoong

    2002-08-01

    Automatic aircraft recognition is very complex because of clutter, shadows, clouds, self-occlusion and degraded imaging conditions. This paper presents an aircraft recognition system, which assumes from the start that the image is possibly degraded, and implements a number of strategies to overcome edge fragmentation and distortion. The current vision system employs a bottom up approach, where recognition begins by locating image primitives (e.g., lines and corners), which are then combined in an incremental fashion into larger sets of line groupings using knowledge about aircraft, as viewed from a generic viewpoint. Knowledge about aircraft is represented in the form of whole/part shape description and the connectedness property, and is embedded in production rules, which primarily aim at finding instances of the aircraft parts in the image and checking the connectedness property between the parts. Once a match is found, a confidence score is assigned and as evidence in support of an aircraft interpretation is accumulated, the score is increased proportionally. Finally a selection of the resulting image interpretations with the highest scores, is subjected to competition tests, and only non-ambiguous interpretations are allowed to survive. Experimental results demonstrating the effectiveness of the current recognition system are given.

  15. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  16. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  17. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  18. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  19. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  20. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  1. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  2. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  3. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  4. Identification of Aircraft Hazards

    Energy Technology Data Exchange (ETDEWEB)

    K. Ashley

    2006-12-08

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2005 [DIRS 174235], Section 6.4.1). That determination was conservatively based upon limited knowledge of flight data in the area of concern and upon crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a monitored geologic repository (MGR) at Yucca Mountain, using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987 [DIRS 103124], Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. The intended use of this report is to provide inputs for further screening and analysis of identified aircraft hazards based upon the criteria that apply to Category 1 and Category 2 event sequence analyses as defined in 10 CFR 63.2 [DIRS 176544] (Section 4). The scope of this report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the repository at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (Section 7).

  5. IDENTIFICATION OF AIRCRAFT HAZARDS

    Energy Technology Data Exchange (ETDEWEB)

    K.L. Ashley

    2005-03-23

    Aircraft hazards were determined to be potentially applicable to a repository at Yucca Mountain in the ''Monitored Geological Repository External Events Hazards Screening Analysis'' (BSC 2004, Section 6.4.1). That determination was conservatively based on limited knowledge of flight data in the area of concern and on crash data for aircraft of the type flying near Yucca Mountain. The purpose of this report is to identify specific aircraft hazards that may be applicable to a Monitored Geologic Repository (MGR) at Yucca Mountain using NUREG-0800, ''Standard Review Plan for the Review of Safety Analysis Reports for Nuclear Power Plants'' (NRC 1987, Section 3.5.1.6), as guidance for the inclusion or exclusion of identified aircraft hazards. NUREG-0800 is being used here as a reference because some of the same considerations apply. The intended use of this report is to provide inputs for further screening and analysis of the identified aircraft hazards based on the criteria that apply to Category 1 and 2 event sequence analyses as defined in 10 CFR 63.2 (see Section 4). The scope of this technical report includes the evaluation of military, private, and commercial use of airspace in the 100-mile regional setting of the MGR at Yucca Mountain with the potential for reducing the regional setting to a more manageable size after consideration of applicable screening criteria (see Section 7).

  6. Aircraft Operations Classification System

    Science.gov (United States)

    Harlow, Charles; Zhu, Weihong

    2001-01-01

    Accurate data is important in the aviation planning process. In this project we consider systems for measuring aircraft activity at airports. This would include determining the type of aircraft such as jet, helicopter, single engine, and multiengine propeller. Some of the issues involved in deploying technologies for monitoring aircraft operations are cost, reliability, and accuracy. In addition, the system must be field portable and acceptable at airports. A comparison of technologies was conducted and it was decided that an aircraft monitoring system should be based upon acoustic technology. A multimedia relational database was established for the study. The information contained in the database consists of airport information, runway information, acoustic records, photographic records, a description of the event (takeoff, landing), aircraft type, and environmental information. We extracted features from the time signal and the frequency content of the signal. A multi-layer feed-forward neural network was chosen as the classifier. Training and testing results were obtained. We were able to obtain classification results of over 90 percent for training and testing for takeoff events.

  7. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  8. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  9. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  10. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  11. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  12. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  13. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  14. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  15. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  16. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  17. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash......In this paper we combine two powerful methods of symmetric cryptanalysis: rotational cryptanalysis and the rebound attack. Rotational cryptanalysis was designed for the analysis of bit-oriented designs like ARX (Addition-Rotation-XOR) schemes. It has been applied to several hash functions and block...... function Skein, a finalist of the SHA-3 competition. Our attack penetrates more than two thirds of the Skein core—the cipher Threefish, and made the designers to change the submission in order to prevent it. The rebound part of our attack has been significantly enhanced to deliver results on the largest...

  18. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  19. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  20. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  1. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  2. A fault diagnosis based reconfigurable longitudinal control system for managing loss of air data sensors for a civil aircraft

    OpenAIRE

    Varga, Andreas; Ossmann, Daniel; Joos, Hans-Dieter

    2014-01-01

    An integrated fault diagnosis based fault tolerant longitudinal control system architecture is proposed for civil aircraft which can accommodate partial or total losses of angle of attack and/or calibrated airspeed sensors. A triplex sensor redundancy is assumed for the normal operation of the aircraft using a gain scheduled longitudinal normal control law. The fault isolation functionality is provided by a bank of 6 fault detection filters, which individually monitor each of the 6 sensors us...

  3. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  4. Advanced Aircraft Material

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Prince

    2013-06-01

    Full Text Available There has been long debate on “advanced aircraft material” from past decades & researchers too came out with lots of new advanced material like composites and different aluminum alloys. Now days a new advancement that is in great talk is third generation Aluminum-lithium alloy. Newest Aluminum-lithium alloys are found out to have low density, higher elastic modulus, greater stiffness, greater cryogenic toughness, high resistance to fatigue cracking and improved corrosion resistance properties over the earlier used aircraft material as mentioned in Table 3 [1-5]. Comparison had been made with nowadays used composite material and is found out to be more superior then that

  5. Aircraft Fuel Systems Career Ladder.

    Science.gov (United States)

    1985-09-01

    type fittings remove and install fuel cells clean work areas inspect aircraft for safety pin installation purge tanks or cells using blow purge method...INSPECT AIRCRAFT FOR SAFETY PIN INSTALLATION 84 H254 PURGE TANKS OR CELLS USING BLOW PURGE METHOD 83 H227 CHECK AIRCRAFT FOR LIQUID OXYGEN (LOX...H243 INSPECT AIRCRAFT FOR SAFETY PIN INSTALLATION 52 M483 MIX SEALANTS BY HAND 48 K372 CONNECT OR DISCONNECT WIGGINS TYPE FITTINGS 48 H236 DISCONNECT

  6. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  7. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  8. Numerical study of aerodynamic characteristics of FSW aircraft with dierent wing positions under supersonic condition

    Institute of Scientific and Technical Information of China (English)

    Lei Juanmian; Zhao Shuai; Wang Suozhu

    2016-01-01

    This paper investigates the influence of forward-swept wing (FSW) positions on the aero-dynamic characteristics of aircraft under supersonic condition (Ma=1.5). The numerical method based on Reynolds-averaged Navier–Stokes (RANS) equations, Spalart–Allmaras (S–A) turbu-lence model and implicit algorithm is utilized to simulate the flow field of the aircraft. The aerody-namic parameters and flow field structures of the horizontal tail and the whole aircraft are presented. The results demonstrate that the spanwise flow of FSW flows from the wingtip to the wing root, generating an upper wing surface vortex and a trailing edge vortex nearby the wing root. The vortexes generated by FSW have a strong downwash effect on the tail. The lower the vertical position of FSW, the stronger the downwash effect on tail. Therefore, the effective angle of attack of tail becomes smaller. In addition, the lift coefficient, drag coefficient and lift–drag ratio of tail decrease, and the center of pressure of tail moves backward gradually. For the whole aircraft, the lower the vertical position of FSW, the smaller lift, drag and center of pressure coefficients of aircraft. The closer the FSW moves towards tail, the bigger pitching moment and center of pres-sure coefficients of the whole aircraft, but the lift and drag characteristics of the horizontal tail and the whole aircraft are basically unchanged. The results have potential application for the design of new concept aircraft.

  9. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  10. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  11. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  12. Aircraft Oxygen Generation

    Science.gov (United States)

    2012-02-01

    aircraft use some form of on-board oxygen generation provided by one of two corporations that dominate this market . A review of safety incident data...manufacture of synthetic resins (e.g., Bakelite), and for 161 making dyestuffs, flavorings, perfumes , and other chemicals. Some are used as

  13. Robots for Aircraft Maintenance

    Science.gov (United States)

    1993-01-01

    Marshall Space Flight Center charged USBI (now Pratt & Whitney) with the task of developing an advanced stripping system based on hydroblasting to strip paint and thermal protection material from Space Shuttle solid rocket boosters. A robot, mounted on a transportable platform, controls the waterjet angle, water pressure and flow rate. This technology, now known as ARMS, has found commercial applications in the removal of coatings from jet engine components. The system is significantly faster than manual procedures and uses only minimal labor. Because the amount of "substrate" lost is minimal, the life of the component is extended. The need for toxic chemicals is reduced, as is waste disposal and human protection equipment. Users of the ARMS work cell include Delta Air Lines and the Air Force, which later contracted with USBI for development of a Large Aircraft Paint Stripping system (LARPS). LARPS' advantages are similar to ARMS, and it has enormous potential in military and civil aircraft maintenance. The technology may also be adapted to aircraft painting, aircraft inspection techniques and paint stripping of large objects like ships and railcars.

  14. Aircraft noise prediction

    Science.gov (United States)

    Filippone, Antonio

    2014-07-01

    This contribution addresses the state-of-the-art in the field of aircraft noise prediction, simulation and minimisation. The point of view taken in this context is that of comprehensive models that couple the various aircraft systems with the acoustic sources, the propagation and the flight trajectories. After an exhaustive review of the present predictive technologies in the relevant fields (airframe, propulsion, propagation, aircraft operations, trajectory optimisation), the paper addresses items for further research and development. Examples are shown for several airplanes, including the Airbus A319-100 (CFM engines), the Bombardier Dash8-Q400 (PW150 engines, Dowty R408 propellers) and the Boeing B737-800 (CFM engines). Predictions are done with the flight mechanics code FLIGHT. The transfer function between flight mechanics and the noise prediction is discussed in some details, along with the numerical procedures for validation and verification. Some code-to-code comparisons are shown. It is contended that the field of aircraft noise prediction has not yet reached a sufficient level of maturity. In particular, some parametric effects cannot be investigated, issues of accuracy are not currently addressed, and validation standards are still lacking.

  15. Aircraft Emissions Characterization

    Science.gov (United States)

    1988-03-01

    sample from each trap through a heated (1500C) six-port valve ’ Carle Instruments Model 5621) and onto the analytical column. The coLoponents in each...Environmental Protection, Vol. II. Aircraft Engine Emissions, Int. Civil Aviation Organ., 1981. 7. Nebel , G. J., "Benzene in Auto Exhaust," J. Air Poll

  16. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  17. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  18. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  19. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  20. Braking performance of aircraft tires

    Science.gov (United States)

    Agrawal, Satish K.

    This paper brings under one cover the subject of aircraft braking performance and a variety of related phenomena that lead to aircraft hydroplaning, overruns, and loss of directional control. Complex processes involving tire deformation, tire slipping, and fluid pressures in the tire-runway contact area develop the friction forces for retarding the aircraft; this paper describes the physics of these processes. The paper reviews the past and present research efforts and concludes that the most effective way to combat the hazards associated with aircraft landings and takeoffs on contaminated runways is by measuring and displaying in realtime the braking performance parameters in the aircraft cockpit.

  1. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  2. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  3. Optimal PID Controller Tuning for Multivariable Aircraft Longitudinal Autopilot Based on Particle Swarm Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Mostafa Lotfi Forushani

    2012-04-01

    Full Text Available This paper presents an optimized controller around the longitudinal axis of multivariable system in one of the aircraft flight conditions. The controller is introduced in order to control the angle of attack from the pitch attitude angle independently (that is required for designing a set of direct force-modes for the longitudinal axis based on particle swarm optimization (PSO algorithm. The autopilot system for military or civil aircraft is an essential component and in this paper, the autopilot system via 6 degree of freedom model for the control and guidance of aircraft in which the autopilot design will perform based on defining the longitudinal and the lateral-directional axes are supposed. The effectiveness of the proposed controller is illustrated by considering HIMAT aircraft. The simulation results verify merits of the proposed controller.

  4. Study of optical techniques for the Ames unitary wind tunnels. Part 3: Angle of attack

    Science.gov (United States)

    Lee, George

    1992-01-01

    A review of optical sensors that are capable of accurate angle of attack measurements in wind tunnels was conducted. These include sensors being used or being developed at NASA Ames and Langley Research Centers, Boeing Airplane Company, McDonald Aircraft Company, Arnold Engineering Development Center, National Aerospace Laboratory of the Netherlands, National Research Council of Canada, and the Royal Aircraft Establishment of England. Some commercial sensors that may be applicable to accurate angle measurements were also reviewed. It was found that the optical sensor systems were based on interferometers, polarized light detector, linear or area photodiode cameras, position sensing photodetectors, and laser scanners. Several of the optical sensors can meet the requirements of the Ames Unitary Plan Wind Tunnel. Two of these, the Boeing interferometer and the Complere lateral effect photodiode sensors are being developed for the Ames Unitary Plan Wind Tunnel.

  5. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  7. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  8. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  9. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  10. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  11. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  12. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... medicines also keep existing clots from getting larger. Beta blockers . Beta blockers decrease your heart’s workload. These medicines also are ... discomfort and to help prevent another heart attack. Beta blockers also are used to treat arrhythmias (irregular heartbeats). ...

  13. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  16. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  17. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  18. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  19. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  20. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  1. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  2. Bifurcation analysis of polynomial models for longitudinal motion at high angle of attack

    Institute of Scientific and Technical Information of China (English)

    Shi Zhongke; Fan Li

    2013-01-01

    To investigate the longitudinal motion stability of aircraft maneuvers conveniently,a new stability analysis approach is presented in this paper.Based on describing longitudinal aerodynamics at high angle-of-attack (α < 50°) motion by polynomials,a union structure of two-order differential equation is suggested.By means of nonlinear theory and method,analytical and global bifurcation analyses of the polynomial differential systems are provided for the study of the nonlinear phenomena of high angle-of-attack flight.Applying the theories of bifurcations,many kinds of bifurcations,such as equilibrium,Hopf,homoclinic (heteroclinic) orbit and double limit cycle bifurcations are discussed and the existence conditions for these bifurcations as well as formulas for calculating bifurcation curves are derived.The bifurcation curves divide the parameter plane into several regions; moreover,the complete bifurcation diagrams and phase portraits in different regions are obtained.Finally,our conclusions are applied to analyzing the stability and bifurcations of a practical example of a high angle-of-attack flight as well as the effects of elevator deflection on the asymptotic stability regions of equilibrium.The model and analytical methods presented in this paper can be used to study the nonlinear flight dynamic of longitudinal stall at high angle of attack.

  3. 19 CFR 10.183 - Duty-free entry of civil aircraft, aircraft engines, ground flight simulators, parts, components...

    Science.gov (United States)

    2010-04-01

    ... Duty-free entry of civil aircraft, aircraft engines, ground flight simulators, parts, components, and... aircraft, aircraft engines, and ground flight simulators, including their parts, components, and... United States (HTSUS) by meeting the following requirements: (1) The aircraft, aircraft engines,...

  4. Flight Test Techniques for Quantifying Pitch Rate and Angle of Attack Rate Dependencies

    Science.gov (United States)

    Grauer, Jared A.; Morelli, Eugene A.; Murri, Daniel G.

    2017-01-01

    Three different types of maneuvers were designed to separately quantify pitch rate and angle of attack rate contributions to the nondimensional aerodynamic pitching moment coefficient. These maneuvers combined pilot inputs and automatic multisine excitations, and were own with the subscale T-2 and Bat-4 airplanes using the NASA AirSTAR flight test facility. Stability and control derivatives, in particular C(sub mq) and C(sub m alpha(.)) were accurately estimated from the flight test data. These maneuvers can be performed with many types of aircraft, and the results can be used to increase simulation prediction fidelity and facilitate more accurate comparisons with wind tunnel experiments or numerical investigations.

  5. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  6. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  7. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  8. Cooperative Attack for Manned/Unmanned Aerial Vehicles%有人/无人机协同作战

    Institute of Scientific and Technical Information of China (English)

    王焱

    2013-01-01

    This paper introduces the development of cooperative attack for manned/unmanned aerial vehicles, presents future possible modes of the cooperative attack between aircraft and unmanned aerial vehicles(UAV), and analyzes the feasibility of realizing the ground control function of UAV by manned aerial vehicles . Relative conclusions are meaningful for technicians concerning this field to carry out research on cooperative attack for manned/unmanned aerial vehicles .%介绍了国外有人/无人机协同作战的发展概况,给出了有人/无人机之间协同作战的几种可能模式,并分析了有人机实现无人机地面控制站功能的可行性。相关结论对该领域技术人员开展有人/无人机协同作战研究具有重要意义。

  9. Aircraft Data Acquisition

    OpenAIRE

    Elena BALMUS

    2016-01-01

    The introduction of digital systems instead of analog ones has created a major separation in the aviation technology. Although the digital equipment made possible that the increasingly faster controllers take over, we should say that the real world remains essentially analogue [4]. Fly-by-wire designers attempting to control and measure the real feedback of an aircraft were forced to find a way to connect the analogue environment to their digital equipment. In order to manage the implications...

  10. Airline and Aircraft Reliability

    OpenAIRE

    Hauka, Maris; Paramonovs, Jurijs

    2014-01-01

    Development of the inspection programme of fatigue-prone aircraft construction under limitation of airline fatigue failure rate. The highest economical effectiveness of airline under limitation of fatigue failure rate and failure probability is discussed. For computing is used exponential regression, Monte Carlo method, Log Normal distribution, Markov chains and semi-Markov process theory. The minimax approach is offered for processing the results of full-scale fatigue approval test of an air...

  11. Slotted Aircraft Wing

    Science.gov (United States)

    McLean, James D. (Inventor); Witkowski, David P. (Inventor); Campbell, Richard L. (Inventor)

    2006-01-01

    A swept aircraft wing includes a leading airfoil element and a trailing airfoil element. At least one full-span slot is defined by the wing during at least one transonic condition of the wing. The full-span slot allows a portion of the air flowing along the lower surface of the leading airfoil element to split and flow over the upper surface of the trailing airfoil element so as to achieve a performance improvement in the transonic condition.

  12. Rotary Balance Wind Tunnel Testing for the FASER Flight Research Aircraft

    Science.gov (United States)

    Denham, Casey; Owens, D. Bruce

    2016-01-01

    Flight dynamics research was conducted to collect and analyze rotary balance wind tunnel test data in order to improve the aerodynamic simulation and modeling of a low-cost small unmanned aircraft called FASER (Free-flying Aircraft for Sub-scale Experimental Research). The impetus for using FASER was to provide risk and cost reduction for flight testing of more expensive aircraft and assist in the improvement of wind tunnel and flight test techniques, and control laws. The FASER research aircraft has the benefit of allowing wind tunnel and flight tests to be conducted on the same model, improving correlation between wind tunnel, flight, and simulation data. Prior wind tunnel tests include a static force and moment test, including power effects, and a roll and yaw damping forced oscillation test. Rotary balance testing allows for the calculation of aircraft rotary derivatives and the prediction of steady-state spins. The rotary balance wind tunnel test was conducted in the NASA Langley Research Center (LaRC) 20-Foot Vertical Spin Tunnel (VST). Rotary balance testing includes runs for a set of given angular rotation rates at a range of angles of attack and sideslip angles in order to fully characterize the aircraft rotary dynamics. Tests were performed at angles of attack from 0 to 50 degrees, sideslip angles of -5 to 10 degrees, and non-dimensional spin rates from -0.5 to 0.5. The effects of pro-spin elevator and rudder deflection and pro- and anti-spin elevator, rudder, and aileron deflection were examined. The data are presented to illustrate the functional dependence of the forces and moments on angle of attack, sideslip angle, and angular rate for the rotary contributions to the forces and moments. Further investigation is necessary to fully characterize the control effectors. The data were also used with a steady state spin prediction tool that did not predict an equilibrium spin mode.

  13. Interaction of Aircraft Wakes From Laterally Spaced Aircraft

    Science.gov (United States)

    Proctor, Fred H.

    2009-01-01

    Large Eddy Simulations are used to examine wake interactions from aircraft on closely spaced parallel paths. Two sets of experiments are conducted, with the first set examining wake interactions out of ground effect (OGE) and the second set for in ground effect (IGE). The initial wake field for each aircraft represents a rolled-up wake vortex pair generated by a B-747. Parametric sets include wake interactions from aircraft pairs with lateral separations of 400, 500, 600, and 750 ft. The simulation of a wake from a single aircraft is used as baseline. The study shows that wake vortices from either a pair or a formation of B-747 s that fly with very close lateral spacing, last longer than those from an isolated B-747. For OGE, the inner vortices between the pair of aircraft, ascend, link and quickly dissipate, leaving the outer vortices to decay and descend slowly. For the IGE scenario, the inner vortices ascend and last longer, while the outer vortices decay from ground interaction at a rate similar to that expected from an isolated aircraft. Both OGE and IGE scenarios produce longer-lasting wakes for aircraft with separations less than 600 ft. The results are significant because concepts to increase airport capacity have been proposed that assume either aircraft formations and/or aircraft pairs landing on very closely spaced runways.

  14. Rapid evaluation of buildings and infrastructure to accidental and deliberate aircraft impact

    Energy Technology Data Exchange (ETDEWEB)

    Tennant, D., E-mail: tennant@wai.com [Weidlinger Associates, Inc., 6301 Indian School Road NE, Suite 501, Albuquerque, NM 87122 (United States); Levine, H., E-mail: levine@ca.wai.com [Weidlinger Associates, Inc., 399 W. El Camino Real, Suite 200, Mountain View, CA 94040 (United States); Mould, J.; Vaughan, D. [Weidlinger Associates, Inc., 399 W. El Camino Real, Suite 200, Mountain View, CA 94040 (United States)

    2014-04-01

    Recent events involving the impact of large transport aircraft such as the Boeing 767 and 757 into the World Trade Center Towers and the Pentagon have revealed the vulnerability of such structures to terrorist attack. Incidents involving smaller general aviation aircraft have shown the damage that this class of plane can do beyond a protected perimeter. These incidents have elicited inquiries with regard to the effects of impacts of these aircraft types into other critical facilities including aboveground and below ground storage facilities, nuclear power plants, damns and other military and civilian installations. A significant capability to evaluate these threats has been developed during the past 10 years. Small medium and large aircraft have been impacted into buried and aboveground reinforced concrete and light steel frame storage facilities. Both explicit aircraft models and Riera functions (a simplified aircraft impact loading function) have been used to generate an extensive data base. The effects of engines impacting have been studied separately as penetrators. Illustrated in this paper is validation of computational tools for impacts into structures and the initial development of a generalized evaluation tool for rapid evaluation of threats and consequence of aircraft impact into protected facilities.

  15. Analysis of Asymmetric Aircraft Aerodynamics Due to an Experimental Wing Glove

    Science.gov (United States)

    Hartshorn, Fletcher

    2011-01-01

    Aerodynamic analysis on a business jet with a wing glove attached to one wing is presented and discussed. If a wing glove is placed over a portion of one wing, there will be asymmetries in the aircraft as well as overall changes in the forces and moments acting on the aircraft. These changes, referred to as deltas, need to be determined and quantified to make sure the wing glove does not have a drastic effect on the aircraft flight characteristics. TRANAIR, a non-linear full potential solver was used to analyze a full aircraft, with and without a glove, at a variety of flight conditions and angles of attack and sideslip. Changes in the aircraft lift, drag and side force, along with roll, pitch and yawing moment are presented. Span lift and moment distributions are also presented for a more detailed look at the effects of the glove on the aircraft. Aerodynamic flow phenomena due to the addition of the glove and its fairing are discussed. Results show that the glove used here does not present a drastic change in forces and moments on the aircraft, but an added torsional moment around the quarter-chord of the wing may be a cause for some structural concerns.

  16. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  17. Guidance Systems of Fighter Aircraft

    Directory of Open Access Journals (Sweden)

    K.N. Rajanikanth

    2005-07-01

    Full Text Available Mission performance of a fighter aircraft is crucial for survival and strike capabilities in todays' aerial warfare scenario. The guidance functions of such an aircraft play a vital role inmeeting the requirements and accomplishing the mission success. This paper presents the requirements of precision guidance for various missions of a fighter aircraft. The concept ofguidance system as a pilot-in-loop system is pivotal in understanding and designing such a system. Methodologies of designing such a system are described.

  18. Guidance Systems of Fighter Aircraft

    OpenAIRE

    K.N. Rajanikanth; Rao, R S; P. S. Subramanyam; Ajai Vohra

    2005-01-01

    Mission performance of a fighter aircraft is crucial for survival and strike capabilities in todays' aerial warfare scenario. The guidance functions of such an aircraft play a vital role inmeeting the requirements and accomplishing the mission success. This paper presents the requirements of precision guidance for various missions of a fighter aircraft. The concept ofguidance system as a pilot-in-loop system is pivotal in understanding and designing such a system. Methodologies of designing s...

  19. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  20. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  1. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  2. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  3. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  4. Scheduling of an aircraft fleet

    Science.gov (United States)

    Paltrinieri, Massimo; Momigliano, Alberto; Torquati, Franco

    1992-01-01

    Scheduling is the task of assigning resources to operations. When the resources are mobile vehicles, they describe routes through the served stations. To emphasize such aspect, this problem is usually referred to as the routing problem. In particular, if vehicles are aircraft and stations are airports, the problem is known as aircraft routing. This paper describes the solution to such a problem developed in OMAR (Operative Management of Aircraft Routing), a system implemented by Bull HN for Alitalia. In our approach, aircraft routing is viewed as a Constraint Satisfaction Problem. The solving strategy combines network consistency and tree search techniques.

  5. Reducing the Impact of Attacks against Healthcare by Curbing the Use of Explosive Weapons in Populated Areas: Developments at the Global Level.

    Science.gov (United States)

    Bagshaw, Simon

    2016-01-01

    Attacks against healthcare in situations of armed conflict have emerged as an issue of increasing concern with explosive weapons - such as aircraft bombs, mortars and improvised explosive devices - accounting for more deaths, injuries and damage than any other type of weapon in attacks on healthcare facilities. While this is perhaps unsurprising, it offers some insight into a possible course of action for dealing with the problem of attacks against healthcare - by curbing the use of explosive weapons in populated areas. There has been growing recognition in recent years of the humanitarian problems caused by the use of such weapons in populated areas. Steps are now being taken at the global level to curb this use which could, in time, make an important contribution to reducing the incidence and devastating impact of attacks against healthcare.

  6. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  7. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  8. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  9. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  10. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  11. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  12. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  13. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  14. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  15. Optics in aircraft engines

    Science.gov (United States)

    Vachon, James; Malhotra, Subhash

    The authors describe optical IR&D (independent research and development) programs designed to demonstrate and evaluate optical technologies for incorporation into next-generation military and commercial aircraft engines. Using a comprehensive demonstration program to validate this technology in an on-engine environment, problems encountered can be resolved early and risk can be minimized. In addition to specific activities related to the optics demonstration on the fighter engine, there are other optical programs underway, including a solenoid control system, a light off detection system, and an optical communication link. Research is also underway in simplifying opto-electronics and exploiting multiplexing to further reduce cost and weight.

  16. Aircraft propeller control

    Science.gov (United States)

    Day, Stanley G. (Inventor)

    1990-01-01

    In the invention, the speeds of both propellers in a counterrotating aircraft propeller pair are measured. Each speed is compared, using a feedback loop, with a demanded speed and, if actual speed does not equal demanded speed for either propeller, pitch of the proper propeller is changed in order to attain the demanded speed. A proportional/integral controller is used in the feedback loop. Further, phase of the propellers is measured and, if the phase does not equal a demanded phase, the speed of one propeller is changed, by changing pitch, until the proper phase is attained.

  17. Commercial Aircraft Protection

    Energy Technology Data Exchange (ETDEWEB)

    Ehst, David A. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-10-26

    This report summarizes the results of theoretical research performed during 3 years of P371 Project implementation. In results of such research a new scientific conceptual technology of quasi-passive individual infrared protection of heat-generating objects – Spatial Displacement of Thermal Image (SDTI technology) was developed. Theoretical substantiation and description of working processes of civil aircraft individual IR-protection system were conducted. The mathematical models and methodology were presented, there were obtained the analytical dependencies which allow performing theoretical research of the affect of intentionally arranged dynamic field of the artificial thermal interferences with variable contrast onto main parameters of optic-electronic tracking and homing systems.

  18. Chemistry in aircraft plumes

    Energy Technology Data Exchange (ETDEWEB)

    Kraabol, A.G.; Stordal, F.; Knudsen, S. [Norwegian Inst. for Air Research, Kjeller (Norway); Konopka, P. [Deutsche Forschungsanstalt fuer Luft- und Raumfahrt e.V. (DLR), Wessling (Germany). Inst. fuer Physik der Atmosphaere

    1997-12-31

    An expanding plume model with chemistry has been used to study the chemical conversion of NO{sub x} to reservoir species in aircraft plumes. The heterogeneous conversion of N{sub 2}O{sub 5} to HNO{sub 3}(s) has been investigated when the emissions take place during night-time. The plume from an B747 has been simulated. During a ten-hour calculation the most important reservoir species was HNO{sub 3} for emissions at noon. The heterogeneous reactions had little impact on the chemical loss of NO{sub x} to reservoir species for emissions at night. (author) 4 refs.

  19. Hydrogen aircraft technology

    Science.gov (United States)

    Brewer, G. D.

    1991-01-01

    A comprehensive evaluation is conducted of the technology development status, economics, commercial feasibility, and infrastructural requirements of LH2-fueled aircraft, with additional consideration of hydrogen production, liquefaction, and cryostorage methods. Attention is given to the effects of LH2 fuel cryotank accommodation on the configurations of prospective commercial transports and military airlifters, SSTs, and HSTs, as well as to the use of the plentiful heatsink capacity of LH2 for innovative propulsion cycles' performance maximization. State-of-the-art materials and structural design principles for integral cryotank implementation are noted, as are airport requirements and safety and environmental considerations.

  20. Qualitative evaluation of a flush air data system at transonic speeds and high angles of attack

    Science.gov (United States)

    Larson, Terry J.; Whitmore, Stephen A.; Ehernberger, L. J.; Johnson, J. Blair; Siemers, Paul M., III

    1987-01-01

    Flight tests were performed on an F-14 aircraft to evaluate the use of flush pressure orifices on the nose section for obtaining air data at transonic speeds over a large range of flow angles. This program was part of a flight test and wind tunnel program to assess the accuracies of such systems for general use on aircraft. It also provided data to validate algorithms developed for the shuttle entry air data system designed at NASA Langley. Data were obtained for Mach numbers between 0.60 and 1.60, for angles of attack up to 26.0 deg, and for sideslip angles up to 11.0 deg. With careful calibration, a flush air data system with all flush orifices can provide accurate air data information over a large range of flow angles. Several orificies on the nose cap were found to be suitable for determination of stagnation pressure. Other orifices on the nose section aft of the nose cap were shown to be suitable for determination of static pressure. Pairs of orifices on the nose cap provided the most sensitive measurements for determining angles of attack and sideslip, although orifices located farther aft on the nose section could also be used.

  1. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  2. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  3. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  4. Decoupler pylon - A simple, effective wing/store flutter suppressor. [in fighter/attack aircraft

    Science.gov (United States)

    Reed, W. H.; Foughner, J. T., Jr.; Runyan, H. L., Jr.

    1979-01-01

    As an alternative to alleviating wing/store flutter by conventional passive methods or by more advanced active control methods, a quasi-passive concept, referred to as the decoupler pylon, is investigated which combines desirable features of both methods. Passive soft-spring/damper elements are used to decouple wing modes from store pitch modes, and a low-power control system maintains store alignment under changing mean loads. It is shown by analysis and wind tunnel tests that the decoupler pylon provides substantial increase in flutter speed and makes flutter virtually insensitive to inertia and center-of-gravity location of the store.

  5. MISSILES AND AIRCRAFT (PART1

    Directory of Open Access Journals (Sweden)

    C.M. Meyer

    2012-02-01

    Full Text Available Many sources maintain that the role played by air power in the 1973 Yom Kippur War was important. Other interpretations state that control of air space over the battlefield areas, (either by aircraft or anti-aircraft defences, was vital.

  6. Aircraft landing using GPS

    Science.gov (United States)

    Lawrence, David Gary

    The advent of the Global Positioning System (GPS) is revolutionizing the field of navigation. Commercial aviation has been particularly influenced by this worldwide navigation system. From ground vehicle guidance to aircraft landing applications, GPS has the potential to impact many areas of aviation. GPS is already being used for non-precision approach guidance; current research focuses on its application to more critical regimes of flight. To this end, the following contributions were made: (1) Development of algorithms and a flexible software architecture capable of providing real-time position solutions accurate to the centimeter level with high integrity. This architecture was used to demonstrate 110 automatic landings of a Boeing 737. (2) Assessment of the navigation performance provided by two GPS-based landing systems developed at Stanford, the Integrity Beacon Landing System, and the Wide Area Augmentation System. (3) Preliminary evaluation of proposed enhancements to traditional techniques for GPS positioning, specifically, dual antenna positioning and pseudolite augmentation. (4) Introduction of a new concept for positioning using airport pseudolites. The results of this research are promising, showing that GPS-based systems can potentially meet even the stringent requirements of a Category III (zero visibility) landing system. Although technical and logistical hurdles still exist, it is likely that GPS will soon provide aircraft guidance in all phases of flight, including automatic landing, roll-out, and taxi.

  7. Nonlinear analysis and control of an aircraft in the neighbourhood of deep stall

    Science.gov (United States)

    Kolb, Sébastien; Hétru, Laurent; Faure, Thierry M.; Montagnier, Olivier

    2017-01-01

    When an aircraft is locked in a stable equilibrium at high angle-of-attack, we have to do with the so-called deep stall which is a very dangerous situation. Airplanes with T-tail are mainly concerned with this phenomenon since the wake of the main wing flows over the horizontal tail and renders it ineffective but other aircrafts such as fighters can also be affected. First the phase portrait and bifurcation diagram are determined and characterized (with three equilibria in a deep stall prone configuration). It allows to diagnose the configurations of aircrafts susceptible to deep stall and also to point out the different types of time evolutions. Several techniques are used in order to determine the basin of attraction of the stable equilibrium at high angle-of-attack. They are based on the calculation of the stable manifold of the saddle-point equilibrium at medium angle-of-attack. Then several ways are explored in order to try to recover from deep stall. They exploits static features (such as curves of pitching moment versus angle-of-attack for full pitch down and full pitch up elevators) or dynamic aspects (excitation of the eigenmodes and improvement of the aerodynamic efficiency of the tail). Finally, some properties of a deep stall prone aircraft are pointed out and some control tools are also implemented. We try also to apply this mathematical results in a concrete situation by taking into account the captors specificities or by estimating the relevant variables thanks to other available information.

  8. Fault Tolerant Control Design for the Longitudinal Aircraft Dynamics using Quantitative Feedback Theory

    OpenAIRE

    Ossmann, Daniel

    2015-01-01

    Flight control laws of modern aircraft are scheduled with respect to flight point parameters. The loss of the air data measurement system implies inevitably the loss of relevant scheduling information. A strategy to design a fault tolerant longitudinal flight control system is proposed which can accommodate the total loss of the angle of attack and the calibrated airspeed measurements. In this scenario the described robust longitudinal control law is employed ensuring a control performance ...

  9. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  10. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  11. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  12. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  13. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  14. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  15. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  16. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  17. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  18. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  19. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  20. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  1. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  2. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  3. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  4. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  5. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  6. Flight Dynamics of Flexible Aircraft with Aeroelastic and Inertial Force Interactions

    Science.gov (United States)

    Nguyen, Nhan T.; Tuzcu, Ilhan

    2009-01-01

    This paper presents an integrated flight dynamic modeling method for flexible aircraft that captures coupled physics effects due to inertial forces, aeroelasticity, and propulsive forces that are normally present in flight. The present approach formulates the coupled flight dynamics using a structural dynamic modeling method that describes the elasticity of a flexible, twisted, swept wing using an equivalent beam-rod model. The structural dynamic model allows for three types of wing elastic motion: flapwise bending, chordwise bending, and torsion. Inertial force coupling with the wing elasticity is formulated to account for aircraft acceleration. The structural deflections create an effective aeroelastic angle of attack that affects the rigid-body motion of flexible aircraft. The aeroelastic effect contributes to aerodynamic damping forces that can influence aerodynamic stability. For wing-mounted engines, wing flexibility can cause the propulsive forces and moments to couple with the wing elastic motion. The integrated flight dynamics for a flexible aircraft are formulated by including generalized coordinate variables associated with the aeroelastic-propulsive forces and moments in the standard state-space form for six degree-of-freedom flight dynamics. A computational structural model for a generic transport aircraft has been created. The eigenvalue analysis is performed to compute aeroelastic frequencies and aerodynamic damping. The results will be used to construct an integrated flight dynamic model of a flexible generic transport aircraft.

  7. Revisiting Riera's model about malevolent aircraft impinging against a rigid target

    Energy Technology Data Exchange (ETDEWEB)

    Li, Fei [School of Aeronautic Science and Engineering, Beihang University, Beijing 100191 (China); Sun, Yuxin, E-mail: yxsun@buaa.edu.cn [School of Aeronautic Science and Engineering, Beihang University, Beijing 100191 (China); Liu, Hua; Yang, Jialing [School of Aeronautic Science and Engineering, Beihang University, Beijing 100191 (China); Wen, Lijing [Nuclear and Radiation Safety Center, Ministry of Environmental Protection, Beijing 100082 (China); Duan, Zhuoping [State Key Laboratory of Explosion Science and Technology, Beijing Institute of Technology, Beijing 100081 (China)

    2015-12-01

    Highlights: • The Riera's model is revisited. • The impulse on rigid target is about equal to the initial momentum of aircraft. • Ratio of initial kinetic energy to the limit plastic strain energy is obtained. • Riera's model is improved by considering the reflection of debris. • Modification coefficient of the dynamic force is proposed. - Abstract: This paper revisited the Riera's model which is known as an important theoretical model of describing a malevolent aircraft impact on a rigid target for which the engineering background is against the crashworthiness design of the protecting shell in nuclear power plant subjected to terrorist attack. The relationship among the initial momentum of the aircraft, the total impulse exerted on the rigid target, the impulse of the crushing pressure, and the impulse of the dynamic pressure were studied. It was proved that the impulse exerted on the rigid target during the impact period is approximately equal to the initial momentum of aircraft. The expression of the ratio of the initial kinetic energy of the aircraft to the limit plastic strain energy that results in the crash of the aircraft was obtained. In addition, this study demonstrated that the reflection of a large number of debris increases the impulse exerted on the target and therefore the Riera's model needs to be improved by considering this effect and the modification coefficient of the dynamic force was proposed.

  8. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  9. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  10. Flight mechanics of a tailless articulated wing aircraft.

    Science.gov (United States)

    Paranjape, Aditya A; Chung, Soon-Jo; Selig, Michael S

    2011-06-01

    This paper investigates the flight mechanics of a micro aerial vehicle without a vertical tail in an effort to reverse-engineer the agility of avian flight. The key to stability and control of such a tailless aircraft lies in the ability to control the incidence angles and dihedral angles of both wings independently. The dihedral angles can be varied symmetrically on both wings to control aircraft speed independently of the angle of attack and flight path angle, while asymmetric dihedral can be used to control yaw in the absence of a vertical stabilizer. It is shown that wing dihedral angles alone can effectively regulate sideslip during rapid turns and generate a wide range of equilibrium turn rates while maintaining a constant flight speed and regulating sideslip. Numerical continuation and bifurcation analysis are used to compute trim states and assess their stability. This paper lays the foundation for design and stability analysis of a flapping wing aircraft that can switch rapidly from flapping to gliding flight for agile manoeuvring in a constrained environment.

  11. Flight mechanics of a tailless articulated wing aircraft

    Energy Technology Data Exchange (ETDEWEB)

    Paranjape, Aditya A; Chung, Soon-Jo; Selig, Michael S, E-mail: sjchung@illinois.edu [Department of Aerospace Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 (United States)

    2011-06-15

    This paper investigates the flight mechanics of a micro aerial vehicle without a vertical tail in an effort to reverse-engineer the agility of avian flight. The key to stability and control of such a tailless aircraft lies in the ability to control the incidence angles and dihedral angles of both wings independently. The dihedral angles can be varied symmetrically on both wings to control aircraft speed independently of the angle of attack and flight path angle, while asymmetric dihedral can be used to control yaw in the absence of a vertical stabilizer. It is shown that wing dihedral angles alone can effectively regulate sideslip during rapid turns and generate a wide range of equilibrium turn rates while maintaining a constant flight speed and regulating sideslip. Numerical continuation and bifurcation analysis are used to compute trim states and assess their stability. This paper lays the foundation for design and stability analysis of a flapping wing aircraft that can switch rapidly from flapping to gliding flight for agile manoeuvring in a constrained environment.

  12. Numerical Study of Transition of an Annular Lift Fan Aircraft

    Directory of Open Access Journals (Sweden)

    Yun Jiang

    2016-09-01

    Full Text Available The present study aimed at studying the transition of annular lift fan aircraft through computational fluid dynamics (CFD simulations. The oscillations of lift and drag, the optimization for the figure of merit, and the characteristics of drag, yawing, rolling and pitching moments in transition are studied. The results show that a two-stage upper and lower fan lift system can generate oscillations of lift and drag in transition, while a single-stage inner and outer fan lift system can eliminate the oscillations. The characteristics of momentum drag of the single-stage fans in transition are similar to that of the two-stage fans, but with the peak of drag lowered from 0.63 to 0.4 of the aircraft weight. The strategy to start transition from a negative angle of attack −21° further reduces the peak of drag to 0.29 of the weight. The strategy also reduces the peak of pitching torque, which needs upward extra thrusts of 0.39 of the weight to eliminate. The peak of rolling moment in transition needs differential upward thrusts of 0.04 of the weight to eliminate. The requirements for extra thrusts in transition lead to a total thrust–weight ratio of 0.7, which makes the aircraft more efficient for high speed cruise flight (higher than 0.7 Ma.

  13. Commercial aircraft composite technology

    CERN Document Server

    Breuer, Ulf Paul

    2016-01-01

    This book is based on lectures held at the faculty of mechanical engineering at the Technical University of Kaiserslautern. The focus is on the central theme of societies overall aircraft requirements to specific material requirements and highlights the most important advantages and challenges of carbon fiber reinforced plastics (CFRP) compared to conventional materials. As it is fundamental to decide on the right material at the right place early on the main activities and milestones of the development and certification process and the systematic of defining clear requirements are discussed. The process of material qualification - verifying material requirements is explained in detail. All state-of-the-art composite manufacturing technologies are described, including changes and complemented by examples, and their improvement potential for future applications is discussed. Tangible case studies of high lift and wing structures emphasize the specific advantages and challenges of composite technology. Finally,...

  14. Aircraft control system

    Science.gov (United States)

    Lisoski, Derek L. (Inventor); Kendall, Greg T. (Inventor)

    2007-01-01

    A solar rechargeable, long-duration, span-loaded flying wing, having no fuselage or rudder. Having a two-hundred foot wingspan that mounts photovoltaic cells on most all of the wing's top surface, the aircraft uses only differential thrust of its eight propellers to turn, pitch and yaw. The wing is configured to deform under flight loads to position the propellers such that the control can be achieved. Each of five segments of the wing has one or more motors and photovoltaic arrays, and produces its own lift independent of the other segments, to avoid loading them. Five two-sided photovoltaic arrays, in all, are mounted on the wing, and receive photovoltaic energy both incident on top of the wing, and which is incident also from below, through a bottom, transparent surface.

  15. Aircraft recognition and pose estimation

    Science.gov (United States)

    Hmam, Hatem; Kim, Jijoong

    2000-05-01

    This work presents a geometry based vision system for aircraft recognition and pose estimation using single images. Pose estimation improves the tracking performance of guided weapons with imaging seekers, and is useful in estimating target manoeuvres and aim-point selection required in the terminal phase of missile engagements. After edge detection and straight-line extraction, a hierarchy of geometric reasoning algorithms is applied to form line clusters (or groupings) for image interpretation. Assuming a scaled orthographic projection and coplanar wings, lateral symmetry inherent in the airframe provides additional constraints to further reject spurious line clusters. Clusters that accidentally pass all previous tests are checked against the original image and are discarded. Valid line clusters are then used to deduce aircraft viewing angles. By observing that the leading edges of wings of a number of aircraft of interest are within 45 to 65 degrees from the symmetry axis, a bounded range of aircraft viewing angles can be found. This generic property offers the advantage of not requiring the storage of complete aircraft models viewed from all aspects, and can handle aircraft with flexible wings (e.g. F111). Several aircraft images associated with various spectral bands (i.e. visible and infra-red) are finally used to evaluate the system's performance.

  16. Studies on the Seizure of Rudder on the Flight Safety of an Aircraft

    Institute of Scientific and Technical Information of China (English)

    GENG Jianzhong; WU Huzi; DUAN Zhuoyi

    2013-01-01

    The demands of aircraft quality design criterion on main control system failure and subsequently instantaneous response were analyzed.According to the simulation,the flight characteristics of an aircraft were studied in different angle of rudder seizure.It demonstrated that when rudder seizure with high angle and pilot could not take action immediately,the flight parameters would change sharply.The yaw angle increased 50 degrees in 5 minutes,side velocity could attain 40 meters per-second,the angle of attack and sideslip would surpass 30 degrees,roll rate would reach-20 degrees per second,side load would arrive 0.6g.Simultaneity the angle of attack exceeded the limited angle,the aircraft would stall.If control wasn' t working,the disaster would happen.These phenomena supply the sufficient information of the rudder malfunction.The validity of correcting yaw moment by asymmetry thrust was testified,the simulation results showed that even rudder seizure in most serious conditions,adopting asymmetry thrust can correct yaw moment caused by the rudder seizure.The judgment standards of flight safety level for the state of malfunction were given.The safety level was assessed caused by the rudder seizure.For an aircraft with two engines on one side,the pilots need to adjust the 4 engines to balance the asymmetric moment,the work load is increased enormously.According the flight safety standards,the safety level is level Ⅲ.

  17. A review and update of the NASA aircraft noise prediction program propeller analysis system

    Science.gov (United States)

    Golub, Robert A.; Nguyen, L. Cathy

    1989-01-01

    The National Aeronautics and Space Administration (NASA) Aircraft Noise Prediction Program (ANOPP) Propeller Analysis System (PAS) is a set of computational modules for predicting the aerodynamics, performance, and noise of propellers. The ANOPP PAS has the capability to predict noise levels for propeller aircraft certification and produce parametric scaling laws for the adjustment of measured data to reference conditions. A technical overview of the prediction techniques incorporated into the system is presented. The prediction system has been applied to predict the noise signature of a variety of propeller configurations including the effects of propeller angle of attack. A summary of these validation studies is discussed with emphasis being placed on the wind tunnel and flight test programs sponsored by the Federal Aviation Administration (FAA) for the Piper Cherokee Lance aircraft. A number of modifications and improvements have been made to the system and both DEC VAX and IBM-PC versions of the system have been added to the original CDC NOS version.

  18. Application of the concept of dynamic trim control to automatic landing of carrier aircraft. [utilizing digital feedforeward control

    Science.gov (United States)

    Smith, G. A.; Meyer, G.

    1980-01-01

    The results of a simulation study of an alternative design concept for an automatic landing control system are presented. The alternative design concept for an automatic landing control system is described. The design concept is the total aircraft flight control system (TAFCOS). TAFCOS is an open loop, feed forward system that commands the proper instantaneous thrust, angle of attack, and roll angle to achieve the forces required to follow the desired trajector. These dynamic trim conditions are determined by an inversion of the aircraft nonlinear force characteristics. The concept was applied to an A-7E aircraft approaching an aircraft carrier. The implementation details with an airborne digital computer are discussed. The automatic carrier landing situation is described. The simulation results are presented for a carrier approach with atmospheric disturbances, an approach with no disturbances, and for tailwind and headwind gusts.

  19. 40 CFR 87.6 - Aircraft safety.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false Aircraft safety. 87.6 Section 87.6 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF AIR POLLUTION FROM AIRCRAFT AND AIRCRAFT ENGINES General Provisions § 87.6 Aircraft safety. The provisions...

  20. 14 CFR 21.6 - Manufacture of new aircraft, aircraft engines, and propellers.

    Science.gov (United States)

    2010-01-01

    ... Manufacture of new aircraft, aircraft engines, and propellers. (a) Except as specified in paragraphs (b) and (c) of this section, no person may manufacture a new aircraft, aircraft engine, or propeller based on... provisions of §§ 21.183(c), 21.184(b), or 21.185(c); and (2) New aircraft engines or propellers...

  1. 78 FR 54385 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2013-09-04

    ... Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration... directive (AD) for various aircraft equipped with Rotax Aircraft Engines 912 A Series Engine. This AD...; phone: +43 7246 601 0; fax: +43 7246 601 9130; Internet: http://www.rotax-aircraft-engines.com . You...

  2. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...

  3. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  4. Comparative Analysis of Routing Attacks in Ad Hoc Network

    Directory of Open Access Journals (Sweden)

    Bipul Syam Purkayastha

    2012-03-01

    Full Text Available In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as blackhole node attacks. The routing protocols of MANET are unprotected and hence resulted into the network with the malicious mobile nodes in the network. These malicious nodes in the network are basically acts as attacks in the network. In this paper, we modify the existing DSR protocol with the functionality of attacks detection without affecting overall performance of the network. Also, we are considering the various attacks on mobile ad hoc network called blackhole attack, flooding attack and show the comparative analysis of these attacks using network simulator ns-2.

  5. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  6. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  7. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  8. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  9. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  10. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  11. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......, one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  12. Mitigation of Malicious Attacks on Networks

    CERN Document Server

    Schneider, Christian M; Andrade, Jose S; Havlin, Shlomo; Herrmann, Hans J; 10.1073/pnas.1009440108

    2011-01-01

    Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How and at which cost can one restructure the network such that it will become more robust against a malicious attack? We introduce a unique measure for robustness and use it to devise a method to mitigate economically and efficiently this risk. We demonstrate its efficiency on the European electricity system and on the Internet as well as on complex networks models. We show that with small changes in the network structure (low cost) the robustness of diverse networks can be improved dramatically while their functionality remains unchanged. Our results are useful not only for improving significantly with low cost the robustness of existing infrastructures but also for designing economically robust network systems.

  13. Making MANET secured against malicious attack

    Science.gov (United States)

    Kush, Ashwani; Taneja, Sunil; Kush, Shagun

    2011-12-01

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, infrastructureless environment and dynamic topology. A recent trend in Ad Hoc network routing is the reactive ondemand philosophy where routes are established only when required. Stable Routing is of major concern in Ad hoc routing. Security and Power efficiency are the major concerns in this field. This paper is an effort to use security to achieve more reliable routing. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme is intended to incorporate security aspect on existing protocols. The study will help in making protocol more robust against attacks to achieve stable routing in routing protocols.

  14. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  15. GNSS-based positioning: Attacks and Countermeasures

    CERN Document Server

    Papadimitratos, P

    2010-01-01

    Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of Global Navigation Satellite Systems (GNSS), integrating, for example, a Global Positioning System (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of ...

  16. Quantifying Shannon's Work Function for Cryptanalytic Attacks

    CERN Document Server

    van Son, R J J H

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on computability logic to quantify Shannon's work function and evaluate resource use in cryptanalysis. A simple cost function is defined which allows to quantify a wide range of theoretical and real computational resources. With this approach the use of custom hardware, e.g., FPGA boards, in cryptanalysis can be analyzed. Applied to real cryptanalytic problems, it raises, for instance, the expectation that the computer time needed to break some simple 90 bit strong cryptographic primitives might theoretically be less than two years.

  17. Sharkonomics How to attack market leaders

    CERN Document Server

    Engeseth, Stefan

    2012-01-01

    Sharks are nature's most revered and feared killing machines. But if you study the behaviour of sharks, you will learn they are also highly strategic and efficient in the way they survive and thrive in nature's competitive environment. Inspired by the shark's evolved (over 420 million years) instincts and strategic moves, this book provides businesses with 10 ways on how to attack the market leaders, and take market share, in your sector.

  18. Afghanistan: Green-on-Blue Attacks

    Science.gov (United States)

    2013-05-02

    Afghanistan, December 2012, p 35 15 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26/ afghanistan-green-on-blue-killings...spike-insider-attacks- stress-ramadan-fasting, 24 August 2012 37 Yousafzai, Sami and Moreau , Ron, http://www.thedailybeast.com/newsweek/2012/08/26...afghanistan-green-on-blue-killings- explained.html, Afghanistan: ‘Green on Blue’ Killings Explained, 27 August 2012 38 Yousafzai, Sami and Moreau , Ron

  19. Coal Slag Attack-A Review

    Institute of Scientific and Technical Information of China (English)

    GUO Zongqi

    2004-01-01

    Although slagging coal gasifiers have served the commercial systems of electricity and chemical fertilizer productions for more than ten years, refractory service life still is a critical factor for gasifier availability. Some investigations were attracted, focusing on coal slag attack on high chromia refractories. A general introduction is made in order to have further understanding about slag corrosion in coal gasification environment. Microstructural deterioration and wear process of high chromia refractory in slagging gasifiers are discussed.

  20. Defending Against LDoS Attacks Using Fair AQM

    Directory of Open Access Journals (Sweden)

    Bianqin Wang

    2011-12-01

    Full Text Available According to the instant high rate and high intensity of LDoS attacks, this paper explores using fair queue management mechanism to mitigate their effect. We perform simulation experiments to evaluate the performance of fair AQM FRED and CHOKe under LDoS attacks. The simulation results show that they are able to reduce the impact of the attacks in various degrees. FRED outperforms CHOKe in throttling the attacks, but it is slightly inferior to CHOKe in time performance.

  1. Optimal Attack Strategy in Random Scale-Free Networks Based on Incomplete Information

    Institute of Scientific and Technical Information of China (English)

    LI Jun; WU Jun; LI Yong; DENG Hong-Zhong; TAN Yue-Jin

    2011-01-01

    @@ We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes.We investigate the optimal attack strategy in random scale-free networks both analytically and numerically.We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies.It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information.Moreover, we show that there is an inflection point in the curve of optimal attack proportion.For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.%We introduce an attack model based on incomplete information, which means that we can obtain the information from partial nodes. We investigate the optimal attack strategy in random scale-free networks both analytically and numerically. We show that the attack strategy can affect the attack effect remarkably and the OAS can achieve better attack effect than other typical attack strategies. It is found that when the attack intensity is small, the attacker should attack more nodes in the "white area" in which we can obtain attack information; when the attack intensity is greater, the attacker should attack more nodes in the "black area" in which we can not obtain attack information. Moreover, we show that there is an inflection point in the curve of optimal attack proportion. For a given magnitude of attack information, the optimal attack proportion decreases with the attack intensity before the inflection point and then increases after the inflection point.

  2. VTOL to Transonic Aircraft Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The cyclogyro, an aircraft propulsion concept with the potential for VTOL to the lower bounds of transonic flight, is conceptually simple but structurally and...

  3. Western Pacific Typhoon Aircraft Fixes

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Western Pacific typhoon aircraft reconnaissance data from the years 1946 - 1965 and 1978, excluding 1952, were transcribed from original documents, or copy of...

  4. Fire resistant aircraft seat program

    Science.gov (United States)

    Fewell, L. A.

    1979-01-01

    Foams, textiles, and thermoformable plastics were tested to determine which materials were fire retardant, and safe for aircraft passenger seats. Seat components investigated were the decorative fabric cover, slip covers, fire blocking layer, cushion reinforcement, and the cushioning layer.

  5. Causes of aircraft electrical failures

    Science.gov (United States)

    Galler, Donald; Slenski, George

    1991-08-01

    The results of a survey of data on failures of aircraft electronic and electrical components that was conducted to identify problematic components are reported. The motivation for the work was to determine priorities for future work on the development of accident investigation techniques for aircraft electrical components. The primary source of data was the Airforce Mishap Database, which is maintained by the Directorate of Aerospace Safety at Norton Air Force Base. Published data from the Air Force Avionics Integrity Program (AVIP) and Hughes Aircraft were also reviewed. Statistical data from these three sources are presented. Two major conclusions are that problems with interconnections are major contributors to aircraft electrical equipment failures, and that environmental factors, especially corrosion, are significant contributors to connector problems.

  6. Aircraft recognition and tracking device

    Science.gov (United States)

    Filis, Dimitrios P.; Renios, Christos I.

    2011-11-01

    The technology of aircraft recognition and tracking has various applications in all areas of air navigation, be they civil or military, spanning from air traffic control and regulation at civilian airports to anti-aircraft weapon handling and guidance for military purposes.1, 18 The system presented in this thesis is an alternative implementation of identifying and tracking flying objects, which benefits from the optical spectrum by using an optical camera built into a servo motor (pan-tilt unit). More specifically, through the purpose-developed software, when a target (aircraft) enters the field of view of the camera18, it is both detected and identified.5, 22 Then the servo motor, being provided with data on target position and velocity, tracks the aircraft while it is in constant communication with the camera (Fig. 1). All the features are so designed as to operate under real time conditions.

  7. Research and Implementation of Three HTTPS Attacks

    Directory of Open Access Journals (Sweden)

    Kefei Cheng

    2011-05-01

    Full Text Available With the rapid development of network applications, the issues of Network transmission security become very important. Therefore, SSL protocol is more and more widely used in a variety of network services. But the SSL protocol itself is not perfect, in practice, there are also problems. For the deficiencies of endpoint authentication in the SSL handshake process, the paper analyzes two kinds of defects existing in the SSL hand-shake process. Firstly, handshake process, in the first stage of the SSL connection, using plaintexts, existing the possibility of  being monitored and tampered. Secondly, SSL deployment of the actual application. Because of considering the factors about the performance of the network connection, that usually uses the way of switch connection based on HTTP protocol. In response to these deficiencies, this thesis adopts the two ways of forged certificates and converting the data stream from HTTPS to HTTP to attack them. In addition, a new attack mode against the data stream of HTTPS is designed and implemented. Experiments show that the above three methods cause significant security risks to HTTPS communications. Therefore, taking a static ARP table, enhanced certificate mechanism and mutual authentication of three different measures are proposed to enhance network security in the paper. It is shown that three ways can relative effectively defense against attacks on HTTPS in the experiments.

  8. Structural Dynamics of Maneuvering Aircraft.

    Science.gov (United States)

    1987-09-01

    AD-RI92 376 STRUCTURAL DYNAMICS OF MANEUVERING RIRCRAFT(U) CONRAD I TECHNOLOGIES INC KING OF PRUSSIA PR M M REDDI SEP 97 CTI-8601 NRDC-88014-69...REPORT NO. NADC-8014-60 STRUCTURAL DYNAMICS OF MANEUVERING AIRCRAFT M. Mahadeva Reddi .4 Conrad Technologies, Inc. 650 S. Henderson Rd. D T IQ King of...NO A0 CCESSION NO. R02303001 107601 11. TITLE (Include Security Classfication) (u) STRUCTURAL DYNAMICS OF MANEUVERING AIRCRAFT 12. PERSONAL AUTHORS) M

  9. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  10. Attacks Prevention and Detection Techniques In MANET: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjali D. Nikam,

    2014-11-01

    Full Text Available Wireless sensor network is a set of distributed sensor nodes. Which are randomly deployed in geographical area to capture climatic changes like temperature, humidity and pressure. In Wireless Network MANET is a Mobile Ad-Hoc Networks which is a one self-configurable network. MANET is a collection of Wireless mobile node which is dynamically moves from one location to another location. Both attacks Active as well as Passive attacks is in MANET. It doesn’t have a static structure. Security for wireless network is much difficult as compare to wired networks. In last few years many security and attacks issue are face many researchers in MANET. Attacks like Packet dropping attack, Black-Hole attack, Denial of Service attack, wormhole attacks and Packet modification attacks found in MANET. At the time of data communication all the above mentioned attacks access data easily without permission. To solve the problem of attacks in MANET and secure data communication use Intrusion Detection System. In This paper propose the survey of different kinds of attacks on MANET and Wireless sensor networks. This paper helps to young researcher for implement new hybrid algorithm for secure intrusion detection in MANET.

  11. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Yee Wei; Hartel, Pieter; Hartog, den Jerry; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. W

  12. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  13. Flight-Determined Subsonic Longitudinal Stability and Control Derivatives of the F-18 High Angle of Attack Research Vehicle (HARV) with Thrust Vectoring

    Science.gov (United States)

    Iliff, Kenneth W.; Wang, Kon-Sheng Charles

    1997-01-01

    The subsonic longitudinal stability and control derivatives of the F-18 High Angle of Attack Research Vehicle (HARV) are extracted from dynamic flight data using a maximum likelihood parameter identification technique. The technique uses the linearized aircraft equations of motion in their continuous/discrete form and accounts for state and measurement noise as well as thrust-vectoring effects. State noise is used to model the uncommanded forcing function caused by unsteady aerodynamics over the aircraft, particularly at high angles of attack. Thrust vectoring was implemented using electrohydraulically-actuated nozzle postexit vanes and a specialized research flight control system. During maneuvers, a control system feature provided independent aerodynamic control surface inputs and independent thrust-vectoring vane inputs, thereby eliminating correlations between the aircraft states and controls. Substantial variations in control excitation and dynamic response were exhibited for maneuvers conducted at different angles of attack. Opposing vane interactions caused most thrust-vectoring inputs to experience some exhaust plume interference and thus reduced effectiveness. The estimated stability and control derivatives are plotted, and a discussion relates them to predicted values and maneuver quality.

  14. Aircraft vibration and flutter

    Directory of Open Access Journals (Sweden)

    R. R. Aggarwal

    1958-04-01

    Full Text Available "The paper outlines the theoretical and experimental procedure one has to adopt for flutter prevention during the various stages (project, design and prototype of the development of modern aircraft. With the advent of high speed, the aerodynamic coefficients have to be calculated with due regards to the effects of compressibility, finite aspect ratio of the lifting surfaces, sweep back and other peculiar shapes of the wings. The use of thin, small aspect ratio with external masses, necessitates the computation of higher frequency modes of vibration. Single degree of freedom flutter and the effect of control surface non-linearities has also become very important. Thus, it is shown how the availability of high speed computing machines, improved experimental technique for model and full scale testing has not kept pace with the uncertainties associated with the transonic speeds, low aspect ratio and the high frequency modes. Cross-checking of theoretical and experimental results at every stage seem to be the only answer."

  15. Aircraft exhaust sulfur emissions

    Energy Technology Data Exchange (ETDEWEB)

    Brown, R.C.; Anderson, M.R.; Miake-Lye, R.C.; Kolb, C.E. [Aerodyne Research, Inc., Billerica, MA (United States). Center for Chemical and Environmental Physics; Sorokin, A.A.; Buriko, Y.I. [Scientific Research Center `Ecolen`, Moscow (Russian Federation)

    1997-12-31

    The extent to which fuel sulfur is converted to SO{sub 3} during combustion and the subsequent turbine flow in supersonic and subsonic aircraft engines is estimated numerically. The analysis is based on: a flamelet model with non-equilibrium sulfur chemistry for the combustor, and a one-dimensional, two-stream model with finite rate chemical kinetics for the turbine. The results indicate that between 2% and 10% of the fuel sulfur is emitted as SO{sub 3}. It is also shown that, for a high fuel sulfur mass loading, conversion in the turbine is limited by the level of atomic oxygen at the combustor exit, leading to higher SO{sub 2} oxidation efficiency at lower fuel sulfur loadings. While SO{sub 2} and SO{sub 3} are the primary oxidation products, the model results further indicate H{sub 2}SO{sub 4} levels on the order of 0.1 ppm for supersonic expansions through a divergent nozzle. This source of fully oxidized S(6) (SO{sub 3} + H{sub 2}SO{sub 4}) exceeds previously calculated S(6) levels due to oxidation of SO{sub 2} by OH in the exhaust plume outside the engine nozzle. (author) 26 refs.

  16. Parabolic aircraft solidification experiments

    Science.gov (United States)

    Workman, Gary L. (Principal Investigator); Smith, Guy A.; OBrien, Susan

    1996-01-01

    A number of solidification experiments have been utilized throughout the Materials Processing in Space Program to provide an experimental environment which minimizes variables in solidification experiments. Two techniques of interest are directional solidification and isothermal casting. Because of the wide-spread use of these experimental techniques in space-based research, several MSAD experiments have been manifested for space flight. In addition to the microstructural analysis for interpretation of the experimental results from previous work with parabolic flights, it has become apparent that a better understanding of the phenomena occurring during solidification can be better understood if direct visualization of the solidification interface were possible. Our university has performed in several experimental studies such as this in recent years. The most recent was in visualizing the effect of convective flow phenomena on the KC-135 and prior to that were several successive contracts to perform directional solidification and isothermal casting experiments on the KC-135. Included in this work was the modification and utilization of the Convective Flow Analyzer (CFA), the Aircraft Isothermal Casting Furnace (ICF), and the Three-Zone Directional Solidification Furnace. These studies have contributed heavily to the mission of the Microgravity Science and Applications' Materials Science Program.

  17. Integration, development, and qualification of the helmet-mounted sight and display on the Rooivalk Attack Helicopter

    Science.gov (United States)

    Mace, Timothy K.; Van Zyl, Petrus H.; Cross, Trevor

    2001-08-01

    The Rooivalk Attack Helicopter is designed and manufactured by Denel Aviation of South Africa, and in service with the South African Air Force. The Helmet Mounted Sight and Display (HMSD) hardware is manufactured by Sextant Avionique of France. The HMSD symbology is developed by Denel Aviation and is specific to the weapons and roles of the aircraft. The HMSD has visor projected NVG and PNVS images, and Flight and Weapon Symbology incorporating head slaved weapon aiming, helmet-to-helmet cueing, and helmet to main sight cueing. The NVG/PNVS image selection and main image controls are incorporated in the flight controls. The paper gives an overview of the aircraft visionic design and describes the integration process. The development of the displayed flight and weapon symbols is discussed. Aeronautical Design Standard 33E was chosen as a basis for the qualification process, and the development of the qualification criteria and the flight testing program are discussed.

  18. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  19. Link-layer jamming attacks on S-MAC

    OpenAIRE

    Law, Yee Wei; Hartel, Pieter; Hartog, den, D.N.; Havinga, Paul

    2005-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone. In this paper, we investigate some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve, and a countermeasure that can be implemented against one o...

  20. Black Hole and Greyhole Attack in Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Rupinder Kaur

    2014-10-01

    Full Text Available Security is an important need in wireless mesh networks to give safe and shared information between wireless non-static nodes. In wireless network nodes has ability to act correctly and route the packets. Wireless mesh networks unusual method of producing,keeping and sharing information ability of mobile objects to show spontaneous and cheap adjusting arrangement itself.There are different types of communication devices in technology by which performance is measured.There is a major issue which take part in network and provide security from various kinds of malicious attacks.There are various attacks such as black hole attack,wormhole attack,Greyhole attack, and evesdropping attack.Black hole and Greyhole attacks are network layer attacks that spoils the performance by falling the packets.The black hole and Grey hole are the problem of security that consider in wireless networks.Black hole and Greyhole attack is one type of way of interrupting attack and can cause large amount of damage to network.Black hole attack is act like ad-hoc network; which create network and attack on packets.In black hole attack where a false node not make correct paths in public to receiver node during the direction finding process. Theattacker achieves this attack when all the similar kinds of nodes communicate and make network to each other. It is very important to protectthe network layer from these attack which is also a great issues in wireless mesh network. Greyhole attack is very difficult to detect in wireless mesh network.In this paper,its an overview about black hole attack and grey hole in wireless mesh network and define problem statement about them. Secondly, its take study about related work in which many authors perform on these attacks and then its discuss about proposed method.Thirdly,the results are simulated carried out in OPNET simulator where black hole attack and grey hole attack shows the performance and Its analysis the throughput in network.

  1. Aircraft Aerodynamic Parameter Detection Using Micro Hot-Film Flow Sensor Array and BP Neural Network Identification

    Science.gov (United States)

    Que, Ruiyi; Zhu, Rong

    2012-01-01

    Air speed, angle of sideslip and angle of attack are fundamental aerodynamic parameters for controlling most aircraft. For small aircraft for which conventional detecting devices are too bulky and heavy to be utilized, a novel and practical methodology by which the aerodynamic parameters are inferred using a micro hot-film flow sensor array mounted on the surface of the wing is proposed. A back-propagation neural network is used to model the coupling relationship between readings of the sensor array and aerodynamic parameters. Two different sensor arrangements are tested in wind tunnel experiments and dependence of the system performance on the sensor arrangement is analyzed. PMID:23112638

  2. Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks.

    Science.gov (United States)

    Lu, Yang; Li, Jiguo

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  3. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    Directory of Open Access Journals (Sweden)

    Yang Lu

    2014-01-01

    Full Text Available Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certificate-based signcryption scheme is insecure in our model. We also propose a new certificate-based signcryption scheme that achieves security against both public key replacement attacks and insider attacks. We prove in the random oracle model that the proposed scheme is chosen-ciphertext secure and existentially unforgeable. Performance analysis shows that the proposed scheme outperforms all the previous certificate-based signcryption schemes in the literature.

  4. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  5. PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK

    Directory of Open Access Journals (Sweden)

    Mohammad Abdus Salam

    2016-03-01

    Full Text Available Wireless sensor network (WSN is highly used in many fields. The network consists of tiny lightweight sensor nodes and is largely used to scan or detect or monitor environments. Since these sensor nodes are tiny and lightweight, they put some limitations on resources such as usage of power, processing given task, radio frequency range. These limitations allow network vulnerable to many different types of attacks such as hello flood attack, black hole, Sybil attack, sinkhole, and many more. Among these attacks, hello flood is one of the most important attacks. In this paper,we have analyzed the performance of hello flood attack and compared the network performance as number of attackers increases. Network performance is evaluated by modifying the ad-hoc on demand distance vector (AODV routing protocol by using NS2 simulator. It has been tested under different scenarios like no attacker, single attacker, and multiple attackers to know how the network performance changes. The simulation results show that as the number of attackers increases the performance in terms of throughput and delay changes.

  6. Mitigating App-DDoS Attacks on Web Servers

    Directory of Open Access Journals (Sweden)

    Manisha M. Patil

    2011-07-01

    Full Text Available In this paper, a lightweight mechanism is proposed to mitigate session flooding and request flooding app-DDoS attacks on web servers. App-DDoS attack is Application layer Distributed Denial of Service attack. This attack prevents legitimate users from accessing services. Numbers of mechanisms are available and can be installed on routers and firewalls to mitigate network layer DDoS attacks like SYNflood attack, ping of death attack. But Network layer solution is not applicable because App-DDoS attacks are indistinguishable based on packets and protocols. A lightweight mechanism is proposed which uses trust to differentiate legitimate users and attackers. Trust to client is evaluated based on his visiting history and requests are scheduled in decreasing order of trust. In this mechanism trust information is stored at client side in the form of cookies. This mitigation mechanism can be implemented as a java package which can run separately and forward valid requests to server. This mechanism also mitigates request flooding attacks by using Client Puzzle Protocol. When server is under request flooding attack source throttling is done by imposing cost on client. Cost is collected in terms of CPU cycles.

  7. Aircraft Cabin Environmental Quality Sensors

    Energy Technology Data Exchange (ETDEWEB)

    Gundel, Lara; Kirchstetter, Thomas; Spears, Michael; Sullivan, Douglas

    2010-05-06

    The Indoor Environment Department at Lawrence Berkeley National Laboratory (LBNL) teamed with seven universities to participate in a Federal Aviation Administration (FAA) Center of Excellence (COE) for research on environmental quality in aircraft. This report describes research performed at LBNL on selecting and evaluating sensors for monitoring environmental quality in aircraft cabins, as part of Project 7 of the FAA's COE for Airliner Cabin Environmental Research (ACER)1 effort. This part of Project 7 links to the ozone, pesticide, and incident projects for data collection and monitoring and is a component of a broader research effort on sensors by ACER. Results from UCB and LBNL's concurrent research on ozone (ACER Project 1) are found in Weschler et al., 2007; Bhangar et al. 2008; Coleman et al., 2008 and Strom-Tejsen et al., 2008. LBNL's research on pesticides (ACER Project 2) in airliner cabins is described in Maddalena and McKone (2008). This report focused on the sensors needed for normal contaminants and conditions in aircraft. The results are intended to complement and coordinate with results from other ACER members who concentrated primarily on (a) sensors for chemical and biological pollutants that might be released intentionally in aircraft; (b) integration of sensor systems; and (c) optimal location of sensors within aircraft. The parameters and sensors were selected primarily to satisfy routine monitoring needs for contaminants and conditions that commonly occur in aircraft. However, such sensor systems can also be incorporated into research programs on environmental quality in aircraft cabins.

  8. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  9. Replication Attack Mitigations for Static and Mobile WSN

    CERN Document Server

    Manjula, V; 10.5121/ijnsa.2011.3210

    2011-01-01

    Security is important for many sensor network applications. Wireless Sensor Networks (WSN) are often deployed in hostile environments as static or mobile, where an adversary can physically capture some of the nodes. once a node is captured, adversary collects all the credentials like keys and identity etc. the attacker can re-program it and replicate the node in order to eavesdrop the transmitted messages or compromise the functionality of the network. Identity theft leads to two types attack: clone and sybil. In particularly a harmful attack against sensor networks where one or more node(s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc. This paper analyzes the threat posed by the replication attack and several novel techniques to detect and defend against the replication attack, and analyzes their effect...

  10. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  11. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  12. Correction of static pressure on a research aircraft in accelerated flight using differential pressure measurements

    Directory of Open Access Journals (Sweden)

    A. R. Rodi

    2012-11-01

    Full Text Available A method is described that estimates the error in the static pressure measurement on an aircraft from differential pressure measurements on the hemispherical surface of a Rosemount model 858AJ air velocity probe mounted on a boom ahead of the aircraft. The theoretical predictions for how the pressure should vary over the surface of the hemisphere, involving an unknown sensitivity parameter, leads to a set of equations that can be solved for the unknowns – angle of attack, angle of sideslip, dynamic pressure and the error in static pressure – if the sensitivity factor can be determined. The sensitivity factor was determined on the University of Wyoming King Air research aircraft by comparisons with the error measured with a carefully designed sonde towed on connecting tubing behind the aircraft – a trailing cone – and the result was shown to have a precision of about ±10 Pa over a wide range of conditions, including various altitudes, power settings, and gear and flap extensions. Under accelerated flight conditions, geometric altitude data from a combined Global Navigation Satellite System (GNSS and inertial measurement unit (IMU system are used to estimate acceleration effects on the error, and the algorithm is shown to predict corrections to a precision of better than ±20 Pa under those conditions. Some limiting factors affecting the precision of static pressure measurement on a research aircraft are discussed.

  13. Quantum attacks on public-key cryptosystems

    CERN Document Server

    Yan, Song Y

    2013-01-01

    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP and ECDLP do exist, provided that a practical quantum computer exists.Quantum Attacks on Public-Key Cryptosystems presemts almost all?known quantum comput

  14. SQL Injection Attacks: Techniques and Protection Mechanisms

    Directory of Open Access Journals (Sweden)

    Santosh Soni

    2011-01-01

    Full Text Available When an internet user interacts in web environment by surfing the Net, sending electronic mail messages and participating in online forums lot of data is generated which may have user’s private information. If this information is captured by third party tools and techniques; it may cause a breach in end user privacy. In the Web environment, end user privacy is one of the most controversial legal issues. In this paper issues related to information leakage through SQL injection attacks are presented and protection mechanisms are also discussed.

  15. Cooperative Guidance for Multimissile Salvo Attack

    Institute of Scientific and Technical Information of China (English)

    Zhao Shiyu; Zhou Rui

    2008-01-01

    Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordi-nation algorithms and local guidance laws are combined together, is proposed. This scheme actually builds up a hierarchical cooperative guidance architecture, which may provide a general solution to the multimissile cooperative guidance problems. In the case of salvo attacks which require missiles to hit the target simultaneously, both centralized and distributed coordination algorithms are derived based on the impact-time-control guidance (ITCG) law. Numerical simulations are performed to demonstrate the effectiveness of the proposed approaches.

  16. Cardiogenic embolism producing crescendo transient ischemic attacks.

    Science.gov (United States)

    Geraghty, Patrick J; Oak, Jack; Choi, Eric T

    2005-09-01

    Lateralizing, repetitive transient ischemic attacks are characteristic of symptomatic carotid bifurcation atherosclerotic plaques. We report a case in which a cardiogenic embolus, after lodging at the left carotid bifurcation, produced crescendo episodes of expressive aphasia and mild right upper extremity weakness. Complete neurological recovery was achieved following emergent carotid embolectomy and endarterectomy. This case demonstrates that the laminar nature of internal carotid blood flow may result in the localization of embolic events to a single region of the cerebral vasculature, regardless of the source lesion in the carotid artery. The role of endoluminal techniques in the diagnosis and management of such lesions is discussed.

  17. A Method to Defend File-Attacking

    Institute of Scientific and Technical Information of China (English)

    HE Hongjun; LUO Li; CAO Sihua; FENG Tao; PAN Li; ZOU Zhiji

    2006-01-01

    The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.

  18. Bobcat attack on a cottontail rabbit

    Science.gov (United States)

    Biggins, D.E.; Biggins, D.M.

    2006-01-01

    We observed an attack by a bobcat (Lynx rufus) on a cottontail rabbit (Sylvilagus) that involved stealthy approach by the cat for >1 h, followed by a 12.3-s chase covering 116.0 m for the cat and 128.4 m for the rabbit. During the chase, the route of the cat from starting point to kill site was more direct than the semi-circular route of the rabbit. Stride lengths for the cat and total distance covered by the chase were longer than those previously reported for bobcats.

  19. Suicide bomb attack causing penetrating craniocerebral injury

    Institute of Scientific and Technical Information of China (English)

    Manzar Hussain; Muhammad Ehsan Bari

    2013-01-01

    Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma,although there are various reports of blast or gunshot injuries in warfare due to multiple foreign bodies like pellets and nails.In our case,a 30-year-old man presented to neurosurgery clinic with signs and symptoms of right-sided weakness after suicide bomb attack.The skull X-ray showed a single intracranial nail.Small craniotomy was done and the nail was removed with caution to avoid injury to surrounding normal brain tissue.At 6 months' follow-up his right-sided power improved to against gravity.

  20. Flight validation of ground-based assessment for control power requirements at high angles of attack

    Science.gov (United States)

    Ogburn, Marilyn E.; Ross, Holly M.; Foster, John V.; Pahle, Joseph W.; Sternberg, Charles A.; Traven, Ricardo; Lackey, James B.; Abbott, Troy D.

    1994-01-01

    A review is presented in viewgraph format of an ongoing NASA/U.S. Navy study to determine control power requirements at high angles of attack for the next generation high-performance aircraft. This paper focuses on recent flight test activities using the NASA High Alpha Research Vehicle (HARV), which are intended to validate results of previous ground-based simulation studies. The purpose of this study is discussed, and the overall program structure, approach, and objectives are described. Results from two areas of investigation are presented: (1) nose-down control power requirements and (2) lateral-directional control power requirements. Selected results which illustrate issues and challenges that are being addressed in the study are discussed including test methodology, comparisons between simulation and flight, and general lessons learned.

  1. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  2. Effect of mass variation on the dynamics of receiver aircraft during aerial refueling

    Science.gov (United States)

    Mao, Weixin

    This dissertation presents the results of a study of the dynamic behavior of two aircraft that are flying in formation while one of them (the receiver) is being refueled by the other (the tanker) in mid-flight. The current procedure for aerial refueling requires that the receiver aircraft fly below, behind, and in relatively close proximity of the tanker for refueling to be possible. This means that the receiver aircraft is subjected to the full impact of the tanker wake turbulence; and this can clearly have a major impact on the motion of the receiver craft. Another important fact about aerial refueling is that large quantity of fuel is transferred from one vehicle to the other in a relatively short time. The resulting change in mass and the attendant change in aircraft inertia properties can also affect the dynamics of the aircraft system during fuel transfer. The principal goal of this project is to investigate the importance of this latter effect. This work accomplishes two main objectives. First, it shows how mass variation can be effectively factored into an analytical study of in-flight refueling; and it does this while keeping the analyses involved manageable. In addition, a numerical study of the equations of motion is utilized to extract useful information on how mass variation and some changes in receiver aircraft parameters can affect the motion of the receiver relative to the tanker. Results obtained indicate that mass variation due to fuel transfer compounds the difficulties created by tanker wake turbulence. In order to keep the receiver aircraft at a fixed position relative to the tanker during aerial refueling, appreciable adjustments must be made to the receiver's angle of attack, throttle setting and elevator deflection. A larger refueling rate demands even larger adjustments. Changes in certain other parameters related to aerial refueling can also amplify the effects of mass variation on the receiver motion, or influence the system's dynamics in

  3. Enhancing network robustness for malicious attacks

    CERN Document Server

    Zeng, An

    2012-01-01

    In a recent work [Proc. Natl. Acad. Sci. USA 108, 3838 (2011)], the authors proposed a simple measure for network robustness under malicious attacks on nodes. With a greedy algorithm, they found the optimal structure with respect to this quantity is an onion structure in which high-degree nodes form a core surrounded by rings of nodes with decreasing degree. However, in real networks the failure can also occur in links such as dysfunctional power cables and blocked airlines. Accordingly, complementary to the node-robustness measurement ($R_{n}$), we propose a link-robustness index ($R_{l}$). We show that solely enhancing $R_{n}$ cannot guarantee the improvement of $R_{l}$. Moreover, the structure of $R_{l}$-optimized network is found to be entirely different from that of onion network. In order to design robust networks resistant to more realistic attack condition, we propose a hybrid greedy algorithm which takes both the $R_{n}$ and $R_{l}$ into account. We validate the robustness of our generated networks a...

  4. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  5. Gemcitabine-induced gouty arthritis attacks.

    Science.gov (United States)

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  6. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  7. Simulation of Attacks for Security in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Alvaro Diaz

    2016-11-01

    Full Text Available The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation. After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  8. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  9. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  10. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator

    Institute of Scientific and Technical Information of China (English)

    Ya-Fei Yang; Qin-Yuan Feng; Yen(Lindsay)Sun; Ya-Fei Dai

    2009-01-01

    Recently,online rating systems are gaining popularity.Dealing with unfair ratings in such systems has been recognized as an important but challenging problem.Many unfair rating detection approaches have been developed and evaluated against simple attack models.However,the lack of unfair rating data from real human users and realistic attack behavior models has become an obstacle toward developing reliable rating systems.To solve this problem,we design and launch a rating challenge to coHect anfair rating data from real human users.In order to broaden the scope of the data collection,we also develop a comprehensive signal-based unfair rating detection system.Based on the analysis of real attack data,we discover important features in unfair ratings,build attack models,and develop an unfair rating generator.The models and generator developed in this paper can be directly used to test current rating aggregation systems,as well as to assist the design of future rating systems.

  11. An Attack Investigation, Characterization and Simulation of Various Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Pratik Gite

    2015-01-01

    Full Text Available Mobile Ad-hoc Network is one of the most popular network technology in the field of research and development community. Due to their dynamic and ad-hoc nature, the network suffers from the various performance and security issues. The main objective of this paper is to evaluate the performance of Ad-hoc On Demand Distance Vector (AODV routing protocol under normal condition and attacks conditions on the basis of different performance metrics. This paper is also concerned about the different kinds of attacks formation viz. Black Hole, Worm Hole, Gray Hole and Denial of Service attacks on MANET environment. In addition of that different kinds of approaches available for detection and prevention of such attacks are also investigated. Finally using different experimentation and simulations through NS-2, the effort is made to identify the effective network characteristics. After concluding the effects and simulation the need of a new Intrusion Detection System (IDS model is presented for future implementation.

  12. Modular Electric Propulsion Test Bed Aircraft Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An all electric aircraft test bed is proposed to provide a dedicated development environment for the rigorous study and advancement of electrically powered aircraft....

  13. Versatile Electric Propulsion Aircraft Testbed Project

    Data.gov (United States)

    National Aeronautics and Space Administration — An all-electric aircraft testbed is proposed to provide a dedicated development environment for the rigorous study and advancement of electrically powered aircraft....

  14. Introduction to unmanned aircraft systems

    CERN Document Server

    Marshall, Douglas M; Hottman, Stephen B; Shappee, Eric; Most, Michael Thomas

    2011-01-01

    Introduction to Unmanned Aircraft Systems is the editors' response to their unsuccessful search for suitable university-level textbooks on this subject. A collection of contributions from top experts, this book applies the depth of their expertise to identify and survey the fundamentals of unmanned aircraft system (UAS) operations. Written from a nonengineering civilian operational perspective, the book starts by detailing the history of UASs and then explores current technology and what is expected for the future. Covering all facets of UAS elements and operation-including an examination of s

  15. Future aircraft networks and schedules

    Science.gov (United States)

    Shu, Yan

    2011-07-01

    Because of the importance of air transportation scheduling, the emergence of small aircraft and the vision of future fuel-efficient aircraft, this thesis has focused on the study of aircraft scheduling and network design involving multiple types of aircraft and flight services. It develops models and solution algorithms for the schedule design problem and analyzes the computational results. First, based on the current development of small aircraft and on-demand flight services, this thesis expands a business model for integrating on-demand flight services with the traditional scheduled flight services. This thesis proposes a three-step approach to the design of aircraft schedules and networks from scratch under the model. In the first step, both a frequency assignment model for scheduled flights that incorporates a passenger path choice model and a frequency assignment model for on-demand flights that incorporates a passenger mode choice model are created. In the second step, a rough fleet assignment model that determines a set of flight legs, each of which is assigned an aircraft type and a rough departure time is constructed. In the third step, a timetable model that determines an exact departure time for each flight leg is developed. Based on the models proposed in the three steps, this thesis creates schedule design instances that involve almost all the major airports and markets in the United States. The instances of the frequency assignment model created in this thesis are large-scale non-convex mixed-integer programming problems, and this dissertation develops an overall network structure and proposes iterative algorithms for solving these instances. The instances of both the rough fleet assignment model and the timetable model created in this thesis are large-scale mixed-integer programming problems, and this dissertation develops subproblem schemes for solving these instances. Based on these solution algorithms, this dissertation also presents

  16. AN INTEGRATED APPROACH AGAINST APP-DDoS FOR MITIGATING IP SPOOFED ATTACKS AND MAC ATTACKS

    Directory of Open Access Journals (Sweden)

    S.PRABHA

    2013-06-01

    Full Text Available The nature of data traffic flow from wired network is extremely different from wireless network. Therefore as the DDoS application service attacks from the wired ones are produced from IP frame and wireless ones from Media Access Control (MAC frame. The variant in the frames motivates the requirement of enhanced resistive mechanism for application DDoS attacks for interfaced internet application servers enabled with both wired and wireless infrastructure. With the wired and wireless interface access in internet application services made us to present an Application Service Network Request Identification (ASNRI scheme in this work. ASNRI scheme first identifies the type of data stream frame and input it to the IHBCM method. In Bayes packet classifier, separated data frames are verified for its malicious characteristic in its data frame attributes to filter out the malicious data packet frames. Simulations are carried out to evaluate the performance of ASNRI to conventional application DDoS attack resistance schemes by measuring its true positive and true negative of data frame classification and its malicious attack resistance rate at different traffic volumes.In the process of applying Bayes has been planned to provide insight into the behavior of this technique itself. In this paper has been illustrated the sensitivity of the algorithm to its initial assumptions and demonstrated the use of two techniques, one to break the Gaussian assumptions and the other to improve the quality of discriminators as input, It leads to significant improvements in the accuracy of the Bayes technique. Integrated Hidden Markov Model (HMM and Bayes Packet Classifier based Gaussian distribution factor to detect and respond to the App-DDoS attacks if they occur during a flash crowd event for both dynamic and stationary objects.

  17. 14 CFR 43.7 - Persons authorized to approve aircraft, airframes, aircraft engines, propellers, appliances, or...

    Science.gov (United States)

    2010-01-01

    ..., airframes, aircraft engines, propellers, appliances, or component parts for return to service after... Administrator, may approve an aircraft, airframe, aircraft engine, propeller, appliance, or component part for..., airframe, aircraft engine, propeller, appliance, or component part for return to service as provided...

  18. 77 FR 1626 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2012-01-11

    ... Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration (FAA), DOT... various aircraft equipped with Rotax Aircraft Engines 912 A series engine. This AD results from mandatory... Rotax Aircraft Engines BRP has issued Alert Service Bulletin ASB- 912-059 and ASB-914-042...

  19. 76 FR 31465 - Airworthiness Directives; Various Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine

    Science.gov (United States)

    2011-06-01

    ... Aircraft Equipped With Rotax Aircraft Engines 912 A Series Engine AGENCY: Federal Aviation Administration...://www.rotax-aircraft-engines.com . You may review copies of the referenced service information at the... by examining the MCAI in the AD docket. Relevant Service Information Rotax Aircraft Engines...

  20. Analyses of Aircraft Responses to Atmospheric Turbulence

    OpenAIRE

    Van Staveren, W.H.J.J.

    2003-01-01

    The response of aircraft to stochastic atmospheric turbulence plays an important role in aircraft-design (load calculations), Flight Control System (FCS) design and flight-simulation (handling qualities research and pilot training). In order to simulate these aircraft responses, an accurate mathematical model is required. Two classical models will be discussed in this thesis, that is the Delft University of Technology (DUT) model and the Four Point Aircraft (FPA) model. Although they are well...

  1. THE AIRPORT DE-ICING OF AIRCRAFTS

    Directory of Open Access Journals (Sweden)

    Robert KONIECZKA

    2015-03-01

    Full Text Available This article provides a summary of the issues involved in de-icing several kinds of aircrafts before flight. The basic risks of an iced aircraft and the factors that can influence its intensity are stated. It discusses the methods for de-icing and protecting against ice formation on small aircrafts, helicopters, and large aircrafts. It also classifies the fluids and other methods used for these de-icing operations, and explains the characteristics and limitations of their use.

  2. Residents' Annoyance Responses to Aircraft Noise Events

    OpenAIRE

    United States, National Aeronautics and Space Administration

    1983-01-01

    In a study conducted in the vicinity of Salt Lake City International Airport, community residents reported their annoyance with individual aircraft flyovers during rating sessions conducted in their homes. Annoyance ratings were obtained at different times of the day. Aircraft noise levels were measured, and other characteristics of the aircraft were noted by trained observers. Metrics commonly used for assessing aircraft noise were compared, but none performed significantly better than A-...

  3. Detection and Defense Against Packet Drop Attack in MANET

    Directory of Open Access Journals (Sweden)

    Tariq Ahamad

    2016-02-01

    Full Text Available MANET is a temporary network for a specified work and with the enormous growth MANETs it is becoming important and simultaneously challenging to protect this network from attacks and other threats. Packet drop attack or gray hole attack is the easiest way to make a denial of service in these dynamic networks. In this attack the malicious node reflects itself as the shortest path and receives all the packets and drops the selected packets in order to give the user the service that that is not correct. It is a specific kind of attack and protects the network and user from detecting this malicious activity. In this article I have proposed an efficient for step technique that confirms that this attack can be detected and defended with least efforts and resource consumption.

  4. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  5. Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction

    Directory of Open Access Journals (Sweden)

    Changwei Liu

    2014-09-01

    Full Text Available Attackers tend to use complex techniques such as combining multi-step, multi-stage attack with anti-forensic tools to make it difficult to find incriminating evidence and reconstruct attack scenarios that can stand up to the expected level of evidence admissibility in a court of law. As a solution, we propose to integrate the legal aspects of evidence correlation into a Prolog based reasoner to address the admissibility requirements by creating most probable attack scenarios that satisfy admissibility standards for substantiating evidence. Using a prototype implementation, we show how evidence extracted by using forensic tools can be integrated with legal reasoning to reconstruct network attack scenarios. Our experiment shows this implemented reasoner can provide pre-estimate of admissibility on a digital crime towards an attacked network.

  6. The Impact of Black-Hole Attack on ZRP Protocol

    Directory of Open Access Journals (Sweden)

    CHAHIDI Badr

    2016-07-01

    Full Text Available lack of infrastructure in ad hoc networks makes their deployment easier. Each node in an ad hoc network can route data using a routing protocol, which decreases the level of security. Ad hoc networks are exposed to several attacks such as the blackhole attack. In this article, a study has been made on the impact of the attack on the hybrid routing protocol ZRP (Zone Routing Protocol. In this attack a malicious node is placed between two or more nodes in order to drop data. The trick of the attack is simple, the malicious node declares to have the most reliable way to the destination so that the wife destination chooses this path. In this study, NS2 is used to assess the impact of the attack on ZRP. Two metrics measure, namely the packet delivered ratio and end to end delay.

  7. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... migraine attack characteristics reported upon enrollment in the trial with those recorded prospectively in the trial. METHODS: Patients with migraine (n = 267) with typical visual aura in more than 30% of their attacks were enrolled from 16 centers for a clinical trial. Upon enrollment, patients provided...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  8. Detection and Isolation of Packet Dropping Attacker in MANETs

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed Abdalla

    2013-05-01

    Full Text Available Several approaches have been proposed for Intrusion Detection Systems (IDS in Mobile Ad hoc Networks (MANETs. Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM. DIPDAM mechanism based on three ID messages Path Validation Message (PVM , Attacker Finder Message (AFM and Attacker Isolation Message (AIM. DIPDAM mechanism based on End-to-End (E2E communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.

  9. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  10. Attacks on Web Based Software and Modelling Defence Mechanisms

    Directory of Open Access Journals (Sweden)

    D.R. Ingle

    2012-08-01

    Full Text Available The software life cycle was in use to develop the good software. Now a day’s the software development life cycle should incorporate the security features. Input Validation Attacks are one of the most wide spread forms of vulnerability on the Web application. Our main intention is to focuses on detection and prevention of Input Validation attacks like SQL Injection, Cross Site Scripting and Buffer Overflow by incorporating security in software development life cycle. We have introduced a novel approach of preclusion and uncovering of Input Validation Attacks. SQL Injection , Cross Site Scripting, A buffer overflow attacks, experimentations are made to do these attacks on various sides and the defense mechanism model is proposed to avoid these attacks on the code.

  11. Attacker Control and Impact for Confidentiality and Integrity

    CERN Document Server

    Askarov, Aslan

    2011-01-01

    Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security-typed languages have therefore introduced declassification mechanisms for relaxing confidentiality policies, and endorsement mechanisms for relaxing integrity policies. However, a continuing challenge has been to define what security is guaranteed when such mechanisms are used. This paper presents a new semantic framework for expressing security policies for declassification and endorsement in a language-based setting. The key insight is that security can be characterized in terms of the influence that declassification and endorsement allow to the attacker. The new framework introduces two notions of security to describe the influence of the attacker. Attacker control defines what the attacker is able to learn from observable effects of this code; attacker impact captures the attacker's influence on trusted locations. This ap...

  12. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  13. REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

    Directory of Open Access Journals (Sweden)

    Wesam Bhaya

    2014-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS overwhelm network resources with useless or harmful packets and prevent normal users from accessing these network resources. These attacks jeopardize the confidentiality, privacy and integrity of information on the internet. Since it is very difficult to set any predefined rules to correctly identify genuine network traffic, an anomaly-based Intrusion Detection System (IDS for network security is commonly used to detect and prevent new DDoS attacks. Data mining methods can be used in intrusion detection systems, such as clustering k-means, artificial neural network. Since the clustering methods can be used to aggregate similar objects, they can detect DDoS attacks to reduce false-positive rates. In this study, a review of DDoS attacks using clustering data mining techniques is presented. A review illustrates the most recent, state-of-the art science for clustering techniques to detect DDoS attacks.

  14. Quantitative Inspection Technologies for Aging Military Aircraft

    Science.gov (United States)

    2013-11-01

    177 Figure 133. Aircraft Mockup With EDM Notches Marked As Red Dots And Numbered In Magnified Photos...178 ix Approved for public release; distribution is unlimited Figure 134. First Test Of The Pantograph Scanner On The Mockup Aircraft...180 Figure 137. CAD Model Of Arc Scanner And Simulated Aircraft Fitting Mockup Panel ..................................... 181 Figure 138

  15. Policy and the evaluation of aircraft noise

    NARCIS (Netherlands)

    Kroesen, M.; Molin, E.J.E.; Van Wee, G.P.

    2010-01-01

    In this paper, we hypothesize and test the ideas that (1) people’s subjectivity in relation to aircraft noise is shaped by the policy discourse, (2) this results in a limited number of frames towards aircraft noise, (3) the frames inform people how to think and feel about aircraft noise and (4) the

  16. 19 CFR 122.37 - Precleared aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Precleared aircraft. 122.37 Section 122.37 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Landing Requirements § 122.37 Precleared aircraft. (a) Application. This section applies when aircraft carrying...

  17. 19 CFR 122.64 - Other aircraft.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Other aircraft. 122.64 Section 122.64 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY AIR COMMERCE REGULATIONS Clearance of Aircraft and Permission To Depart § 122.64 Other aircraft. Clearance or permission to depart shall be...

  18. Analyses of Aircraft Responses to Atmospheric Turbulence

    NARCIS (Netherlands)

    Van Staveren, W.H.J.J.

    2003-01-01

    The response of aircraft to stochastic atmospheric turbulence plays an important role in aircraft-design (load calculations), Flight Control System (FCS) design and flight-simulation (handling qualities research and pilot training). In order to simulate these aircraft responses, an accurate mathemat

  19. 14 CFR 91.117 - Aircraft speed.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Aircraft speed. 91.117 Section 91.117... speed. (a) Unless otherwise authorized by the Administrator, no person may operate an aircraft below 10... than the maximum speed prescribed in this section, the aircraft may be operated at that minimum speed....

  20. Breakdown of an Inhomogeneous Scale- Free Network Under Intentional Attack

    Institute of Scientific and Technical Information of China (English)

    LIN Guo-Ji; CHENG Xiang; OU-YANG Qi

    2003-01-01

    Using a recently introduced network model with node and connection diversity, we study the breakdown of different scale-free networks under intentional attacks. Our simulation results show that inhomogeneous networks are more sensitive to intentional attack than the homogeneous ones and that the centralization of the networks is an important variable, reflecting the characteristics of the network under intentional attack. Using a recently introduced method we can theoretically develop the critical point of the inhomogeneous networks.

  1. Cooperative Defense Against DDoS Attack using GOSSIP Protocol

    OpenAIRE

    Sohail, Imran; Hayat,Sikandar

    2009-01-01

    The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.

  2. Participant attack on quantum secret sharing based on entanglement swapping

    Institute of Scientific and Technical Information of China (English)

    Song Ting-Ting; Zhang Jie; Gao Fei; Wen Qiao-Yan; Zhu Fu-Chen

    2009-01-01

    The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented.In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller,and it will not be detected by any othcr users.Furthermore,by modifying the distribution process of particles and adding a detection step after each distribution process,we propose an improved protocol which can resist this kind of attack.

  3. Non-harmful insertion of data mimicking computer network attacks

    Energy Technology Data Exchange (ETDEWEB)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  4. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network

    Science.gov (United States)

    2014-02-01

    ping-o-death. html. [40] S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, “TCP Con- gestion Control with a Misbehaving Receiver,” ACM SIGCOMM CCR...forcing them to choose guard nodes in control of the adversary. Finally, we discuss defenses against the Sniper Attack that provably render the attack...in control of the adversary. Our attack thus imposes real, significant threats to Tor’s users,1 and we believe it constitutes the most devastating

  5. New trends in Internet attacks: Clickjacking in detail

    OpenAIRE

    Thoresen, Torgeir Dahlqvist

    2009-01-01

    While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we investigate and describe clickjacking in great detail. To our knowledge, this work represent the first systematic scientific approach to assess clickjacking that also consider the attack's social consequences for users' security through an experiment and survey. We address the...

  6. Securing Oracle Database from Search Engines Attack

    Directory of Open Access Journals (Sweden)

    N. M. A. Ayad

    2012-09-01

    Full Text Available Database security has recently become A victim of misused search engines. This can be accomplished simply by searching for a URL containing the name of the vulnerable web page or application. Oracle ships several sample web applications along with its databases. The security holes in these applications allow a web user to exploit SQL Injection to submit arbitrary SQL statements to the database. These applications are enabled by default, listening on port 7777, and known to be vulnerable to SQL Injection. This paper focuses on exploiting search engines to attack oracle database using SQL injection technique from web applications, when a website is vulnerable by SQL injection and this side is connected by oracle database vulnerable by SQL injection.

  7. Inorganic nanoparticles engineered to attack bacteria.

    Science.gov (United States)

    Miller, Kristen P; Wang, Lei; Benicewicz, Brian C; Decho, Alan W

    2015-11-01

    Antibiotics were once the golden bullet to constrain infectious bacteria. However, the rapid and continuing emergence of antibiotic resistance (AR) among infectious microbial pathogens has questioned the future utility of antibiotics. This dilemma has recently fueled the marriage of the disparate fields of nanochemistry and antibiotics. Nanoparticles and other types of nanomaterials have been extensively developed for drug delivery to eukaryotic cells. However, bacteria have very different cellular architectures than eukaryotic cells. This review addresses the chemistry of nanoparticle-based antibiotic carriers, and how their technical capabilities are now being re-engineered to attack, kill, but also non-lethally manipulate the physiologies of bacteria. This review also discusses the surface functionalization of inorganic nanoparticles with small ligand molecules, polymers, and charged moieties to achieve drug loading and controllable release.

  8. Attacks on lexical natural language steganography systems

    Science.gov (United States)

    Taskiran, Cuneyt M.; Topkara, Umut; Topkara, Mercan; Delp, Edward J.

    2006-02-01

    Text data forms the largest bulk of digital data that people encounter and exchange daily. For this reason the potential usage of text data as a covert channel for secret communication is an imminent concern. Even though information hiding into natural language text has started to attract great interest, there has been no study on attacks against these applications. In this paper we examine the robustness of lexical steganography systems.In this paper we used a universal steganalysis method based on language models and support vector machines to differentiate sentences modified by a lexical steganography algorithm from unmodified sentences. The experimental accuracy of our method on classification of steganographically modified sentences was 84.9%. On classification of isolated sentences we obtained a high recall rate whereas the precision was low.

  9. [Acute ischemic proctitis following an epileptic attack

    DEFF Research Database (Denmark)

    Klintmann, C.K.; Hillingso, J.G.; Glenthøj, Andreas

    2008-01-01

    Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal circulat......Acute ischemic proctitis is a rare diagnosis mainly because the rectum is supplied by an extensive arterial network. Consequently, in more than 90% of patients with ischemic colitis the rectum is spared. Previously reported cases are related to severe vascular insufficiency of the rectal...... circulation caused by systemic atherosclerosis, usually following aortic or aortoiliac operations. We report one case of acute ischemic proctitis following an epileptic attack Udgivelsesdato: 2008/9/29...

  10. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  11. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  12. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  13. [Cerebral infarction and transient ischemic attack].

    Science.gov (United States)

    Sahara, Noriyuki; Kuwashiro, Takahiro; Okada, Yasushi

    2016-04-01

    Japanese Guidelines for the Management of Stroke 2015 was published. Here, we describe several points revised from the 2009 edition about "Cerebral infarction and transient ischemic attack (TIA)". The revision points are as follows; 1. Extension of possible time window of intravenous recombinant tissue-plasminogen activator treatment (from within 3 hours to within 4.5 hours); 2. Antiplatelet therapy in acute stage (dual antiplatelet therapy (DAPT) for non-cardioembolic ischemic stroke or TIA); 3. Endovascular recanalization therapy in acute stage; 4. Antiplatelet therapy in chronic stage (Cilostazol is recommended similar to aspirin or clopidogrel); 5. Non-vitamin K antagonist oral anticoagulants (NOACs) for non-valvular atrial fibrillation (NVAF) stroke or TIA patients; 6. Management of TIA. We explain the revised points of the guideline in the text.

  14. Feasible attack on detector-device-independent quantum key distribution.

    Science.gov (United States)

    Wei, Kejin; Liu, Hongwei; Ma, Haiqiang; Yang, Xiuqing; Zhang, Yong; Sun, Yongmei; Xiao, Jinghua; Ji, Yuefeng

    2017-03-27

    Recently, to bridge the gap between security of Measurement-device-independent quantum key distribution (MDI-QKD) and a high key rate, a novel protocol, the so-called detector-device-independent QKD (DDI-QKD), has been independently proposed by several groups and has attracted great interest. A higher key rate is obtained, since a single photon bell state measurement (BSM) setup is applied to DDI-QKD. Subsequently, Qi has proposed two attacks for this protocol. However, the first attack, in which Bob's BSM setup is assumed to be completely a "black box", is easily prevented by using some additional monitoring devices or by specifically characterizing the BSM. The second attack, which combines the blinding attack and the detector wavelength-dependent efficiency, is not explicitly discussed, and its feasibility is not experimentally confirmed. Here, we show that the second attack is not technically viable because of an intrinsically wavelength-dependent property of a realistic beam splitter, which is an essential component in DDI-QKD. Moreover, we propose a feasible attack that combines a well-known attack-detector blinding attack with intrinsic imperfections of single-photon detectors. The experimental measurement and proof-of-principle test results confirm that our attack can allow Eve to get a copy of quantum keys without being detected and that it is feasible with current technology.

  15. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    The paper assumes that some people, at least, are liable to attack in war. In a number of ways, this is an ambiguous statement, so before proceeding, I need to clarify the specific senses in which I shall generally be using the terms "liable" and "attack." When I write that "S is liable to military...... attack," I mean that S has forfeited his or her right not to be attacked by armed forces. Here, "liable" is used in a normative-cum-legal sense, not descriptively as it is when one says "some colors are liable to darken in perpetual shade," and "attack" is used passively, as an equivalent of be attacked....... Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...

  16. PASSWORD BASED SCHEME AND GROUP TESTING FOR DEFENDING DDOS ATTACKS

    Directory of Open Access Journals (Sweden)

    Ravinuthala Sruthi

    2013-06-01

    Full Text Available DOS ATTACKS ARE ONE OF THE TOP SECURITY PROBLEMS AFFECTING NETWORKS AND DISRUPTING SERVICES TO LEGITIMATE USERS. THE VITAL STEP IN DEALING WITH THIS PROBLEM IS THE NETWORK'S ABILITY TO DETECT SUCH ATTACKS. APPLICATION DDOS ATTACK, WHICH AIMS AT DISRUPTING APPLICATION SERVICE RATHER THAN DEPLETING THE NETWORK RESOURCE. UP TO NOW ALL THE RESEARCHES MADE ON THIS DDOS ATTACKS ONLY CONCENTRATES EITHER ON NETWORK RESOURCES OR ON APPLICATION SERVERS BUT NOT ON BOTH. IN THIS PAPER WE PROPOSED A SOLUTION FOR BOTH THESE PROBLEMS BY AUTHENTICATION METHODS AND GROUP TESTING.

  17. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  18. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  19. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  20. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  1. Performance analysis of black hole attacks in geographical routing MANET

    Directory of Open Access Journals (Sweden)

    H.J Shanthi

    2014-10-01

    Full Text Available The MANET (Mobile Adhoc Network is vulnerable to several types of attacks. The most commonly classified attack is black hole attack, which is carried by single or multiple attackers, advertising itself of having a short fresh route to transmit data. The aim is to ensure security against the black hole attack and analyze the performance in geographical routing. The simple method is to send data as small blocks instead of entire data. The traffic is monitored independently in its neighborhood. The mechanism uses geographic information to detect variance in neighbor relations and node movements. We analyze the black hole attack in two popular location based protocol LAR and DREAM. It provides the stimulation study of black hole attack with the minimum attacker and also provides analysis on the parameters such as throughput, packet delivery and delay done with OMNET++ simulator. The simulation results show that packet loss increases and throughput decreases in the network with a black hole node in geographical routing. The proposed mechanism can be combined with existent routing protocols to defend against black hole attacks.

  2. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  3. Intrusions into Privacy in Video Chat Environments: Attacks and Countermeasures

    CERN Document Server

    Xing, Xinyu; Han, Richard; Liu, Xue; Mishra, Shivakant

    2010-01-01

    Video chat systems such as Chatroulette have become increasingly popular as a way to meet and converse one-on-one via video and audio with other users online in an open and interactive manner. At the same time, security and privacy concerns inherent in such communication have been little explored. This paper presents one of the first investigations of the privacy threats found in such video chat systems, identifying three such threats, namely de-anonymization attacks, phishing attacks, and man-in-the-middle attacks. The paper further describes countermeasures against each of these attacks.

  4. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  5. The timing of terrorist attacks: An optimal stopping approach

    Directory of Open Access Journals (Sweden)

    Thomas Jensen

    2016-02-01

    Full Text Available I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later.

  6. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore...

  7. Fake BTS Attacks of GSM System on Software Radio Platform

    Directory of Open Access Journals (Sweden)

    Yubo Song

    2012-02-01

    Full Text Available The 2G GSM communication system only provides one-way authentication mechanism which just authenticate the identities of mobile users. As we know, this is not resistant to fake BTS attack. But for the huge cost for building a fake BTS before, this kind of attack were not really implemented before. This paper presents an implement of fake BTS based on software radio technologies. Furthermore, this paper discusses two types of fake BTS attacks on our software radio platform. The first attack is IMSI/IMEI catch attack, which can get the mobile phone’s IMSI and IMEI. With this information, attacker can got the track of the man with this phone. The second attack is selective jamming attack. After get the IMSI and IMEI of the mobile phone, the attackers can decide whether the mobile phone is blocked or not. We will analyze the GSM protocol which is relevant to the interception system and later present the performance of such a system by real tests and demonstrate its feasibility.

  8. Impact Analysis of Recent DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Ketki Arora

    2011-02-01

    Full Text Available In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replacedby cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. Denial-of-service attack is one of them, which poses immense threat on the availability. Since, the World is highly dependent on the Internet, availability of the Internet is very critical for the socio-economic growth of the society. Denial-of-service attacks occur almost every day,and the frequency and the volume of these attacks are increasing day by day. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputationissues, most of the commercial sites do not even disclose that they were blitzed by such attacks. Details of attacks can guide very well in the formulation of comprehensive defensive solution for such attacks. In this paper, an overview on DDoS problem, major factors causing DDoS attacks are demonstrated, brief detail of most recent DDoS incidents on online organizations is outlined and finally, the need for a comprehensive distributed solution is highlighted.

  9. An Improved Model of Attack Probability Prediction System

    Institute of Scientific and Technical Information of China (English)

    WANG Hui; LIU Shufen; ZHANG Xinjia

    2006-01-01

    This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.

  10. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  11. Prevention Of WormholeAttacks In Geographic Routing Protocol

    Directory of Open Access Journals (Sweden)

    E.Poornima,

    2011-01-01

    Full Text Available As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSRprotocol and analysis and simulations are performed in network simulator (NS-2.

  12. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  13. MATE. Multi Aircraft Training Environment

    DEFF Research Database (Denmark)

    Hauland, G.; Bove, T.; Andersen, Henning Boje

    2002-01-01

    . The cockpit switches and instruments in MATE are computer-generated graphics. The graphics are back projected onto semi-transparent touch screen panels in a hybrid cockpit mock-up. Thus, the MATE is relativelycheap, it is always available, it is reconfigurable (e.g. between types of aircraft...

  14. Aircraft Lightning Electromagnetic Environment Measurement

    Science.gov (United States)

    Ely, Jay J.; Nguyen, Truong X.; Szatkowski, George N.

    2011-01-01

    This paper outlines a NASA project plan for demonstrating a prototype lightning strike measurement system that is suitable for installation onto research aircraft that already operate in thunderstorms. This work builds upon past data from the NASA F106, FAA CV-580, and Transall C-180 flight projects, SAE ARP5412, and the European ILDAS Program. The primary focus is to capture airframe current waveforms during attachment, but may also consider pre and post-attachment current, electric field, and radiated field phenomena. New sensor technologies are being developed for this system, including a fiber-optic Faraday polarization sensor that measures lightning current waveforms from DC to over several Megahertz, and has dynamic range covering hundreds-of-volts to tens-of-thousands-of-volts. A study of the electromagnetic emission spectrum of lightning (including radio wave, microwave, optical, X-Rays and Gamma-Rays), and a compilation of aircraft transfer-function data (including composite aircraft) are included, to aid in the development of other new lightning environment sensors, their placement on-board research aircraft, and triggering of the onboard instrumentation system. The instrumentation system will leverage recent advances in high-speed, high dynamic range, deep memory data acquisition equipment, and fiber-optic interconnect.

  15. Human Response to Aircraft Noise

    NARCIS (Netherlands)

    Kroesen, M.

    2011-01-01

    How can it be that one person is extremely annoyed by the sounds of aircrafts, while his neighbour claims not to be bothered at all? The present thesis attempts to explain this observation by applying a range of quantitative methods to field data gathered among residents living near large airports.

  16. Aircraft Natural/Artificial Icing

    Science.gov (United States)

    2009-02-12

    axial vibration is caused by an oscillator driving a coil in the probe to create a magnetostrictive force. A sensing coil within the probe senses the...Consequence TOP 7-3-537 12 February 2009 C-1 APPENDIX C. ICING TEST SITE SELECTION 1. INTRODUCTION Unlike large fixed-wing aircraft, helicopters

  17. Aircraft Simulators and Pilot Training.

    Science.gov (United States)

    Caro, Paul W.

    Flight simulators are built as realistically as possible, presumably to enhance their training value. Yet, their training value is determined by the way they are used. Traditionally, simulators have been less important for training than have aircraft, but they are currently emerging as primary pilot training vehicles. This new emphasis is an…

  18. Survival analysis of aging aircraft

    Science.gov (United States)

    Benavides, Samuel

    This study pushes systems engineering of aging aircraft beyond the boundaries of empirical and deterministic modeling by making a sharp break with the traditional laboratory-derived corrosion prediction algorithms that have shrouded real-world failures of aircraft structure. At the heart of this problem is the aeronautical industry's inability to be forthcoming in an accurate model that predicts corrosion failures in aircraft in spite of advances in corrosion algorithms or improvements in simulation and modeling. The struggle to develop accurate corrosion probabilistic models stems from a multitude of real-world interacting variables that synergistically influence corrosion in convoluted and complex ways. This dissertation, in essence, offers a statistical framework for the analysis of structural airframe corrosion failure by utilizing real-world data while considering the effects of interacting corrosion variables. This study injects realism into corrosion failures of aging aircraft systems by accomplishing four major goals related to the conceptual and methodological framework of corrosion modeling. First, this work connects corrosion modeling from the traditional, laboratory derived algorithms to corrosion failures in actual operating aircraft. This work augments physics-based modeling by examining the many confounding and interacting variables, such as environmental, geographical and operational, that impact failure of airframe structure. Examined through the lens of censored failure data from aircraft flying in a maritime environment, this study enhances the understanding between the triad of the theoretical, laboratory and real-world corrosion. Secondly, this study explores the importation and successful application of an advanced biomedical statistical tool---survival analysis---to model censored corrosion failure data. This well-grounded statistical methodology is inverted from a methodology that analyzes survival to one that examines failures. Third, this

  19. Factors influencing aircraft ground handling performance

    Science.gov (United States)

    Yager, T. J.

    1983-01-01

    Problems associated with aircraft ground handling operations on wet runways are discussed and major factors which influence tire/runway braking and cornering traction capability are identified including runway characteristics, tire hydroplaning, brake system anomalies, and pilot inputs. Research results from tests with instrumented ground vehicles and aircraft, and aircraft wet runway accident investigation are summarized to indicate the effects of different aircraft, tire, and runway parameters. Several promising means are described for improving tire/runway water drainage capability, brake system efficiency, and pilot training to help optimize aircraft traction performance on wet runways.

  20. Hydrogen Storage for Aircraft Applications Overview

    Science.gov (United States)

    Colozza, Anthony J.; Kohout, Lisa (Technical Monitor)

    2002-01-01

    Advances in fuel cell technology have brought about their consideration as sources of power for aircraft. This power can be utilized to run aircraft systems or even provide propulsion power. One of the key obstacles to utilizing fuel cells on aircraft is the storage of hydrogen. An overview of the potential methods of hydrogen storage was compiled. This overview identifies various methods of hydrogen storage and points out their advantages and disadvantages relative to aircraft applications. Minimizing weight and volume are the key aspects to storing hydrogen within an aircraft. An analysis was performed to show how changes in certain parameters of a given storage system affect its mass and volume.

  1. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  2. Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks

    OpenAIRE

    Yang Lu; Jiguo Li

    2014-01-01

    Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in certificate-based cryptography, certificate-based signcryption preserves the merits of certificate-based cryptography and signcryption simultaneously. In this paper, we present an improved security model of certificate-based signcryption that covers both public key replacement attack and insider security. We show that an existing certific...

  3. Words Mean Things: The Case for Information System Attack and Control System Attack

    Science.gov (United States)

    2008-10-31

    databases , reservation system, documents, web pages…”ix On the other hand, infrastructure control systems interact with the physical world, and...Week and Space Technology, 4 September 2002, 3, EBSCOhost (accessed 8 September 2008). xxvii Barnes, Julian E., “Hacking Could Become Weapon in...September 2002, EBSCOhost (accessed 8 September 2008). Gibson, Tim, “What You Should Know About Attacking Computer Networks

  4. Toward Improved CFD Predictions of Slender Airframe Aerodynamics Using the F-16XL Aircraft (CAWAPI-2)

    Science.gov (United States)

    Luckring, James M.; Rizzi, Arthur; Davis, M. Bruce

    2014-01-01

    A coordinated project has been underway to improve CFD predictions of slender airframe aerodynamics. The work is focused on two flow conditions and leverages a unique flight data set obtained with an F-16XL aircraft. These conditions, a low-speed high angleof- attack case and a transonic low angle-of-attack case, were selected from a prior prediction campaign wherein the CFD failed to provide acceptable results. In this paper the background, objectives and approach to the current project are presented. The work embodies predictions from multiple numerical formulations that are contributed from multiple organizations, and the context of this campaign to other multi-code, multiorganizational efforts is included. The relevance of this body of work toward future supersonic commercial transport concepts is also briefly addressed.

  5. New Systematic CFD Methods to Calculate Static and Single Dynamic Stability Derivatives of Aircraft

    Directory of Open Access Journals (Sweden)

    Bai-gang Mi

    2017-01-01

    Full Text Available Several new systematic methods for high fidelity and reliability calculation of static and single dynamic derivatives are proposed in this paper. Angle of attack step response is used to obtain static derivative directly; then translation acceleration dynamic derivative and rotary dynamic derivative can be calculated by employing the step response motion of rate of the angle of attack and unsteady motion of pitching angular velocity step response, respectively. Longitudinal stability derivative calculations of SACCON UCAV are taken as test cases for validation. Numerical results of all cases achieve good agreement with reference values or experiments data from wind tunnel, which indicate that the proposed methods can be considered as new tools in the process of design and production of advanced aircrafts for their high efficiency and precision.

  6. A Synthesis of Hybrid RANS/LES CFD Results for F-16XL Aircraft Aerodynamics

    Science.gov (United States)

    Luckring, James M.; Park, Michael A.; Hitzel, Stephan M.; Jirasek, Adam; Lofthouse, Andrew J.; Morton, Scott A.; McDaniel, David R.; Rizzi, Arthur M.

    2015-01-01

    A synthesis is presented of recent numerical predictions for the F-16XL aircraft flow fields and aerodynamics. The computational results were all performed with hybrid RANS/LES formulations, with an emphasis on unsteady flows and subsequent aerodynamics, and results from five computational methods are included. The work was focused on one particular low-speed, high angle-of-attack flight test condition, and comparisons against flight-test data are included. This work represents the third coordinated effort using the F-16XL aircraft, and a unique flight-test data set, to advance our knowledge of slender airframe aerodynamics as well as our capability for predicting these aerodynamics with advanced CFD formulations. The prior efforts were identified as Cranked Arrow Wing Aerodynamics Project International, with the acronyms CAWAPI and CAWAPI-2. All information in this paper is in the public domain.

  7. Disorienting effects of aircraft catapult launchings: III. Cockpit displays and piloting performance.

    Science.gov (United States)

    Cohen, M M

    1977-09-01

    Accelerations closely approximating those encountered in catapult launchings of carrier-based aircraft were generated on the Naval Air Development Center's human centrifuge Dynamic Flight Simulator. Flight instruments, controls, and flight dynamics of an A-7 aircraft were provided to four experienced Naval Aviators, who exercised closed-loop control of a simulated climbout immediately after they were exposed to the accelerations. Four experimental conditions were employed for each aviator: 1) no operational flight instruments, 2) conventional flight instruments, 3) a single carrier takeoff director display operating concurrently. Measures of flight parameters, including indicated airspeed, angle of attack, rate of climb, altitude, pitch attitude, and pitch trim adjustment were monitored throughout the simulation. Subjective reactions and piloting performance were examined under each of the four conditions. Results indicate that the carrier takeoff director display significantly reduced pilot workload and enhanced performance during the climbout.

  8. Optimization via CFD of aircraft hot-air anti-icing systems

    Science.gov (United States)

    Pellissier, Mathieu Paul Constantin

    In-flight icing is a major concern in aircraft safety and a non-negligible source of incidents and accidents, and is still a serious hazard today. It remains consequently a design and certification challenge for aircraft manufacturers. The aerodynamic performance of an aircraft can indeed degrade rapidly when flying in icing conditions, leading to incidents or accidents. In-flight icing occurs when an aircraft passes through clouds containing supercooled water droplets at or below freezing temperature. Droplets impinge on its exposed surfaces and freeze, causing roughness and shape changes that increase drag, decrease lift and reduce the stall angle of attack, eventually inducing flow separation and stall. This hazardous ice accretion is prevented by the use of dedicated anti-icing systems, among which hot-air-types are the most common for turbofan aircraft. This work presents a methodology for the optimization of such aircraft hot-air-type anti-icing systems, known as Piccolo tubes. Having identified through 3D Computational Fluid Dynamics (CFD) the most critical in-flight icing conditions, as well as determined thermal power constraints, the objective is to optimize the heat distribution in such a way to minimize power requirements, while meeting or exceeding all safety regulation requirements. To accomplish this, an optimization method combining 3D CFD, Reduced-Order Models (ROM) and Genetic Algorithms (GA) is constructed to determine the optimal configuration of the Piccolo tube (angles of jets, spacing between holes, and position from leading edge). The methodology successfully results in increasingly optimal configurations from three up to five design variables.

  9. Pattern association--a key to recognition of shark attacks.

    Science.gov (United States)

    Cirillo, G; James, H

    2004-12-01

    Investigation of a number of shark attacks in South Australian waters has lead to recognition of pattern similarities on equipment recovered from the scene of such attacks. Six cases are presented in which a common pattern of striations has been noted.

  10. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin;

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  11. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  12. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that...

  13. Understanding bifurcation of slow versus fast cyber-attackers

    NARCIS (Netherlands)

    Wieren, van Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab” cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats” on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the att

  14. Transforming graphical system models to graphical attack models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that he

  15. Ethical Considerations of Computer Network Attack in Information Warfare

    Science.gov (United States)

    2001-01-16

    attack/destruction, and special information operations (SIO). CNA and the other methods of offensive IO represent the incorporation of information...psychological operations, electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network...to computer networks to record information sent over them. 41 special information operations. Information operations that by their sensitive nature

  16. Survey of Attacks on Mobile AdhocWireless Networks

    Directory of Open Access Journals (Sweden)

    Vikas Solomon Abel

    2011-02-01

    Full Text Available Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also security is an important issue keeping in view the Internet connectivity and attack on the MANET protocols.

  17. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary;

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  18. Defensive Cyber Battle Damage Assessment Through Attack Methodology Modeling

    Science.gov (United States)

    2011-03-25

    3 focuses on steganography use. Table 30. DCBDA Experiment ASL. Scenario 1 Scenario 2 Scenario 3 Covering Tracks Covering Tracks Covering Tracks...Covert Channel Log Obfuscation Hide Attack Data ICMP Covert Channel Disable Auditing Steganography Persistent Access Obfuscation Hide Attack Data...Marker Forensic Tool Suspicious files/sizes Steganography Suspicious files/sizes Stegdetect Suspicious files/sizes Steganography Suspicious files

  19. Hereditary Angioedema Attacks: Local Swelling at Multiple Sites.

    Science.gov (United States)

    Hofman, Zonne L M; Relan, Anurag; Hack, C Erik

    2016-02-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may also involve multiple anatomical sites simultaneously. A detailed description of such multi-location attacks is currently lacking. This study investigated the occurrence, severity and clinical course of HAE attacks with multiple anatomical locations. HAE patients included in a clinical database of recombinant human C1-inhibitor (rhC1INH) studies were evaluated. Visual analog scale scores filled out by the patients for various symptoms at various locations and investigator symptoms scores during the attack were analysed. Data of 219 eligible attacks in 119 patients was analysed. Thirty-three patients (28%) had symptoms at multiple locations in anatomically unrelated regions at the same time during their first attack. Up to five simultaneously affected locations were reported. The observation that severe HAE attacks often affect multiple sites in the body suggests that HAE symptoms result from a systemic rather than from a local process as is currently believed.

  20. Hereditary Angioedema Attacks : Local Swelling at Multiple Sites

    NARCIS (Netherlands)

    Hofman, Zonne L M; Relan, Anurag; Hack, C. Erik

    2016-01-01

    Hereditary angioedema (HAE) patients experience recurrent local swelling in various parts of the body including painful swelling of the intestine and life-threatening laryngeal oedema. Most HAE literature is about attacks located in one anatomical site, though it is mentioned that HAE attacks may al

  1. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  2. Refractory Degradation by Slag Attack in Coal Gasification

    Science.gov (United States)

    2009-02-01

    REFRACTORY DEGRADATION BY SLAG ATTACK IN COAL GASIFICATION Jinichiro Nakano 1,2 , Sridhar Seetharaman 1,2 , James Bennett 3 , Kyei-Sing...00-2009 4. TITLE AND SUBTITLE Refractory Degradation by Slag Attack in Coal Gasification 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM

  3. An active attack on a multiparty key exchange protocol

    Directory of Open Access Journals (Sweden)

    Reto Schnyder

    2016-01-01

    Full Text Available The multiparty key exchange introduced in Steiner et al. and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

  4. Correct-by-Construction Attack-Tolerant Systems

    Science.gov (United States)

    2015-05-01

    for rendering systems Byzantine fault tolerant and to ideas for monitoring distributed system behavior and responding to unusual events . We believe...attack-tolerance, fault tolerant systems, correct-by-construction protocols, formal methods, event logic, functional distributed processes, cyber...nation’s ability to use advanced computer science and substantial computing power to enhance the ability of our systems to detect attacks and

  5. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  6. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  7. [Banana tree pests attacking Heliconia latispatha Benth. (Heliconiaceae)].

    Science.gov (United States)

    Watanabe, Maria A

    2007-01-01

    In mid-May 2005, the caterpillars Antichloris eriphia (Fabr.) (Lepidoptera: Arctiidae) and Calligo illioneus (Cramer) (Lepidoptera: Nymphalidae) which are banana tree pests, were found attacking six-month old stalks of Heliconia latispatha Benth., planted near a banana tree plantation in Jaguariuna, SP, Brazil. The attack by C. illioneus is observed by the first time in Brazil.

  8. Air Superiority and Airfield Attack - Lessons from History.

    Science.gov (United States)

    1984-05-15

    operation carried out as a surprise attack on German airfields on a 1200 kilometer-wide front from Smolensk to the Sea of Azov . This operation was to combine...damaged. EAF gun camera films show the attack at Ras Nasrani and explosions on the taxiways. They also show two Mirage fighters becoming airborne

  9. Performance evaluation of DSR Protocol under DoS attack

    Directory of Open Access Journals (Sweden)

    Ms. Trupti Patel

    2012-03-01

    Full Text Available A mobile ad-hoc network (MANET consists of mobile hosts equipped with wireless communication devices. A Mobile Ad hoc Network is a self-organizing, infrastructure less, multi-hop network. The transmission of a mobile host is received by all hosts within its transmission range due to the broadcast nature of wireless communication and unidirectional antenna. If two wireless hosts are out of their transmission ranges in the ad hoc networks, other mobile hosts located between them can forward their message, which effectively builds connected networks among the mobile hosts in the deployed area. One main challenge in design of these networks is their vulnerable nature to security attack. These attacks can be deployed by insider or outsider attacker. Sometime, the node from network can be attacker. This is happen because of mobility of nodes and changing network topology. There are different kind of attacks available in literature and can be implemented on MANET. One of these attacks is Grey Hole attack that has dangerous effect on Mobile Ad-Hoc Network. In this paper, we study the effect of Grey Hole attack on Dynamic Source Routing (DSR protocol in Mobile Ad-Hoc Network.

  10. A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    DR. N. SATYANARAYANA

    2010-12-01

    Full Text Available Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc Flooding Attack (AHFA, can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP, a generic defense against the Ad Hoc Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad Hoc Flooding attack efficiently.

  11. New Attacks on Animal Researchers Provoke Anger and Worry

    Science.gov (United States)

    Guterman, Lila

    2008-01-01

    This article reports on firebomb attacks at the homes of two animal researchers which have provoked anger and unease. The firebomb attacks, which set the home of a neuroscientist at the University of California at Santa Cruz aflame and destroyed a car parked in the driveway of another university researcher's home, have left researchers and…

  12. Aircraft systems design methodology and dispatch reliability prediction

    OpenAIRE

    Bineid, Mansour

    2005-01-01

    Aircraft despatch reliability was the main subject of this research in the wider content of aircraft reliability. The factors effecting dispatch reliability, aircraft delay, causes of aircraft delays, and aircraft delay costs and magnitudes were examined. Delay cost elements and aircraft delay scenarios were also studied. It concluded that aircraft dispatch reliability is affected by technical and non-technical factors, and that the former are under the designer's control. It showed that ...

  13. Attack Vulnerability of Network with Duplication-Divergence Mechanism

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability a is more robust against target attack relatively. Furthermore, duplication-divergence network is broken down more quickly than its counterpart BA network under target attack. Such result is consistent with the fact of WWW and Internet networks under target attack. So duplication-divergence model is a more realistic one for us to investigate the characteristics of the world wide web in future. We also observe that the exponent 7 of degree distribution and average degree are important parameters of networks, reflecting the performance of networks under target attack. Our results are helpful to the research on the security of network.

  14. The research of DPA attacks against AES implementations

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations.

  15. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  16. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based......The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we...... on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among...

  17. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  18. A Robust Image Hashing Algorithm Resistant Against Geometrical Attacks

    Directory of Open Access Journals (Sweden)

    Y.L. Liu

    2013-12-01

    Full Text Available This paper proposes a robust image hashing method which is robust against common image processing attacks and geometric distortion attacks. In order to resist against geometric attacks, the log-polar mapping (LPM and contourlet transform are employed to obtain the low frequency sub-band image. Then the sub-band image is divided into some non-overlapping blocks, and low and middle frequency coefficients are selected from each block after discrete cosine transform. The singular value decomposition (SVD is applied in each block to obtain the first digit of the maximum singular value. Finally, the features are scrambled and quantized as the safe hash bits. Experimental results show that the algorithm is not only resistant against common image processing attacks and geometric distortion attacks, but also discriminative to content changes.

  19. New-Fangled Method Against Data Flooding Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Kavuri Roshan

    2012-07-01

    Full Text Available Mobile users like to use their own consumer electronic devices anywhere and at anytime to accessmultimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near futuresince these networks form the topology with low cost on the fly. However, consumer electronic devicesgenerally operate on limited battery power and therefore are vulnerable to security threats like dataflooding attacks. The data flooding attack causes Denial of Service (DoS attacks by flooding many datapackets. However, there are a few existing defence systems against data flooding attacks. Moreover, theexisting schemes may not guarantee the Quality of Service (QoS of burst traffic since multimedia data areusually burst. Therefore, we propose a novel defence mechanism against data flooding attacks with the aimof enhancing the throughput.

  20. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  1. Robustness of Complex Networks under Attack and Repair

    Institute of Scientific and Technical Information of China (English)

    HU Bin; LI Fang; ZHOU Hou-Shun

    2009-01-01

    To study the robustness of complex networks under attack and repair,we introduce a repair model of complex networks.Based on the model,we introduce two new quantities,i.e.attack fraction f_a and the maximum degree of the nodes that have never been attacked K_a,to study analytically the critical attack fraction and the relati ve size of the giant component of complex networks under attack and repair,using the method of generating function.We show analytically and numerically that the repair strategy significantly enhances the robustness of the scale-free network and the effect of robustness improvement is better for the scale-free networks with a smaller degree exponent.We discuss the application of our theory in relation to the understanding of robustness of complex networks with reparability.

  2. Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wazir Zada Khan

    2011-02-01

    Full Text Available Sensor networks are becoming closer towards wide-spread deployment so security issues become a vital concern. Selective forwarding attack is one of the harmful attacks against sensor networks and can affect the whole sensor network communication. The variety of defense approaches against selective forwarding attack is overwhelming. In this paper we have described all the existing defensive schemes according to our best knowledge against this attack along with their drawbacks, thus providing researchers a better understanding of the attack and current solution space. This paper also classifies proposed schemes according to their nature and defense. Nature of scheme classifies into Distributed and Centralized. Defense of scheme classifies into detection and prevention.

  3. Weak laws against acid attacks on women: an Indian perspective.

    Science.gov (United States)

    Ahmad, Nehaluddin

    2012-01-01

    Acid attacks, especially on women, have seen an alarming growth in India over the last decade. While these attacks can be attributed to various factors such as the social weakness of women in a male-dominated society, the situation is exacerbated by the general neglect of the lawmakers. As acid is inexpensive and easily available, it serves as an ideal weapon for the perpetrators. Further, as this offence is bailable in certain situations, the punishment does not act as a sufficient deterrent in most cases. This paper describes the horrendous effects that acid attacks have on the victims physically, psychologically and socially. It also examines the contemporary laws governing acid attacks on victims and offenders. Ideas for a better legal approach will also be examined with special reference to acid attacks as a crime, and the validity of specific legal provisions for female victims.

  4. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  5. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  6. Robustness of controllability for networks based on edge-attack.

    Science.gov (United States)

    Nie, Sen; Wang, Xuwen; Zhang, Haifeng; Li, Qilang; Wang, Binghong

    2014-01-01

    We study the controllability of networks in the process of cascading failures under two different attacking strategies, random and intentional attack, respectively. For the highest-load edge attack, it is found that the controllability of Erdős-Rényi network, that with moderate average degree, is less robust, whereas the Scale-free network with moderate power-law exponent shows strong robustness of controllability under the same attack strategy. The vulnerability of controllability under random and intentional attacks behave differently with the increasing of removal fraction, especially, we find that the robustness of control has important role in cascades for large removal fraction. The simulation results show that for Scale-free networks with various power-law exponents, the network has larger scale of cascades do not mean that there will be more increments of driver nodes. Meanwhile, the number of driver nodes in cascading failures is also related to the edges amount in strongly connected components.

  7. Impact of Multipath Routing on WSN Security Attacks

    Directory of Open Access Journals (Sweden)

    Koffka Khan

    2014-05-01

    Full Text Available Multipath routing does not minimize the consequences of security attacks. Due to this many WSNs are still in danger of most security attacks even when multipath routing is used. In critical situations, for example, in military and health applications this may lead to undesired, harmful and disastrous effects. These applications need to get their data communicated efficiently and in a secure manner. In this paper, we show the results of a series of security attacks on a multipath extension to the ad hoc on-demand distance vector AODV protocol, AOMDV. It is proved that many security parameters are negatively affected by security attacks on AOMDV, which is contradictory to research claims. This means that alternative refinements have to be made to present multipath routing protocols in order to make them more effective against network security attacks.

  8. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent;

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  9. Study on Sinkhole Attacks in Wireless Ad hoc Networks

    Directory of Open Access Journals (Sweden)

    GAGANDEEP

    2012-06-01

    Full Text Available Wireless ad hoc network is a collection of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. As compared to conventional network, wireless ad hocnetwork are more vulnerable to the security attacks. The nature and structure of wireless ad hoc network makes it very attractive to attackers, because there is no fixed infrastructure and administrativeapproach in it. “Sinkhole attack” is one of the severe attacks in this type of network; this makes trustable nodes to malicious nodes that result in loss of secure information. This paper focuses on sinkhole attacks on routing protocols such as DSR, AODV. To overcome the problems occur due to sinkhole we discuss about Security-aware routing (SAR which helps to reduce the impact of such attack.

  10. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  11. Expected losses, insurability, and benefits from reducing vulnerability to attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Nozick, Linda Karen (Cornell University, Ithaca, NY); Carlson, Rolf Erik; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2004-03-01

    A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails.

  12. Pilot Human Factors in Stall/Spin Accidents of Supersonic Fighter Aircraft

    Science.gov (United States)

    Anderson, S. B.; Enevoldson, E. K.; Nguyen, L. T.

    1983-01-01

    A study has been made of pilot human factors related to stall/spin accidents of supersonic fighter aircraft. The military specifications for flight at high angles of attack are examined. Several pilot human factors problems related to stall/spin are discussed. These problems include (1) unsatisfactory nonvisual warning cues; (2) the inability of the pilot to quickly determine if the aircraft is spinning out of control, or to recognize the type of spin; (3) the inability of the pilot to decide on and implement the correct spin recovery technique; (4) the inability of the pilot to move, caused by high angular rotation; and (5) the tendency of pilots to wait too long in deciding to abandon the irrecoverable aircraft. Psycho-physiological phenomena influencing pilot's behavior in stall/spin situations include (1) channelization of sensory inputs, (2) limitations in precisely controlling several muscular inputs, (3) inaccurate judgment of elapsed time, and (4) disorientation of vestibulo-ocular inputs. Results are given of pilot responses to all these problems in the F14A, F16/AB, and F/A-18A aircraft. The use of departure spin resistance and automatic spin prevention systems incorporated on recent supersonic fighters are discussed. These systems should help to improve the stall/spin accident record with some compromise in maneuverability.

  13. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  14. Perception of aircraft Deviation Cues

    Science.gov (United States)

    Martin, Lynne; Azuma, Ronald; Fox, Jason; Verma, Savita; Lozito, Sandra

    2005-01-01

    To begin to address the need for new displays, required by a future airspace concept to support new roles that will be assigned to flight crews, a study of potentially informative display cues was undertaken. Two cues were tested on a simple plan display - aircraft trajectory and flight corridor. Of particular interest was the speed and accuracy with which participants could detect an aircraft deviating outside its flight corridor. Presence of the trajectory cue significantly reduced participant reaction time to a deviation while the flight corridor cue did not. Although non-significant, the flight corridor cue seemed to have a relationship with the accuracy of participants judgments rather than their speed. As this is the second of a series of studies, these issues will be addressed further in future studies.

  15. CID Aircraft slap-down

    Science.gov (United States)

    1984-01-01

    In this photograph the B-720 is seen during the moments of initial impact. The left wing is digging into the lakebed while the aircraft continues sliding towards wing openers. In 1984 NASA Dryden Flight Research Facility and the Federal Aviation Administration (FAA) teamed-up in a unique flight experiment called the Controlled Impact Demonstration (CID). The test involved crashing a Boeing 720 aircraft with four JT3C-7 engines burning a mixture of standard fuel with an additive, Anti-misting Kerosene (AMK), designed to supress fire. In a typical aircraft crash, fuel spilled from ruptured fuel tanks forms a fine mist that can be ignited by a number of sources at the crash site. In 1984 the NASA Dryden Flight Research Facility (after 1994 a full-fledged Center again) and the Federal Aviation Administration (FAA) teamed-up in a unique flight experiment called the Controlled Impact Demonstration (CID), to test crash a Boeing 720 aircraft using standard fuel with an additive designed to supress fire. The additive, FM-9, a high-molecular-weight long-chain polymer, when blended with Jet-A fuel had demonstrated the capability to inhibit ignition and flame propagation of the released fuel in simulated crash tests. This anti-misting kerosene (AMK) cannot be introduced directly into a gas turbine engine due to several possible problems such as clogging of filters. The AMK must be restored to almost Jet-A before being introduced into the engine for burning. This restoration is called 'degradation' and was accomplished on the B-720 using a device called a 'degrader.' Each of the four Pratt & Whitney JT3C-7 engines had a 'degrader' built and installed by General Electric (GE) to break down and return the AMK to near Jet-A quality. In addition to the AMK research the NASA Langley Research Center was involved in a structural loads measurement experiment, which included having instrumented dummies filling the seats in the passenger compartment. Before the final flight on December 1

  16. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  17. Temporal characterization of experimental recorder attack transients.

    Science.gov (United States)

    Ernoult, A; Fabre, B

    2017-01-01

    Through the comparison of notes produced on two recorders by one novice and two experienced players in musical contexts, this study identifies the temporal aspects of the attack transients which are controlled by the player and those which are imposed by the dynamic response of the instrument. The rise times of mouth pressure used by the novice player are longer than the ones produced by the experienced players, which are the shortest ones preserving the control of the jet velocity rise times. For shortest rise times, the jet development is limited by the inertia of the channel. The onset time of the acoustic oscillation is divided in two parts: the time needed to initiate the oscillation and the duration of the growth. The times of growth are similar for the novice and the experienced players, which is linked to the similarity of the gain characterizing the linear behavior of the instrument. The times needed to initiate the oscillation show the most pronounced difference between the two types of players; it is much longer for a novice player. This difference is interpreted in terms of the initial input of energy in the system which is larger for the experienced players.

  18. Multilayer Approach to Defend Phishing Attacks

    CERN Document Server

    Dhinakaran, Cynthia; Lee, Jae Kwang

    2011-01-01

    Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; therefore a continuous evaluation of phishing only helps us combat phisher effectiveness. In our study, we collected seven hundred thousand spam from a corporate server for a period of 13 months from February 2008 to February 2009. From the collected data, we identified different kinds of phishing scams and mode of operation. Our observation shows that phishers are dynamic and depend more on social engineering techniques rather than software vulnerabilities. We believe that this study will develop more efficient anti-phishing methodologies. Based on our analysis, we developed an anti-phishing methodology and implemented in ou...

  19. Alcohol Cuts Heart Attack Risk in Men

    Institute of Scientific and Technical Information of China (English)

    Gene; Emery; 方笑丰

    2003-01-01

    选注者言:本文的主题句开门见山地告诉读者:frequent tippling(少喝常饮,常饮少量烈酒)of beer,wine or even spirits lowers a man’s risk of heart attack(心脏病发作)。但是,让我们感到不解的是文中的另一句话:alcohol affects womendifferently than men and that it would be"premature and unwise"to extrapolate(推断)the results beyond men。现代科技尚不能揭开这个谜:男性每日少量饮酒能降低心脏病的风险,而女性经常喝酒,却会增加得乳腺癌的机会。此句中的premature and unwise可以学用,而extrapolate一词则用得太文绉绉了。

  20. Node Survival in Networks under Correlated Attacks.

    Directory of Open Access Journals (Sweden)

    Yan Hao

    Full Text Available We study the interplay between correlations, dynamics, and networks for repeated attacks on a socio-economic network. As a model system we consider an insurance scheme against disasters that randomly hit nodes, where a node in need receives support from its network neighbors. The model is motivated by gift giving among the Maasai called Osotua. Survival of nodes under different disaster scenarios (uncorrelated, spatially, temporally and spatio-temporally correlated and for different network architectures are studied with agent-based numerical simulations. We find that the survival rate of a node depends dramatically on the type of correlation of the disasters: Spatially and spatio-temporally correlated disasters increase the survival rate; purely temporally correlated disasters decrease it. The type of correlation also leads to strong inequality among the surviving nodes. We introduce the concept of disaster masking to explain some of the results of our simulations. We also analyze the subsets of the networks that were activated to provide support after fifty years of random disasters. They show qualitative differences for the different disaster scenarios measured by path length, degree, clustering coefficient, and number of cycles.

  1. Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

    Directory of Open Access Journals (Sweden)

    Rakesh Kumar Sahu

    2012-09-01

    Full Text Available This paper is mainly focused on Denial of Service (DoS attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but our paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How we can detect any one of attacks is addressed in this paper. We have discussed the CPU and memory utilization during the attack. We have given two separate algorithms for each attack and also suggest how to get rid of this type of attacks .

  2. Static Aeroelasticity in Combat Aircraft.

    Science.gov (United States)

    1986-01-01

    Simulation Maneuverability Performance System Integration Design Load Spectren FIG. 1 HIGH PERFORMANCE AIRCRAFT DESIGN Simulation has a great potential...Aeroelasticity has also a great effect on the flight control system design. If the basic control powers are reduced by increasing dynamic pressure...Components Flight Envelope Structure Concept a Total Aircraf Analysis FIG, 2 BASIC DATAS FOR AEROELASTIC DESIGN STUDIES Aeroelastic activities are now devided

  3. Aircraft Derived Data Validation Algorithms

    Science.gov (United States)

    2012-08-06

    to be equipped with Flight Management Systems (FMSs) that use sophisticated digital computers to assist pilots, allowing them to fly more fuel...some basic data is prepared. These include calculations of aircraft position projeted on a three-dimensional Cartesian coordinate system, and...Administration FMS Flight Management System GA General Aviation NextGen Next Generation Air Transportation System NGA National Geospatial-Intelligence

  4. Serial analysis of gene expression predicts structural differences in hippocampus of long attack latency and short attack latency mice

    NARCIS (Netherlands)

    Feldker, DEM; Datson, NA; Veenema, AH; Meulmeester, E; de Kloet, ER; Vreugdenhil, E

    2003-01-01

    The genetically selected long attack latency (LAL) and short attack latency (SAL) mice differ in a wide variety of behavioural traits and display differences in the serotonergic system and the hypothalamus-pituitary-adrenocortical (HPA)-axis. Serial analysis of gene expression (SAGE) was used to gen

  5. Stochastic Methods for Aircraft Design

    Science.gov (United States)

    Pelz, Richard B.; Ogot, Madara

    1998-01-01

    The global stochastic optimization method, simulated annealing (SA), was adapted and applied to various problems in aircraft design. The research was aimed at overcoming the problem of finding an optimal design in a space with multiple minima and roughness ubiquitous to numerically generated nonlinear objective functions. SA was modified to reduce the number of objective function evaluations for an optimal design, historically the main criticism of stochastic methods. SA was applied to many CFD/MDO problems including: low sonic-boom bodies, minimum drag on supersonic fore-bodies, minimum drag on supersonic aeroelastic fore-bodies, minimum drag on HSCT aeroelastic wings, FLOPS preliminary design code, another preliminary aircraft design study with vortex lattice aerodynamics, HSR complete aircraft aerodynamics. In every case, SA provided a simple, robust and reliable optimization method which found optimal designs in order 100 objective function evaluations. Perhaps most importantly, from this academic/industrial project, technology has been successfully transferred; this method is the method of choice for optimization problems at Northrop Grumman.

  6. A LocationGuard Approach: An Efficacious Scheme to Alleviate DoS Attacks

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2011-01-01

    from a denial-of- service (DoS) attack or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein a n adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents Location Guard—a...

  7. AIRTV: Broadband Direct to Aircraft

    Science.gov (United States)

    Sorbello, R.; Stone, R.; Bennett, S. B.; Bertenyi, E.

    2002-01-01

    Airlines have been continuously upgrading their wide-body, long-haul aircraft with IFE (in-flight entertainment) systems that can support from 12 to 24 channels of video entertainment as well as provide the infrastructure to enable in-seat delivery of email and internet services. This is a direct consequence of increased passenger demands for improved in-flight services along with the expectations that broadband delivery systems capable of providing live entertainment (news, sports, financial information, etc.) and high speed data delivery will soon be available. The recent events of Sept. 11 have slowed the airline's upgrade of their IFE systems, but have also highlighted the compelling need for broadband aeronautical delivery systems to include operational and safety information. Despite the impact of these events, it is estimated that by 2005 more than 3000 long haul aircraft (servicing approximately 1 billion passengers annually) will be fully equipped with modern IFE systems. Current aircraft data delivery systems, which use either Inmarsat or NATS, are lacking in bandwidth and consequently are unsuitable to satisfy passenger demands for broadband email/internet services or the airlines' burgeoning data requirements. Present live video delivery services are limited to regional coverage and are not readily expandable to global or multiregional service. Faced with a compelling market demand for high data transport to aircraft, AirTV has been developing a broadband delivery system that will meet both passengers' and airlines' needs. AirTV is a global content delivery system designed to provide a range of video programming and data services to commercial airlines. When AirTV is operational in 2004, it will provide a broadband connection directly to the aircraft, delivering live video entertainment, internet/email service and essential operational and safety data. The system has been designed to provide seamless global service to all airline routes except for those

  8. Design Methods and Optimization for Morphing Aircraft

    Science.gov (United States)

    Crossley, William A.

    2005-01-01

    This report provides a summary of accomplishments made during this research effort. The major accomplishments are in three areas. The first is the use of a multiobjective optimization strategy to help identify potential morphing features that uses an existing aircraft sizing code to predict the weight, size and performance of several fixed-geometry aircraft that are Pareto-optimal based upon on two competing aircraft performance objectives. The second area has been titled morphing as an independent variable and formulates the sizing of a morphing aircraft as an optimization problem in which the amount of geometric morphing for various aircraft parameters are included as design variables. This second effort consumed most of the overall effort on the project. The third area involved a more detailed sizing study of a commercial transport aircraft that would incorporate a morphing wing to possibly enable transatlantic point-to-point passenger service.

  9. 78 FR 65554 - Exhaust Emission Standards for New Aircraft Turbine Engines and Identification Plate for Aircraft...

    Science.gov (United States)

    2013-11-01

    ... Aircraft Turbine Engines and Identification Plate for Aircraft Engines Correction In rule document 2013... for Subsonic Engines'', in the third column, in the last row, the entry ``rO > 26.7'' is corrected...

  10. Resist DoS attacks in UMTS-WLAN

    Science.gov (United States)

    Qu, Huyu; Cheng, Qiang

    2005-06-01

    Wireless network is more vulnerable to denial of service (DoS) attacks than wired one. In this paper we propose two methods to resist DoS attacks in UMTS-WLAN network, one is active and the other is passive. These two are complementary to each other. In active DoS defense method, a mobile terminal generates an authorized anonymous ID (AAI) using its true ID such as IP address, MAC address, PIN code, or asymmetric key, and substitutes its true ID with the authorized anonymous ID. The mobile terminal may be authenticated by the UMTS-WLAN, however its true ID is anonymous to intending attackers. This method can be used to isolate de-authenticating/disassociating DoS attackers, spoofing power-save DoS attacker, etc. In passive DoS defense method, we propose a trace back scheme. We use covert channels in the header of mobile IP packets to trace back the malicious nodes by embedding some address information of intermediate nodes, and recovering the embedded information by the victim. After the victim successfully traces the attacking paths from malicious nodes, it can segregate the malicious nodes and protect itself. This method can be used to resist DoS attacks of mass-produced junk message congestions.

  11. A Survey of DDOS Attacks in TCP/IP Stack

    Directory of Open Access Journals (Sweden)

    P.C. Senthil Mahesh

    2014-08-01

    Full Text Available The aim of study is to discuss DDOS attack in TCP/IP layer. A Denial-of-Service (DoS or Distributed Denial-of-Service (DDoS attack is an attempt to make a device or network source not available to its designed customers. The purposes and objectives of a DoS attack may differ, it usually includes initiatives to momentarily or consistently disrupt or hold solutions of a variety linked with the Online. As explanation, DDoS (Distributed Denial of Service attack are sent by two or more individuals, or bots. DoS (Denial of Service attack are sent by one person or system. DoS attack typically focus on sites or solutions organized on high-profile web or web servers such as financial institutions, bank card payment gateways and even main name servers. This technique has now seen comprehensive use in certain activities, used by server owners, or dissatisfied opponents on activities. Progressively, DoS attack have also been used as a way of level of resistance.

  12. Attack resilience of the evolving scientific collaboration network.

    Directory of Open Access Journals (Sweden)

    Xiao Fan Liu

    Full Text Available Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic" level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  13. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  14. Risk factors for hypertensive attack during pheochromocytoma resection

    Science.gov (United States)

    Kwon, Se Yun; Lee, Kyung Seop; Lee, Jun Nyung; Ha, Yun-Sok; Choi, Seock Hwan; Kim, Hyun Tae; Kim, Tae-Hwan; Yoo, Eun Sang

    2016-01-01

    Purpose We aimed to retrospectively evaluate the risk factors for hypertensive attack during adrenalectomy in patients with pheochromocytoma. Despite the development of newer surgical and anesthetic techniques for the management of pheochromocytoma, intraoperative hypertensive attack continues to present a challenge. Materials and Methods Data from 53 patients diagnosed with pheochromocytoma at Kyungpook National Uriversity Medical Center between January 2000 and June 2012 were retrospectively analyzed. The subjects were divided into 2 groups depending on the presence or absence of hypertensive attack at the time of surgery. Patient demographic characteristics and preoperative evaluations were assessed for their prognostic relevance with respect to hypertensive attack. A univariate analysis was conducted, and a multivariate logistic regression analysis was also performed. Results In the univariate analysis, systolic blood pressure at presentation, preoperative hormonal status (including epinephrine, norepinephrine, vanillylmandelic acid, and metanephrine levels in a 24-hour urine sample), tumor size, and postoperative systolic blood pressure were significantly associated with the development of hypertensive attack. In the multivariate analysis, preoperative epinephrine level and tumor size were independent factors that predicted hypertensive attack. The highest odds ratio for tumor size (2.169) was obtained at a cutoff value of 4.25 cm and the highest odds ratio for preoperative epinephrine (1.020) was obtained at a cutoff value of 166.3 µg/d. Conclusions In this study, a large tumor size and an elevated preoperative urinary epinephrine level were risk factors for intraoperative hypertensive attack in patients with pheochromocytoma. PMID:27194549

  15. Cerebral perfusion SPECT in transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    You, D.-L. E-mail: dlyou@mail.kfcc.org.tw; Shieh, F.-Y.; Tzen, K.-Y.; Tsai, M.-F.; Kao, P.-F

    2000-04-01

    Purpose: The purpose of our study is to evaluate the efficacy of cerebral perfusion single photon emission computerized tomography (SPECT) in patients with transient ischemic attack (TIA). Methods: Thirty-seven patients with TIA were collected for study. All patients had transient focal neurological symptoms or signs with complete recovery within 24 h after onset. The patients underwent cerebral perfusion SPECT between 6 h and 11 days after onset, with 10 cases performed within 24 h (group A), nine cases performed between 1 and 3 days (group B), 11 cases performed between 3 and 5 days (group C), and seven cases performed after more than 5 days (group D). A semi-quantitative method was used for analyzing the SPECT data, and the difference ratios between lesion side and contralateral normal side were calculated on each pair of regions of interest. Results: In total, 78.4% (29/37) of patients had reduced perfusion in the cerebral cortical regions or deep nuclei, and the regions with reduced perfusion corresponded with clinical presentations of the patients. The abnormal rate with reduced perfusion was 90.0% in group A, 77.8% in group B, 72.7% in group C and 71.4% in group D. Cross cerebellar diaschisis (CCD) was present in seven patients, and all of the primary cerebral perfusion defects of these patients were located at the territory of left or right middle cerebral artery. Conclusion: Cerebral perfusion SPECT is a potential tool to detect cerebral perfusion defects and CCD in patients with TIA. Although the perfusion defect may persist more than 5 days after onset, we suggest cerebral perfusion SPECT should be performed as soon as possible.

  16. A Qualitative Analysis of SAC Aircraft Maintenance.

    Science.gov (United States)

    1982-09-01

    A122 815 A QUALITATIVE ANALYSIS OF SAC AIRCRAFT MRINTENANCE(U) 112 AIR FORCE INST OF TECH WRIGHT-PRTTERSON AFB OH SCHOOL OF SYSTEMS AND LOGISTICS D...Wright-Patterson Air Force Base, Ohio ’ ; " ... ..... ... ... . .. .. A QUALITATIVE ANALYSIS OF SAC AIRCRAFT MAINTENANCE Douglas P. Cook, Captain... QUALITATIVE ANALYSIS OF SAC Master’s Thesis AIRCRAFT MAINTENANCE 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(q) S. CONTRACT OR GRANT NUMBER(a) Douglas

  17. Visualization of Aircraft Longitudinal-Axis Motion

    OpenAIRE

    Peter Kvasnica

    2015-01-01

    In this paper, the use of continuous mathematical models of an aircraft in an aircraft simulator is described. The models are of lower degree and less time-consuming for calculation. Computer implementation of the models capable to work faster and more accurately and efficiently is also described. The suggested approach allows to achieve the required precision at accelerated simulation speed using the continuous mathematical models of an aircraft. Frequency of the computation of continuous ma...

  18. Advanced Aerostructural Optimization Techniques for Aircraft Design

    OpenAIRE

    Yingtao Zuo; Pingjian Chen; Lin Fu; Zhenghong Gao; Gang Chen

    2015-01-01

    Traditional coupled aerostructural design optimization (ASDO) of aircraft based on high-fidelity models is computationally expensive and inefficient. To improve the efficiency, the key is to predict aerostructural performance of the aircraft efficiently. The cruise shape of the aircraft is parameterized and optimized in this paper, and a methodology named reverse iteration of structural model (RISM) is adopted to get the aerostructural performance of cruise shape efficiently. A new mathematic...

  19. Aircraft Survivability. Susceptibility Reduction. Fall 2010

    Science.gov (United States)

    2010-01-01

    to determine the degree of control available with manual manipulation of engine throttles for various transport aircraft. Simulations included...Boeing 727, 737, 747, 757, 767, 777, MD-11, MD-90, C-17, and Airbus A320 and A300 transport aircraft. Preliminary missile impact effects were...shown, for most aircraft tested, that using only manual TOC it is very difficult to make a safe runway landing due to difficulty in controlling the

  20. Enhancement of scale-free network attack tolerance

    Institute of Scientific and Technical Information of China (English)

    Qu Ze-Hui; Wang Pu; Song Chao-Ming; Qin Zhi-Guang

    2010-01-01

    Despite the large size of most communication and transportation systems, there are short paths between nodes in these networks which guarantee the efficient information, data and passenger delivery; furthermore these networks have a surprising tolerance under random errors thanks to their inherent scale-free topology. However, their scale-free topology also makes them fragile under intentional attacks, leaving us a challenge on how to improve the network robustness against intentional attacks without losing their strong tolerance under random errors and high message and passenger delivering capacity. Here we propose two methods (SL method and SH method) to enhance scale-free network's tolerance under attack in different conditions.