WorldWideScience

Sample records for attack damage due

  1. Assessment of damage potential to the TMI-2 lower head due to thermal attack by core debris

    International Nuclear Information System (INIS)

    Cronenberg, A.W.; Behling, S.R.; Broughton, J.M.

    1986-06-01

    Camera inspection of the Three Mile Island Unit 2 (TMI-2) inlet plenum region has shown that approximately 10 to 20 percent of the core material loading may have relocated to the lower plenum. Although vessel integrity was maintained, a question of primary concern is ''how close to vessel failure'' did this accident come. This report summarizes the results of thermal analyses aimed at assessing damage potential to the TMI-2 lower head and attached instrument penetration tubes due to thermal attack by hot core debris. Results indicate that the instrument penetration nozzles could have experienced melt failure at localized hot spot regions, with attendant debris drainage and plugging of the instrument lead tubes. However, only minor direct thermal attack of the vessel liner is predicted

  2. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    International Nuclear Information System (INIS)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-01-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment

  3. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  4. A continuum damage analysis of hydrogen attack in 2.25 Cr-1Mo vessel

    DEFF Research Database (Denmark)

    van der Burg, M.W.D.; van der Giessen, E.; Tvergaard, Viggo

    1998-01-01

    A micromechanically based continuum damage model is presented to analyze the stress, temperature and hydrogen pressure dependent material degradation process termed hydrogen attack, inside a pressure vessel. Hydrogen attack (HA) is the damage process of grain boundary facets due to a chemical...... reaction of carbides with hydrogen, thus forming cavities with high pressure methane gas. Driven by the methane gas pressure, the cavities grow, while remote tensile stresses can significantly enhance the cavitation rate. The damage model gives the strain-rate and damage rate as a function...... of the temperature, hydrogen pressure and applied stresses. The model is applied to study HA in a vessel wall, where nonuniform distributions of hydrogen pressure, temperature and stresses result in a nonuniform damage distribution over the vessel wall. Stresses inside the vessel wall first tend to accelerate...

  5. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel

    2012-12-27

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young\\'s modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  6. New Computational Model Based on Finite Element Method to Quantify Damage Evolution Due to External Sulfate Attack on Self-Compacting Concretes

    KAUST Repository

    Khelifa, Mohammed Rissel; Guessasma, Sofiane

    2012-01-01

    Abstract: This work combines experimental and numerical investigations to study the mechanical degradation of self-compacting concrete under accelerated aging conditions. Four different experimental treatments are tested among them constant immersion and immersion-drying protocols allow an efficient external sulfate attack of the material. Significant damage is observed due to interfacial ettringite. A predictive analysis is then adopted to quantify the relationship between ettringite growth and mechanical damage evolution during aging. Typical 3D microstructures representing the cement paste-aggregate structures are generated using Monte Carlo scheme. These images are converted into a finite element model to predict the mechanical performance under different criteria of damage kinetics. The effect of ettringite is then associated to the development of an interphase of lower mechanical properties. Our results show that the observed time evolution of Young's modulus is best described by a linear increase of the interphase content. Our model results indicate also that the interphase regions grow at maximum stress regions rather than exclusively at interfaces. Finally, constant immersion predicts a rate of damage growth five times lower than that of immersion-drying protocol. © 2012 Computer-Aided Civil and Infrastructure Engineering.

  7. Individual vs. overarching protection for minimizing the expected damage caused by an attack

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Dai, Yuanshun

    2013-01-01

    The article considers a system consisting of identical elements which can be protected and attacked individually and collectively. The system is aimed at supplying a demand. If, following the attack, the cumulative performance of the elements becomes less than the demand the damage proportional to the unsupplied demand is inflicted. Additional damage is associated with the destruction of the equipment. To destroy any system element the attacker always must penetrate/destroy the collective (overarching) protection. Both the attacker and the defender have limited resources and can distribute them freely between the two types of attack and protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the expected damage associated with equipment losses and unsupplied demand. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its solutions are presented and analyzed. The influence of the game parameters on the optimal defense and attack strategies is discussed

  8. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  9. Unique fatality due to claw injuries in a tiger attack: a case report.

    Science.gov (United States)

    Pathak, Hrishikesh; Dixit, Pradeep; Dhawane, Shailendra; Meshram, Satin; Shrigiriwar, Manish; Dingre, Niraj

    2014-11-01

    This paper describes a unique case of a fatal tiger attack in the wild. In the present case, a tiger fatally mauled a 34-year-old female with its claws, instead of the usual mechanism of killing by the bite injury to the neck. The autopsy revealed multiple fatal and non-fatal injuries caused by the tiger claws. The characteristic injuries due to the tooth impacts were absent as the teeth of the offending tiger were either fallen or non-functional. To the best of our knowledge, probably this rare case would be the first reported human fatality due to the tiger claw injuries in the world. The purpose of the present article is to highlight the fatal injuries due to the tiger claws, as the claw-induced fatal injuries in a tiger attack are not reported in the medico-legal literature. Moreover, this report would be an illustrative one for differentiation between the fatal injuries due to the claws and tooth impacts in a tiger attack. Furthermore, the present report establishes the importance of the tiger claws as a source of fatal injuries in a tiger attack. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  10. Damage modelling in concrete subject to sulfate attack

    Directory of Open Access Journals (Sweden)

    N. Cefis

    2014-07-01

    Full Text Available In this paper, we consider the mechanical effect of the sulfate attack on concrete. The durability analysis of concrete structures in contact to external sulfate solutions requires the definition of a proper diffusion-reaction model, for the computation of the varying sulfate concentration and of the consequent ettringite formation, coupled to a mechanical model for the prediction of swelling and material degradation. In this work, we make use of a two-ions formulation of the reactive-diffusion problem and we propose a bi-phase chemo-elastic damage model aimed to simulate the mechanical response of concrete and apt to be used in structural analyses.

  11. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  12. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  13. Vulnerabilities of the security of nuclear material due to cyber attacks

    International Nuclear Information System (INIS)

    Daschil, F.

    2002-01-01

    Full text: The spread of new communication and computer technologies is now the potential for a dedicated, sophisticated adversary to conduct coordinated strikes against the computers, communications systems, and databases of nuclear material security systems. All weapons of cyber war, like viruses, Trojans, access to computer systems are potential risks for the security of nuclear material. New forms of destruction of electronic devices, e.g. Transient Electromagnetic Devices (TED), that could, in the hands of enemies, criminals, or terrorist pose a significant threat to nuclear safety infrastructure components that are based on micro-circuits and computer or micro-processor control. These examples shows the necessity to clearly identify possible risks as: information and communication based disorders and other disruptions and attacks; partial or complete failure of systems causing the risk of unexpected reaction or unmanageable situations; cracking of access codes and elimination of alarm equipment could give easy access to nuclear material; computer manipulation or complete computer and system takeover due to brute force attacks, viruses, Trojans and worms could lead to malfunctions, disruptions and nuclear disasters; computer spying and brute force attacks could give detailed information about technical, organizational and organizational data; combined actions of physical, electronic and computer attacks. The paper gives an overview of potential computer and communication safety gaps and points out strategic implications as the identification of the critical infrastructure, surveillance of computer systems, data access and communication paths. The basic necessity of the development of computer and communication breakdown backup systems as well as measures of precaution against cyber attacks is shown in the paper. (author)

  14. Coupled analysis of building damage due to tunneling

    NARCIS (Netherlands)

    Giardina, G.; Hendriks, M.A.N.; Rots, J.G.

    2009-01-01

    Excavation works in urban areas require a preliminary risk damage assessment. In historical cities, the prediction of building response to settlements is necessary to reduce the risk of damage of the architectural heritage. The current method used to predict the building damage due to ground

  15. Damage of plants due to peroxyacyl nitrates (PAN)

    Energy Technology Data Exchange (ETDEWEB)

    Fukuda, H.; Terakado, K.

    1974-02-01

    In Japan plant damages began to resemble those due to PAN about 1972. Exposure experiments with artifically synthesized PAN in an environment simulation room determined the concentration of PAN and its duration to examine the relationship between these data in the field and crop damage. Synthesized PAN created by irradiating a mixture of ethyl nitrate and oxygen with ultraviolet light gave results similar to those seen in fields. From the end of April to the end of November, damages to petunias seemingly due to PAN appeared 15 times. The symptoms differed with the variety of petunia. After 14 experiments in fields from September 20 to November 30 with a continuous determination of the environmental concentration of PAN, damages to petunia were confirmed on 6 days when the maximum PAN concentration range was 3.0-6.7 ppb. The duration of concentrations higher than 3 ppb was 2-13 hr. The most serious damage appeared on September 20 when a concentration of more than 5 ppb continued for 7 hours. No damage appeared with a long continuation (6-12 hr) of a lower concentration of PAN of 2 ppb. Inter-varietal grafting showed that the symptoms and the degree of damage due to PAN were influenced only by the physiological specificity of the aerial portion of the plant. Leaves which are most affected by PAN differed with the variety of petunia.

  16. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  17. Laboratory evaluation of resistance to moisture damage in asphalt mixtures

    Directory of Open Access Journals (Sweden)

    Ahmed Ebrahim Abu El-Maaty Behiry

    2013-09-01

    Full Text Available Moisture damage in asphalt mixtures refers to loss in strength and durability due to the presence of water. Egypt road network is showing severe deterioration such as raveling and stripping because the bond between aggregates and asphalt film is broken due to water intrusion. To minimize moisture damage, asphalt mixes are investigated to evaluate the effect of air voids, degree of saturation, media of attack and the conditioning period. Two medias of attack are considered and two anti-stripping additives are used (hydrated lime and Portland cement. The retained Marshall stability and tensile strength ratio are calculated to determine the resistance to moisture damage. The results showed that both lime and cement could increase Marshall stability, resilient modulus, tensile strength and resistance to moisture damage of mixtures especially at higher condition periods. Use of hydrated lime had better results than Portland cement.

  18. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able...

  19. Takotsubo cardiomyopathy following recurrent doses of albuterol due to asthma attack: a very rare case report.

    Science.gov (United States)

    Parsa, Saeed Alipour; Khaheshi, Isa; Memaryan, Mehdi; Naderian, Mohammadreza

    2016-11-01

    To present an unusual case in order to clarify one of the most important differential diagnoses of ST-elevation myocardial infarction in a postmenopausal woman. A 72-year-old woman with asthma attack and retrosternal chest pain was presented to our emergency unit. She had used albuterol spray ten-times before admission due to accentuated dyspnea. Initial ECG revealed ST-segment elevation in leads V1-V6, I and aVL. Emergent coronary angiography indicated normal coronary arteries, and left ventriculography showed significant akinesia of apical segments. This unusual case emphasizes the fact that emergency physicians and cardiologists should be familiar with Takotsubo cardiomyopathy following overuse of β 2 -agonist due to asthma attack that can mimic ST-elevation myocardial infarction.

  20. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  1. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  2. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  3. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  4. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  5. Evaluating the Impact of Juice Filming Charging Attack in Practical Environments

    DEFF Research Database (Denmark)

    Meng, Weizhi; Lee, Wang; Liu, Zhe

    2018-01-01

    Nowadays, smartphones are widely adopted in people’s daily lives. With the increasing capability, phone charging has become a basic requirement and a large number of public charging facilitates are under construction for this purpose. However, public charging stations may open a hole for cyber-cr...... then for the first time investigate the impact of JFC attack under three practical scenarios. Our work aims to complement the state-of-the-art and stimulate more research in this area....... the whole charging period. Due to the potential damage of JFC attacks, there is a need to investigate its influence in practical scenarios. Motivated by this, in this work, we firstly conduct a large user survey with over 2500 participants about their awareness and attitude towards charging attacks. We......-criminals to launch various attacks, especially charging attacks, to steal phone user’s private information. Juice filming charging (JFC) attack is one such threat, which can refer users’ sensitive information from both Android OS and iOS devices, through automatically monitoring and recording phone screen during...

  6. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  7. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  8. Modifying effect of age on the association between ambient ozone and nighttime primary care visits due to asthma attack.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Ando, Michiko; Nitta, Hiroshi

    2009-01-01

    We examined the association between short-term exposure to outdoor air pollution and nighttime primary care visits due to asthma attack. We also investigated the modifying effects of age on this association. A case-crossover study was conducted at a primary care clinic in metropolitan Tokyo. The subjects were 308 children aged 0-14 years and 95 adolescents and adults aged 15-64 years. All subjects made visits to the clinic for an asthma attack at between 7 PM and 12 AM. Data on hourly concentrations of particulate matter with a 50% cut-off aerodynamic diameter asthma attack in warmer months; the association was greater among preschool children.

  9. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  10. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  11. Association of ambient air pollution and meteorological factors with primary care visits at night due to asthma attack.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2013-09-01

    The association of outdoor air pollution and meteorological elements with primary care visits at night due to asthma attack was studied. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. The subjects were 956 children aged 0-14 years who visited the clinic with an asthma attack between the hours of 9 p.m. and 6 a.m. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and a number of meteorological elements were measured, and a conditional logistic regression model was used to estimate odds ratios (ORs) of primary care visits per unit increment of air pollutants or meteorological elements. The analyses took into consideration the effects of seasonality. Of the 956 children, 73 (7.6 %) were aged asthma attack at night in the spring or summer was found. An inverse relation between suspended particulate matter and primary care visits due to asthma attack was detected in the winter. ORs in the summer per degree increment in daily mean temperature was 1.31 [95 % confidential interval (CI) 1.09-1.56], and ORs in the autumn per hourly increment in daily hours of sunshine was 0.94 (95 % CI 0.90-0.99). The findings of our study fail to support any association between daily mean concentration of air pollutant and primary care visits at night. However, we did find evidence indicating that certain meteorological elements may be associated with primary care visits.

  12. Hydrogen attack evaluation of boiler tube using ultrasonic wave

    International Nuclear Information System (INIS)

    Won, Soon Ho; Hyun, Yang Ki; Lee, Jong O; Cho, Kyung Shik; Lee, Jae Do

    2001-01-01

    The presence of hydrogen in industrial plants is a source of damage. Hydrogen attack is one such form of degradation and often causing large tube ruptures that necessitate an immediate shutdown. Hydrogen attack may reduce the fracture toughness as well as the strength of steels. This reduction is caused partially by the presence of cavities and microcracks at the grain boundaries. In the past several techniques have been used with limited results. This paper describes the application of an ultrasonic velocity, attenuation and backscatter techniques for detecting the presence of hydrogen damage in utility boiler tubes. Ultrasonic tests showed a decrease in wave velocity and an increase in attenuation. Such results demonstrate the potential for ultrasonic nondestructive testing to quantify damage. Based on this study, recommendations are that both velocity and attenuation be used to detect hydrogen attack in steels.

  13. Tracheoesophageal Fistula due to a Damaged Tracheal Stent

    Directory of Open Access Journals (Sweden)

    Masahiro Kimura

    2014-01-01

    Full Text Available We describe the management of a tracheoesophageal fistula due to a damaged tracheal stent, which was first inserted to treat tracheal stenosis. A 29-year-old woman with a history of treated epilepsy had a seizure and suffered from smoke inhalation during a fire. Breathing difficulties appeared and gradually worsened; consultation was obtained two years afterward. After undergoing a thorough examination, the patient was diagnosed with tracheal strangulation. A noncovered, metallic stent was inserted. When the patient was 37 years old, she was admitted to our hospital for the treatment of a tracheoesophageal fistula. We diagnosed it as a tracheoesophageal fistula due to the collapse of the damaged tracheal stent toward the esophageal side, and we decided to perform a mediastinal tracheostomy. Granulation may be formed in the circumference of a stent that has been present for a prolonged period, and removal of the stent may become difficult. This case suggests that insertion of a noncovered, metallic stent is contraindicated for a benign disease.

  14. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  15. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  16. A method for the estimation of the probability of damage due to earthquakes

    International Nuclear Information System (INIS)

    Alderson, M.A.H.G.

    1979-07-01

    The available information on seismicity within the United Kingdom has been combined with building damage data from the United States to produce a method of estimating the probability of damage to structures due to the occurrence of earthquakes. The analysis has been based on the use of site intensity as the major damage producing parameter. Data for structural, pipework and equipment items have been assumed and the overall probability of damage calculated as a function of the design level. Due account is taken of the uncertainties of the seismic data. (author)

  17. ICS logging solution for network-based attacks using Gumistix technology

    Science.gov (United States)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  18. Network resilience against intelligent attacks constrained by the degree-dependent node removal cost

    International Nuclear Information System (INIS)

    Annibale, A; Coolen, A C C; Bianconi, G

    2010-01-01

    We study the resilience of complex networks against attacks in which nodes are targeted intelligently, but where disabling a node has a cost to the attacker which depends on its degree. Attackers have to meet these costs with limited resources, which constrains their actions. A network's integrity is quantified in terms of the efficacy of the process that it supports. We calculate how the optimal attack strategy and the most attack-resistant network degree statistics depend on the node removal cost function and the attack resources. The resilience of networks against intelligent attacks is found to depend strongly on the node removal cost function faced by the attacker. In particular, if node removal costs increase sufficiently fast with the node degree, power law networks are found to be more resilient than Poissonian ones, even against optimized intelligent attacks. For cost functions increasing quadratically in the node degrees, intelligent attackers cannot damage the network more than random damages would.

  19. Damage formation and annealing in InP due to swift heavy ions

    International Nuclear Information System (INIS)

    Kamarou, A.; Wesch, W.; Wendler, E.; Klaumuenzer, S.

    2004-01-01

    Virgin and pre-damaged InP samples were irradiated at room temperature (RT) and at liquid nitrogen temperature (LNT) with different fluences of 140 MeV Kr, 390 MeV Xe and 600 MeV Au ions. The pre-damaging was performed with 600 keV Ge ions at LNT to obtain different damage levels. The samples were analysed by means of Rutherford backscattering spectrometry (RBS) in random and channelling geometry. A relatively weak damage accumulation in virgin InP and a very significant defect annealing in pre-damaged InP occurs due to 140 MeV Kr irradiation. The damaging of virgin InP with 390 MeV Xe and 600 MeV Au is much more efficient in comparison with that of 140 MeV Kr. Further, annealing of the pre-damaged InP due to 390 MeV Xe irradiation is hardly visible. At LNT InP appears to be much more radiation-resistant to swift heavy ion (SHI) irradiation than at RT. Our results show that during SHI irradiation of InP both damage formation and damage annealing occur simultaneously. Whether the first or the second one plays a more important role depends on the SHI mass and energy

  20. Exploring aggregate economic damage functions due to climate change

    Energy Technology Data Exchange (ETDEWEB)

    Dowlatabadi, H.; Kandlikar, M.; Patwardhan, A. [and others

    1994-12-31

    A number of issues need to be considered when developing aggregated economic damage functions due to climate change. These include: (i) identification of production processes vulnerable to climate change, (ii) an understanding of the mechanism of vulnerability, (iii) the rate of technological advance and diffusion (iv) the issue of detection of damages and availability of response options. In this paper we will explore the implications of these considerations with the aid of an illustrative model. The findings suggest that there is a significant upward bias in damage functions calculated without consideration of these issues. Furthermore, this systematic bias is larger as climate change increases. We believe the approach explored here is a more suitable model for adoption in future integrated assessments of climate change.

  1. Exploring aggregate economic damage functions due to climate change

    International Nuclear Information System (INIS)

    Dowlatabadi, H.; Kandlikar, M.; Patwardhan, A.

    1994-01-01

    A number of issues need to be considered when developing aggregated economic damage functions due to climate change. These include: (1) identification of production processes vulnerable to climate change, (2) an understanding of the mechanism of vulnerability, (3) the rate of technological advance and diffusion, (4) the issue of detection of damages and availability of response options. In this paper the authors will explore the implications of these considerations with the aid of an illustrative model. The findings suggest that there is a significant upward bias in damage functions calculated without consideration of these issues. Furthermore, this systematic bias is larger as climate change increases. The authors believe the approach explored here is a more suitable model for adoption in future integrated assessments of climate change

  2. Effects of the addition of micro silica on the durability of mortars exposed to the sodium sulfate attack

    International Nuclear Information System (INIS)

    Nasser, C.; Meriam, M.

    2012-01-01

    This article presents a detailed experimental study on the sulfate attack of mortars of self compacting concrete, and the effectiveness of employs micro silica and limestone fillers in the minimization of the damage resulting from such an attack. The test solution used to supply the sulfate ions and the cations was the sodium sulfate solution 4.5%. The solution saturated with lime was employed as the reference solution. The main variables investigated in the study were the type of cement and mineral addition. The expansion measured on p rims of mortar of (40x40x160) millimeters was employed to estimate their durability after exposure to the sodium sulfate solution attack during 91 days-Specimens of mortars were visually examined to assess the extent of deterioration due to the sulfate attack. The x-ray diffraction was used to evaluate the microstructural nature of the sulfate attack. The test results proved that the use of micro silica had a beneficial effect on the expansion due to the sodium sulfate attack. While mortars with limestone filler have undergoes degradation even with the use of cement resistant to sulfates. (authors).

  3. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  4. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  5. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  7. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  8. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  9. The influence of alkali-free and alkaline shotcrete accelerators within cement systems Influence of the temperature on the sulfate attack mechanisms and damage

    International Nuclear Information System (INIS)

    Paglia, C.; Wombacher, F.; Boehni, H.

    2003-01-01

    The resistance to sulfate attack of mixtures accelerated with alkali-free and alkaline accelerators was found to be mainly influenced by the Al 3+ and SO 4 2- added via the admixtures. Microstructural observations showed decalcification and disintegration of the CSH gel, which acted as an additional Ca 2+ supplier as compared to the CH for ettringite formation. The CSH decalcification was mainly observed with a homogeneous distribution of the alkali-free admixture. The disintegration of the CSH gel increased the porosity and allowed more sulfate solution to penetrate into the specimens. This process promoted the swelling of the specimens and directly contributed to the expansion, explaining the lack of a direct relationship between the ettringite formation and the expansion. Moreover, the CSH gel disintegration, typical for MgSO 4 attack, also occurred with Na 2 SO 4 solutions and depending on the aluminate-sulfate distribution and the extent of the CSH gel disintegration, different damage types were detected. At higher temperatures (65 deg. C) the damage was mainly controlled by the growth, the rearrangement and the thermal stability of ettringite

  10. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  11. 78 FR 66852 - Housing Assistance Due to Structural Damage

    Science.gov (United States)

    2013-11-07

    ... constructed. This type of housing would have a life expectancy of more than 5 years, but less than 25 years... FEMA-2010-0035] RIN 1660-AA68 Housing Assistance Due to Structural Damage AGENCY: Federal Emergency...'s repair, replacement, and housing construction assistance regulations that clarify the eligibility...

  12. Evaluation of environmental damage due to atmospheric pollution caused by power economy

    International Nuclear Information System (INIS)

    Burneikis, J.; Shtreimikiene, D.

    1996-01-01

    Methods to evaluate the environmental damage due to atmospheric pollution caused by power economy are presented. The products of burning fossil fuel (CO 2 , SO 2 , NO x and ashes) make the bulk of the pollutants that are being discharged into the atmosphere. To evaluate the damage caused by these pollutants an empirical method is suggested. The direct and analytical methods are used as a basis in collecting data for the empirical evaluation. All the three methods are described and empirical formulas suggested for calculating environmental damage due to burning fossil fuel in thermal power stations. The authors prove the necessity to change the present system of environmental taxes in Lithuania, which are purely symbolic. (author). 8 refs., 9 tabs

  13. Integrated approach for investigating the durability of self-consolidating concrete to sulfate attack

    Science.gov (United States)

    Bassuoni, Mohamed Tamer F.

    tests, the combined sulfate attack tests captured performance risks and complex damage mechanisms associated with the SCC pore structure and constituent materials. Sodium sulfate attack with wetting-drying cycles and/or partial immersion under temperate-hot conditions synergistically caused significant damage to specimens, especially to quaternary cementitious systems having very fine pore structure, due to the build-up of salt crystals and sulfate reaction products. The deleterious effects of sulfate reaction products and salt crystallization on all cementitious systems were more severe under the combined sodium sulfate and freezing-thawing exposure, with a potential of sudden brittle failure. Laboratory experiments in the current work documented evidence for the occurrence of thaumasite sulfate attack (TSA) in cementitious systems containing limestone filler, not only under cold but also under temperate-hot conditions, which made specimens more vulnerable to damage in the combined sulfate attack tests. The field-like combined exposure of sodium sulfate, cyclic environments and flexural loading had synergistic effects on SCC specimens and caused the coexistence of multiple-complex degradation mechanisms (sulfate attack, TSA, stress-corrosion, salt crystallization, surface scaling and corrosion of surface steel fibres) depending on the mixture design variables. The current thesis demonstrates that relying only on sulfate immersion tests to evaluate the performance of cement-based materials can be risky. It also shows that linear and deterministic modeling of the performance of concrete structures under external sulfate attack is unrealistic. Fuzzy and adaptive-neuro fuzzy inference systems developed in the current thesis accurately and rationally predicted the serviceability, deterioration in engineering properties and time to failure of the SCC mixtures under the various sulfate attack exposure regimes adopted in the integrated testing approach. A durability evaluation

  14. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  15. Damage studies on tungsten due to helium ion irradiation

    International Nuclear Information System (INIS)

    Dutta, N.J.; Buzarbaruah, N.; Mohanty, S.R.

    2014-01-01

    Highlights: • Used plasma focus helium ion source to study radiation induced damage on tungsten. • Surface analyses confirm formation of micro-crack, bubbles, blisters, pinholes, etc. • XRD patterns confirm development of compressive stress due to thermal load. • Reduction in hardness value is observed in the case of exposed sample. - Abstract: Energetic and high fluence helium ions emitted in a plasma focus device have been used successfully to study the radiation induced damage on tungsten. The reference and irradiated samples were characterized by optical microscopy, field emission scanning electron microscopy, X-ray diffraction and by hardness testers. The micrographs of the irradiated samples at lower magnification show uniform mesh of cracks of micrometer width. However at higher magnification, various types of crystalline defects such as voids, pinholes, bubbles, blisters and microcracks are distinctly noticed. The prominent peaks in X-ray diffraction spectrum of irradiated samples are seen shifted toward higher Bragg angles, thus indicating accumulation of compressive stress due to the heat load delivered by helium ions. A marginal reduction in hardness of the irradiated sample is also noticed

  16. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  17. Nonstructural damages of reinforced concrete buildings due to 2015 Ranau earthquake

    Science.gov (United States)

    Adiyanto, Mohd Irwan; Majid, Taksiah A.; Nazri, Fadzli Mohamed

    2017-07-01

    On 15th June 2016 a moderate earthquake with magnitude Mw5.9 was occurred in Sabah, Malaysia. Specifically, the epicentre was located at 16 km northwest of Ranau. Less than two days after the first event, a reconnaissance mission took action to investigate the damages on buildings. Since the reinforced concrete buildings in Ranau were designed based on gravity and wind load only, a lot of minor to severe damages was occurred. This paper presents the damages on the nonstructural elements of reinforced concrete buildings due to Ranau earthquake. The assessment was conducted via in-situ field investigation covering the visual observation, taking photo, and interview with local resident. Based on in-situ field investigation, there was a lot of damages occurred on the nonstructural elements like the brick walls. Such damages cannot be neglected since it can cause injury and fatality to the victims. Therefore, it can be concluded that the installation of nonstructural elements should be reviewed for the sake of safety.

  18. Uncertainty in urban flood damage assessment due to urban drainage modelling and depth-damage curve estimation.

    Science.gov (United States)

    Freni, G; La Loggia, G; Notaro, V

    2010-01-01

    Due to the increased occurrence of flooding events in urban areas, many procedures for flood damage quantification have been defined in recent decades. The lack of large databases in most cases is overcome by combining the output of urban drainage models and damage curves linking flooding to expected damage. The application of advanced hydraulic models as diagnostic, design and decision-making support tools has become a standard practice in hydraulic research and application. Flooding damage functions are usually evaluated by a priori estimation of potential damage (based on the value of exposed goods) or by interpolating real damage data (recorded during historical flooding events). Hydraulic models have undergone continuous advancements, pushed forward by increasing computer capacity. The details of the flooding propagation process on the surface and the details of the interconnections between underground and surface drainage systems have been studied extensively in recent years, resulting in progressively more reliable models. The same level of was advancement has not been reached with regard to damage curves, for which improvements are highly connected to data availability; this remains the main bottleneck in the expected flooding damage estimation. Such functions are usually affected by significant uncertainty intrinsically related to the collected data and to the simplified structure of the adopted functional relationships. The present paper aimed to evaluate this uncertainty by comparing the intrinsic uncertainty connected to the construction of the damage-depth function to the hydraulic model uncertainty. In this way, the paper sought to evaluate the role of hydraulic model detail level in the wider context of flood damage estimation. This paper demonstrated that the use of detailed hydraulic models might not be justified because of the higher computational cost and the significant uncertainty in damage estimation curves. This uncertainty occurs mainly

  19. Reduction in thermal conductivity of ceramics due to radiation damage

    International Nuclear Information System (INIS)

    Klemens, P.G.; Hurley, G.F.; Clinard, F.W. Jr.

    1976-01-01

    Ceramics are required for a number of applications in fusion reactors. In several of these applications, the thermal conductivity is an important design parameter as it affects the level of temperature and thermal stress in service. Ceramic insulators are known to suffer substantial reduction in thermal conductivity due to neutron irradiation damage. The present study estimates the reduction in thermal conductivity at high temperature due to radiation induced defects. Point, extended, and extended partly transparent defects are considered

  20. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  1. Discontinuous phase formation and selective attack of SiC materials exposed to low oxygen partial pressure environments

    Energy Technology Data Exchange (ETDEWEB)

    Butt, D.P. [Los Alamos National Lab., NM (United States); Tressler, R.E.; Spear, K.E. [Pennsylvania State Univ., University Park, PA (United States). Dept. of Materials Science and Engineering

    1993-09-01

    Three SiC materials were exposed to gas mixtures containing N{sub 2}, H{sub 2}, and CO at 1000-1300C, 1-740 torr for a few to 1000 h. Kinetic and thermodynamic studies indicate that CO is the predominant oxidizing species. A variety of corrosion processes were observed, including surface and internal pit formation, needle growth, grain boundary attack, and attack of impurities and surrounding material. In the case of a siliconized SiC, impurities such as Ca, Al, and Fe diffused rapidly through the Si matrix forming complex calcium aluminosilicates on the surface, leaving behind internal voids. Evaluation of the mechanical properties, including fractography, revealed a variety of degradative phenomena. Efforts to identify causes of pit formation suggested that the overall process was complex. Pits formed during attack of grain boundaries and regions containing transition metal impurities. Studies of single crystals showed preferential attack near impurities and crystalline defects, indicating that damaged crystals or certain crystal orientations in the polycrystalline materials are susceptible to attack. In addition, under some conditions where pit formation was observed, the strength of certain materials increased apparently due to flaw healing. It is suggested that flaws can heal in the absence of mechanical stress due to their high surface energy. However, second phases observed within partially healed surface cracks suggest impurities also contribute to the flaw healing processes.

  2. Association between PM2.5 and primary care visits due to asthma attack in Japan: relation to Beijing's air pollution episode in January 2013.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2014-03-01

    In January 2013, extremely high concentrations of fine particles (PM2.5) were observed around Beijing, China. In Japan, the health effects of transboundary air pollution have been a matter of concern. We examined the association between the levels of outdoor PM2.5 and other air pollutants with primary care visits (PCVs) at night due to asthma attack in Himeji City, western Japan. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan, involving 112 subjects aged 0-80 years who visited the clinic due to an asthma attack between 9 p.m. and 6 a.m. during the period January-March, 2013. Daily concentrations of particulate matter, ozone, nitrogen dioxide, and some meteorological elements were measured, and a conditional logistic regression model was used to estimate the odds ratios (OR) of PCVs per unit increment in air pollutants or meteorological elements. Of the 112 subjects, 76 (68 %) were aged asthma attack at night. A positive relation between ozone and PCVs due to asthma attack was detected. The OR per 10 ppb increment in daily mean ozone the day before the visit was 2.31 (95 % confidence interval 1.16-4.61). These findings do not support an association between daily mean concentration of PM2.5 and PCVs at night. However, we did find evidence suggesting that ozone is associated with PCVs.

  3. Otolithic membrane damage in patients with endolymphatic hydrops and drop attacks.

    Science.gov (United States)

    Calzada, Audrey P; Lopez, Ivan A; Ishiyama, Gail; Ishiyama, Akira

    2012-12-01

    1. Evaluate the otolithic membrane in patients with endolymphatic hydrops (EH) and vestibular drop attacks (VDA) undergoing ablative labyrinthectomy. 2. Correlate intraoperative findings to archival temporal bone specimens of patients with EH. Retrospective case review. Tertiary referral center. SPECIMEN SOURCE: 1. Patients undergoing labyrinthectomy for incapacitating Ménière's disease (MD), delayed EH, VDA, or acoustic neuroma (AN) between 2004 and 2011. 2. Archival temporal bone specimens of patients with MD. Ablative labyrinthectomy. Examination of the utricular otolithic membrane. The otolithic membrane of the utricle was evaluated intraoperatively in 28 patients undergoing labyrinthectomy. Seven (25%) had a history of VDA, 6 (21%) had delayed EH, 9 (32%) had MD, and 6 (21%) had AN. All patients with VDA showed evidence of a disrupted utricular otolithic membrane, whereas only 50% and 56% of patients with delayed EH and MD, respectively, demonstrated otolithic membrane disruption (p = 0.051). None of the patients with AN showed otolithic membrane disruption (p = 0.004). The mean thickness of the otolithic membrane in 5 archival temporal bone MD specimens was 11.45 micrometers versus 38 micrometers in normal specimens (p = 0.001). The otolithic membrane is consistently damaged in patients with VDA. In addition, there is a significantly higher incidence of otolithic membrane injury in patients with MD and delayed EH compared with patients without hydrops, suggesting that the underlying pathophysiology in VDA results from injury to the otolithic membrane of the saccule and utricle, resulting in free-floating otoliths and atrophy.

  4. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  5. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs, adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  6. Degradation of self-compacting concrete (SCC) due to sulfuric acid attack: Experiment investigation on the effect of high volume fly ash content

    Science.gov (United States)

    Kristiawan, S. A.; Sunarmasto; Tyas, G. P.

    2016-02-01

    Concrete is susceptible to a variety of chemical attacks. In the sulfuric acid environment, concrete is subjected to a combination of sulfuric and acid attack. This research is aimed to investigate the degradation of self-compacting concrete (SCC) due to sulfuric acid attack based on measurement of compressive strength loss and diameter change. Since the proportion of SCC contains higher cement than that of normal concrete, the vulnerability of this concrete to sulfuric acid attack could be reduced by partial replacement of cement with fly ash at high volume level. The effect of high volume fly ash at 50-70% cement replacement levels on the extent of degradation owing to sulfuric acid will be assessed in this study. It can be shown that an increase in the utilization of fly ash to partially replace cement tends to reduce the degradation as confirmed by less compressive strength loss and diameter change. The effect of fly ash to reduce the degradation of SCC is more pronounced at a later age.

  7. Descriptive study of damage caused by the rhinoceros beetle, Oryctes agamemnon, and its influence on date palm oases of Rjim Maatoug, Tunisia.

    Science.gov (United States)

    Soltani, Rasmi; Lkbel, Chaieb; Habib Ben Hamouda, Med

    2008-01-01

    Oryctes agamemnon (Burmeister 1847) (Coleoptera, Scarabaeidae) was accidentally introduced in the southwestern oases of Tunisia (Tozeur) around 1980 and spread to the Rjim Maatoug region. In these areas O. agamemnon was specific to date palm trees causing severe damage that can result in potential danger due to collapse of the tree. This study was conducted from April 2004 to March 2006 in 4 sites in the region of Rjim Maatoug. Different levels of palm tree attack were determined, ovioposition sites were identified, and pest damage was described in detail to specify their relative importance and to indicate factors governing palm tree attack. Eggs were individually oviposited in the attacked parts. Dead parts of palm trees were the main target of O. agamemnon including the respiratory roots, tough, trunk bark, dry petiole and the periphery of the crown. The crown itself was not attacked. Feeding by larvae caused significant damage. The biggest danger occurred when heavy attacks of larvae invaded the respiratory roots at the level of the soil, and secondarily on the periphery of the crown, which can result in fungal diseases. Several cases of Deglet Nour date palm tree collapse were caused by this pest in Rjim Maatoug. Attacks on other parts of the tree were without danger for the palm tree. In the absence of pest management, application of a quarantine program combined with field cultivation techniques could help farmers significantly decrease attack of O. agamemnon on palm trees.

  8. Planning guidance for emergency response to a hypothetical nuclear attack on Riyadh, Saudi Arabia

    Science.gov (United States)

    Shubayr, Nasser Ali M.

    The threat of nuclear attack will remain imminent in an ever-advancing society. Saudi Arabia is not immune to this threat. This dissertation establishes planning guidance for response to a nuclear attack on Riyadh, the capital of Saudi Arabia, based on a hypothetical scenario of a nuclear detonation. A case scenario of a one-megaton thermonuclear bomb detonated at ground level over Riyadh is used to support the thesis. Previous nuclear tests and the Hiroshima and Nagasaki bombings have been used to present possible effects on Riyadh. US planning guidance and lessons learned from the Chernobyl and Fukushima nuclear plants accidents have been used to develop the emergency response guidance. The planning guidance outlines a rapid response to the nuclear detonation. Four damage zones have been identified; severe damage zone, moderate damage zone, light damage zone and dangerous fallout zone. Actions that are recommended, and those that should be avoided, have been determined for each zone. Shelter/ evacuation evaluation for blast-affected and fallout-affected areas is the basis for the recommendation that shelter in place is the best decision for the first hours to days after the attack. Guidelines for medical care response and population monitoring and decontamination are included to reduce the early and long-term effects of the attack. Recommendations to the Saudi Arabian authorities have been made to facilitate suitable preparedness and response for such an event.

  9. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  10. Damages and methods for reparation; Hydropower structures; Skador och reparationsmetoder

    Energy Technology Data Exchange (ETDEWEB)

    Sandstroem, Tomas

    2008-10-15

    structures are also presented in this report. The input used for establishing the most common types of damage are taken from studies made in the USA and Sweden as well as from the literature and from observations made at some Swedish hydropower plants. In conclusion, the following can be said about the need of overlays in regard to Hydropower applications and about the deteriorating processes acting in those environments: The bulk of the damages that occur on the concrete structures can be derived to the environment and the physical and chemical attacks caused by it. The deterioration of concrete structures are therefore more likely to occur due to the environmental affects than due to extensive live loads caused by ice, wind, water, snow etc. Overlays and/toppings are repair techniques that are adequate for repairing most of the damages that occur on concrete structures in Hydropower environments. The performance of the repair work as well as the determination of the composition of the repair mortar or concrete can sometimes be difficult tasks to undertake, often due to the environment (location of the damage and the underlying cause of damage). The continuing work regarding overlays and toppings for Hydropower environments should focus on long-term properties and affects with regards to the whole repair work (including the repair material, the host material and the transition zone). The conclusions above show that there are a rather high potential good with the pursuing of an extensive knowledge in this area

  11. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  12. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  13. Euxesta spp. NEW PEST IN Zea mays L. VAR. rugosa: ASSOCIATION WITH Heliothis zea ATTACKS IN SPRING AND SUMMER SEEDS

    Directory of Open Access Journals (Sweden)

    María Cecilia Curis

    2015-12-01

    Full Text Available The "corn silk fly" of maize (Euxesta spp. Loew, 1868 appeared in 2005 in Santa Fe (Argentina, causing damage to the ears. The attacks are related to temperature, crop growth stage and previous attack of other pests. For this new pest, we determined the species present, the damage on Bt sweet corn plantings in two seasons (August and February, the association of attacks with Heliothis zea (Boddie, 1850 and the presence of parasitoids. Larvae counts of H. zea and Euxesta spp. began in the phenological stage of R2 and ended in R5 and consisted of removing at random from each batch (three for each planting season four ears. In laboratory we determined the percentage of damage on the ears and number of larvae of Euxesta spp. and H. zea, discriminated by size. Fly was identified as E. eluta, damage was greatest in the early spring planting corn. Attacks were correlated with H. zea.

  14. Mathematical modeling of damage function when attacking file server

    Science.gov (United States)

    Kozlov, V. G.; Skrypnikov, A. V.; Chernyshova, E. V.; Mogutnov, R. V.; Levushkin, D. M.

    2018-05-01

    The development of information technologies in Russia and the prospects for their further improvement allow us to identify a stable trend of expansion of both functions of the corresponding automated information systems (AIS) and the spheres of their application. At the same time, many threats to information processes in the AIS are expanding, which in turn stimulates the development of adequate means and systems for ensuring the information security of the AS and methods for assessing their protection. It is necessary to assess the ability of the system to continue its normal functioning under the conditions of permanent destructive influences and to resist them, to adapt the functioning algorithms to new conditions and to organize functional restoration or to ensure functioning with a gradual process of degradation, possibly without losing the most significant “critical” information functions. The analysis and evaluation of reliability are needed to be transformed into the analysis and evaluation of survivability. Survivability can be considered as the ability of the information system to store and restore the performance of basic functions in a given volume and for a given time in the case of a change in the system structure and / or algorithms and the conditions of its functioning due to adverse effects. One of the system survivability indicators is the reserve of survivability (S-survivability) that is the critical number of defects reduced by a unit. The authors will consider defect as a unit of measurement of damage to the information system by adverse impact. U is denoted as the critical number of defects, then S = 1-U is the index of S-survivability. The article gives the definition of an analytical formula for the function of damage and risk.

  15. Preliminary observations of environmental damage due to the Gulf War

    International Nuclear Information System (INIS)

    El-Baz, F.

    1992-01-01

    Preparing for and conducting the Gulf War resulted in much damage to the environment of the region. The first and most visible effect is related to the damage caused by oil well fires in terms of air pollution as well as the potential damage to the petroleum reservoirs. The second detrimental effect has been caused by the oil spill in the Gulf water. Hundreds of miles of the western coastline of the Gulf are already covered with oil. Petroleum 'mats' have settled on coral reefs and have reduced Gulf water productivity. Foremost among the irreparable damages are changes to the terrain due to the digging of trenches, building walls of soil and otherwise disturbing the desert pavement in and around Kuwait. Disruption of the, usually, one-grain thick layer of pebbles on the desert floor exposes soil to wind action. Changing the contours of the normally flat land increases resistance to the wind and increases the potential of particle transport until the land is peneplained. This condition will increase the frequency and the ferocity of dust storms in the region. It will also result in the formation of new sand dunes; sand drifts already exist along roads in northern Kuwait. It is believed that the detrimental effects on the atmosphere will last for years, on the Gulf water for decades, and on the desert surface for centuries. (author). 12 refs, 1 fig

  16. Preliminary observations of environmental damage due to the Gulf War

    Energy Technology Data Exchange (ETDEWEB)

    El-Baz, F [Boston Univ., Boston, MA (United States). Center for Remote Sensing

    1992-02-01

    Preparing for and conducting the Gulf War resulted in much damage to the environment of the region. The first and most visible effect is related to the damage caused by oil well fires in terms of air pollution as well as the potential damage to the petroleum reservoirs. The second detrimental effect has been caused by the oil spill in the Gulf water. Hundreds of miles of the western coastline of the Gulf are already covered with oil. Petroleum 'mats' have settled on coral reefs and have reduced Gulf water productivity. Foremost among the irreparable damages are changes to the terrain due to the digging of trenches, building walls of soil and otherwise disturbing the desert pavement in and around Kuwait. Disruption of the, usually, one-grain thick layer of pebbles on the desert floor exposes soil to wind action. Changing the contours of the normally flat land increases resistance to the wind and increases the potential of particle transport until the land is peneplained. This condition will increase the frequency and the ferocity of dust storms in the region. It will also result in the formation of new sand dunes; sand drifts already exist along roads in northern Kuwait. It is believed that the detrimental effects on the atmosphere will last for years, on the Gulf water for decades, and on the desert surface for centuries. (author). 12 refs, 1 fig.

  17. Spatial variability in oviposition damage by periodical cicadas in a fragmented landscape.

    Science.gov (United States)

    Cook, William M; Holt, Robert D; Yao, Jin

    2001-03-01

    Effects of the periodical cicada (Magicicada spp.) on forest dynamics are poorly documented. A 1998 emergence of M. cassini in eastern Kansas led to colonization of a fragmented experimental landscape undergoing secondary succession. We hypothesized that per-tree rates of oviposition damage by cicadas would reflect: (1) distance from the source of the emergence, (2) patch size, and (3) local tree density. Ovipositing females displayed clear preferences for host species and damage incidence showed predictable spatial patterns. Two species (smooth sumac, Rhus glabra, and eastern red cedar, Juniperus virginiana) were rarely attacked, whereas others (rough-leaved dogwood, Cornus drummondii; slippery elm, Ulmus rubra; box elder, Acer negundo, and honey locust, Gleditsia triacanthos) were strongly attacked. The dominant early successional tree, dogwood, received on average the most attacks. As predicted, attacks per stem declined strongly with distance from the emergence source, and with local stem density (a "dilution" effect). Contrary to expectations, there were more attacks per stem on larger patches. Because ovipositing cicadas cut damaging slits in host tree branches, potentially affecting tree growth rate, competitive ability, and capacity to reproduce, cicada damage could potentially influence spatial variation in secondary succession.

  18. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  19. Alloys influence in ferritic steels with hydrogen attack

    International Nuclear Information System (INIS)

    Moro, L; Rey Saravia, D; Lombardich, J; Saggio, M; Juan, A; Blanco, J

    2003-01-01

    Materials exposed to a corrosive environment and high temperatures, are associated with a decrease of their mechanical properties and embitterment.At room temperatures atomic hydrogen diffuses easily through metals structure, it accumulates in lattice defects forming molecular hydrogen and generating cracking due to internal stresses.Under high temperatures the phenomenon is more complex.The steels in these conditions present different structures of precipitates, that the change under creep conditions period.In this work it is determined the influence of Cr and V alloys, the changes of ferritic steel resistance in a corrosive environment and high temperatures.1.25 Cr 1 Mo 0.25 V and 2.25Cr 1 Mo under different loads and temperatures previously attacked by hydrogen environment.The hydrogen is induced by the electrolytic technique, optimizing the choice of temperatures, current density, electrolyte, etc. In order to control an adequate cathode charge, a follow up procedure is carried out by electronic barrier microscopy.After the attack, the material is settled at room temperatures for certain period of time, to allow the hydrogen to leave and evaluate the residual damage.Creep by torsion assays, under constant load and temperature is used as an experimental technique.With the outcome data curves are drawn in order to study the secondary creep rate, with the applied load and temperature, determining the value of stress exponent n and the activation energy Q.Comparing to equal assays to the same ferritic steels but non attacked by hydrogen, these values allows the prediction of microstructure changes present during these tests

  20. The assessment of damages due to climate change in a situation of uncertainty: the contribution of adaptation cost modelling

    International Nuclear Information System (INIS)

    Dumas, P.

    2006-01-01

    The aim of this research is to introduce new elements for the assessment of damages due to climate changes within the frame of compact models aiding the decision. Two types of methodologies are used: sequential optimisation stochastic models and simulation stochastic models using optimal assessment methods. The author first defines the damages, characterizes their different categories, and reviews the existing assessments. Notably, he makes the distinction between damages due to climate change and damages due to its rate. Then, he presents the different models used in this study, the numerical solutions, and gives a rough estimate of the importance of the considered phenomena. By introducing a new category of capital in an optimal growth model, he tries to establish a framework allowing the representation of adaptation and of its costs. He introduces inertia in macro-economical evolutions, climatic variability, detection of climate change and damages due to climate hazards

  1. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  2. An overview of road damages due to flooding: Case study in Kedah state, Malaysia

    Science.gov (United States)

    Ismail, Muhd Shahril Nizam; Ghani, Abdul Naser Abdul

    2017-10-01

    Flooding occurs frequently in many countries including Malaysia. Floods in Malaysia are usually due to heavy and prolonged rainfall, uncontrolled development, and drainage systems that are not being monitored. Road damage due to flooding event can cause huge expenditures for the post-flooding rehabilitation and maintenance. The required maintenance and rehabilitation could upset the original life cycle cost estimations. Data on road statistics were obtained from the Highway Planning Division, Ministry of Works Malaysia and data on flooding was collected from the Department of Irrigation and Drainage Malaysia for events between 2012 and 2015. The pilot sites were selected based on its historical cases of floods that caused road damages in Kedah. The pilot site indicated that the impact of flooding on road infrastructures systems can be used to plan better road design and maintenances. It also revealed that it costs more than RM 1 million to reinstate roads damaged by flooding in a typical district annually.

  3. An investigation on damaged buildings in Ranau due the 2015 Sabah earthquake

    Science.gov (United States)

    Lim, Yang Soh; Tan, Jun Pin; Chiew, Lerk Qing; Chang, Wai Hoe; Lau, Tze Liang

    2017-10-01

    A magnitude 5.9 earthquake struck near Ranau district in Sabah, Malaysia on June 5, 2015. The epicenter was located 14 km from Ranau. Various buildings were damaged by the earthquake. This paper discusses the extent of the destruction to two severely damaged structures in Ranau. An assessment of damaged buildings in Ranau Hospital using microtremor data was conducted after the earthquake event. The building consists of two identical blocks with similar soft-story structural forms. Two microtremor observations were carried out before and after the repair work. The predominant frequencies of the damaged buildings were determined by using the Nakamura's H/V method. Based on the assumption that both identical blocks of building in Ranau Hospital have similar predominant frequencies due to the same structural design and construction quality, results show that B block of Ranau Hospital suffered more damage compared with another block of the building. The predominant frequency of B block is 10% lower than that of A Block. Results obtained are consistent with the observed building performance during the site reconnaissance. The predominant frequency of both buildings measured after the repair work shows 11% to 21% increment, which implies that the lateral stiffness of both buildings has been improved.

  4. Computed chest tomography in rats with pulmonary damage due to microembolism

    Energy Technology Data Exchange (ETDEWEB)

    Wegener, T.; Wegenius, G.; Hemmingsson, A.; Jung, B.; Saldeen, T.

    Computed chest tomography was performed in 13 rats with pulmonary damage due to microembolism, caused by injection of thrombin (500 NIH/kg body weight) and tranexamic acid, a fibrinolytic inhibitor (200 mg/kg body weight), and in 9 control rats. The purpose of the investigation was to perform attenuation measurements at two levels of the right lung, each with three regions of interest (anterior, mid and posterior). Alterations in attenuation, compared with controls, were correlated with lung weight. Compared with controls, the attenuation was significantly increased in the anterior and posterior regions at both levels in animals with pulmonary damage, but not in the mid regions. There was a statistically significant correlation between increasing attenuation and increasing lung weight. A significant difference was found between damaged and control lungs regarding the microscopic grade of interstitial oedema, alveolar oedema and fibrin. Histograms of attenuation values in computed tomograms might be of value in detecting alveolar oedema. It is concluded that computed chest tomography is a good method for detection pulmonary oedema at an early stage of experimental microembolism in the rat.

  5. Computed chest tomography in rats with pulmonary damage due to microembolism

    International Nuclear Information System (INIS)

    Wegener, T.; Wegenius, G.; Hemmingsson, A.; Jung, B.; Saldeen, T.; Uppsala Univ.; Uppsala Univ.; Uppsala Univ.

    1986-01-01

    Computed chest tomography was performed in 13 rats with pulmonary damage due to microembolism, caused by injection of thrombin (500 NIH/kg body weight) and tranexamic acid, a fibrinolytic inhibitor (200 mg/kg body weight), and in 9 control rats. The purpose of the investigation was to perform attenuation measurements at two levels of the right lung, each with three regions of interest (anterior, mid and posterior). Alterations in attenuation, compared with controls, were correlated with lung weight. Compared with controls, the attenuation was significantly increased in the anterior and posterior regions at both levels in animals with pulmonary damage, but not in the mid regions. There was a statistically significant correlation between increasing attenuation and increasing lung weight. A significant difference was found between damaged and control lungs regarding the microscopic grade of interstitial oedema, alveolar oedema and fibrin. Histograms of attenuation values in computed tomograms might be of value in detecting alveolar oedema. It is concluded that computed chest tomography is a good method for detection pulmonary oedema at an early stage of experimental microembolism in the rat. (orig.)

  6. Iron-Deficiency Anemia Leading to Transient Ischemic Attacks due to Intraluminal Carotid Artery Thrombus

    Directory of Open Access Journals (Sweden)

    H. Z. Batur Caglayan

    2013-01-01

    Full Text Available Reactive thrombocytosis secondary to iron-deficiency anemia (IDA is a rare but recognized cause of stroke. We report the case of a patient with iron-deficiency anemia presenting with multiple transient ischemic attacks (TIA due to intraluminal thrombus of an internal carotid artery. The putative mechanisms underlying anemia and stroke syndromes are not completely understood, and it is believed that iron deficiency may cause ischemic stroke by several potential mechanisms. Thrombocytosis is often associated with iron deficiency, and microcytosis produces a reduction in the red cell deformability and could produce a hypercoagulable state. The platelet count and function observed in iron-deficiency anemia could act synergistically to promote thrombus formation, especially in the setting of an underlying atherosclerotic disease. The presence of floating thrombus in a patient with clinical and MRI evidence of stroke represents a significant therapeutic dilemma and requires immediate decision about treatment.

  7. A Stochastic Framework for Quantitative Analysis of Attack-Defense Trees

    NARCIS (Netherlands)

    Jhawar, Ravi; Lounis, Karim; Mauw, Sjouke

    2016-01-01

    Cyber attacks are becoming increasingly complex, practically sophisticated and organized. Losses due to such attacks are important, varying from the loss of money to business reputation spoilage. Therefore, there is a great need for potential victims of cyber attacks to deploy security solutions

  8. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  9. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    OpenAIRE

    Pinzón, Cristian; de Paz Santana, Yanira; Bajo Pérez, Javier; Abraham, Ajith P.; Corchado Rodríguez, Juan M.

    2009-01-01

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a k...

  10. Behavioral Modeling of WSN MAC Layer Security Attacks: A Sequential UML Approach

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    is the vulnerability to security attacks/threats. The performance and behavior of a WSN are vastly affected by such attacks. In order to be able to better address the vulnerabilities of WSNs in terms of security, it is important to understand the behavior of the attacks. This paper addresses the behavioral modeling...... of medium access control (MAC) security attacks in WSNs. The MAC layer is responsible for energy consumption, delay and channel utilization of the network and attacks on this layer can introduce significant degradation of the individual sensor nodes due to energy drain and in performance due to delays....... The behavioral modeling of attacks will be beneficial for designing efficient and secure MAC layer protocols. The security attacks are modeled using a sequential diagram approach of Unified Modeling Language (UML). Further, a new attack definition, specific to hybrid MAC mechanisms, is proposed....

  11. Assessment of damage to the desert surfaces of Kuwait due to the Gulf War

    International Nuclear Information System (INIS)

    El-Baz, F.; Al-Ajmi, D.

    1993-01-01

    This is a preliminary report on a joint research project by Boston University and the Kuwait Institute for Scientific Research that commenced in April 1992. The project aim is to establish the extent and nature of environmental damage to the desert surface and coastal zone of Kuwait due to the Gulf War and its aftermath. Change detection image enhancement techniques were employed to enhance environmental change by comparison of Landsat Thematic Mapper images obtained before the wars and after the cessation of the oil and well fires. Higher resolution SPOT images were also utilized to evaluate the nature of the environmental damage to specific areas. The most prominent changes were due to: (1) the deposition of oil and course-grained soot on the desert surface as a result of ''oil rain'' from the plume that emanated from the oil well fires; (2) the formation of hundreds of oil lakes, from oil seepage at the damaged oil well heads; (3) the mobilization of sand and dust and (4) the pollution of segments of the coastal zone by the deposition of oil from several oil spills. Interpretation of satellite image data are checked in the field to confirm the observations, and to assess the nature of the damage. Final results will be utilized in establishing the needs for remedial action to counteract the harmful effects of the various types of damage to the environment of Kuwait

  12. Bacterial Cell Surface Damage Due to Centrifugal Compaction

    NARCIS (Netherlands)

    Peterson, Brandon W.; Sharma, Prashant K.; van der Mei, Henny C.; Busscher, Henk J.

    Centrifugal damage has been known to alter bacterial cell surface properties and interior structures, including DNA. Very few studies exist on bacterial damage caused by centrifugation because of the difficulty in relating centrifugation speed and container geometry to the damage caused. Here, we

  13. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Chan Young; Seong, Poong Hyun [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  14. Suggestion of a Framework to Analyze Failure Modes and Effect of Cyber Attacks in NPP

    International Nuclear Information System (INIS)

    Lee, Chan Young; Seong, Poong Hyun

    2016-01-01

    The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  15. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  16. Damage costs due to automotive air pollution and the influence of street canyons

    International Nuclear Information System (INIS)

    Spadaro, Joseph V.; Rabl, Ari

    2001-01-01

    Using the methodology of the ExternE Project of the European Commission, we have evaluated the damage costs of automotive air pollution by way of two case studies in France: a trip across Paris, and a trip from Paris to Lyon. This methodology involves an analysis of the impact pathways, starting with the emissions (e.g., g/km of particles form tailpipe), followed by local and regional dispersion (e.g., incremental μg/m 3 of particles), calculation of the physical impacts using exposure-response functions (e.g., cases of respiratory hospital admissions), and finally multiplication by unit costs factors (e.g., ε per hospital admission). Damages are aggregated over all affected receptors in Europe. In addition to the local and regional dispersion calculations carried out so far by ExternE, we also consider the increased microscale impacts due to the trapping of pollutants in street canyons, using numerical simulations with the FLUENT software. We have evaluated impacts to human health, agricultural crops and building materials, due to particles, NO x , CO, HC and CO 2 . Health impacts, especially reduced life expectancy, dominate in terms of cost. Damages for older cars (before 1997) range from 2 to 41Euro cents/km, whereas for newer cars (since 1997), the range 1-9 Euro cents/km, and there is continuing progress in reducing the emissions further. In large cities, the particulate emissions of diesel cars lead to the highest damages, exceeding those of gasoline cars by a factor of 7. For cars before 1997 the order of magnitude of the damage costs is comparable to the price of gasoline, and the loss of life expectancy is comparable to that from traffic accidents. (Author)

  17. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  18. DNA Damage by Ionizing Radiation: Tandem Double Lesions by Charged Particles

    Science.gov (United States)

    Huo, Winifred M.; Chaban, Galina M.; Wang, Dunyou; Dateo, Christopher E.

    2005-01-01

    Oxidative damages by ionizing radiation are the source of radiation-induced carcinogenesis, damage to the central nervous system, lowering of the immune response, as well as other radiation-induced damages to human health. Monte Carlo track simulations and kinetic modeling of radiation damages to the DNA employ available molecular and cellular data to simulate the biological effect of high and low LET radiation io the DNA. While the simulations predict single and double strand breaks and base damages, so far all complex lesions are the result of stochastic coincidence from independent processes. Tandem double lesions have not yet been taken into account. Unlike the standard double lesions that are produced by two separate attacks by charged particles or radicals, tandem double lesions are produced by one single attack. The standard double lesions dominate at the high dosage regime. On the other hand, tandem double lesions do not depend on stochastic coincidences and become important at the low dosage regime of particular interest to NASA. Tandem double lesions by hydroxyl radical attack of guanine in isolated DNA have been reported at a dosage of radiation as low as 10 Gy. The formation of two tandem base lesions was found to be linear with the applied doses, a characteristic of tandem lesions. However, tandem double lesions from attack by a charged particle have not been reported.

  19. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  20. The Clinical Test of Nano gold Cosmetic for Recovering Skin Damage Due to Chemicals: Special Case

    Science.gov (United States)

    Taufikurohmah, T.; Wardana, A. P.; Tjahjani, S.; Sanjaya, I. G. M.; Baktir, A.; Syahrani, A.

    2018-01-01

    Manufacturing of Nano gold cosmetics was done at PT. Gizi Indonesia. Clinical trials to cosmetics data supported that cosmetics are able to treat skin health which has been reported partially. For special cases, the recovery process of facial skin damage should also receive attention including cases of facial skin damage caused by chemicals such as phenol, HCl, aqua regia or other harsh chemicals. The problem determined whether the Nano gold is able to recover skin damage due to the harsh chemicals. This clinical trial data on the forms of early skin damage caused by phenol was delivered in the forms of facial photos patients. The recovery progress of facial skin condition was obtained every week for two months. The data included the forms of widespread wounds during the recovery process. This statement supported by anova statistical analysis of the widespread wound changing every week for 8 times. The conclusion is skin damage due to Phenol impregnation can be recovered with the use of Nano gold cosmetics for 8 weeks. This results support the manufacturing of Nano gold cosmetics for the needs of society. It also suggest that Nano gold material can be used for medicine manufacturing in the future.

  1. Assessment of Mechanical Properties and Damage of High Performance Concrete Subjected to Magnesium Sulfate Environment

    Directory of Open Access Journals (Sweden)

    Sheng Cang

    2017-01-01

    Full Text Available Sulfate attack is one of the most important problems affecting concrete structures, especially magnesium sulfate attack. This paper presents an investigation on the mechanical properties and damage evolution of high performance concrete (HPC with different contents of fly ash exposure to magnesium sulfate environment. The microstructure, porosity, mass loss, dimensional variation, compressive strength, and splitting tensile strength of HPC were investigated at various erosion times up to 392 days. The ultrasonic pulse velocity (UPV propagation in HPC at different erosion time was determined by using ultrasonic testing technique. A relationship between damage and UPV of HPC was derived according to damage mechanics, and a correlation between the damage of HPC and erosion time was obtained eventually. The results indicated that (1 the average increasing amplitude of porosity for HPCs was 34.01% before and after exposure to magnesium sulfate solution; (2 the damage evolution of HPCs under sulfate attack could be described by an exponential fitting; (3 HPC containing 20% fly ash had the strongest resistance to magnesium sulfate attack.

  2. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  3. Nursery Pest Management of Phytolyma lata Walker (Scott) Attack ...

    African Journals Online (AJOL)

    The establishment of plantations of Milicia excelsa has been constrained by the gall-forming psyllid Phytolyma lata Walker (Scott) that causes extensive damage to young plants. We present findings of an experiment aimed at preventing Phytolyma attack on Milicia seedlings in the nursery using chemical control and ...

  4. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  5. Damage symptoms of plants due to PAN exposure

    Energy Technology Data Exchange (ETDEWEB)

    Nouchi, I; Sawada, T; Ohashi, T; Odaira, T

    1974-11-01

    In order to identify the cause of plant damage which differed from that by ozone, a series of exposure experiments was carried out on Beta vulgaris, Japanese radish, French bean, luthern, tomato, and spinach in a controlled weather room by artificially synthesized PAN (peroxyacetyl nitrate). The damage appeared generally on younger leaves as a lustering and bronzing on the lower surface; there was a specific symptom in which the interveinary part of the lower surface depressed, leaving the veins in relief. At higher concentrations of PAN, damages appeared on the upper surface of leaves, however, bronzing and lustering were clearer during exposure to lower concentrations of PAN. The position of the leaves and the part of a leaf which was damaged were constant in the petunia, morning glory, and tobacco. There was a hyperbolic relationship between the concentration of PAN and the time period of appearance of the damage as was seen during sulfur dioxide and ozone exposures.

  6. Nonlinear analysis of NPP safety against the aircraft attack

    International Nuclear Information System (INIS)

    Králik, Juraj; Králik, Juraj

    2016-01-01

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  7. Nonlinear analysis of NPP safety against the aircraft attack

    Energy Technology Data Exchange (ETDEWEB)

    Králik, Juraj, E-mail: juraj.kralik@stuba.sk [Faculty of Civil Engineering, STU in Bratislava, Radlinského 11, 813 68 Bratislava (Slovakia); Králik, Juraj, E-mail: kralik@fa.stuba.sk [Faculty of Architecture, STU in Bratislava, Námestie Slobody 19, 812 45 Bratislava (Slovakia)

    2016-06-08

    The paper presents the nonlinear probabilistic analysis of the reinforced concrete buildings of nuclear power plant under the aircraft attack. The dynamic load is defined in time on base of the airplane impact simulations considering the real stiffness, masses, direction and velocity of the flight. The dynamic response is calculated in the system ANSYS using the transient nonlinear analysis solution method. The damage of the concrete wall is evaluated in accordance with the standard NDRC considering the spalling, scabbing and perforation effects. The simple and detailed calculations of the wall damage are compared.

  8. Nonstructural carbohydrate dynamics of lodgepole pine dying from mountain pine beetle attack.

    Science.gov (United States)

    Wiley, Erin; Rogers, Bruce J; Hodgkinson, Robert; Landhäusser, Simon M

    2016-01-01

    Bark beetle outbreaks are an important cause of tree death, but the process by which trees die remains poorly understood. The effect of beetle attack on whole-tree nonstructural carbohydrate (NSC) dynamics is particularly unclear, despite the potential role of carbohydrates in plant defense and survival. We monitored NSC dynamics of all organs in attacked and protected lodgepole pines (Pinus contorta) during a mountain pine beetle (Dendroctonus ponderosae) outbreak in British Columbia, starting before beetle flight in June 2011 through October 2012, when most attacked trees had died. Following attack, NSC concentrations were first reduced in the attacked region of the bole. The first NSC reduction in a distant organ appeared in the needles at the end of 2011, while branch and root NSC did not decline until much later in 2012. Attacked trees that were still alive in October 2012 had less beetle damage, which was negatively correlated with initial bark sugar concentrations in the attack region. The NSC dynamics of dying trees indicate that trees were killed by a loss of water conduction and not girdling. Further, our results identify locally reduced carbohydrate availability as an important mechanism by which stressors like drought may increase tree susceptibility to biotic attack. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  9. Influence of Titanium Dioxide Nanoparticles on the Sulfate Attack upon Ordinary Portland Cement and Slag-Blended Mortars

    Directory of Open Access Journals (Sweden)

    Atta-ur-Rehman

    2018-02-01

    Full Text Available In this study, the effects of titanium dioxide (TiO2 nanoparticles on the sulfate attack resistance of ordinary Portland cement (OPC and slag-blended mortars were investigated. OPC and slag-blended mortars (OPC:Slag = 50:50 were made with water to binder ratio of 0.4 and a binder to sand ratio of 1:3. TiO2 was added as an admixture as 0%, 3%, 6%, 9% and 12% of the binder weight. Mortar specimens were exposed to an accelerated sulfate attack environment. Expansion, changes in mass and surface microhardness were measured. Scanning Electron Microscopy (SEM, Energy Dispersive Spectroscopy (EDS, X-ray Diffraction (XRD, Thermogravimetry Analysis (TGA and Differential Scanning Calorimetry (DSC tests were conducted. The formation of ettringite and gypsum crystals after the sulfate attack were detected. Both these products had caused crystallization pressure in the microstructure of mortars and deteriorated the mortars. Our results show that the addition of nano-TiO2 accelerated expansion, variation in mass, loss of surface microhardness and widened cracks in OPC and slag-blended mortars. Nano-TiO2 containing slag-blended mortars were more resistant to sulfate attack than nano-TiO2 containing OPC mortars. Because nano-TiO2 reduced the size of coarse pores, so it increased crystallization pressure due to the formation of ettringite and gypsum thus led to more damage under sulfate attack.

  10. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  11. Setting Component Priorities in Protecting NPPs against Cyber-Attacks Using Reliability Analysis Techniques

    International Nuclear Information System (INIS)

    Choi, Moon Kyoung; Seong, Poong Hyun; Son, Han Seong

    2017-01-01

    The digitalization of infrastructure makes systems vulnerable to cyber threats and hybrid attacks. According to ICS-CERT report, as time goes by, the number of vulnerabilities in ICS industries increases rapidly. Digital I and C systems have been developed and installed in nuclear power plants, and due to installation of the digital I and C systems, cyber security concerns are increasing in nuclear industry. However, there are too many critical digital assets to be inspected in digitalized NPPs. In order to reduce the inefficiency of regulation in nuclear facilities, the critical components that are directly related to an accident are elicited by using the reliability analysis techniques. Target initial events are selected, and their headings are analyzed through event tree analysis about whether the headings can be affected by cyber-attacks or not. Among the headings, the headings that can be proceeded directly to the core damage by the cyber-attack when they are fail are finally selected as the target of deriving the minimum cut-sets. We analyze the fault trees and derive the minimum set-cuts. In terms of original PSA, the value of probability for the cut-sets is important but the probability is not important in terms of cyber security of NPPs. The important factors is the number of basic events consisting of the minimal cut-sets that is proportional to vulnerability.

  12. Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study

    DEFF Research Database (Denmark)

    Jiang, Lijun; Meng, Weizhi; Wang, Michael Yu

    2017-01-01

    ) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen information and the user inputs during the charging process. The rationale is that users’ information can be leaked through a standard micro USB connector...... that employs the Mobile High-Definition Link (MHL) standard. Motivated by the potential damage of charging attack, we focus on JFC attack in this paper, and investigate for the first time the energy consumption, especially CPU usage caused by JFC attack. In particular, we conduct a user study with over 500...... participants and identify that JFC attack may increase CPU usage when connecting the phone to the malicious charger, but this anomaly is hard for raising the attention from a common user. Our work aims to complement existing state-of-the-art results, raise more attention and stimulate more research on charging...

  13. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  14. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, D R; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the first time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  15. Characterization of Women Requesting Inter-consultations of Psychology Due to Violence

    Directory of Open Access Journals (Sweden)

    Alain Darcout Rodríguez

    2017-02-01

    Full Text Available Foundation: partner violence against women is a problem which cause chronic psychological damages in addition to physical damage, so as disability, sequelae and decreased quality of life. Objective: to characterize women requesting inter-consultation of psychology due to violence in the Riobamba province. Methods: a descriptive cross study about violence against women, during the period between April 2015 and May 2016. A total of 132 female were included. As a method of data collection it was used documentary revision. The variables analyzed were: distribution of women according to age, level of instruction, occupation, relationship with the attacker, place of origin, type of violence received, frequency and reason for the attack, measures taken and consequences of violence. The data were processed according to descriptive statistics. Results: women between 20 and 29 years old predominated (32 %, with secondary education level, housewives (43 %, living in the south of the city (41 %, violence was predominantly exercised by the spouse (49 %, of psychological type (54 % and reporting it was for the first time (48 %, associating it with alcohol consumption of the attacker (17 % and women’s insubordination (16 %, (41 % left their houses, and (83 % present as negative sequale negative emotions and problems with their children (82 %. Conclusion: women victims of violence were predominantly young, with a secondary level of instruction, living in the south zone of the Riobamba city. Violence was exercised mainly by the spouse and psychological violence predominated. They reacted living their houses and presented as main sequelae negative emotions and problems with their children.

  16. The Damage To The Armour Layer Due To Extreme Waves

    Science.gov (United States)

    Oztunali Ozbahceci, Berguzar; Ergin, Aysen; Takayama, Tomotsuka

    2010-05-01

    The sea waves are not regular but random and chaotic. In order to understand this randomness, it is common to make individual wave analysis in time domain or spectral analysis in frequency domain. Characteristic wave heights like Hmax, H%2,H1-10, H1-3, Hmean are obtained through individual wave analysis in time domain. These characteristic wave heights are important because they are used in the design of different type of coastal structures. It is common to use significant wave height, H1-3,for the design of rubble mound structures. Therefore, only spectrally derived or zero-crossing significant wave height is usually reported for the rubble mound breakwaters without any information on larger waves. However, even the values of H1-3are similar; some train of irregular waves may exhibit a large fluctuation of instantaneous wave energy, while another train may not show such a fluctuation (Goda, 1998). Moreover, freak or rogue wave, simply defined as the wave exceeding at least twice the significant wave height may also occur. Those larger waves were called as extreme waves in this study and the effect of extreme waves on the damage to the armour layer of rubble mound breakwaters was investigated by means of hydraulic model experiment. Rock armored rubble mound breakwater model with 1:1.5 slope was constructed in the wave channel of Hydraulics Laboratory of the Disaster Prevention Research Institute of Kyoto University, Japan. The model was consisted of a permeable core layer, a filter and armour layer with two stones thicknesses. Size of stones were same for both of the slopes as Dn50(armour)=0.034m, Dn50(filter)=0.021m and Dn50(core)=0.0148m for armour, filter and core layers, respectively. Time series which are approximately equal to 1000 waves, with similar significant wave height but different extreme wave height cases were generated. In order to generate necessary time series in the wave channel, they were firstly computed by numerically. For the numerical

  17. Evolution of Army Attack Aviation: A Chaotic Coupled Pendulums Analogy

    Science.gov (United States)

    2013-05-23

    forward of the FLOT for 36 minutes.32 Ground Campaign: 4-229 AVN Deep Attack, 26-27 February With the commencement of the ground campaign on 24......battalions worth of tanks and armored personnel carriers while receiving no damage to 4-229 AVN aircraft.34 Prior planning, training, and command

  18. Ovarian damage due to cyst removal

    DEFF Research Database (Denmark)

    Perlman, Signe; Kjer, Jens J

    2016-01-01

    INTRODUCTION: Surgical treatment of endometriomas and potential damage to the ovary have been debated. Studies have described the inconsistent risk of unintended removal of ovarian tissue when a cystectomy of an endometrioma is performed. We evaluated the risk of inadvertently removed ovarian tis...

  19. Effects of Motivation: Rewarding Hackers for Undetected Attacks Cause Analysts to Perform Poorly.

    Science.gov (United States)

    Maqbool, Zahid; Makhijani, Nidhi; Pammi, V S Chandrasekhar; Dutt, Varun

    2017-05-01

    The aim of this study was to determine how monetary motivations influence decision making of humans performing as security analysts and hackers in a cybersecurity game. Cyberattacks are increasing at an alarming rate. As cyberattacks often cause damage to existing cyber infrastructures, it is important to understand how monetary rewards may influence decision making of hackers and analysts in the cyber world. Currently, only limited attention has been given to this area. In an experiment, participants were randomly assigned to three between-subjects conditions ( n = 26 for each condition): equal payoff, where the magnitude of monetary rewards for hackers and defenders was the same; rewarding hacker, where the magnitude of monetary reward for hacker's successful attack was 10 times the reward for analyst's successful defense; and rewarding analyst, where the magnitude of monetary reward for analyst's successful defense was 10 times the reward for hacker's successful attack. In all conditions, half of the participants were human hackers playing against Nash analysts and half were human analysts playing against Nash hackers. Results revealed that monetary rewards for human hackers and analysts caused a decrease in attack and defend actions compared with the baseline. Furthermore, rewarding human hackers for undetected attacks made analysts deviate significantly from their optimal behavior. If hackers are rewarded for their undetected attack actions, then this causes analysts to deviate from optimal defend proportions. Thus, analysts need to be trained not become overenthusiastic in defending networks. Applications of our results are to networks where the influence of monetary rewards may cause information theft and system damage.

  20. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  1. Environmental problems associated with blasting in mines: public apprehensions of damage due to blast vibrations - case studies

    Energy Technology Data Exchange (ETDEWEB)

    Padhi, S.N. [DGMS, Bhubaneswar (India)

    1994-12-31

    Blast vibrations may be felt in intensities as small as 1/100 of that required to cause any damage to structures. Therefore, the public response and thus complaints regarding damages are often imaginary. The paper deals with three case studies, involving alleged damage from blasting in surface and underground coal mines where public litigations and agitations resulted due to such apprehensions. The paper is written in simple technical language as the situations warranted that the blast vibration studies should be understood by the general public. 7 tabs.

  2. Effects of foliar herbivory by insects on the fitness of Raphanus raphanistrum: damage can increase male fitness.

    Science.gov (United States)

    Strauss, S Y; Conner, J K; Lehtilä, K P

    2001-11-01

    Generally, effects of herbivory on plant fitness have been measured in terms of female reproductive success (seed production). However, male plant fitness, defined as the number of seeds sired by pollen, contributes half of the genes to the next generation and is therefore crucial to the evolution of natural plant populations. This is the first study to examine effects of insect herbivory on both male and female plant reproductive success. Through controlled field and greenhouse experiments and genetic paternity analysis, we found that foliar damage by insects caused a range of responses by plants. In one environment, damaged plants had greater success as male parents than undamaged plants. Neither effects on pollen competitive ability nor pollinator visitation patterns could explain the greater siring success of these damaged plants. Success of damaged plants as male parents appeared to be due primarily to changes in allocation to flowers versus seeds after damage. Damaged plants produced more flowers early in the season, but not more seeds, than undamaged plants. Based on total seed production, male fitness measures from the first third of the season, and flower production, we estimated that damaged and undamaged plants had equal total reproductive success at the end of the season in this environment. In a second, richer environment, damaged and undamaged plants had equal male and female plant fitness, and no traits differed significantly between the treatments. Equal total reproductive success may not be ecologically or evolutionarily equivalent if it is achieved differentially through male versus female fitness. Genes from damaged plants dispersed through pollen may escape attack from herbivores, if such attack is correlated spatially from year to year.

  3. Finding Multi-step Attacks in Computer Networks using Heuristic Search and Mobile Ambients

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    2009-01-01

    An important aspect of IT security governance is the proactive and continuous identification of possible attacks in computer networks. This is complicated due to the complexity and size of networks, and due to the fact that usually network attacks are performed in several steps. This thesis proposes

  4. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  5. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  6. New perspectives on the damage estimation for buried pipeline systems due to seismic wave propagation

    Energy Technology Data Exchange (ETDEWEB)

    Pineda Porras, Omar Andrey [Los Alamos National Laboratory

    2009-01-01

    Over the past three decades, seismic fragility fonnulations for buried pipeline systems have been developed following two tendencies: the use of earthquake damage scenarios from several pipeline systems to create general pipeline fragility functions; and, the use of damage scenarios from one pipeline system to create specific-system fragility functions. In this paper, the advantages and disadvantages of both tendencies are analyzed and discussed; in addition, a summary of what can be considered the new challenges for developing better pipeline seismic fragility formulations is discussed. The most important conclusion of this paper states that more efforts are needed to improve the estimation of transient ground strain -the main cause of pipeline damage due to seismic wave propagation; with relevant advances in that research field, new and better fragility formulations could be developed.

  7. Validity of reciprocity rule on mouse skin thermal damage due to CO2 laser irradiation

    Science.gov (United States)

    Parvin, P.; Dehghanpour, H. R.; Moghadam, M. S.; Daneshafrooz, V.

    2013-07-01

    CO2 laser (10.6 μm) is a well-known infrared coherent light source as a tool in surgery. At this wavelength there is a high absorbance coefficient (860 cm-1), because of vibration mode resonance of H2O molecules. Therefore, the majority of the irradiation energy is absorbed in the tissue and the temperature of the tissue rises as a function of power density and laser exposure duration. In this work, the tissue damage caused by CO2 laser (1-10 W, ˜40-400 W cm-2, 0.1-6 s) was measured using 30 mouse skin samples. Skin damage assessment was based on measurements of the depth of cut, mean diameter of the crater and the carbonized layer. The results show that tissue damage as assessed above parameters increased with laser fluence and saturated at 1000 J cm-2. Moreover, the damage effect due to high power density at short duration was not equivalent to that with low power density at longer irradiation time even though the energy delivered was identical. These results indicate the lack of validity of reciprocity (Bunsen-Roscoe) rule for the thermal damage.

  8. Experiment Analysis of Concrete’s Mechanical Property Deterioration Suffered Sulfate Attack and Drying-Wetting Cycles

    Directory of Open Access Journals (Sweden)

    Wei Tian

    2017-01-01

    Full Text Available The mechanism of concrete deterioration in sodium sulfate solution is investigated. The macroperformance was characterized via its apparent properties, mass loss, and compressive strength. Changes in ions in the solution at different sulfate attack periods were tested by inductively coupled plasma (ICP. The damage evolution law, as well as analysis of the concrete’s meso- and microstructure, was revealed by scanning electron microscope (SEM and computed tomography (CT scanning equipment. The results show that the characteristics of concrete differed at each sulfate attack period; the drying-wetting cycles generally accelerated the deterioration process of concrete. In the early sulfate attack period, the pore structure of the concrete was filled with sulfate attack products (e.g., ettringite and gypsum, and its mass and strength increased. The pore size and porosity decreased while the CT number increased. As deterioration progressed, the swelling/expansion force of products and the salt crystallization pressure of sulfate crystals acted on the inner wall of the concrete to accumulate damage and accelerate deterioration. The mass and strength of concrete sharply decreased. The number and volume of pores increased, and the pore grew more quickly resulting in initiation and expansion of microcracks while the CT number decreased.

  9. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  10. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    Science.gov (United States)

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  11. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  12. Detecting unknown attacks in wireless sensor networks that contain mobile nodes.

    Science.gov (United States)

    Banković, Zorana; Fraga, David; Moya, José M; Vallejo, Juan Carlos

    2012-01-01

    As wireless sensor networks are usually deployed in unattended areas, security policies cannot be updated in a timely fashion upon identification of new attacks. This gives enough time for attackers to cause significant damage. Thus, it is of great importance to provide protection from unknown attacks. However, existing solutions are mostly concentrated on known attacks. On the other hand, mobility can make the sensor network more resilient to failures, reactive to events, and able to support disparate missions with a common set of sensors, yet the problem of security becomes more complicated. In order to address the issue of security in networks with mobile nodes, we propose a machine learning solution for anomaly detection along with the feature extraction process that tries to detect temporal and spatial inconsistencies in the sequences of sensed values and the routing paths used to forward these values to the base station. We also propose a special way to treat mobile nodes, which is the main novelty of this work. The data produced in the presence of an attacker are treated as outliers, and detected using clustering techniques. These techniques are further coupled with a reputation system, in this way isolating compromised nodes in timely fashion. The proposal exhibits good performances at detecting and confining previously unseen attacks, including the cases when mobile nodes are compromised.

  13. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  14. Enamel subsurface damage due to tooth preparation with diamonds.

    Science.gov (United States)

    Xu, H H; Kelly, J R; Jahanmir, S; Thompson, V P; Rekow, E D

    1997-10-01

    In clinical tooth preparation with diamond burs, sharp diamond particles indent and scratch the enamel, causing material removal. Such operations may produce subsurface damage in enamel. However, little information is available on the mechanisms and the extent of subsurface damage in enamel produced during clinical tooth preparation. The aim of this study, therefore, was to investigate the mechanisms of subsurface damage produced in enamel during tooth preparation by means of diamond burs, and to examine the dependence of such damage on enamel rod orientation, diamond particle size, and removal rate. Subsurface damage was evaluated by a bonded-interface technique. Tooth preparation was carried out on two enamel rod orientations, with four clinical diamond burs (coarse, medium, fine, and superfine) used in a dental handpiece. The results of this study showed that subsurface damage in enamel took the form of median-type cracks and distributed microcracks, extending preferentially along the boundaries between the enamel rods. Microcracks within individual enamel rods were also observed. The median-type cracks were significantly longer in the direction parallel to the enamel rods than perpendicular to the rods. Preparation with the coarse diamond bur produced cracks as deep as 84 +/- 30 microns in enamel. Finishing with fine diamond burs was effective in crack removal. The crack lengths in enamel were not significantly different when the removal rate was varied. Based on these results, it is concluded that subsurface damage in enamel induced by tooth preparation takes the form of median-type cracks as well as inter- and intra-rod microcracks, and that the lengths of these cracks are sensitive to diamond particle size and enamel rod orientation, but insensitive to removal rate.

  15. Mechanical damage due to corrosion of parts of pump technology and valves of LWR power installations

    International Nuclear Information System (INIS)

    Hron, J.; Krumpl, M.

    1986-01-01

    Two types are described of uneven corrosion of austenitic chromium-nickel steel: pitting and slit corrosion. The occurrence of slit corrosion is typical of parts of pumping technology and valves. The corrosion damage of austenitic chromium-nickel steels spreads as intergranular, transgranular or mixed corrosion. In nuclear power facilities with LWR's, intergranular corrosion is due to chlorides and sulphur compounds while transgranular corrosion is due to the presence of dissolved oxygen and chlorides. In mechanically stressed parts, stress corrosion takes place. The recommended procedures are discussed of reducing the corrosion-mechanical damage of pumping equipment of light water reactors during design, production and assembly. During the service of the equipment, corrosion cracks are detected using nondestructive methods and surface cracks are repaired by grinding and welding. (E.S.)

  16. MRI findings of brain damage due to neonatal hypoglycemia

    International Nuclear Information System (INIS)

    Wang Lu; Fan Guoguang; Ji Xu; Sun Baohai; Guo Qiyong

    2009-01-01

    Objective: To report the MRI findings of brain damage observed in neonatal patients who suffered from isolated hypoglycemia and to explore the value of diffusion-weighted imaging(DWI) in early detection of neonatal hypoglycemic brain injury. Methods: Twelve neonates with isolated hypoglycemia (10 of the 12 were diagnosed to suffer from hypoglycemic encephalopathy) were enrolled in this study. They were first scanned at age from 3 days to 10 days with T 1 WI, T 2 WI and DWI(b is 0 s/mm 2 , 1000 s/mm 2 ), and 4 of them were then scanned from 7 days to 10 days following the initial scan. All acquired MR images were retrospectively analysed. Results: First series of DWI images showed distinct hyperintense signal in 11 cases in several areas including bilateral occipital cortex (2 cases), right occipital cortex (1 case), left occipital cortex and subcortical white matter(1 case), bilateral occipital cortex and subcortical white matter (2 cases), bilateral parieto-occipital cortex (2 cases), bilateral parieto-occipital cortex and subcortical white matter(2 cases), the splenium of corpus callosum (4 cases), bilateral corona radiata( 2 cases), left caudate nucleus and globus pallidus (1 case), bilateral thalamus (1 case), bilaterally posterior limb of internal capsule (1 case). In the initial T 1 WI and T 2 WI images, there were subtle hypointensity in the damaged cortical areas (3 cases), hyperintensity in the bilaterally affected occipital cortex( 1 case) on T 1 weighted images, and hyperintensity in the affected cortex and subcortical white matter with poor differentiation on T 2 weighted images. The followed-up MRI of 4 cases showed regional encephalomalacia in the affected occipital lobes(4 cases), slightly hyperintensity on T 2 weighted images in the damaged occipital cortex (2 cases), extensive demyelination (1 case), disappearance of hyperintensity of the splenium of corpus callosum (1 case), and persistent hyperintensity in the splenium of corpus callosum (1 case

  17. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  18. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation. © 2015 Society for Risk Analysis.

  19. Assessment of damage from reduction of expected lifespan due to cancer

    Directory of Open Access Journals (Sweden)

    Boris Alengordovich Korobitsyn

    2013-09-01

    Full Text Available This paper presents the theoretical and methodological approaches to the assessment of damage from premature mortality and reduction of life expectancy due to various reasons. The concepts measuring the price of a human life are analyzed: the evaluation from the standpoint of the theory of human capital; indirect estimation taking into account non-monetary social costs; evaluation of individuals’ willingness to pay for the elimination of the risk of death; estimation based on the determination of insurance premiums and compensations under court decision; evaluation of the social investments, aimed to reduce the risk of premature mortality of the individual. The following indexes were calculated for all subordinate entities of the Russian Federation: reduction of life expectancy, lost years of potential life in the working age, and gross regional product lost due to the reduction of years of potential life in the working-age population as a result of cancer

  20. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  1. PROTECTION WORKS AGAINST WAVE ATTACKS IN THE HAOR AREAS OF BANGLADESH: ANALYSIS OF SUSTAINABILITY

    Directory of Open Access Journals (Sweden)

    M.K. Alam

    2010-12-01

    Full Text Available Haor is the local name of the saucer-shaped, naturally depressed areas of Bangladesh. There are 414 haors in the northeast region that comprise approximately 17% of the country. These areas are submerged under deep water from July to November due to the overflow of rivers and heavy rainfall, causing them to appear like seas with erosive waves. Recently, the wave attack has drastically increased because of de-plantation and changing cropping patterns to allow for more agricultural production. The local people, government and Non-Government Organisations (NGOs have tried many techniques to protect life and property against wave attacks. A cost comparison shows that Cement Concrete (CC blocks over geotextile on the slope embankment is a cost-effective, environment friendly and socially acceptable method to prevent loss of life and property. However, the design rules employed by the engineers are faulty because there is knowledge gap in the application of wave hydraulics among these professionals. As a result, damage frequently occurs and maintenance costs are increasing. This study explores the sustainability of the CC blocks used in the Haor areas by evaluating two case studies with the verification of available design rules.

  2. Experimental and numerical study on cement paste degradation under external sulfate attack

    NARCIS (Netherlands)

    Ma, X.; Copuroglu, O.; Schlangen, H.E.J.G.; Han, N; Xing, F; Saouma, V.; Bolander, J.; Landis, E.

    2016-01-01

    External sulfate attack is one of the situations that may cause gradual but severe damage in cementitious materials, which may lead to cracking, increased permeability and strength loss. In this paper, thin-walled hollow cement paste cylinders with a wall thickness of 2.5mm were made considering the

  3. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  4. Attack tree based cyber security analysis of nuclear digital instrumentation and control systems

    International Nuclear Information System (INIS)

    Khand, P.A.

    2009-01-01

    To maintain the cyber security, nuclear digital Instrumentation and Control (I and C) systems must be analyzed for security risks because a single security breach due to a cyber attack can cause system failure, which can have catastrophic consequences on the environment and staff of a Nuclear Power Plant (NPP). Attack trees have been widely used to analyze the cyber security of digital systems due to their ability to capture system specific as well as attacker specific details. Therefore, a methodology based on attack trees has been proposed to analyze the cyber security of the systems. The methodology has been applied for the Cyber Security Analysis (CSA) of a Bistable Processor (BP) of a Reactor Protection System (RPS). Threats have been described according to their source. Attack scenarios have been generated using the attack tree and possible counter measures according to the Security Risk Level (SRL) of each scenario have been suggested. Moreover, cyber Security Requirements (SRs) have been elicited, and suitability of the requirements has been checked. (author)

  5. Can You Recognize a Heart Attack or Stroke? What To Do When Every Moment Counts

    Science.gov (United States)

    ... Special Issues Subscribe August 2014 Print this issue Can You Recognize a Heart Attack or Stroke? What ... could prevent many of these deaths. Fast action can also limit permanent damage to the body. Heart ...

  6. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  7. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  8. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  9. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    International Nuclear Information System (INIS)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Rinder, Thomas; Klammer, Dietmar; Leis, Albrecht; Tritthart, Josef; Dietzel, Martin

    2013-01-01

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L −1 of SO 4 and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L −1 of SO 4 and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as 2 H/H and 18 O/ 16 O isotope ratios of H 2 O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the

  10. Cross-Layer Damage Assessment for Cyber Situational Awareness

    Science.gov (United States)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  11. Protection of Microkernel Environment L4Re from Stack-smashed Attacks

    OpenAIRE

    Vasily Andreevich Sartakov; Alexander Sergeevich Tarasikov

    2014-01-01

    Microkernel-based operating systems provide high level of protection due to the strong isolation of components, small size of Trusted Computing Base and execution of drivers in user space. At the same time, such systems are vulnerable to a stack overflow attacks, because these attacks exploit the hardware features of the platform, such as shared memory space for data and code. Modern architectures, such as AMD64 and ARM, provide opportunities to counteract attacks at the hardware level by dis...

  12. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  13. Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

    OpenAIRE

    Mirsky, Yisroel; Kalbo, Naor; Elovici, Yuval; Shabtai, Asaf

    2018-01-01

    The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic. In this paper, we propose Vesper: a novel plug-and-play MitM detector for local area networks. Vesper uses a technique inspired from impulse respo...

  14. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  15. Numerical assessment of wind turbine blade damage due to contact/impact with tower during installation

    Science.gov (United States)

    Shankar Verma, Amrit; Petter Vedvik, Nils; Gao, Zhen

    2017-12-01

    The use of floating crane vessel for installation of offshore wind turbine blades presents a great challenge in terms of its random motions and is likely to increase the probability of the blade hitting the preassembled tower during lifting operation. To evaluate the consequences of such scenarios and to determine the allowable motions or sea states for such operations, it is very important to understand the damage development in the blade due to impact. The present paper employs the application of high fidelity finite element method to investigate the damage behavior in the blade when the leading edge of the blade hits the tower. A nonlinear time domain structural analysis using ABAQUS was conducted on the DTU 10 MW reference blade model which is based on shell elements. Damage assessment along with the nature of evolution of various energies is examined and presented for two different impact velocities with modified layup stacking sequence at the contact region.

  16. Critical supply network protection against intentional attacks: A game-theoretical model

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2013-01-01

    A crucial issue in today's critical supply chains is how to protect facilities against intentional attacks, since it has become unacceptable to ignore the high impact of low probability disruptions caused by these attacks. This article develops a game-theoretical model to deal with the protection of facilities, in the context of the uncapacitated fixed-charge location problem. Given a set of investment alternatives for protecting the facilities against identified threats, the objective is to select the optimal defence strategy. The attacker is considered as a player who tries to maximise the expected damage while weighing against the attacks expenditures. The conflict on facilities vulnerability is modelled using the concept of contest. The vulnerability of a facility is defined by its destruction probability. Contest success functions determine the vulnerability of each facility dependent on the relative investments of the defender and the attacker on each facility, and on the characteristics of the contest. A method is developed to evaluate the utilities of the players (i.e., the defender and the attacker). This method evaluates many expected costs, including the cost needed to restore disabled facilities, the backorder cost, and the cost incurred because of the increase in transportation costs after attacks. In fact, when one or several facilities are unavailable, transportation costs will increase since reassigned customers may receive shipments from facilities which are farther away. The model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defence strategy. An illustrative example is presented. The approach is compared to other suggested strategies, and some managerial insights are provided in the context of facility location

  17. Extra lethal damage due to residual incompletely repaired sublethal damage in hyperfractionated and continuous radiation treatment

    Energy Technology Data Exchange (ETDEWEB)

    Chen, J.; van de Geijn, J.; Goffman, T. (ROB, DCT, NCI, NIH, Bethesda, Maryland 20892 (US))

    1991-05-01

    In the conventional linear--quadratic model of single-dose response, the {alpha} and {beta} terms reflect lethal damage created {ital during} the delivery of a dose, from two different presumed molecular processes, one linear with dose, the other quadratic. With the conventional one-fraction-per-day (or less) regimens, the sublethal damage (SLD), presumably repairing exponentially over time, is essentially completely fixed by the time of the next dose of radiation. If this assumption is true, the effects of subsequent fractions of radiation should be independent, that is, there should be little, if any, reversible damage left from previous fractions, at the time of the next dose. For multiple daily fractions, or for the limiting case, continuous radiation, this simplification may overlook damaged cells that have had insufficient time for repair. A generalized method is presented for accounting for extra lethal damage (ELD) arising from such residual SLD for hyperfractionation and continuous irradiation schemes. It may help to predict differences in toxicity and tumor control, if any, obtained with unconventional'' treatment regimens. A key element in the present model is the finite size and the dynamic character of the pool of sublethal damage. Besides creating the usual linear and quadratic components of lethal damage, each new fraction converts a certain fraction of the existing SLD into ELD, and creates some new SLD.

  18. Extra lethal damage due to residual incompletely repaired sublethal damage in hyperfractionated and continuous radiation treatment

    International Nuclear Information System (INIS)

    Chen, J.; van de Geijn, J.; Goffman, T.

    1991-01-01

    In the conventional linear--quadratic model of single-dose response, the α and β terms reflect lethal damage created during the delivery of a dose, from two different presumed molecular processes, one linear with dose, the other quadratic. With the conventional one-fraction-per-day (or less) regimens, the sublethal damage (SLD), presumably repairing exponentially over time, is essentially completely fixed by the time of the next dose of radiation. If this assumption is true, the effects of subsequent fractions of radiation should be independent, that is, there should be little, if any, reversible damage left from previous fractions, at the time of the next dose. For multiple daily fractions, or for the limiting case, continuous radiation, this simplification may overlook damaged cells that have had insufficient time for repair. A generalized method is presented for accounting for extra lethal damage (ELD) arising from such residual SLD for hyperfractionation and continuous irradiation schemes. It may help to predict differences in toxicity and tumor control, if any, obtained with ''unconventional'' treatment regimens. A key element in the present model is the finite size and the dynamic character of the pool of sublethal damage. Besides creating the usual linear and quadratic components of lethal damage, each new fraction converts a certain fraction of the existing SLD into ELD, and creates some new SLD

  19. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  20. Videodensitometry in rats with pulmonary damage due to microembolism

    Energy Technology Data Exchange (ETDEWEB)

    Wegenius, G.; Wegener, T.; Ruhn, G.; Saldeen, T.; Erikson, U.

    Serial pulmonary angiography with videodensitometry was performed in 18 rats with pulmonary damage caused by administration of a fibrinolysis inhibitor, tranexamic acid (200 mg/kg body weight injected intraperitoneally) and bovine thrombin (500 NIH/kg body weight injected into the right femoral vein). The mean transit time (MTT) was calculated from videodensitometry, the observed area of interest consisting of approximately one-third of the right lung, including both central and peripheral parts. The impact of the pulmonary damage was analysed by morphologic methods and correlated to MTT. Although a pressure rise presumably occurred in the pulmonary circulation, no change in MTT was found after induction of pulmonary damage, indicating opening of actual and potential anastomoses between pulmonary arterioles and venules to serve as by-pass portions and as a safety-valve mechanism for the capillary bed and the right heart, respectively. Another explanation to unchanged MTT may be opening of resting capillary beds. Two rats with very severe pulmonary damage showed prolonged MTT. These rats may have suffered from cardiac failure.

  1. Videodensitometry in rats with pulmonary damage due to microembolism

    International Nuclear Information System (INIS)

    Wegenius, G.; Wegener, T.; Ruhn, G.; Saldeen, T.; Erikson, U.

    1985-01-01

    Serial pulmonary angiography with videodensitometry was performed in 18 rats with pulmonary damage caused by administration of a fibrinolysis inhibitor, tranexamic acid (200 mg/kg body weight injected intraperitoneally) and bovine thrombin (500 NIH/kg body weight injected into the right femoral vein). The mean transit time (MTT) was calculated from videodensitometry, the observed area of interest consisting of approximately one-third of the right lung, including both central and peripheral parts. The impact of the pulmonary damage was analysed by morphologic methods and correlated to MTT. Although a pressure rise presumably occurred in the pulmonary circulation, no change in MTT was found after induction of pulmonary damage, indicating opening of actual and potential anastomoses between pulmonary arterioles and venules to serve as by-pass portions and as a safety-valve mechanism for the capillary bed and the right heart, respectively. Another explanation to unchanged MTT may be opening of resting capillary beds. Two rats with very severe pulmonary damage showed prolonged MTT. These rats may have suffered from cardiac failure. (orig.)

  2. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  3. Developing advanced fingerprint attacks on challenge-based collaborative intrusion detection networks

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    Traditionally, an isolated intrusion detection system (IDS) is vulnerable to various types of attacks. In order to enhance IDS performance, collaborative intrusion detection networks (CIDNs) are developed through enabling a set of IDS nodes to communicate with each other. Due to the distributed...... network architecture, insider attacks are one of the major threats. In the literature, challenge-based trust mechanisms have been built to identify malicious nodes by evaluating the satisfaction levels between challenges and responses. However, such mechanisms rely on two major assumptions, which may...... result in a weak threat model. In this case, CIDNs may be still vulnerable to advanced insider attacks in real-world deployment. In this paper, we propose a novel collusion attack, called passive message fingerprint attack (PMFA), which can collect messages and identify normal requests in a passive way...

  4. Damage to apparel layers and underlying tissue due to hand-gun bullets.

    Science.gov (United States)

    Carr, Debra; Kieser, Jules; Mabbott, Alexander; Mott, Charlotte; Champion, Stephen; Girvan, Elizabeth

    2014-01-01

    Ballistic damage to the clothing of victims of gunshot wounds to the chest can provide useful forensic evidence. Anyone shot in the torso will usually be wearing clothing which will be damaged by the penetrating impact event and can reportedly be the source of some of the debris in the wound. Minimal research has previously been reported regarding the effect of bullets on apparel fabrics and underlying tissue. This paper examines the effect of ammunition (9 mm full metal jacket [FMJ] DM11 A1B2, 8.0 g; and soft point flat nose Remington R357M3, 10.2 g) on clothing layers that cover the torso (T-shirt, T-shirt plus hoodie, T-shirt plus denim jacket) and underlying structures represented by porcine thoracic wall (skin, underlying tissue, ribs). Impacts were recorded using a Phantom V12 high speed camera. Ejected bone debris was collected before wound tracts were dissected and measured; any debris found was recovered for further analysis. Size and mass of bony debris was recorded; fibre debris recovered from the wound and impact damage to fabrics were imaged using scanning electron microscopy (SEM). Remington R357M3 ammunition was characteristically associated with stellate fabric damage; individual fibres were less likely to show mushrooming. In contrast, 9 mm FMJ ammunition resulted in punch-out damage to fabric layers, with mushrooming of individual fibres being more common. Entry wound sizes were similar for both types of ammunition and smaller than the diameter of the bullet that caused them. In this work, the Remington R357M3 ammunition resulted in larger exit wounds due to the bullet construction which mushroomed. That fabric coverings did not affect the amount of bony debris produced is interesting, particularly given there was some evidence that apparel layers affected the size of the wound. Recent work has suggested that denim (representative of jeans) can exacerbate wounding caused by high-velocity bullet impacts to the thigh when the bullet does not

  5. Interaction of insecticide and media moisture on ambrosia beetle (Coleoptera: Curculionidae) attacks on ornamental trees

    Science.gov (United States)

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) and Xylosandrus germanus (Blandford), are among the most economically damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but rec...

  6. SiC: An Agent Based Architecture for Preventing and Detecting Attacks to Ubiquitous Databases

    Science.gov (United States)

    Pinzón, Cristian; de Paz, Yanira; Bajo, Javier; Abraham, Ajith; Corchado, Juan M.

    One of the main attacks to ubiquitous databases is the structure query language (SQL) injection attack, which causes severe damages both in the commercial aspect and in the user’s confidence. This chapter proposes the SiC architecture as a solution to the SQL injection attack problem. This is a hierarchical distributed multiagent architecture, which involves an entirely new approach with respect to existing architectures for the prevention and detection of SQL injections. SiC incorporates a kind of intelligent agent, which integrates a case-based reasoning system. This agent, which is the core of the architecture, allows the application of detection techniques based on anomalies as well as those based on patterns, providing a great degree of autonomy, flexibility, robustness and dynamic scalability. The characteristics of the multiagent system allow an architecture to detect attacks from different types of devices, regardless of the physical location. The architecture has been tested on a medical database, guaranteeing safe access from various devices such as PDAs and notebook computers.

  7. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  8. Endogenous melatonin and oxidatively damaged guanine in DNA

    DEFF Research Database (Denmark)

    Davanipour, Zoreh; Poulsen, Henrik E; Weimann, Allan

    2009-01-01

    overnight guanine DNA damage. 8-oxodG and 8-oxoGua were measured using a high-performance liquid chromatography-electrospray ionization tandem mass spectrometry assay. The mother, father, and oldest sampled daughter were used for these analyses. Comparisons between the mothers, fathers, and daughters were...... attack and increase the rate of repair of that damage. This paper reports the results of a study relating the level of overnight melatonin production to the overnight excretion of the two primary urinary metabolites of the repair of oxidatively damaged guanine in DNA. METHODS: Mother...

  9. DETECTION AND LOCALIZATION OF MULTIPLE SPOOFING ATTACKERS FOR MOBILE WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    R. Maivizhi

    2015-06-01

    Full Text Available The openness nature of wireless networks allows adversaries to easily launch variety of spoofing attacks and causes havoc in network performance. Recent approaches used Received Signal Strength (RSS traces, which only detect spoofing attacks in mobile wireless networks. However, it is not always desirable to use these methods as RSS values fluctuate significantly over time due to distance, noise and interference. In this paper, we discusses a novel approach, Mobile spOofing attack DEtection and Localization in WIireless Networks (MODELWIN system, which exploits location information about nodes to detect identity-based spoofing attacks in mobile wireless networks. Also, this approach determines the number of attackers who used the same node identity to masquerade as legitimate device. Moreover, multiple adversaries can be localized accurately. By eliminating attackers the proposed system enhances network performance. We have evaluated our technique through simulation using an 802.11 (WiFi network and an 802.15.4 (Zigbee networks. The results prove that MODELWIN can detect spoofing attacks with a very high detection rate and localize adversaries accurately.

  10. Mapping the most significant computer hacking events to a temporal computer attack model

    CSIR Research Space (South Africa)

    Van Heerden, R

    2012-09-01

    Full Text Available of an impending net- work attack, and occur before any real damage has occurred. Popular reconnaissance actions include network mapping and scanning with tools such as Nmap and Nessus. Google and other search engines can also be used to identify potential weak.... ? Reconnaissance: Using well-known search engines to search for potential weak- nesses in the Windows operating system and Microsoft Outlook. ? Ramp-up: Writing the I-LOVE-YOU worm code. ? Damage: The spreading the I-LOVE-YOU worm via e-mail. It led...

  11. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  12. A simple coherent attack and practical security of differential phase shift quantum cryptography

    International Nuclear Information System (INIS)

    Kronberg, D A

    2014-01-01

    The differential phase shift quantum key distribution protocol reveals good security against such powerful attacks as unambiguous state discrimination and beam splitting attacks. Its complete security analysis is complex due to high dimensions of the supposed spaces and density operators. In this paper, we consider a particular and conceptually simple coherent attack, available in practical implementations. The main condition for this attack is the length of used coherent state tuples of order 8–12. We show that under this condition, no high level of practical distance between legitimate users can be achieved. (paper)

  13. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  14. Testing Silica Fume-Based Concrete Composites under Chemical and Microbiological Sulfate Attacks

    Directory of Open Access Journals (Sweden)

    Adriana Estokova

    2016-04-01

    Full Text Available Current design practices based on descriptive approaches to concrete specification may not be appropriate for the management of aggressive environments. In this study, the durability of cement-based materials with and without the addition of silica fume, subjected to conditions that leach calcium and silicon, were investigated. Chemical corrosion was simulated by employing various H2SO4 and MgSO4 solutions, and biological corrosion was simulated using Acidithiobacillus sp. bacterial inoculation, leading to disrupted and damaged surfaces; the samples’ mass changes were studied following both chemical and biological attacks. Different leaching trends were observed via X-ray fluorescence when comparing chemical with biological leaching. Lower leaching rates were found for concrete samples fortified with silica fume than those without silica fume. X-ray diffraction and scanning electron microscopy confirmed a massive sulfate precipitate formation on the concrete surface due to bacterial exposure.

  15. Damage estimation of subterranean building constructions due to groundwater inundation – the GIS-based model approach GRUWAD

    Directory of Open Access Journals (Sweden)

    R. Schinke

    2012-09-01

    Full Text Available The analysis and management of flood risk commonly focuses on surface water floods, because these types are often associated with high economic losses due to damage to buildings and settlements. The rising groundwater as a secondary effect of these floods induces additional damage, particularly in the basements of buildings. Mostly, these losses remain underestimated, because they are difficult to assess, especially for the entire building stock of flood-prone urban areas. For this purpose an appropriate methodology has been developed and lead to a groundwater damage simulation model named GRUWAD. The overall methodology combines various engineering and geoinformatic methods to calculate major damage processes by high groundwater levels. It considers a classification of buildings by building types, synthetic depth-damage functions for groundwater inundation as well as the results of a groundwater-flow model. The modular structure of this procedure can be adapted in the level of detail. Hence, the model allows damage calculations from the local to the regional scale. Among others it can be used to prepare risk maps, for ex-ante analysis of future risks, and to simulate the effects of mitigation measures. Therefore, the model is a multifarious tool for determining urban resilience with respect to high groundwater levels.

  16. Mortality from heart attack in Belgrade population during the period 1990-2004

    Directory of Open Access Journals (Sweden)

    Ratkov Isidora

    2008-01-01

    Full Text Available INTRODUCTION In most countries, cardiovascular diseases are the leading disorders, with ischemic heart diseases being the leading cause of death. According to WHO data, every year about 17 million people die of cardiovascular diseases, which is 30% of all deaths. Ischemic heart diseases contribute from one-third to one-half of all deaths due to cardiovascular diseases. Three point eight million men and 3.4 million women in the world die every year from ischemic heart diseases, and in Europe about 2 million. The highest mortality rate from ischemic heart diseases occurs in India, China and Russia. OBJECTIVE The aim of this descriptive epidemiological study was to determine heart attack mortality in Belgrade population during the period 1990-2004. METHOD In the study, we conducted investigation of Belgrade population during the period 1990-2004. Mortality data were obtained from the city institution for statistics. The mortality rates were calculated based on the total Belgrade population obtained from the mean values for the last two register years (1991 and 2002. The mortality rates were standardized using the direct method of standardization according to the world (Segi standard population. RESULTS In the Belgrade population during the period 1990-2004, the participation of mortality rate due to heart attack among deaths from cardiovascular diseases was 17% in males and 10% in females. In Belgrade male population, mean standardized mortality rates (per 100,000 habitants were 50.5 for heart attack, 8.3 for chronic ischemic heart diseases and 4.6 for angina pectoris, while in females the rates were 30.8, 6.7 and 4.2, respectively. Mortality from ischemic heart diseases and from heart attack was higher in males than in females. During the studied 15-year period, on average 755 males and 483 females died due to heart attack every year. Mean standardized mortality rates per 100,000 habitants were 50.0 in male and 31.1 in female population. Males

  17. Attack tree analysis for insider threats on the IoT using isabelle

    DEFF Research Database (Denmark)

    Kammüller, Florian; Nurse, Jason R. C.; Probst, Christian W.

    2016-01-01

    The Internet-of-Things (IoT) aims at integrating small devices around humans. The threat from human insiders in "regular" organisations is real; in a fully-connected world of the IoT, organisations face a substantially more severe security challenge due to unexpected access possibilities and info....... On the classified IoT attack examples, we show how this logical approach can be used to make the models more precise and to analyse the previously identified Insider IoT attacks using Isabelle attack trees....

  18. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  19. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  20. A New Mechanism to Improve the Detection Rate of Shilling Attacks in the Recommender Systems

    Directory of Open Access Journals (Sweden)

    javad nehriri

    2017-12-01

    Full Text Available Recommender systems are widely used, in social networks and online stores, to overcome the problems caused by the large amount of information. Most of these systems use a collaborative filtering method to generate recommendations to the users. But, as in this method users’ feedback is considered for recommendations, it can be significantly erroneous by the malicious people. In other words, there may be some users who open fake profiles and vote one-sided or biased in the system that may cause disturbance in providing proper recommendations to other users. This kind of damage is said to be shiling attacks. If the attackers succeed, the user's trust in the recommender systems will reduce. In recent years, efficient attack detection algorithms have been proposed, but each has its own limitations. In this paper, we use profile-based and item-based algorithms to provide a new mechanism to significantly reduce the detection error for shilling attacks.

  1. Filtered air plastic chamber as an experimental facility to prove visible damage of crops due to air pollution

    Energy Technology Data Exchange (ETDEWEB)

    Matsuoka, Y; Yoda, H; Omichi, S; Shiratori, K

    1975-01-01

    An experimental filtered air chamber was constructed to prove the visible damage of crops due to air pollution. The chamber was provided with another room into which non-filtered ambient air was introduced. The purified air was prepared by filtering ambient air with activated carbon. The average content of air pollutants in the purified air chamber was less than 10 to 20% of the ozone and 20% of the sulfur oxides in the ambient air. However, cultivated vegetables such as tobacco and spinach, which are susceptible to oxidant, showed no visible damage in the filtered air chamber, and showed the same damage in the nonfiltered air chamber as was seen in fields at the same time.

  2. RESISTANCE TO THE ATTACK OF DRY-WOOD TERMITES (Cryptotermes brevis) OF SIX WOOD SPECIES

    OpenAIRE

    Fabrício Gomes Gonçalves; José Tarcísio da Silva Oliveira

    2006-01-01

    The dry wood termites are one of the largest causes of damages in wood used in Brazil. This work analyzed the attackof the Cryptotermes brevis in six commercials wood species in the north of the Rio de Janeiro and south of the Espírito Santo. The testobserved the number of holes, the percentage of died individuals and the damage of the pieces. When compared to the Pinus sp(reference), the species with less susceptibility to the attack were Cedrela fissilis, Cariocar brasiliense and Goupia gla...

  3. Damage reconstruction due to impact of high-energetic particles on Malaysia Airlines flight MH17 (U)

    NARCIS (Netherlands)

    2015-01-01

    The Dutch Safety Board (DSB) investigates the crash of Malaysia Airlines flight MH17 which occurred on Thursday July 17, 2014 in the Donetsk region (Ukraine). The DSB wants to provide a clear picture of the cause of the crash. A possible cause is fatal damage to the aircraft due to detonation of the

  4. Multi-factor evaluation indicator method for the risk assessment of atmospheric and oceanic hazard group due to the attack of tropical cyclones

    Science.gov (United States)

    Qi, Peng; Du, Mei

    2018-06-01

    China's southeast coastal areas frequently suffer from storm surge due to the attack of tropical cyclones (TCs) every year. Hazards induced by TCs are complex, such as strong wind, huge waves, storm surge, heavy rain, floods, and so on. The atmospheric and oceanic hazards cause serious disasters and substantial economic losses. This paper, from the perspective of hazard group, sets up a multi-factor evaluation method for the risk assessment of TC hazards using historical extreme data of concerned atmospheric and oceanic elements. Based on the natural hazard dynamic process, the multi-factor indicator system is composed of nine natural hazard factors representing intensity and frequency, respectively. Contributing to the indicator system, in order of importance, are maximum wind speed by TCs, attack frequency of TCs, maximum surge height, maximum wave height, frequency of gusts ≥ Scale 8, rainstorm intensity, maximum tidal range, rainstorm frequency, then sea-level rising rate. The first four factors are the most important, whose weights exceed 10% in the indicator system. With normalization processing, all the single-hazard factors are superposed by multiplying their weights to generate a superposed TC hazard. The multi-factor evaluation indicator method was applied to the risk assessment of typhoon-induced atmospheric and oceanic hazard group in typhoon-prone southeast coastal cities of China.

  5. Frost induced damages within porous materials - from concrete technology to fuel cells technique

    Science.gov (United States)

    Palecki, Susanne; Gorelkov, Stanislav; Wartmann, Jens; Heinzel, Angelika

    2017-12-01

    Porous media like concrete or layers of membrane electrode assemblies (MEA) within fuel cells are affected by a cyclic frost exposure due to different damage mechanisms which could lead to essential degradation of the material. In general, frost damages can only occur in case of a specific material moisture content. In fuel cells, residual water is generally available after shut down inside the membrane i.e. the gas diffusion layer (GDL). During subsequent freezing, this could cause various damage phenomena such as frost heaves and delamination effects of the membrane electrode assembly, which depends on the location of pore water and on the pore structure itself. Porous materials possess a pore structure that could range over several orders of magnitudes with different properties and freezing behaviour of the pore water. Latter can be divided into macroscopic, structured and pre-structured water, influenced by surface interactions. Therefore below 0 °C different water modifications can coexist in a wide temperature range, so that during frost exposure a high amount of unfrozen and moveable water inside the pore system is still available. This induces transport mechanisms and shrinkage effects. The physical basics are similar for porous media. While the freezing behaviour of concrete has been studied over decades of years, in order to enhance the durability, the know-how about the influence of a frost attack on fuel cell systems is not fully understood to date. On the basis of frost damage models for concrete structures, an approach to describe the impact of cyclic freezing and thawing on membrane electrode assemblies has been developed within this research work. Major aim is beyond a better understanding of the frost induced mechanisms, the standardization of a suitable test procedure for the assessment of different MEA materials under such kind of attack. Within this contribution first results will be introduced.

  6. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  7. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  8. An approach to Identify the Risk Induced by Cyber-Attack on the Non-safety NPP I and C System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hee Eun; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Kim, Jong Hyun [Chosun University, Gwangju (Korea, Republic of); Son, Han Sung [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    In this study, influence of the attack on the non-safety system will be investigated, because the cyber-attack on the safety system cannot be accomplished easily. To identify the risk from cyber-attack, the result of PSA will be applied. Cyber-attack may cause other risks except for the core damage. Those risks also can be identified by applying this method. This study could be reinforced in a more realistic way if the information on the maintenance is considered, because certain type of cyber-attack could be detected during the maintenance. Also, possible set of wrong actions need to be selected, based on the knowledge of I and C system and its vulnerabilities because the hacker might not attack every information. To obtain the realistic result information that can be manipulated need to be listed, because the hacker may not attack certain information, not to be detected during the maintenance. In addition, by using the result of this study, the test plan for the cyber-attack can be suggested. If the scenario is given, the criteria for the test target selection can be obtained. It includes the target component and information.

  9. An approach to Identify the Risk Induced by Cyber-Attack on the Non-safety NPP I and C System

    International Nuclear Information System (INIS)

    Kim, Hee Eun; Kang, Hyun Gook; Kim, Jong Hyun; Son, Han Sung

    2016-01-01

    In this study, influence of the attack on the non-safety system will be investigated, because the cyber-attack on the safety system cannot be accomplished easily. To identify the risk from cyber-attack, the result of PSA will be applied. Cyber-attack may cause other risks except for the core damage. Those risks also can be identified by applying this method. This study could be reinforced in a more realistic way if the information on the maintenance is considered, because certain type of cyber-attack could be detected during the maintenance. Also, possible set of wrong actions need to be selected, based on the knowledge of I and C system and its vulnerabilities because the hacker might not attack every information. To obtain the realistic result information that can be manipulated need to be listed, because the hacker may not attack certain information, not to be detected during the maintenance. In addition, by using the result of this study, the test plan for the cyber-attack can be suggested. If the scenario is given, the criteria for the test target selection can be obtained. It includes the target component and information

  10. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  11. Efficacy of nebulized fluticasone propionate in adult patients admitted to the emergency department due to bronchial asthma attack.

    Science.gov (United States)

    Starobin, Daniel; Bolotinsky, Ludmila; Or, Jack; Fink, Gershon; Shtoeger, Zev

    2008-01-01

    Locally delivered steroids by inhalers or nebulizers have been shown in small trials to be effective in acute asthma attack, but evidence-based data are insufficient to establish their place as routine management of adult asthma attacks. To determine the efficacy of nebulized compared to systemic steroids in adult asthmatics admitted to the emergency department following an acute attack. Adult asthmatics admitted to the ED were assigned in random consecutive case fashion to one of three protocol groups: group 1--nebulized steroid fluticasone (Flixotide Nebules), group 2--intravenous methylprednisolone, group 3--combined treatment by both routes. Objective and subjective parameters, such as peak expiratory flow, oxygen saturation, heart rate and dyspnea score, were registered before and 2 hours after ED treatment was initiated. Steroids were continued for 1 week following the ED visit according to the protocol arm. Data on hospital admission/discharge rate, ED readmissions in the week after enrollment and other major events related to asthma were registered. Altogether, 73 adult asthmatics were assigned to receive treatment: 24 patients in group 1, 23 in group 2 and 26 in group 3. Mean age was 44.4 +/- 16.8 years (range 17-75 years). Peak expiratory flow and dyspnea score significantly improved in group 1 patients compared with patients in the other groups after 2 hours of ED treatment (P = 0.021 and 0.009, respectively). The discharge rate after ED treatment was significantly higher in groups 1 and 3 than in group 2 (P = 0.05). All 73 patients were alive a week after enrollment. Five patients (20.8%) in the Flixotide treatment arm were hospitalized and required additional systemic steroids. Multivariate analysis of factors affecting hospitalization rate demonstrated that severity of asthma (odds ratio 8.11) and group 2 (OD 4.17) had a negative effect, whereas adherence to chronic anti-asthma therapy (OD 0.49) reduced the hospitalization rate. Our study cohort

  12. Improved Deep Belief Networks (IDBN Dynamic Model-Based Detection and Mitigation for Targeted Attacks on Heavy-Duty Robots

    Directory of Open Access Journals (Sweden)

    Lianpeng Li

    2018-04-01

    Full Text Available In recent years, the robots, especially heavy-duty robots, have become the hardest-hit areas for targeted attacks. These attacks come from both the cyber-domain and the physical-domain. In order to improve the security of heavy-duty robots, this paper proposes a detection and mitigation mechanism which based on improved deep belief networks (IDBN and dynamic model. The detection mechanism consists of two parts: (1 IDBN security checks, which can detect targeted attacks from the cyber-domain; (2 Dynamic model and security detection, used to detect the targeted attacks which can possibly lead to a physical-domain damage. The mitigation mechanism was established on the base of the detection mechanism and could mitigate transient and discontinuous attacks. Moreover, a test platform was established to carry out the performance evaluation test for the proposed mechanism. The results show that, the detection accuracy for the attack of the cyber-domain of IDBN reaches 96.2%, and the detection accuracy for the attack of physical-domain control commands reaches 94%. The performance evaluation test has verified the reliability and high efficiency of the proposed detection and mitigation mechanism for heavy-duty robots.

  13. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  14. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  15. A Study on health damage due to air pollution

    Energy Technology Data Exchange (ETDEWEB)

    Han, Hwa Jin; Oh, So Young [Korea Environment Institute, Seoul (Korea)

    1998-12-01

    According to the domestic and foreign change in given conditions of air preservation policy, the air preservation policy in Korea should be implemented scientifically and reasonably. A gradual turnover to receptor-oriented reflecting human health and ecological effect is needed to establish and promote the air preservation policy systemically and in a long-term basis. Based on the quantified health damage of a people, air preservation policy in Korea should develop as a management policy to develop and implement an optimum management mechanism to minimized health damage of receptor. 19 refs., 2 figs., 25 tabs.

  16. Clusters of DNA damage induced by ionizing radiation: Formation of short DNA fragments. I. Theoretical modeling

    International Nuclear Information System (INIS)

    Holley, W.R.; Chatterjee, A.

    1996-01-01

    We have developed a general theoretical model for the interaction of ionizing radiation with chromatin. Chromatin is modeled as a 30-nm-diameter solenoidal fiber composed of 20 turns of nucleosomes, 6 nucleosomes per turn. Charged-particle tracks are modeled by partitioning the energy deposition between primary track core, resulting from glancing collisions with 100 eV or less per event, and δ rays due to knock-on collisions involving energy transfers > 100 eV. A Monte Carlo simulation incorporates damages due to the following molecular mechanisms: (1) ionization of water molecules leading to the formation of circ OH, circ H, e aq , etc.; circ OH attack on sugar molecules leading to strand breaks; circ OH attack on bases; direct ionization of the sugar molecules leading to strand breaks; direct ionization of the bases. Our calculations predict significant clustering of damage both locally, over regions up to 40 hp and over regions extending to several kilobase pairs. A characteristic feature of the regional damage predicted by our model is the production of short fragments of DNA associated with multiple nearby strand breaks. Such fragments have subsequently been detected experimentally and are reported in an accompanying paper after exposure to both high- and low-LET radiation. The overall measured yields agree well quantitatively with the theoretical predictions. Our theoretical results predict the existence of a strong peak at about 85 bp, which represents the revolution period about the nucleosome. Other peaks at multiples of about 1,000 bp correspond to the periodicity of the particular solenoid model of chromatin used in these calculations. Theoretical results in combination with experimental data on fragmentation spectra may help determine the consensus or average structure of the chromatin fibers in mammalian DNA. 27 refs., 7 figs

  17. Big News: The Indian Media and Student Attacks in Australia

    Directory of Open Access Journals (Sweden)

    Matt Wade

    2016-05-01

    Full Text Available By any measure, 2009 was a big year for news in India. And yet the safety of Indian students in Australia ranked among the major news events in India that year. The India-Australia Poll 2013 found 65 per cent of respondents believed the Indian media had accurately reported the problems faced by Indian students in Australia in 2009-10. That implies two-thirds of Indians accepted the Indian media’s mostly negative depictions of Australia. Those who believed the media reporting about Australia had been accurate were more likely to be from large cities, be tertiary educated and have relatively high-incomes. The poll found 62 per cent of respondents thought Australia was a dangerous place for Indian students and that 61 per cent believed attacks on Indian students were motivated by racism. The results suggest negative perceptions about Australia created by the media’s portrayal of the student attacks linger in the Indian community. The timing of the initial attacks, and the imagery associated with them, helped attract and sustain media attention on the issue. The diplomatic tensions created by the crisis highlighted the growing influence of the broadcast media on India’s foreign relations. But the episode also exposed a deep lack of understanding about India in Australia. Governments were slow to comprehend how much damage media coverage of student attacks could do to Australia’s reputation in India.

  18. Non-invasive ventilation in severe asthma attack, its possibilities and problems.

    Science.gov (United States)

    Murase, K; Tomii, K; Chin, K; Niimi, A; Ishihara, K; Mishima, M

    2011-06-01

    Asthma attack is characterized by episodic attacks of cough, dyspnea and wheeze occurring due to bronchoconstriction, airway hyperresponsiveness and mucous hypersecretion. Although nationwide clinical guidelines have been published to establish the standard care of asthma, choices in the treatment of fatal asthma attacks remain of clinical significance. Especially, in a severe asthma attack, despite the application of conventional medical treatment, respiratory management is critical. Even though non-invasive ventilation (NIV) has been shown to be effective in a wide variety of clinical settings, reports of NIV in asthmatic patients are scarce. According to a few prospective clinical trials reporting promising results in favour of the use of NIV in a severe asthma attack, a trial of NIV prior to invasive mechanical ventilation seems acceptable and may benefit patients by decreasing the need for intubation and by supporting pharmaceutical treatments. Although selecting the appropriate patients for NIV use is a key factor in successful NIV application, how to distinguish such patients is quite controversial. Larger high quality clinical trails are urgently required to confirm the benefits of NIV to patients with severe asthma attack. In this article, we focus on the body of evidence supporting the use of NIV in asthma attacks and discuss its advantages as well its problems.

  19. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  20. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  1. RESISTANCE TO THE ATTACK OF DRY-WOOD TERMITES (Cryptotermes brevis OF SIX WOOD SPECIES

    Directory of Open Access Journals (Sweden)

    Fabrício Gomes Gonçalves

    2006-03-01

    Full Text Available The dry wood termites are one of the largest causes of damages in wood used in Brazil. This work analyzed the attackof the Cryptotermes brevis in six commercials wood species in the north of the Rio de Janeiro and south of the Espírito Santo. The testobserved the number of holes, the percentage of died individuals and the damage of the pieces. When compared to the Pinus sp(reference, the species with less susceptibility to the attack were Cedrela fissilis, Cariocar brasiliense and Goupia glabra, that alsopresented the largest percentages of mortality of termites. The Schizolobium parahyba, Toona ciliata and the Tachigalia myrmecophyllawere the species with the highest level of damage.

  2. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  3. Do White Shark Bites on Surfers Reflect Their Attack Strategies on Pinnipeds?

    Directory of Open Access Journals (Sweden)

    Erich Ritter

    2016-01-01

    Full Text Available The theory of mistaken identity states that sharks, especially white sharks, Carcharodon carcharias, mistake surfers for pinnipeds when looking at them from below and thus bite them erroneously. Photographs of surfer wounds and board damage were interpreted with special emphasis on shark size, wound severity, and extent of damage to a board. These were compared with the concurrent literature on attack strategies of white sharks on pinnipeds and their outcomes. The results show that the majority of damage to surfers and their boards is at best superficial-to-moderate in nature and does not reflect the level of damage needed to immobilize or stun a pinniped. It is further shown that the size distribution of sharks biting surfers differs from that in pinnipeds. The results presented show that the theory of mistaken identity, where white sharks erroneously mistake surfers for pinnipeds, does not hold true and should be rejected.

  4. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  5. Depletion-of-Battery Attack: Specificity, Modelling and Analysis

    Directory of Open Access Journals (Sweden)

    Vladimir Shakhov

    2018-06-01

    Full Text Available The emerging Internet of Things (IoT has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  6. Cyber-security: industrials must stop denying the risk of cyber-attacks

    International Nuclear Information System (INIS)

    Hausermann, L.

    2015-01-01

    The risk of cyber-attacks of industrial sites is real. Recently the Anvers port and the Bakou-Tbilissi-Ceyhan pipeline have been attacked. In both cases hackers succeeded: they were able to track sea containers in which drug was concealed and recover it in the Anvers port and in the case of the pipeline the hackers took control of the control system and were able to trigger a huge explosion by shunning security systems and allowing damaging pressure surges. The massive use of digital systems and of automated systems in various industrial sectors has led to huge network of inter-connected smart devices whose purpose is not to process data but to monitor and control. All these devices and equipment are controlled by software whose weaknesses and fault lines multiply the risk of cyber-attacks even for 'closed' networks. While the total hacking of a nuclear power plant is highly unlikely, real threats exist and must be taken into account. Innovative solutions based on the mapping of the fluxes of the system and combined with an inventory of all its weaknesses may pave the way towards cyber-security. (A.C.)

  7. Practical security and privacy attacks against biometric hashing using sparse recovery

    Science.gov (United States)

    Topcu, Berkay; Karabat, Cagatay; Azadmanesh, Matin; Erdogan, Hakan

    2016-12-01

    Biometric hashing is a cancelable biometric verification method that has received research interest recently. This method can be considered as a two-factor authentication method which combines a personal password (or secret key) with a biometric to obtain a secure binary template which is used for authentication. We present novel practical security and privacy attacks against biometric hashing when the attacker is assumed to know the user's password in order to quantify the additional protection due to biometrics when the password is compromised. We present four methods that can reconstruct a biometric feature and/or the image from a hash and one method which can find the closest biometric data (i.e., face image) from a database. Two of the reconstruction methods are based on 1-bit compressed sensing signal reconstruction for which the data acquisition scenario is very similar to biometric hashing. Previous literature introduced simple attack methods, but we show that we can achieve higher level of security threats using compressed sensing recovery techniques. In addition, we present privacy attacks which reconstruct a biometric image which resembles the original image. We quantify the performance of the attacks using detection error tradeoff curves and equal error rates under advanced attack scenarios. We show that conventional biometric hashing methods suffer from high security and privacy leaks under practical attacks, and we believe more advanced hash generation methods are necessary to avoid these attacks.

  8. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  9. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  10. Remote damage control during the attacks on Paris: Lessons learned by the Paris Fire Brigade and evolutions in the rescue system.

    Science.gov (United States)

    Lesaffre, Xavier; Tourtier, Jean-Pierre; Violin, Yann; Frattini, Benoit; Rivet, Catherine; Stibbe, Olivier; Faure, Florian; Godefroy, Anne; Gallet, Jean-Claude; Ausset, Sylvain

    2017-06-01

    On November 13, 2015, in 40 minutes, Paris suffered four suicide bombers attacks; shootings at three different restaurant terraces; and an attack on the Bataclan concert hall, resulting in 130 dead and 495 wounded. How did the Parisian rescue system respond and how did it evolve since?We proved we could deploy quickly wide prehospital and hospital resources and teams' equipment and preparedness is being further developed. To secure a swifter initial response, we need a better integration of the operators of the rescue chain with a simpler and more robust organization as well as improved communications channels. We must continue to anticipate and prepare for possible future attacks.

  11. Measures to prevent concrete damage due to alkali-silica reaction in the Netherlands: Current state-of-affairs

    NARCIS (Netherlands)

    Heijnen, W.M.M.; Larbi, J.A.

    1999-01-01

    In CUR-Recommendation 38, various vital measures that need to be taken during design of new concrete-mixtures in order to prevent damage due to ASR in the concrete have been outlined. The most important of these measures are: • the use of blast furnace slag cement (with a high slag content: 50 % by

  12. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  13. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  14. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  15. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  16. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  17. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  18. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  19. Assessment for the potential of Stuxnet attack on research reactor in Indonesia

    International Nuclear Information System (INIS)

    Eko H Riyadi

    2013-01-01

    Since discovered in June of 2010, the malware that named Stuxnet was directly electrify the world. The malware is interested the attentions of the media and security experts since infect instrumentation and control systems in industrial and caused significant damage. Stuxnet is a sophisticated kind of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS7. Even the malware developed to attack Iran's nuclear facilities have very specific goals and designed to infect Siemens SCADA systems are set up to control and monitor industrial processes. In Indonesia there are 3 research reactors i.e. Kartini in Jog jakarta, TRIGA in Bandung and RSG GA Siwabessy in Serpong. Last reactor has the largest capacity that was using the instrumentation and control system of the Siemens made. This study aims to determine the potential of the Stuxnet attack on research reactor with use methods and analysis the learning to the malware. With the configuration of the control system on research reactors, it is not impossible will be target of the Stuxnet attacks like as Iran's nuclear facility in Natanz. Although some security experts and anti virus have develop system patch and removal to fix this malware, but still needed the role of regulatory bodies to ensure that instrumentation and control system in research reactors are totally safe and secure from malware attacks. (author)

  20. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  1. Breakthrough attacks in patients with hereditary angioedema receiving long-term prophylaxis are responsive to icatibant

    DEFF Research Database (Denmark)

    Aberer, Werner; Maurer, Marcus; Bouillet, Laurence

    2017-01-01

    BACKGROUND: Patients with hereditary angioedema (HAE) due to C1-inhibitor deficiency (C1-INH-HAE) experience recurrent attacks of cutaneous or submucosal edema that may be frequent and severe; prophylactic treatments can be prescribed to prevent attacks. However, despite the use of long-term prop...

  2. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  3. Terrorism and nuclear damage coverage

    International Nuclear Information System (INIS)

    Horbach, N. L. J. T.; Brown, O. F.; Vanden Borre, T.

    2004-01-01

    This paper deals with nuclear terrorism and the manner in which nuclear operators can insure themselves against it, based on the international nuclear liability conventions. It concludes that terrorism is currently not covered under the treaty exoneration provisions on 'war-like events' based on an analysis of the concept on 'terrorism' and travaux preparatoires. Consequently, operators remain liable for nuclear damage resulting from terrorist acts, for which mandatory insurance is applicable. Since nuclear insurance industry looks at excluding such insurance coverage from their policies in the near future, this article aims to suggest alternative means for insurance, in order to ensure adequate compensation for innocent victims. The September 11, 2001 attacks at the World Trade Center in New York City and the Pentagon in Washington, DC resulted in the largest loss in the history of insurance, inevitably leading to concerns about nuclear damage coverage, should future such assaults target a nuclear power plant or other nuclear installation. Since the attacks, some insurers have signalled their intentions to exclude coverage for terrorism from their nuclear liability and property insurance policies. Other insurers are maintaining coverage for terrorism, but are establishing aggregate limits or sublimits and are increasing premiums. Additional changes by insurers are likely to occur. Highlighted by the September 11th events, and most recently by those in Madrid on 11 March 2004, are questions about how to define acts of terrorism and the extent to which such are covered under the international nuclear liability conventions and various domestic nuclear liability laws. Of particular concern to insurers is the possibility of coordinated simultaneous attacks on multiple nuclear facilities. This paper provides a survey of the issues, and recommendations for future clarifications and coverage options.(author)

  4. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  5. Estimation of health damage due to emission of air pollutants by cars: the canyon effect

    Energy Technology Data Exchange (ETDEWEB)

    Spadaro, J.V. [Ecole des Mines, Centre d' Energetique, Paris, 75 (France); Rabl, A.

    1999-07-01

    Since current epidemiological evidence suggests that air pollution has harmful effects even at typical ambient concentrations and the dispersion is significant over hundreds to thousands of km, the estimation of total health damage involves consideration of local and regional effects. In recent years, several estimates have been published of health damage due to air pollution from cars, in particular by Delucchi et al of UC Davis and by the ExternE Project of the European Commission. To capture the geographic extent of pollutant dispersion, local and regional models have been used in combination. The present paper addresses a potentially significant contribution of the total damage, not yet taken into account in these studies: the increased concentration of pollutants inside urban street canyons. This canyon effect is appreciable only for primary pollutants, the time constants for the formation of secondary pollutants being long compared to the residence time in the canyon. We assumed linearity of incremental health impact with incremental concentration, in view of the lack of epidemiological evidence for no-effect thresholds or significant deviations from linearity at typical ambient concentrations; therefore, only long term average concentrations matter. We use the FLUENT software to model the dispersion inside a street canyon for a wide range of rectangular geometries and wind velocities. Our results suggest that the canyon effect is of marginal significance for total damages, the contribution of the canyon effect being roughly 10 to 20% of the total. The relative importance of the canyon effect is, of course, highly variable with local conditions; it could be much smaller but it is unlikely to add more than 100% to the flat terrain estimate. (Author)

  6. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  7. Damages to masonry due to interaction(s) between mortar and brick

    NARCIS (Netherlands)

    Klugt, L.J.A.R. van der

    1995-01-01

    Masonry consists of brick and mortar. Next to the laying mortar there can be a separate pointing mortar as well. Each of these components can suffer damage. Such damages, of course, have to do with the properties of the components and with the agressiveness of the environment. However, next to their

  8. Interaction of Insecticide and Media Moisture on Ambrosia Beetle (Coleoptera: Curculionidae) Attacks on Selected Ornamental Trees.

    Science.gov (United States)

    Frank, Steven D; Anderson, Amanda L; Ranger, Christopher M

    2017-12-08

    Exotic ambrosia beetles, particularly Xylosandrus crassiusculus (Motschulsky) (Coleoptera: Curculionidae: Scolytinae) and Xylosandrus germanus (Blandford) (Coleoptera: Curculionidae: Scolytinae), are among the most damaging pests of ornamental trees in nurseries. Growers have had few tactics besides insecticide applications to reduce ambrosia beetle attacks but recent research has shown that attacks may be reduced by maintaining media moisture below a 50% threshold thereby reducing flood stress. We compared the efficacy of managing media moisture and insecticide applications for reducing ambrosia beetle attacks on three ornamental tree species in North Carolina. During trials in spring 2013 and 2015, flooded Cornus florida and Cornus kousa were heavily attacked despite sprays with permethrin, but nonflooded C. kousa or C. florida were not attacked. In spring 2015 trials, both nonflooded and flooded Styrax japonicus were heavily attacked regardless of permethrin applications. Although ethanol emissions were not measured, the apparently healthy nonflooded S. japonicus trees may have been exposed to an unknown physiological stress, such as low temperature injury, the previous winter, which predisposed them to beetle attack. However, ethanol levels within host tissues were not measured as part of the current study. X. crassiusculus (75%), Xyloborinus saxesenii Ratzburg (13%), and X. germanus (9%) were the most abundant species collected in ethanol baited traps deployed in 2015, while X. crassiusculus (63%) and X. germanus (36%) were the predominant species reared from attacked trees. Results indicate that managing media moisture levels at or below 50%, and maximizing tree health overall, may provide significant protection against Xylosandrus spp. attacks in flood intolerant tree species. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  9. Damage-tolerance strategies for nacre tablets.

    Science.gov (United States)

    Wang, Shengnan; Zhu, Xinqiao; Li, Qiyang; Wang, Rizhi; Wang, Xiaoxiang

    2016-05-01

    Nacre, a natural armor, exhibits prominent penetration resistance against predatory attacks. Unraveling its hierarchical toughening mechanisms and damage-tolerance design strategies may provide significant inspiration for the pursuit of high-performance artificial armors. In this work, relationships between the structure and mechanical performance of nacre were investigated. The results show that other than their brick-and-mortar structure, individual nacre tablets significantly contribute to the damage localization of nacre. Affected by intracrystalline organics, the tablets exhibit a unique fracture behavior. The synergistic action of the nanoscale deformation mechanisms increases the energy dissipation efficiency of the tablets and contributes to the preservation of the structural and functional integrity of the shell. Copyright © 2016 Elsevier Inc. All rights reserved.

  10. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  11. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  12. Host plant invests in growth rather than chemical defense when attacked by a specialist herbivore.

    Science.gov (United States)

    Arab, Alberto; Trigo, José Roberto

    2011-05-01

    Plant defensive compounds may be a cost rather than a benefit when plants are attacked by specialist insects that may overcome chemical barriers by strategies such as sequestering plant compounds. Plants may respond to specialist herbivores by compensatory growth rather than chemical defense. To explore the use of defensive chemistry vs. compensatory growth we studied Brugmansia suaveolens (Solanaceae) and the specialist larvae of the ithomiine butterfly Placidina euryanassa, which sequester defensive tropane alkaloids (TAs) from this host plant. We investigated whether the concentration of TAs in B. suaveolens was changed by P. euryanassa damage, and whether plants invest in growth, when damaged by the specialist. Larvae feeding during 24 hr significantly decreased TAs in damaged plants, but they returned to control levels after 15 days without damage. Damaged and undamaged plants did not differ significantly in leaf area after 15 days, indicating compensatory growth. Our results suggest that B. suaveolens responds to herbivory by the specialist P. euryanassa by investing in growth rather than chemical defense.

  13. A Study on the VHCF Fatigue Behaviors of Hydrogen Attacked Inconel 718 Alloy

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Chang-Min [Kyungpook National Univ., DMI Senior Fellow, Daegu (Korea, Republic of); Nahm, Seung-Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Kim, Jun-Hyong; Pyun, Young-Sik [Sun Moon Univ., Chunan (Korea, Republic of)

    2016-07-15

    This study is to investigate the influence of hydrogen attack and UNSM on fatigue behaviors of the Inconel 718 alloy. The decrease of the fatigue life between the untreated and the hydrogen attacked material is 10-20%. The fatigue lives of hydrogen attacked specimen decreased without a fatigue limit, similar to those of nonferrous materials. Due to hydrogen embrittlement, about 80% of the surface cracks were smaller than the average grain size of 13 μm. Many small surface cracks caused by the embrittling effect of hydrogen attack were initiated at the grain boundaries and surface scratches. Cracks were irregularly distributed, grew, and then coalesced through tearing, leading to a reduction of fatigue life. Results revealed that the fatigue lives of UNSM-treated specimens were longer than those of the untreated specimens.

  14. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  15. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  16. Assessing risk from intelligent attacks: A perspective on approaches

    International Nuclear Information System (INIS)

    Guikema, Seth D.; Aven, Terje

    2010-01-01

    Assessing the uncertainties in and severity of the consequences of intelligent attacks are fundamentally different from risk assessment for accidental events and other phenomena with inherently random failures. Intelligent attacks against a system involve adaptation on the part of the adversary. The probabilities of the initiating events depend on the risk management actions taken, and they may be more difficult to assess due to high degrees of epistemic uncertainty about the motivations and future actions of adversaries. Several fundamentally different frameworks have been proposed for assessing risk from intelligent attacks. These include basing risk assessment and management on game theoretic modelling of attacker actions, using a probabilistic risk analysis (PRA) approach based on eliciting probabilities of different initiating events from appropriate experts, assessing uncertainties beyond probabilities and expected values, and ignoring the probabilities of the attacks and choosing to protect highest valued targets. In this paper we discuss and compare the fundamental assumptions that underlie each of these approaches. We then suggest a new framework that makes the fundamental assumptions underlying the approaches clear to decision makers and presents them with a suite of results from conditional risk analysis methods. Each of the conditional methods presents the risk from a specified set of fundamental assumptions, allowing the decision maker to see the impacts of these assumptions on the risk management strategies considered and to weight the different conditional results with their assessments of the relative likelihood of the different sets of assumptions.

  17. Exposure to air pollution and meteorological factors associated with children's primary care visits at night due to asthma attack: case-crossover design for 3-year pooled patients.

    Science.gov (United States)

    Yamazaki, Shin; Shima, Masayuki; Yoda, Yoshiko; Oka, Katsumi; Kurosaka, Fumitake; Shimizu, Shigeta; Takahashi, Hironobu; Nakatani, Yuji; Nishikawa, Jittoku; Fujiwara, Katsuhiko; Mizumori, Yasuyuki; Mogami, Akira; Yamada, Taku; Yamamoto, Nobuharu

    2015-05-03

    We examined the association of outdoor air pollution and meteorological parameters with primary care visits (PCVs) at night due to asthma attack. A case-crossover study was conducted in a primary care clinic in Himeji City, Japan. Participants were 1447 children aged 0-14 years who visited the clinic with an asthma attack from April 2010 until March 2013. Daily concentrations of air pollutants and meteorological parameters were measured. PCVs at night due to asthma attack. A conditional logistic regression model was used to estimate ORs of PCVs per unit increment of air pollutants or meteorological parameters (the per-unit increments of particulate matter with an aerodynamic diameter ≤2.5 µm (PM₂.₅) and ozone were 10 μg/m(3) and 10 ppb, respectively). Analyses took into consideration the effects of seasonality. We noted an association between PCVs and daily ozone levels on the day before a PCV (OR=1.17; 95% CI 1.01 to 1.35; p=0.04), as well as between PCVs and 3-day mean ozone levels before a PCV (OR=1.29; 95% CI 1.00 to 1.46; p=0.04), from April until June. We also observed an association between PCVs and daily PM₂.₅ levels on the day before a PCV from December until March (OR=1.16; 95% CI 1.01 to 1.33; p=0.05). Meteorological parameters, such as hours of sunshine from September until November, atmospheric pressure from April until June, and temperature from April until August, were also found to be associated with PCVs. The findings in the present study supported an association between ozone and PCVs and suggest that certain meteorological items may be associated with PCVs. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  18. 34 CFR 674.64 - Discharge of student loan indebtedness for survivors of victims of the September 11, 2001, attacks.

    Science.gov (United States)

    2010-07-01

    ..., other safety or rescue personnel, or as a member of the Armed Forces; and (ii)(A) Died due to injuries... to injuries suffered in the terrorist attacks on September 11, 2001. (2) Died due to injuries suffered in the terrorist attacks on September 11, 2001 means the individual was present at the World Trade...

  19. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  20. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  1. A study on the mechanism of speculative attack and the defence strategy of the central bank.

    Directory of Open Access Journals (Sweden)

    Chang-Hyun Yun

    1999-09-01

    Full Text Available We first analyze the concrete mechanism of speculative attack on the foreign exchange market which became very prevalent phenomena during the foreign exchange crisis. When the central bank of the domestic country tries to defend the attack by increasing the interest rate, some problems can arise in that the speculative attacks through foreign exchange options market and/or index futures markets can be very successful due to that policy. So the central bank should pay much attention to the microstructure of the financial markets when the defence strategy against speculative attack is determined.

  2. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  3. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  4. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  5. Spectroscopic photoacoustics for assessing ischemic kidney damage

    Science.gov (United States)

    Berndl, Elizabeth S. L.; He, Xiaolin; Yuen, Darren A.; Kolios, Michael C.

    2018-02-01

    Ischemic reperfusion injuries (IRIs) are caused by return of blood to a tissue or organ after a period without oxygen or nutrients. Damage in the microvasculature causes an inflammatory response and heterogeneous scarring, which is associated with an increase in collagen in the extracellular matrix. Although most often associated with heart attacks and strokes, IRI also occurs when blood reperfuses a transplanted organ. Currently, monitoring for IRI is limited to biopsies, which are invasive and sample a limited area. In this work, we explored photoacoustic (PA) biomarkers of scarring. IRI events were induced in mice (n=2) by clamping the left renal artery, then re-establishing flow. At 53 days post-surgery, kidneys were saline perfused and cut in half laterally. One half was immediately imaged with a VevoX system (Fujifilm-VisualSonics, Toronto) in two near infrared ranges - 680 to 970 nm (NIR), and 1200 to 1350 nm (NIR II). The other half was decellularized and then imaged at NIR and NIR II. Regions of interest were manually identified and analyzed for each kidney. For both cellularized and decellularized samples, the PA signal ratio based on irradiation wavelengths of 715:930 nm was higher in damaged kidneys than for undamaged kidneys (p collagen in the NIR II range, while healthy kidneys did not. Collagen rich spectra were more apparent in decellularized kidneys, suggesting that in the cellularized samples, other components may be contributing to the signal. PA imaging using spectral ratios associated with collagen signatures may provide a non-invasive tool to determine areas of tissue damage due to IRIs.

  6. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    Science.gov (United States)

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  7. Evaluation of creep damage due to stress relaxation in SA533 grade B class 1 and SA508 class 3 pressure vessel steels

    International Nuclear Information System (INIS)

    Hoffmann, C.L.; Urko, W.

    1993-01-01

    Creep damage can result from stress relaxation of residual stresses in components when exposed to high temperature thermal cycles. Pressure vessels, such as the reactor vessel of the modular high-temperature gas reactor (MHTGR), which normally operate at temperatures well below the creep range can develop relatively high residual stresses in high stress locations. During short term excursions to elevated-temperatures, creep damage can be produced by the loadings on the vessel. In addition, residual stresses will relax out, causing greater creep damage in the pressure vessel material than might otherwise be calculated. The evaluation described in this paper assesses the magnitude of the creep damage due to relaxation of residual stresses resulting from short term exposure of the pressure vessel material to temperatures in the creep range. Creep relaxation curves were generated for SA533 Grade B, Class 1 and SA508 Class 3 pressure vessel steels using finite element analysis of a simple uniaxial truss loaded under constant strain conditions to produce an initial axial stress equal to 1.25 times the material yield strength at temperature. The strain is held constant for 1000 hours at prescribed temperatures from 700 F to 1000 F. The material creep law is used to calculate the relaxed stress for each time increment. The calculated stress relaxation versus time curves are compared with stress relaxation test data. Creep damage fractions are calculated by integrating the stress relaxation versus time curves and performing a linear creep damage summation using the minimum stress to rupture curves at the respective relaxation temperatures. Cumulative creep damage due to stress relaxation as a function of time and temperature is derived from the linear damage summation

  8. Protection of Microkernel Environment L4Re from Stack-smashed Attacks

    Directory of Open Access Journals (Sweden)

    Vasily Andreevich Sartakov

    2014-12-01

    Full Text Available Microkernel-based operating systems provide high level of protection due to the strong isolation of components, small size of Trusted Computing Base and execution of drivers in user space. At the same time, such systems are vulnerable to a stack overflow attacks, because these attacks exploit the hardware features of the platform, such as shared memory space for data and code. Modern architectures, such as AMD64 and ARM, provide opportunities to counteract attacks at the hardware level by disallowing memory allocation for storing executable stack and heap, but this protection mechanism requires additional support from the operating system. This paper presents memory management, program execution model and IPC mechanism of microkernel Fiasco.OC and environment L4Re from nonexecution memory support point of view.

  9. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  10. The neuroimaging evidence for chronic brain damage due to boxing

    Energy Technology Data Exchange (ETDEWEB)

    Moseley, I.F. [Lysholm Radiological Department, National Hospital for Neurology and Neurosurgery, London (United Kingdom)

    2000-01-01

    A number of imaging techniques have been used to investigate changes produced in the brain by boxing. Most morphological studies have failed to show significant correlations between putative abnormalities on imaging and clinical evidence of brain damage. Fenestration of the septum pellucidum, with formation of a cavum, one of the most frequent observations, does not appear to correlate with neurological or physiological evidence of brain damage. Serial studies on large groups may be more informative. Magnetic resonance spectroscopy and cerebral blood flow studies have been reported in only small numbers of boxers; serial studies are not available to date. (orig.)

  11. Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

    Directory of Open Access Journals (Sweden)

    Ashraf Al Sharah

    2016-01-01

    Full Text Available Security in mobile ad hoc networks (MANETs is challenging due to the ability of adversaries to gather necessary intelligence to launch insider jamming attacks. The solutions to prevent external attacks on MANET are not applicable for defense against insider jamming attacks. There is a need for a formal framework to characterize the information required by adversaries to launch insider jamming attacks. In this paper, we propose a novel reputation-based coalition game in MANETs to detect and mitigate insider jamming attacks. Since there is no centralized controller in MANETs, the nodes rely heavily on availability of transmission rates and a reputation for each individual node in the coalition to detect the presence of internal jamming node. The nodes will form a stable grand coalition in order to make a strategic security defense decision, maintain the grand coalition based on node reputation, and exclude any malicious node based on reputation value. Simulation results show that our approach provides a framework to quantify information needed by adversaries to launch insider attacks. The proposed approach will improve MANET’s defense against insider attacks, while also reducing incorrect classification of legitimate nodes as jammers.

  12. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  13. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  14. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ₁ Regularization.

    Science.gov (United States)

    Hernandez-Suarez, Aldo; Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Perez-Meana, Hector; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-04-29

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  15. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  16. Fatal tiger attack: a case report with emphasis on typical tiger injuries characterized by partially resembling stab-like wounds.

    Science.gov (United States)

    Pathak, Hrishikesh; Borkar, Jaydeo; Dixit, Pradeep; Dhawane, Shailendra; Shrigiriwar, Manish; Dingre, Niraj

    2013-10-10

    Fatalities due to attacks by tigers on humans are uncommon and are rarely described in the medico-legal literature. We herein present a forensic investigation in a unique case of a fatal tiger attack in the wild on a 35 year old female in India by an Indian Bengal tiger (Panthera tigris tigris). The attack resulted in two pairs of puncture wounds over the nape area with occult cervical spine injuries resulting from transfixing of spine due to the tiger canines; multiple puncture wounds, numerous scratches and abrasions consistent with the tiger claw injuries and injury to the right jugulocarotid vessels. This case outlines the characteristic injury pattern from such an attack along with the multiple sources of the tiger injuries. The analysis of these injuries might reveal the motivation behind the attack and the big cat species involved in the attack. A tiger injury is sometimes compared with a stab injury, as the patterned injuries due to a tiger bite are characterized by multiple penetrating, stab-like wounds. So, a special attention is paid toward establishment of the cause of death from bites by the animal teeth under unknown circumstances of trauma and to exclude the possibility of a homicide beyond reasonable doubt in such cases. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Tactic determinants of game practiced by middle attacker in men’s volleyball

    Directory of Open Access Journals (Sweden)

    Gustavo De Conti Teixeira Costa

    2016-07-01

    Full Text Available DOI: http://dx.doi.org/10.5007/1980-0037.2016v18n3p371   Among volleyball skills, spike is responsible for the highest number of scores, and the first tempo of attack is related to the higher incidence of score a point, by hindering the defensive opponent’s action. However, most of the studies show general results and do not specify the conditions and constraints of each attack zone. Thus, the aim of this study was analyzing the offensive game (complex I performed by the middle attacker at the 2014/2015 National men’s Brazilian Championship (Superliga. The sample wascomposed by 142 games of 12 teams, totaling 5350 receptions, setting and spikes actions. The results showed that the middle spikes occurred mostly after receptions A and B, being the most frequent attack scoring point as well as the most powerful one. Moreover, the relationship between the reception effect and setting effect was observed, showing that the best receptions influenced the setting type and the attack effect. Therefore, the middle attack had effective effect in the winning score, since it decreased the chances of opponent’s defense, due to the reduced time to defensive organization. Finally, the situational constraints delimited the middle attacker actions. Based on the above, we suggest that future studies should restrict the analysis conditions and situational constraints of each specific game situation.

  18. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  19. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  20. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  1. DNA damage due to perfluorooctane sulfonate based on nano-gold embedded in nano-porous poly-pyrrole film

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Liping, E-mail: lipinglu@bjut.edu.cn; Xu, Laihui; Kang, Tianfang; Cheng, Shuiyuan

    2013-11-01

    DNA damage induced from perfluorooctane sulfonate (PFOS) was further developed on a nano-porous bionic interface. The interface was formed by assembling DNA on nano-gold particles which were embedded in a nano-porous overoxidized polypyrrole film (OPPy). Atomic force microscopy, scanning electron microscope and electrochemical investigations indicate that OPPy can be treated to form nano-pore structures. DNA damage due to PFOS was proved using electrochemistry and X-ray photoelectron spectroscopy (XPS) and was investigated by detecting differential pulse voltammetry (DPV) response of methylene blue (MB) which was used as electro-active indicator in the system. The current of MB attenuates obviously after incubation of DNA in PFOS. Moreover, electrochemical impedance spectroscopy (EIS) demonstrates that PFOS weakens DNA charge transport. The tentative binding ratio of PFOS: DNA base pair was obtained by analyzing XPS data of this system.

  2. Mechanical Properties and Elastic Constants Due to Damage Accumulation and Amorphization in SiC

    International Nuclear Information System (INIS)

    Gao, Fei; Weber, William J.

    2004-01-01

    Damage accumulation due to cascade overlap, which was simulated previously, has been used to study the changes of elastic constants, bulk and elastic moduli as a function of dose. These mechanical properties generally decrease with increasing dose, and the rapid decrease at low-dose level indicates that point defects and small clusters play an important role in the changes of elastic constants rather than topological disorder. The internal strain relaxation has no effect on the elastic constants, C11 and C12, in perfect SiC, but it has a significant influence on all elastic constants calculated in damaged SiC. The elastic constants in the cascade-amorphized (CA) SiC decrease about 19%, 29% and 46% for C11, C12 and C44, respectively. The bulk modulus decrease 23% and the elastic modulus decreases 29%, which is consistent with experimental measurements. The stability of both the perfect SiC and CA-SiC under hydrostatic tension has been also investigated. All mechanical properties in the CA-SiC exhibit behavior similar to that in perfect SiC, but the critical stress at which the CA-SiC becomes structurally unstable is one order of magnitude smaller than that for perfect SiC

  3. Environmental Impacts to Residual Stand Damage due to Logging Operations in Hyrcanian Forest

    Directory of Open Access Journals (Sweden)

    Meghdad JOURGHOLAMI

    2012-08-01

    Full Text Available The development of harvesting systems aims to provide physically feasible, economically viable, and environmentally sound solutions. Residual stand-damage data have been collected from a mixed broadleaved stand in Kheyrud area in Hyrcanian forest in the northern of Iran. After the harvesting operations, for all trees, damage to the bole, roots, extent of the damage, wounding patterns, size and distribution was assessed using stratified systematic sampling with a random start and fixed area plots. Results show that wounding occurred on 16.4% of the remaining trees, but the severity of wounding varied significantly by species. Forty-six percent of wounding for all species combined was considered as small size. The greatest average amount of damage, to a bole, occurred along the first 1m up from the ground and also within 3m of the skid trail centerline (86.4%. Gouges were present on 79% of all scars. The stratification of the study unit would effectively improve accuracy of stand damage surveys. Selection of the appropriate method for damage reduction to trees adjacent skid trails was crucial. According to the results, skidding damage cannot be completely avoided in practice. We suggest that the education and the entertainment of the foresters and workers in forest would be enhanced and the injuries could be explained before the harvesting to the workers. In such a way the damages would be less in the future.

  4. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Usage of prestressed vertical bolts for retrofitting flat slabs damaged due to punching shear

    Directory of Open Access Journals (Sweden)

    Hamed S. Askar

    2015-09-01

    An experimental investigation with the objective of retrofitting flat slabs damaged due to punching shear using prestressed vertical bolts is presented in this paper. The parameters examined in this study are vertical prestressed bolts with different ratios within the slab thickness, slab thickness and central column size. Through the experimental tests the load carrying capacity, deformation characteristics and the cracking behavior have been investigated. A comparison between the behavior of retrofitted slabs and their references showed that the proposed system of repair is effective and could be used in practice. A comparison between the experimental results and calculated punching failure load based on the formulas adopted by different codes, showed a reasonable agreement.

  6. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  7. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  8. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  9. Cerebral blood flow and CO2 reactivity in transient ischemic attacks: comparison between TIAs due to the ICA occlusion and ICA mild stenosis

    International Nuclear Information System (INIS)

    Tsuda, Y.; Kimura, K.; Yoneda, S.; Etani, H.; Asai, T.; Nakamura, M.; Abe, H.

    1983-01-01

    Hemispheric mean cerebral blood flow (CBF), together with its CO2 reactivity in response to hyperventilation, was investigated in 18 patients with transient ischemic attacks (TIAs) by intraarterial 133Xe injection method in a subacute-chronic stage of the clinical course. In 8 patients, the lesion responsible for symptoms was regarded as unilateral internal carotid artery (ICA) occlusion, and in 10 patients, it was regarded as unilateral ICA mild stenosis (less than 50% stenosis in diameter). Resting flow values were significantly decreased in the affected hemisphere of TIA due to the ICA occlusion as compared with the unaffected hemisphere of the same patient, regarded as the relative control. It was not decreased in the affected hemisphere of TIA due to the ICA mild stenosis as compared with the control. With respect to the responsiveness of CBF to changes in PaCO2, it was preserved in both TIAs, due to the ICA occlusion and ICA mild stenosis. Vasoparalysis was not observed in either types of TIAs in the subacute-chronic stage. However, in the relationship of blood pressure and CO2 reactivity, expressed as delta CBF(%)/delta PaCO2, pressure-dependent CO2 reactivity as a group was observed with significance in 8 cases of TIA due to the ICA occlusion, while no such relationship was noted in 10 cases of TIA due to the ICA mild stenosis. Moreover, clinical features were different between TIAs due to the ICA occlusion and ICA mild stenosis, i.e., more typical, repeatable TIA (6.3 +/- 3.7 times) with shorter duration (less than 30 minutes) was observed in TIAs due to the ICA mild stenosis, while more prolonged, less repeatable TIA (2.4 +/- 1.4 times) was observed in TIAs due to fixed obstruction of the ICA. From these observations, two different possible mechanisms as to the pathogenesis of TIA might be expected

  10. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  11. Un-repairable DNA damage in cell due to irradiation

    International Nuclear Information System (INIS)

    Yoshii, Giichi

    1992-01-01

    Radiation-induced cell reproductive deactivation is caused by damage to DNA. In a cell, cellular DNA radical reacts with diffusion controlled rate and generates DNA peroxide radical. The chemical repair of DNA radical with hydrogen donation by thiol competes with the reaction of oxygen with same radicals in the DNA molecules. From the point reaction rates, the prolongation of radical life time is not as great as expected from the reduction in the glutathione content of the cell. This indicates that further reducting compounds (protein bound thiol) are present in the cell. The residual radicals are altered to strand breaks, base damages and so on. The effective lesions for a number of endpoints is un-repaired double strand break, which has been discovered in a cluster. This event gives risk to high LET radiation or to a track end of X-rays. For X- or electron irradiations the strand breaks are frequently induced by the interactions between sublesions on two strands in DNA. A single strand break followed by radical action may be unstable excited state, because of remaining sugar radical action and of having negative charged phosphates, in which strands breaks will be rejoined in a short time to stable state. On the same time, a break in the double helix will be immediately produced if two breaks are on either or approximately opposite locations. The formation of a double strand break in the helix depends on the ion strength of the cell. The potassium ions are largely released from polyanionic strand during irradiation, which results in the induction of denatured region. Double strand break with the denatured region seems to be un-repairable DNA damage. (author)

  12. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  13. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  14. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  15. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    Science.gov (United States)

    Sanchez-Perez, Gabriel; Toscano-Medina, Karina; Martinez-Hernandez, Victor; Olivares-Mercado, Jesus; Sanchez, Victor

    2018-01-01

    In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ1 regularization. PMID:29710833

  16. Social Sentiment Sensor in Twitter for Predicting Cyber-Attacks Using ℓ1 Regularization

    Directory of Open Access Journals (Sweden)

    Aldo Hernandez-Suarez

    2018-04-01

    Full Text Available In recent years, online social media information has been the subject of study in several data science fields due to its impact on users as a communication and expression channel. Data gathered from online platforms such as Twitter has the potential to facilitate research over social phenomena based on sentiment analysis, which usually employs Natural Language Processing and Machine Learning techniques to interpret sentimental tendencies related to users’ opinions and make predictions about real events. Cyber-attacks are not isolated from opinion subjectivity on online social networks. Various security attacks are performed by hacker activists motivated by reactions from polemic social events. In this paper, a methodology for tracking social data that can trigger cyber-attacks is developed. Our main contribution lies in the monthly prediction of tweets with content related to security attacks and the incidents detected based on ℓ 1 regularization.

  17. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  18. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  19. Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system

    Science.gov (United States)

    Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju

    2018-01-01

    Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.

  20. Toward Exposing Timing-Based Probing Attacks in Web Applications

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-02-01

    Full Text Available Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  1. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  2. DNA damage in neurodegenerative diseases

    Energy Technology Data Exchange (ETDEWEB)

    Coppedè, Fabio, E-mail: fabio.coppede@med.unipi.it; Migliore, Lucia, E-mail: lucia.migliore@med.unipi.it

    2015-06-15

    Highlights: • Oxidative DNA damage is one of the earliest detectable events in the neurodegenerative process. • The mitochondrial DNA is more vulnerable to oxidative attack than the nuclear DNA. • Cytogenetic damage has been largely documented in Alzheimer's disease patients. • The question of whether DNA damage is cause or consequence of neurodegeneration is still open. • Increasing evidence links DNA damage and repair with epigenetic phenomena. - Abstract: Following the observation of increased oxidative DNA damage in nuclear and mitochondrial DNA extracted from post-mortem brain regions of patients affected by neurodegenerative diseases, the last years of the previous century and the first decade of the present one have been largely dedicated to the search of markers of DNA damage in neuronal samples and peripheral tissues of patients in early, intermediate or late stages of neurodegeneration. Those studies allowed to demonstrate that oxidative DNA damage is one of the earliest detectable events in neurodegeneration, but also revealed cytogenetic damage in neurodegenerative conditions, such as for example a tendency towards chromosome 21 malsegregation in Alzheimer's disease. As it happens for many neurodegenerative risk factors the question of whether DNA damage is cause or consequence of the neurodegenerative process is still open, and probably both is true. The research interest in markers of oxidative stress was shifted, in recent years, towards the search of epigenetic biomarkers of neurodegenerative disorders, following the accumulating evidence of a substantial contribution of epigenetic mechanisms to learning, memory processes, behavioural disorders and neurodegeneration. Increasing evidence is however linking DNA damage and repair with epigenetic phenomena, thereby opening the way to a very attractive and timely research topic in neurodegenerative diseases. We will address those issues in the context of Alzheimer's disease

  3. DNA damage in neurodegenerative diseases

    International Nuclear Information System (INIS)

    Coppedè, Fabio; Migliore, Lucia

    2015-01-01

    Highlights: • Oxidative DNA damage is one of the earliest detectable events in the neurodegenerative process. • The mitochondrial DNA is more vulnerable to oxidative attack than the nuclear DNA. • Cytogenetic damage has been largely documented in Alzheimer's disease patients. • The question of whether DNA damage is cause or consequence of neurodegeneration is still open. • Increasing evidence links DNA damage and repair with epigenetic phenomena. - Abstract: Following the observation of increased oxidative DNA damage in nuclear and mitochondrial DNA extracted from post-mortem brain regions of patients affected by neurodegenerative diseases, the last years of the previous century and the first decade of the present one have been largely dedicated to the search of markers of DNA damage in neuronal samples and peripheral tissues of patients in early, intermediate or late stages of neurodegeneration. Those studies allowed to demonstrate that oxidative DNA damage is one of the earliest detectable events in neurodegeneration, but also revealed cytogenetic damage in neurodegenerative conditions, such as for example a tendency towards chromosome 21 malsegregation in Alzheimer's disease. As it happens for many neurodegenerative risk factors the question of whether DNA damage is cause or consequence of the neurodegenerative process is still open, and probably both is true. The research interest in markers of oxidative stress was shifted, in recent years, towards the search of epigenetic biomarkers of neurodegenerative disorders, following the accumulating evidence of a substantial contribution of epigenetic mechanisms to learning, memory processes, behavioural disorders and neurodegeneration. Increasing evidence is however linking DNA damage and repair with epigenetic phenomena, thereby opening the way to a very attractive and timely research topic in neurodegenerative diseases. We will address those issues in the context of Alzheimer's disease

  4. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  5. Laser damage helps the eavesdropper in quantum cryptography.

    Science.gov (United States)

    Bugge, Audun Nystad; Sauge, Sebastien; Ghazali, Aina Mardhiyah M; Skaar, Johannes; Lydersen, Lars; Makarov, Vadim

    2014-02-21

    We propose a class of attacks on quantum key distribution (QKD) systems where an eavesdropper actively engineers new loopholes by using damaging laser illumination to permanently change properties of system components. This can turn a perfect QKD system into a completely insecure system. A proof-of-principle experiment performed on an avalanche photodiode-based detector shows that laser damage can be used to create loopholes. After ∼1  W illumination, the detectors' dark count rate reduces 2-5 times, permanently improving single-photon counting performance. After ∼1.5  W, the detectors switch permanently into the linear photodetection mode and become completely insecure for QKD applications.

  6. A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET

    Directory of Open Access Journals (Sweden)

    Chi-Sung Laih

    2009-06-01

    Full Text Available MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods, we implement a new protocol, MHA, using a hop-count analysis from the viewpoint of users without any special environment assumptions. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions, thus showing the advantages of MHA.

  7. Methodology for the assessment of possible damages in low voltage equipment due to lightning surges

    Energy Technology Data Exchange (ETDEWEB)

    Matsuo, Nelson M.; Kagan, Nelson [University of Sao Paulo (USP), SP (Brazil)], Emails: matsuonm@usp.br, nelsonk@pea.usp.br; Domingues, Ivo T. [AES Eletropaulo, SP (Brazil); Jesus, Nelson C. de [AES Sul, Porto Alegre, RS (Brazil); Silva, Marcelo H.I. da [Grupo Rede, Sao Paulo, SP (Brazil); Takauti, Edson H. [Bandeirante, Sao Paulo, SP (Brazil)

    2007-07-01

    This paper deals with the development of a methodology to assess the possibility of equipment damages in low voltage customers due to lightning surges. The main objective is to incorporate this methodology in a computation system that supports distribution companies to determine the possible causes of equipment damages claimed by customers and to decide whether the claims are to be reimbursed or not. The proposed methodology determines whether a specific customer could be affected by a lightning strike according to his/her location and to the lightning main parameters, by using data from a lightning detection system and from the specific equipment surge withstand capability. A specific study using ATP (Alternative Transients Program) was carried out to assess the propagation of lightning surges in electric power distribution systems and their impact over low voltage customers. On the other hand, the withstand capability of the main household appliances was determined by a series of tests carried out in the University's power quality laboratory. The paper details the modeling used for simulation, such as network configuration, grounding points, and modelling of insulator flashover, distribution transformer, low voltage loads. It also presents some results regarding the evaluation of over voltages in low voltage customers installations. A practical method is proposed for assessing the possibility of equipment damage and describes how the existing uncertainties were handled. Also, some issues regarding the withstand capability of electric household appliances to lightning surges are discussed and some results of the laboratory tests are presented. (author)

  8. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  9. Classification of HTTP Attacks: A Study on the ECML/PKDD 2007 Discovery Challenge

    Energy Technology Data Exchange (ETDEWEB)

    Gallagher, Brian [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Eliassi-Rad, Tina [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-07-08

    As the world becomes more reliant on Web applications for commercial, financial, and medical transactions, cyber attacks on the World Wide Web are increasing in frequency and severity. Web applications provide an attractive alternative to traditional desktop applications due to their accessibility and ease of deployment. However, the accessibility of Web applications also makes them extremely vulnerable to attack. This inherent vulnerability is intensified by the distributed nature ofWeb applications and the complexity of configuring application servers. These factors have led to a proliferation of Web-based attacks, in which attackers surreptitiously inject code into HTTP requests, allowing them to execute arbitrary commands on remote systems and perform malicious activities such as reading, altering, or destroying sensitive data. One approach for dealing with HTTP-based attacks is to identify malicious code in incoming HTTP requests and eliminate bad requests before they are processed. Using machine learning techniques, we can build a classifier to automatically label requests as “Valid” or “Attack.” For this study, we develop a simple, but effective HTTP attack classifier, based on the vector space model used commonly for Information Retrieval. Our classifier not only separates attacks from valid requests, but can also identify specific attack types (e.g., “SQL Injection” or “Path Traversal”). We demonstrate the effectiveness of our approach through experiments on the ECML/PKDD 2007 Discovery Challenge data set. Specifically, we show that our approach achieves higher precision and recall than previous methods. In addition, our approach has a number of desirable characteristics, including robustness to missing contextual information, interpretability of models, and scalability.

  10. Hypochlorite-induced damage to nucleosides

    DEFF Research Database (Denmark)

    Hawkins, C L; Davies, Michael Jonathan

    2001-01-01

    HOCl damage to DNA bases. We show that reaction of HOCl with the exocyclic -NH(2) groups of cytidine, adenosine, and guanosine, and the ring NH groups of all bases, yields chloramines (RNHCl/RR'NCl). These are the major initial products. Chloramine decay can be accelerated by UV light and metal ions...... for radical formation is cytidine > adenosine = guanosine > uridine = thymidine. These data are inconsistent with the selectivity of HOCl attack and the stability of the resulting chloramines, but can be rationalized if chlorine transfer between bases is rapid and yields the most stable chloramine...

  11. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  12. The effect of apple (Malus Domestica juice on the damage of mice liver cells due to paracetamol treatment

    Directory of Open Access Journals (Sweden)

    Anthony Hartanto

    2009-07-01

    Full Text Available The liver is an important organ for body metabolism process. Liver disease is one of serious health problems in developing countries including Indonesia. Liver damage is caused by viral infection, toxic agent exposure (medications, alcohol, hormonal disturbance, neoplasm and autoimmune diseases. The use of high dose paracetamol to reduce pain also leads to liver damage. Apple (Malus domestica juice is a natural anti oxidant agent. This laboratory experimental study was performed to discover the effect of giving apple juice on damaged cell regeneration due to the use of paracetamol. The study was performed in 21 male mice from Swiss-Webster strain that were divided into group I, II, and III. Group, I served as control while group II received 1 mg/ml paracetamol dose for 5 days and Group III received 1 mg/ml paracetamol for 5 days and 1 ml of apple juice on the 5th to 10th day. The observation of the mice liver cells was conducted using a light microscope with 400x magnification to get the number of necrotic liver cells per view field. The results of this study showed a difference in the number of necrotic liver cells between Group II and III. ANOVA statistical test ( = 0.05 concluded that apple juice significantly helps regeneration process in damaged liver cells caused by paracetamol.

  13. Vulnerability Assessment of Housing Damage in the Philippines Due to an Increase Increase in Typhoon Intensity

    Science.gov (United States)

    Esteban, Miguel; Stromberg, Per; Gasparatos, Alexandros

    2010-05-01

    south is almost unaffected due to its proximity to the equator. The estimation of the damage shows that the number of houses partially or totally destroyed could increase by up to 58% in certain regions by 2085. The historical damage data shows how the adaptive capacity values of each region given by Yusuf and Herminia (2009) are crucial to the amount of damage recorded. These authors defined this parameter as the degree to which adjustments in practices, processes or structures can moderate or offset potential damage or take advantage of opportunities from climate change. This clearly highlights the importance of mitigation measures to increase the resilience of communities in the future. This is a significant conclusion of the present paper, independent of whether tropical cyclones increase in intensity or not.

  14. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  15. Damage analysis: damage function development and application

    International Nuclear Information System (INIS)

    Simons, R.L.; Odette, G.R.

    1975-01-01

    The derivation and application of damage functions, including recent developments for the U.S. LMFBR and CTR programs, is reviewed. A primary application of damage functions is in predicting component life expectancies; i.e., the fluence required in a service spectrum to attain a specified design property change. An important part of the analysis is the estimation of the uncertainty in such fluence limit predictions. The status of standardizing the procedures for the derivation and application of damage functions is discussed. Improvements in several areas of damage function development are needed before standardization can be completed. These include increasing the quantity and quality of the data used in the analysis, determining the limitations of the analysis due to the presence of multiple damage mechanisms, and finally, testing of damage function predictions against data obtained from material surveillance programs in operating thermal and fast reactors. 23 references. (auth)

  16. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  17. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  18. Unexpected ICD pulse generator failure due to electronic circuit damage caused by electrical overstress.

    Science.gov (United States)

    Hauser, R G; Hayes, D L; Almquist, A K; Epstein, A E; Parsonnet, V; Tyers, G F; Vlay, S C; Schoenfeld, M H

    2001-07-01

    Because it is a lifesaving device, the unexpected failure of an ICD can be catastrophic. We report ICD electronic circuit failure due to electrical overstress damage (EOS) to the high voltage hybird circuit and other electronic components in a series of ICD pulse generator models. Data were obtained from the Multicenter Registry of Pacemaker and ICD Pacemaker and Lead Failures, and from the manufactures' adverse event reports, that were in the FDA's Manufacturer and User Facility Device Experience (MAUDE) database. Of 16 nonbattery Guidant/CPI ICD pulse generator failures reported to the registry, 6 (38%) have been confirmed by the manufacturer to be EOS related, and Guidant/CPI has reported 273 such failures to the FDA as of 12/29/00. The signs of failure included loss of telemetry and inability to deliver therapy, and some patients have experienced serious adverse events. Hybrid circuit damage may have occurred during capacitor charging or reform, and the majority appears to have happened during normal ICD function. While the incidence of this problem is unknown, a management strategy should be adopted that includes routine follow-up every 3 months and device evaluation after a shock or exposure to external defibrillation or electrosurgical devices. This study suggests that additional data are needed to determine the incidence of this problem, and that our present methods for monitoring the performance of ICD's following market release are inadequate.

  19. Combined 8-MOP and UVA damages of peripheral lymphocytes within less than one second

    International Nuclear Information System (INIS)

    Boehm, F.; Meffert, H.; Bauer, E.; Akademie der Wissenschaften der DDR, Jena. Zentralinstitut fuer Mikrobiologie und Experimentelle Therapie)

    1982-01-01

    Cell membranes are the main target of PUVA-therapy. Combined stopped flow and irradiation experiments allow to conclude from the speed of a photoreaction to its anatomical place. Isolated human lymphocytes were mixed with 8-MOP solution in a time less than 20 ms (total concentration 5 μM) and irradiated with UVA (0.05 J/cm 2 ). One second after irradiation 1/5 of the cells used were damaged. The rate of trypan blue-stainable cells was not enhanced by prolongating the time of incubation up to 45 minutes and following irradiation with 0.3 J/cm 2 UVA. These results are exaplained by a membrane attack due to the combined action of 8-MOP and UVA to the lymphocytes. (author)

  20. Bark and wood pests of smoke-damaged Scots pine. [Myclophilus piniperda, Pissodes pini, Pissodes piniphilus

    Energy Technology Data Exchange (ETDEWEB)

    Kudela, M; Wolf, R

    1964-01-01

    This paper examines the relationship between smoke damage and insect infestation of trees. Two stands of trees were examined. The trees ranged in age from 64 > 75 years. Details are tabulated on the number and distribution of pests. The chief pests were Myclophilus piniperda, Pissodes pini, and Pissodes piniphilus. Results indicated that the intensity of attack by pests increased with increasing severity of smoke damage. 20 references.

  1. Base excision repair of oxidative DNA damage and association with cancer and aging

    DEFF Research Database (Denmark)

    Maynard, Scott; Schurman, Shepherd H; Harboe, Charlotte

    2009-01-01

    Aging has been associated with damage accumulation in the genome and with increased cancer incidence. Reactive oxygen species (ROS) are produced from endogenous sources, most notably the oxidative metabolism in the mitochondria, and from exogenous sources, such as ionizing radiation. ROS attack DNA...

  2. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  3. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  4. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  5. Schistosoma mansoni; relationship between membrane turnover rates and susceptibility to immune damage. Part of a coordinated programme on preparation of irradiated vaccines against some human diseases

    International Nuclear Information System (INIS)

    Pereira Tavares, C.A.

    1983-11-01

    It is known that the schistosomulum of Schistosoma mansoni become refractory to damage by antibody and complement in vitro in the presence of serum, or Concanavalin A (Con A), or after contact with host tissues, presumably due to intrinsic changes in the surface membrane. This project studied the effect of dialysed fetal calf serum (DFCS) and Con A on the synthesis and turnover of individual proteins in the surface membrane using the incorporation of 14 C- and 3 H-labelled Arginine and the separation of the membrane proteins in SDS-PAGE. The results indicate that during the period in which schistosomules become resistant to immune attack, no qualitative alterations in electrophoretic patterns of surface proteins were observed. There was, however, a marked heterogeneity in synthesis and degradation among constituent proteins. In addition, Con A which had been shown to be effective in stimulating loss of susceptibility to immune attack, caused a slight decrease in the synthesis and turnover rate of high molecular weight proteins, whilst DFCS increased synthesis and turnover of low molecular weight proteins. This suggests that at least two processes occur in the membrane which may be related to the development of protection against immune attack. Serum might stimulate the loss of crucial antigens by accelerating their turnover making antibody attachment difficult, and Con A could be stabilizing the membrane by crosslinking large macromolecules. It is possible that in vivo both mechanisms occur to make the schistosomule surface refractory to damage

  6. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  7. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  8. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  9. CORRELATION AMONG DAMAGES CAUSED BY YELLOW BEETLE, CLIMATOLOGICAL ELEMENTS AND PRODUCTION OF GUAVA ACCESSES GROWN IN ORGANIC SYSTEM

    Directory of Open Access Journals (Sweden)

    JULIANA ALTAFIN GALLI

    Full Text Available ABSTRACT The objective of this research was evaluate the damage caused by the yellow beetle on 85 guava accessions and correlations of the damage with the climatological elements and the production of fruit in an orchard of guava conducted in organic system. Ten leaves by access were analyzed containing the injury of insect attack. Each leaf had its foliar area measured by leaf area meter and, after obtaining the total area, the leaf was covered with duct tape, and measure again. The averages were compared by Scott-Knott test at 5% probability. The 15 accessions with highest average damage had the data submitted to the correlation with the minimum and maximum temperature, precipitation and relative humidity. The production was obtained by the number of fruits/plant. The damages are negatively correlated with the mean relative humidity of 7:00h (local time in the period of 14 days prior to the assessments, and negatively affect production. The accessions Saito, L4P16, Monte Alto Comum 1 and L5P19 are promising in organic agriculture, for presenting good production and minor damage to insect attack, when compared to others.

  10. Honey can repairing damage of liver tissue due to protein energy malnutrition through induction of endogenous stem cells.

    Science.gov (United States)

    Prasetyo, R Heru; Hestianah, Eka Pramyrtha

    2017-06-01

    This study was to evaluate effect of honey in repairing damage of liver tissue due to energy protein malnutrition and in mobilization of endogenous stem cells. Male mice model of degenerative liver was obtained through food fasting but still have drinking water for 5 days. It caused energy protein malnutrition and damage of liver tissue. The administration of 50% (v/v) honey was performed for 10 consecutive days, while the positive control group was fasted and not given honey and the negative control not fasted and without honey. Observations of regeneration the liver tissue based on histologically examination, observation of Hsp70 expression, and homing signal based on vascular endothelial growth factor-1 (VEGF-1) expression using immunohistochemistry technique. Observation on expression of CD34 and CD45 as the marker of auto mobilization of hematopoietic stem cells using flow cytometry technique. There is regeneration of the liver tissue due to protein energy malnutrition, decrease of Hsp70 expression, increase of VEGF-1 expression, and high expression of CD34 and CD45. Honey can improve the liver tissue based on: (1) Mobilization of endogenous stem cells (CD34 and CD45); (2) Hsp70 and VEGF-1 expressions as regeneration marker of improvement, and (3) regeneration histologically of liver tissue.

  11. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  12. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. Nondestructive damage detection and evaluation technique for seismically damaged structures

    Science.gov (United States)

    Adachi, Yukio; Unjoh, Shigeki; Kondoh, Masuo; Ohsumi, Michio

    1999-02-01

    The development of quantitative damage detection and evaluation technique, and damage detection technique for invisible damages of structures are required according to the lessons from the 1995 Hyogo-ken Nanbu earthquake. In this study, two quantitative damage sensing techniques for highway bridge structures are proposed. One method is to measure the change of vibration characteristics of the bridge structure. According to the damage detection test for damaged bridge column by shaking table test, this method can successfully detect the vibration characteristic change caused by damage progress due to increment excitations. The other method is to use self-diagnosis intelligent materials. According to the reinforced concrete beam specimen test, the second method can detect the damage by rupture of intelligent sensors, such as optical fiber or carbon fiber reinforced plastic rod.

  14. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  15. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  16. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  17. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  18. Radiation damage to histones

    International Nuclear Information System (INIS)

    Mee, L.K.; Adelstein, S.J.

    1985-01-01

    The damage to histones irradiated in isolation is being elaborated to aid the identification of the crosslinking sites in radiation-induced DNA-histone adducts. Histones are being examined by amino acid analysis to determine the destruction of residues and by polyacrylamide gel electrophoresis to delineate changes in conformation. For the slightly lysine-rich histone, H2A, a specific attack on selective residues has been established, the aromatic residues, tyrosine and phenylalanine, and the heterocyclic residue, histidine, being significantly destroyed. In addition, a significant increase in aspartic acid was found; this may represent a radiation product from scission of the ring in the histidine residues. The similarity of the effects on residues in nitrous oxide-saturated and nitrogen-saturated solutions suggests that OH . and e/sub aq//sup -/ are equally efficient and selective in their attack. On gel electrophoresis degradation of the histone H2A was found to be greatest for irradiations in nitrous oxide-saturated solutions, suggesting CH . is the most effective radical for producing changes in conformation; O/sub 2//sup -/ was essentially ineffective. Other histones are being examined for changes in amino acid composition, conformation, and for the formation of radiation products

  19. How to detect the location and time of a covert chemical attack a Bayesian approach

    OpenAIRE

    See, Mei Eng Elaine.

    2009-01-01

    Approved for public release, distribution unlimited In this thesis, we develop a Bayesian updating model that estimates the location and time of a chemical attack using inputs from chemical sensors and Atmospheric Threat and Dispersion (ATD) models. In bridging the critical gap between raw sensor data and threat evaluation and prediction, the model will help authorities perform better hazard prediction and damage control. The model is evaluated with respect to settings representing real-wo...

  20. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  1. Information Warfare: using the viable system model as a framework to attack organisations

    Directory of Open Access Journals (Sweden)

    Bill Hutchinson

    2002-05-01

    Full Text Available Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

  2. Toward Exposing Timing-Based Probing Attacks in Web Applications †

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-01-01

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. PMID:28245610

  3. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  4. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  5. Acoustic emission diagnosis of concrete-piles damaged by earthquakes

    International Nuclear Information System (INIS)

    Shiotami, Tomoki; Sakaino, Norio; Ohtsu, Masayasu; Shigeishi, Mitsuhiro

    1997-01-01

    Earthquakes often impose unexpected damage on structures. Concerning the soundness of the structure, the upper portion is easily estimated by visual observation, while the lower portion located in deep underground is difficult to be estimated. Thus there exist few effective methods to investigate underground structures. In this paper, a new inspection technique for damage evaluation of concrete-piles utilizing acoustic emission (AE) is proposed, and is verified by a series of experiments. Firstly, such basic characteristics as the attenuation and effective wave-guides for detecting AE underground, are examined through laboratory tests. Secondary, fracture tests of full-scale prefabricated concrete piles are conducted, and the characteristics of the AE are examined. Finally, actual concrete-piles attacked by the 1995 Great Hanshin Earthquake are investigated. Results confirm that the estimated damages by the proposed method are in good agreement with actual damaged locations. Thus, the method is very effective for the diagnosis of the concrete-piles.

  6. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  7. Mechanisms for radiation damage in DNA

    International Nuclear Information System (INIS)

    Sevilla, M.D.

    1985-07-01

    Radiation damage to DNA results from the direct interaction of radiation with DNA where positive ions, electrons and excited states are formed in the DNA, and the indirect effect where radical species formed in the surrounding medium by the radiation attack the DNA. The primary mechanism proposed for radiation damage, by the direct effect, is that positive and negative ions formed within the DNA strand migrate through the stacked DNA bases. The ions can then recombine, react with the DNA bases most likely to react by protonation of the anion and deprotonation or hydroxylation of the cation or transfer out of the DNA chain to the surrounding histone protein. This work as aimed at understanding the possible reactions of the DNA base ion radicals, as well as their initial distribution in the DNA strand. 31 refs

  8. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  9. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  10. Radiation damage to DNA-protein complexes

    Czech Academy of Sciences Publication Activity Database

    Spotheim-Maurizot, M.; Davídková, Marie

    2011-01-01

    Roč. 261, zima (2011), s. 1-10 ISSN 1742-6588. [COST Chemistry CM0603-MELUSYN Joint Meeting Damages Induced in Biomolecules by Low and High Energy Radiations. Paříž, 09.03.2010-12.03.2010] R&D Projects: GA AV ČR IAA1048103; GA AV ČR KJB4048401; GA MŠk 1P05OC085; GA MŠk OC09012; GA AV ČR IAB1048901 Institutional research plan: CEZ:AV0Z10480505 Keywords : radiolysis * molecular-dynamics simulation * hydroxyl radical attack * induced strand breakage Subject RIV: BO - Biophysics

  11. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2007-10-15

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation

  12. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation as a

  13. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  14. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  15. Analysis and evaluation of atom level composition variation and property change due to materials irradiation damage

    International Nuclear Information System (INIS)

    Furuya, Kazuo; Takeguchi, Masaki; Mitsuishi, Kazuki; Song Menhi; Saito, Tetsuya

    2000-01-01

    This study aims at general elucidation of atom level composition variation due to radiation damage and property change accompanied with this under intending to stressing application of the in-situ analysis and evaluation apparatus on material radiation damage. Then, by using the electron energy loss spectroscopy (EELS) capable of showing a power in composition analysis at microscopic region, measurement of EELS on crystal structure change after heat treatment of Xe precipitation was carried out under parallel of its high resolution observation. As a result, a precipitation with less than 30 nm in diameter was observed on a specimen inserted at 473 K. Xe precipitates in crystalline state began to change at 623 K, to be perfectly gassy state at 773 K. In an energy filter image (EFI) using low loss of Xe, distribution of crystalline and non-crystalline Xe was observed. In EELS, peaks at 14.6 and 15.3 eV were observed in 300 and 773 K, respectively, which were thought to be plasmon. And, difference of peak position at the core loss was thought to reflex difference of Xe state at 300 and 773 K. (G.K.)

  16. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  17. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  18. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  19. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  20. Face Spoof Attack Recognition Using Discriminative Image Patches

    Directory of Open Access Journals (Sweden)

    Zahid Akhtar

    2016-01-01

    Full Text Available Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user’s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames are redundant or correspond to the clutter in the image (video, thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM, Naive-Bayes, Quadratic Discriminant Analysis (QDA, and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD shows promising results compared to existing works.

  1. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  2. Brain imaging with 123I-IMP-SPECT in migraine between attacks

    International Nuclear Information System (INIS)

    Schlake, H.P.; Boettger, I.G.G.; Grotemeyer, K.H.; Husstedt, I.W.

    1989-01-01

    123 I-IMP-SPECT brain imaging was performed in patients with classic migraine (n = 5) and migraine accompagnee (n = 18) during the headache-free interval. A regional reduction of tracer uptake into brain was observed in all patients with migraine accompagnee, while in patients with classic migraine only one case showed an area of decreased activity. The most marked alteration was found in a patient with persisting neurological symptoms (complicated migraine). In most cases the areas of decreased tracer uptake corresponded to headache localization as well as to topography of neurologic symptoms during migraine attacks. It may be concluded that migraine attacks occur in connection with exacerbations of preexisting changes of cerebral autoregulation due to endogenous or exogenous factors

  3. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  4. Genetic doping and health damages.

    Science.gov (United States)

    Fallahi, Aa; Ravasi, Aa; Farhud, Dd

    2011-01-01

    Use of genetic doping or gene transfer technology will be the newest and the lethal method of doping in future and have some unpleasant consequences for sports, athletes, and outcomes of competitions. The World Anti-Doping Agency (WADA) defines genetic doping as "the non-therapeutic use of genes, genetic elements, and/or cells that have the capacity to enhance athletic performance ". The purpose of this review is to consider genetic doping, health damages and risks of new genes if delivered in athletes. This review, which is carried out by reviewing relevant publications, is primarily based on the journals available in GOOGLE, ELSEVIER, PUBMED in fields of genetic technology, and health using a combination of keywords (e.g., genetic doping, genes, exercise, performance, athletes) until July 2010. There are several genes related to sport performance and if they are used, they will have health risks and sever damages such as cancer, autoimmunization, and heart attack.

  5. Honey can repairing damage of liver tissue due to protein energy malnutrition through induction of endogenous stem cells

    Directory of Open Access Journals (Sweden)

    R. Heru Prasetyo

    2017-06-01

    Full Text Available Aim: This study was to evaluate effect of honey in repairing damage of liver tissue due to energy protein malnutrition and in mobilization of endogenous stem cells. Materials and Methods: Male mice model of degenerative liver was obtained through food fasting but still have drinking water for 5 days. It caused energy protein malnutrition and damage of liver tissue. The administration of 50% (v/v honey was performed for 10 consecutive days, while the positive control group was fasted and not given honey and the negative control not fasted and without honey. Observations of regeneration the liver tissue based on histologically examination, observation of Hsp70 expression, and homing signal based on vascular endothelial growth factor-1 (VEGF-1 expression using immunohistochemistry technique. Observation on expression of CD34 and CD45 as the marker of auto mobilization of hematopoietic stem cells using flow cytometry technique. Results: There is regeneration of the liver tissue due to protein energy malnutrition, decrease of Hsp70 expression, increase of VEGF-1 expression, and high expression of CD34 and CD45. Conclusion: Honey can improve the liver tissue based on: (1 Mobilization of endogenous stem cells (CD34 and CD45; (2 Hsp70 and VEGF-1 expressions as regeneration marker of improvement, and (3 regeneration histologically of liver tissue.

  6. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  7. Development of a dynamic model to evaluate economic recovery following a nuclear attack. Volume 1. Description and simulations. Final report

    International Nuclear Information System (INIS)

    Peterson, D.W.; Silverman, W.S.; Weil, H.B.; Willard, S.

    1980-11-01

    A highly-robust, dynamic simulation model of the US economy has been constructed to evaluate the likely economic response after various nuclear attacks or other severe disruptions, under various policies and assumptions. The model consists of a large system of nonlinear, recursive, time-difference equations. The solution-interval of the model is adjustable, with a maximum value of three weeks. The model represents the economy in thirteen sectors. Each sector contains a detailed representation of production, distribution, supply constraints, finance, employment, pricing, and wages. Also included are a full input-output representation of the interconnections among the sectors, and the psychological responses of corporate planners, consumers, and the labor force. The model's equations are formulated to remain consistent and realistic for all values of the variables, including the most extreme conditions. Therefore, the model can realistically simulate any degree or time sequence of nuclear attacks, pre-attack surges, mobilization, or policy shifts. Simulation experiments with the model suggest that the economy is highly vulnerable to nuclear attack, and that recovery requires extensive preparation, including psychological readiness, technology maintenance, special financial policies, and (if possible) maintenance of foreign trade. Civil defense policies must be adaptive (contingent on the nature of the damage) and must strive for balance among sectors, rather than maximum survival. This volume includes two appendices. Appendix A defines the aggregation of the model. Appendix B outlines the range of attack scenarios, pre-attack civil defense policies, and post-attack civil defense policies that can be evaluated with the model, including the model variables applicable to implementing those policies

  8. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  9. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  10. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT

    Directory of Open Access Journals (Sweden)

    Avijit Mathur

    2016-01-01

    Full Text Available Wireless sensor networks (WSNs are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use: black hole and selective forwarding (SF attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  11. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.

    Science.gov (United States)

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-19

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  12. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  13. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  14. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  15. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  16. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  17. The usefulness of the nuclear cardiology in the cellular implant in patients with severe myocardial damage

    International Nuclear Information System (INIS)

    Omelas A, M.; Arguero S, R.; Garrido G, M.H.; Rodriguez C, A.; Careaga, G.; Castano G, R.; Nambo, M.J.; Pascual P, J.; Ortega R, A.; Gaxiola A, A.; Magana S, J.A.; Estrada A, H.; Equipo de Tecnicos en Medicina Nuclear

    2005-01-01

    The recent therapeutic advances as the cellular implant as well as those different protocols of image acquisition in the field of the Nuclear Cardiology its have allowed that the patient with severe myocardial damage and without some possibility of revascularization is benefited with these advances. Doubtless the Tl-201 par excellence has an important paper for standardize the more appropriate therapeutic behavior for the heart attack patient; reason by this investigation protocol was developed. The objective of the study was to identify the heart attack regions without viable tissue with SPECT in patient with important myocardial damage without some possibility of traditional revascularization; for the 'Stem cell' cellular implantation therapy. The methodology it was carried out by a study of myocardial perfusion in 10 patients with important myocardial damage previous cellular implants, with PICANUC/ SPECT methodology and using a software (Emory Tool Box) for the image processing validated by the University of Emory Atlanta GA; and using as tracer the Tl - 201 to identify the heart attack regions without presence of viable tissue with an analysis model of 17 segments standardized for the left ventricle; qualifying this way the myocardial perfusion in: 0 (normal), 1 (light), 2 (moderate), 3 (severe), 4 (absent) and x (bad technique). The conclusions were that the SPECT study with PICANUC methodology with Tl-201 is safe and effective for the precise localization for the cellular implantation via direct intra myocardial. (Author)

  18. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  19. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  20. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  1. Damage of plates due to impact, dynamic pressure and explosive loads

    Directory of Open Access Journals (Sweden)

    Norman Jones

    Full Text Available It is the purpose of this article to present design equations which can be used to predict the damage of ductile plating when subjected to mass impact, dynamic pressure or impulsive loadings. The external loadings are sufficiently severe to produce inelastic material behaviour and produce finite transverse displacement, or geometry change, effects. The damage is characterised as the final or permanent transverse displacement of a plate. The theoretical method predicts values for the maximum permanent transverse displacements which agree reasonably well with the corresponding experimental results generated on aluminium alloy circular, square and rectangular plates. Thus, the equations presented in this article are valuable for preliminary design purposes and for forensic studies, while the experimental data can be used for validating numerical schemes.

  2. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  3. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  4. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  5. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  6. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  7. Maize Stem Response to Long-Term Attack by Sesamia nonagrioides

    Directory of Open Access Journals (Sweden)

    Victor M. Rodriguez

    2018-04-01

    Full Text Available Plants defend themselves against herbivores by activating a plethora of genetic and biochemical mechanisms aimed at reducing plant damage and insect survival. The short-term plant response to insect attack is well understood, but less is known about the maintenance of this response over time. We performed transcriptomic and metabolomics analyses in order to identify genes and metabolites involved in the long-term response of maize to attack by the corn borer Sesamina nonagrioides. To determine the role of elicitors present in caterpillar secretions, we also evaluated the response of maize stem challenged with insect regurgitates. The integrative analysis of the omics results revealed that the long-term response in maize is characterized by repression of the primary metabolism and a strong redox response, mainly mediated by germin-like proteins to produce anti-nutritive and toxic compounds that reduce insect viability, and with the glutathione–ascorbate cycle being crucial to minimize the adverse effects of reactive oxygen species (ROS on the plant. Our results suggest that different defense mechanisms are involved in the long-term response compared to those reported during the early response. We also observed a marginal effect of the caterpillar regurgitates on the long-term defensive response.

  8. Cybersecurity Information Sharing Between Public Private Sector Agencies

    Science.gov (United States)

    2015-03-01

    due to fears of public disclosure, such as the recent Edward Snowden revelations. Public 188 Blauner...recent Snowden leaks.60 While some attacks have left behind minimal damage, other more sophisticated attacks have resulted in major security breaches...resulting in the loss of hundreds of millions of dollars.61 The extent of damage caused by the Snowden leaks is still unknown

  9. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  10. Understanding radiation damage on sub-cellular scale using RADAMOL simulation tool

    Czech Academy of Sciences Publication Activity Database

    Štěpán, Václav; Davídková, Marie

    2016-01-01

    Roč. 128, NOV (2016), s. 11-17 ISSN 0969-806X R&D Projects: GA ČR(CZ) GBP108/12/G108; GA MŠk LD12008 Grant - others:GA MŠk(CZ) LM2010005 Institutional support: RVO:61389005 Keywords : charged particles * DNA * proteins * radiation damage * radical attack * water radiolysis Subject RIV: BO - Biophysics Impact factor: 1.315, year: 2016

  11. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  12. Protective effects of oleum curcumae wenchowensis on skin damage due to UVB

    International Nuclear Information System (INIS)

    Wang Zhicheng; Zhao Hongguang; Du Xiang; Li Yanbo; Guo Wei; Gong Shouliang; Xiao Jian; Yao Chongshun; Li Xiaokun

    2006-01-01

    Objective: To study the protective effects of oleum curcumae wenchowensis on skin damage exposed to UVB and its mechanism, and to provide the experimental basis for the protection of skin damage exposed to UVB. Methods: The skin of guinea pigs was exposed to UVB (28.38 J/cm 2 · 30 d) to establish the oxidative damage model. The skin erythema and the rough were observed during the experiment; the thickness of epiderm and the number of fibroblast were observed under light microscope after the experiment. The activities of GSH-Px, SOD, CAT and T-AOC and the contain of MDA in the supernate of skin homogenate were detected with biochemical methods. Results: The epiderm in UVB exposure group and blank group thickened, but that in protective group weren't observed; the number of fibroblast in UVB exposure group and blank group decreased, while that in protective group increased, but that in control group didn't. The content of MDA in the supemate of skin homogenate in UVB exposure group and blank group increased, but that in protective group deceased, and the activities of GSH-Px, SOD, CAT and T-AOC in UVB exposure group and blank group decreased, but those in protective group increased, and control group had no change. Conclusions: Oleum curcumae wenchowensis has the protective effects on skin damage exposed to UVB, which may be mediated by increasing the contain of antioxidases and eliminating the flee radical. (authors)

  13. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  14. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  15. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  17. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  18. Evaluation on effects of chloride-induced deterioration on mechanical properties of RC beams with cracking damage

    International Nuclear Information System (INIS)

    Matsuo, Toyofumi; Matsumura, Takuro; Otsuka, Taku

    2015-01-01

    This paper discusses the influence of chloride-induced deterioration on mechanical properties of aging reinforced concrete (RC) structures and the applicability of the material degradation model that takes reinforcing steel corrosion into consideration for finite element analysis. We conducted the corrosion tests under the simulated tidal environment and the flexural loading tests for the RC beams with cracking damage and initial defects. Then, the experimental results were numerically correlated to validate the devised modeling. The obtained results were summarized as follows: (a) The cracking damage in specimens caused a minor effect on the reinforcing steel corrosion in the case where the thickness of cover concrete was 40 mm and main rebars did not yield before chloride attack. On the other hand the maximum corrosion ratio of the deteriorated part became considerably larger than that of the non-cracking part in the specimens where the cover concrete were removed partially to simulate spalling by the severe corrosion. (b) Based on the test results, we derived the corrosion velocity of reinforcing steel corresponding to cracking damage degrees. (c) In FEM analyses, we showed that the above modeling can estimate the flexural strength of RC beams in consideration of the degradation in elongation performance of reinforcing steel due to corrosion. (author)

  19. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  20. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    OpenAIRE

    Rosenberg, Ishai; Shabtai, Asaf; Rokach, Lior; Elovici, Yuval

    2017-01-01

    In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such...

  1. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  2. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  3. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  4. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  5. The United States should forego a damage-limitation capability against China

    Science.gov (United States)

    Glaser, Charles L.

    2017-11-01

    Bottom Lines • THE KEY STRATEGIC NUCLEAR CHOICE. Whether to attempt to preserve its damage-limitation capability against China is the key strategic nuclear choice facing the United States. The answer is much less clear-cut than when the United States faced the Soviet Union during the Cold War. • FEASIBILITY OF DAMAGE LIMITATION. Although technology has advanced significantly over the past three decades, future military competition between the U.S. and Chinese forces will favor large-scale nuclear retaliation over significant damage limitation. • BENEFITS AND RISKS OF A DAMAGE-LIMITATION CAPABILITY. The benefits provided by a modest damage-limitation capability would be small, because the United States can meet its most important regional deterrent requirements without one. In comparison, the risks, which include an increased probability of accidental and unauthorized Chinese attacks, as well as strained U.S.—China relations, would be large. • FOREGO DAMAGE LIMITATION. These twin findings—the poor prospects for prevailing in the military competition, and the small benefits and likely overall decrease in U.S. security—call for a U.S. policy that foregoes efforts to preserve or enhance its damage-limitation capability.

  6. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  7. The thaumasite form of sulfate attack in concrete of Yongan Dam

    International Nuclear Information System (INIS)

    Hu Mingyu; Long Fumei; Tang Mingshu

    2006-01-01

    According to microanalytical investigations, it is shown that the concrete of Yongan Dam is deteriorated due to the thaumasite form of sulfate attack (TSA). Analysis results of scanning electron microscopy (SEM), Energy Disperse X-ray (EDX) and X-ray Diffraction (XRD) are supported by the analysis of the concrete composition and the geographical conditions of the dam

  8. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  9. Detection of system changes due to damage using a tuned hyperchaotic probe

    International Nuclear Information System (INIS)

    Torkamani, S; Butcher, E A; Todd, M D; Park, G

    2011-01-01

    This study explores the use of a hyperchaotic signal as an excitation to probe a system for dynamic changes induced by damage events. In chaotic interrogation a deterministic chaotic input (rather than the more commonly employed stochastic white noise input) is applied to the structure and the dynamic response is mined for features derived from its state space reconstruction. The steady-state chaotic excitation is tuned to excite the structure in a way that optimal sensitivity to dimensionality changes in the response may be observed, resulting in damage-sensitive features extracted from the resulting attractors. The enhanced technique proposed in this paper explores a hyperchaotic excitation, which is fundamentally new in its use as an excitation. Hyperchaotic oscillators have at least two Lyapunov exponents, in contrast to simple chaotic oscillators. By using the Kaplan–Yorke conjecture and performing a parametric investigation, the steady-state hyperchaotic excitation is tuned to excite the structure in such a way that the optimal (as will be defined) dimensionality of the steady-state response is achieved. A feature called the 'average local attractor variance ratio' (ALAVR), which is based on attractor geometry, is used to compare the geometry of a baseline attractor to a test attractor. The enhanced technique is applied to analytically and experimentally analyze the response of an eight-degree-of-freedom system to the hyperchaotic excitation for the purpose of damage assessment. A comparison between the results obtained from current hyperchaotic excitation versus a chaotic excitation highlights the higher damage sensitivity in the system response to the hyperchaotic excitation

  10. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  11. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  12. Increased incidence rate of trauma- and stressor-related disorders in Denmark following the Breivik attacks in Norway

    DEFF Research Database (Denmark)

    Hansen, Bertel Teilfeldt; Dinesen, Peter T; Østergaard, Søren D

    2017-01-01

    BACKGROUND: On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity......-would be followed by even larger increases in Denmark. METHODS: Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. RESULTS......: The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. CONCLUSION: This study bolsters...

  13. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  14. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  15. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  17. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  18. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  19. Biomechanical evaluation of potential damage to hernia repair materials due to fixation with helical titanium tacks.

    Science.gov (United States)

    Lerdsirisopon, Sopon; Frisella, Margaret M; Matthews, Brent D; Deeken, Corey R

    2011-12-01

    This study aimed to determine whether the strength and extensibility of hernia repair materials are negatively influenced by the application of helical titanium tacks. This study evaluated 14 meshes including bare polypropylene, macroporous polytetrafluoroethylene, absorbable barrier, partially absorbable mesh, and expanded polytetrafluoroethylene materials. Each mesh provided 15 specimens, which were prepared in 7.5 × 7.5-cm squares. Of these, 5 "undamaged" specimens were subjected to ball-burst testing to determine their biomechanical properties before application of helical titanium tacks (ProTack). To 10 "damaged" specimens 7 tacks were applied 1 cm apart in a 3.5-cm-diameter circle using a tacking force of 25 to 28 N. The tacks were removed from five of the specimens before ball-burst testing and left intact in the remaining five specimens. The application of tacks had no effect on the tensile strength of Dualmesh, ProLite Ultra, Infinit, Ultrapro, C-QUR Lite (6 in.). Most of the meshes did not exhibit significantly different tensile strengths between removal of tacks and tacks left intact. Exceptions included C-QUR, Prolene, Ultrapro, and Bard Soft Mesh, which were weaker with removal of tacks than with tacks left intact during the test. Damage due to the application of helical titanium tacks also caused increased strain at a stress of 16 N/cm for all the meshes except C-QUR Lite (>6 in.) and Physiomesh. Many of the meshes evaluated in this study exhibited damage in the form of reduced tensile strength and increased extensibility after the application of tacks compared with the corresponding "undamaged" meshes. Meshes with smaller interstices and larger filaments were influenced negatively by the application of helical titanium tacks, whereas mesh designs with larger interstices and smaller filaments tended to maintain their baseline mechanical properties.

  20. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  1. [Clinical pathway for management of patients with acute asthma attack].

    Science.gov (United States)

    Azuma, Naoto; Katada, Yoshinori; Kobayashi, Masaaki; Kojima, Makiko; Nakajima, Yumi; Shibano, Miyo; Tomita, Hitomi; Yamanaka, Takao; Harada, Yoshinori; Ishii, Taeko; Saeki, Yukihiko

    2008-11-01

    There have been few reports of clinical pathway (CP) for treatment of asthma attack, because patients with asthma always admit emergently and the severity varies. We introduced CP so that standard asthma treatment can be widely used, and investigated its clinical usefulness. We designed a new CP for treating asthma attack according to the guideline (Japanese guideline (JGL) and Global Initiative for Asthma (GINA)). 136 patients who admitted to our hospital due to asthma attack from January 1999 to November 2006, were enrolled our study. Excluding cases complicated with pneumonia, COPD or cardiac failure, we evaluated 46 cases treated with the CP comparing with 19 cases treated without the CP. The clinical evaluations include systemic and inhaled steroid use, FEV1.0%, history of asthma, and the duration of asthma attack. Furthermore, we investigated difference between cases with and without prolonged admission. While the rates of systemic and inhaled steroid use in cases without the CP were 57.9% and 52.6% respectively, those in cases with the CP were approximately 100%. Employing the CP, FEV 1.0% at discharge time was elevated from 71.7% to 76.3% and the duration of hospitalization was shortened from 14.2 days to 11.5 days. Mean age of the cases with prolonged admission was higher than the rest. The asthma CP is an effective way for the standard treatment according to the guideline to be used widely even by doctors who are not familiar with asthma treatment. It improves the efficacy of in-hospital treatment.

  2. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  3. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  4. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  5. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  6. Detecting Cyber-Attacks on Wireless Mobile Networks Using Multicriterion Fuzzy Classifier with Genetic Attribute Selection

    Directory of Open Access Journals (Sweden)

    El-Sayed M. El-Alfy

    2015-01-01

    Full Text Available With the proliferation of wireless and mobile network infrastructures and capabilities, a wide range of exploitable vulnerabilities emerges due to the use of multivendor and multidomain cross-network services for signaling and transport of Internet- and wireless-based data. Consequently, the rates and types of cyber-attacks have grown considerably and current security countermeasures for protecting information and communication may be no longer sufficient. In this paper, we investigate a novel methodology based on multicriterion decision making and fuzzy classification that can provide a viable second-line of defense for mitigating cyber-attacks. The proposed approach has the advantage of dealing with various types and sizes of attributes related to network traffic such as basic packet headers, content, and time. To increase the effectiveness and construct optimal models, we augmented the proposed approach with a genetic attribute selection strategy. This allows efficient and simpler models which can be replicated at various network components to cooperatively detect and report malicious behaviors. Using three datasets covering a variety of network attacks, the performance enhancements due to the proposed approach are manifested in terms of detection errors and model construction times.

  7. Earthquake damage to underground facilities

    International Nuclear Information System (INIS)

    Pratt, H.R.; Hustrulid, W.A.; Stephenson, D.E.

    1978-11-01

    The potential seismic risk for an underground nuclear waste repository will be one of the considerations in evaluating its ultimate location. However, the risk to subsurface facilities cannot be judged by applying intensity ratings derived from the surface effects of an earthquake. A literature review and analysis were performed to document the damage and non-damage due to earthquakes to underground facilities. Damage from earthquakes to tunnels, s, and wells and damage (rock bursts) from mining operations were investigated. Damage from documented nuclear events was also included in the study where applicable. There are very few data on damage in the subsurface due to earthquakes. This fact itself attests to the lessened effect of earthquakes in the subsurface because mines exist in areas where strong earthquakes have done extensive surface damage. More damage is reported in shallow tunnels near the surface than in deep mines. In mines and tunnels, large displacements occur primarily along pre-existing faults and fractures or at the surface entrance to these facilities.Data indicate vertical structures such as wells and shafts are less susceptible to damage than surface facilities. More analysis is required before seismic criteria can be formulated for the siting of a nuclear waste repository

  8. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  9. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  10. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  11. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  12. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  13. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  14. Sleep bruxism possibly triggered by multiple sclerosis attacks and treated successfully with botulinum toxin: Report of three cases.

    Science.gov (United States)

    Sevim, Serhan; Kaleağası, Hakan; Fidancı, Halit

    2015-09-01

    Sleep bruxism refers to a nocturnal parafunctional activity including the clenching, grinding or gnashing of teeth. While most of the nocturnal bruxism cases seen in the general population are apparently idiopathic, it has been reported to be associated with a range of neurological diseases such as Huntington's disease, cranio-cervical dystonia and post-anoxic brain damage, but not multiple sclerosis (MS). We describe three cases of MS patients who have had moderate to severe complaints of bruxism in the two weeks following their relevant MS attacks. None of the three patients had a diagnosis of bruxism prior to her attack. The diagnosis was confirmed in one out of three by a polysomnography. One patient did not have any complaints related to bruxism previous to her attack, whereas two had mild and infrequent complaints. The symptoms of the relevant attacks were left hemihypesthesia in all and hemiparesis in two. None of the patients had spasticity that could result in severe teeth clenching. All three patients presented with morning headaches and jaw pain or tightness and were treated successfully with botulinum toxin (Btx) injections applied to their masseter and temporalis muscles. The cause of bruxism is controversial but lesions of the cortico-basalganglia-thalamo-cotrical loops are thought to be most likely. However, acute or chronic lesions in those pathways were not demonstrated in the 3 patients. It is feasible that they had normal appearing white matter interruptions in their cortico-basalganglia-thalamocortical loops along with their relevant attack. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  16. ECONOMIC DENIAL OF SUSTAINABILITY (EDOS ATTACK ON CLOUD – A SURVEY

    Directory of Open Access Journals (Sweden)

    A. Somasundaram

    2016-12-01

    Full Text Available Cloud computing is a promising technology aims to provide reliable, customized and quality of service computation environments for cloud users in terms of Software as a Service-SaaS , Plat- form as a Service-PaaS and Infrastructure as Service-IaaS, which is provided on the pay per use basis. Cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA of customer. However, due to elasticity of resources, cloud systems are facing severe security problems. One of the most serious threats to cloud computing is EDoS (economic Distributed Denial of Service aims to consume the cloud resource by attacker and impose financial burden to the legitimate user, where integrity, availability and confidentiality of the cloud services are never compromised but affects the accountability which leads to inaccurate billing. Since the billing models of cloud services may not be mature enough to properly account for an EDoS attack. These paper surveys, the different techniques that generate, detect and mitigate the EDoS Attack on Cloud.

  17. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  18. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  19. Known-plaintext attack on the double phase encoding and its implementation with parallel hardware

    Science.gov (United States)

    Wei, Hengzheng; Peng, Xiang; Liu, Haitao; Feng, Songlin; Gao, Bruce Z.

    2008-03-01

    A known-plaintext attack on the double phase encryption scheme implemented with parallel hardware is presented. The double random phase encoding (DRPE) is one of the most representative optical cryptosystems developed in mid of 90's and derives quite a few variants since then. Although the DRPE encryption system has a strong power resisting to a brute-force attack, the inherent architecture of DRPE leaves a hidden trouble due to its linearity nature. Recently the real security strength of this opto-cryptosystem has been doubted and analyzed from the cryptanalysis point of view. In this presentation, we demonstrate that the optical cryptosystems based on DRPE architecture are vulnerable to known-plain text attack. With this attack the two encryption keys in the DRPE can be accessed with the help of the phase retrieval technique. In our approach, we adopt hybrid input-output algorithm (HIO) to recover the random phase key in the object domain and then infer the key in frequency domain. Only a plaintext-ciphertext pair is sufficient to create vulnerability. Moreover this attack does not need to select particular plaintext. The phase retrieval technique based on HIO is an iterative process performing Fourier transforms, so it fits very much into the hardware implementation of the digital signal processor (DSP). We make use of the high performance DSP to accomplish the known-plaintext attack. Compared with the software implementation, the speed of the hardware implementation is much fast. The performance of this DSP-based cryptanalysis system is also evaluated.

  20. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  1. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  2. Modelling multi-hazard hurricane damages on an urbanized coast with a Bayesian Network approach

    Science.gov (United States)

    van Verseveld, H.C.W.; Van Dongeren, A. R.; Plant, Nathaniel G.; Jäger, W.S.; den Heijer, C.

    2015-01-01

    Hurricane flood impacts to residential buildings in coastal zones are caused by a number of hazards, such as inundation, overflow currents, erosion, and wave attack. However, traditional hurricane damage models typically make use of stage-damage functions, where the stage is related to flooding depth only. Moreover, these models are deterministic and do not consider the large amount of uncertainty associated with both the processes themselves and with the predictions. This uncertainty becomes increasingly important when multiple hazards (flooding, wave attack, erosion, etc.) are considered simultaneously. This paper focusses on establishing relationships between observed damage and multiple hazard indicators in order to make better probabilistic predictions. The concept consists of (1) determining Local Hazard Indicators (LHIs) from a hindcasted storm with use of a nearshore morphodynamic model, XBeach, and (2) coupling these LHIs and building characteristics to the observed damages. We chose a Bayesian Network approach in order to make this coupling and used the LHIs ‘Inundation depth’, ‘Flow velocity’, ‘Wave attack’, and ‘Scour depth’ to represent flooding, current, wave impacts, and erosion related hazards.The coupled hazard model was tested against four thousand damage observations from a case site at the Rockaway Peninsula, NY, that was impacted by Hurricane Sandy in late October, 2012. The model was able to accurately distinguish ‘Minor damage’ from all other outcomes 95% of the time and could distinguish areas that were affected by the storm, but not severely damaged, 68% of the time. For the most heavily damaged buildings (‘Major Damage’ and ‘Destroyed’), projections of the expected damage underestimated the observed damage. The model demonstrated that including multiple hazards doubled the prediction skill, with Log-Likelihood Ratio test (a measure of improved accuracy and reduction in uncertainty) scores between 0.02 and 0

  3. Development of an accelerated test for Internal Sulfate Attack study

    Directory of Open Access Journals (Sweden)

    Khelil Nacim

    2014-04-01

    Full Text Available Internal Sulfate Attack (ISA is a pathology that occurs under certain conditions in concrete having undergone heating above 70 °C at early age (through heating in pre-casting industry or due to hydration in large concrete parts. This reaction deemed very slow, numerous methods to speed up reactions leading to delayed ettringite formation have been developed. These methods are all based on the material damage. Another type of test is currently under development. It is based on rehabilitation techniques such as electrochemical chloride extraction (ECE in order to accelerate the leaching of alkalis that could be one of the triggers of the pathology. The study presented in this paper focused on concrete specimens prepared from cement (CEM I 52.5 N enriched with Na2SO4. These concretes have undergone a heat treatment typical of those used in precast plants (up to 24 hours with a maximum temperature of 80 °C. Various paths were explored for the development of the accelerated test. The first results showed that it was necessary to use a removable titanium anode ruthenium anode instead of stainless steel embedded in the concrete. Then tests with de-ionized water as the solute to the cathode did not accelerate the onset of expansions. The experiment has been modified and potassium carbonate was added to the solution. This modification didn’t show any significant improvement, and other experiments are being carried out to explain this result.

  4. How oxygen attacks [FeFe] hydrogenases from photosynthetic organisms

    Science.gov (United States)

    Stripp, Sven T.; Goldet, Gabrielle; Brandmayr, Caterina; Sanganas, Oliver; Vincent, Kylie A.; Haumann, Michael; Armstrong, Fraser A.; Happe, Thomas

    2009-01-01

    Green algae such as Chlamydomonas reinhardtii synthesize an [FeFe] hydrogenase that is highly active in hydrogen evolution. However, the extreme sensitivity of [FeFe] hydrogenases to oxygen presents a major challenge for exploiting these organisms to achieve sustainable photosynthetic hydrogen production. In this study, the mechanism of oxygen inactivation of the [FeFe] hydrogenase CrHydA1 from C. reinhardtii has been investigated. X-ray absorption spectroscopy shows that reaction with oxygen results in destruction of the [4Fe-4S] domain of the active site H-cluster while leaving the di-iron domain (2FeH) essentially intact. By protein film electrochemistry we were able to determine the order of events leading up to this destruction. Carbon monoxide, a competitive inhibitor of CrHydA1 which binds to an Fe atom of the 2FeH domain and is otherwise not known to attack FeS clusters in proteins, reacts nearly two orders of magnitude faster than oxygen and protects the enzyme against oxygen damage. These results therefore show that destruction of the [4Fe-4S] cluster is initiated by binding and reduction of oxygen at the di-iron domain—a key step that is blocked by carbon monoxide. The relatively slow attack by oxygen compared to carbon monoxide suggests that a very high level of discrimination can be achieved by subtle factors such as electronic effects (specific orbital overlap requirements) and steric constraints at the active site. PMID:19805068

  5. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  6. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  7. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  8. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  9. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  10. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  11. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  12. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  13. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  14. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  15. On the need for data for the verification of service life models for frost damage

    DEFF Research Database (Denmark)

    Geiker, Mette Rica; Engelund, Sven

    1999-01-01

    The purpose of this paper is to draw the attention to the need for the verification of service life models for frost attack on concrete and the collection of relevant data. To illustrate the type of data needed the paper presents models for internal freeze/thaw damage (internal cracking including...

  16. Increased intrinsic brain connectivity between pons and somatosensory cortex during attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hougaard, Anders; Amin, Faisal Mohammad; Larsson, Henrik B W

    2017-01-01

    The neurological disturbances of migraine aura are caused by transient cortical dysfunction due to waves of spreading depolarization that disrupt neuronal signaling. The effects of these cortical events on intrinsic brain connectivity during attacks of migraine aura have not previously been......-based approach focusing on cortical visual areas and areas involved in migraine pain, and a data-driven independent component analysis approach to detect changes in intrinsic brain signaling during attacks. In addition, we performed the analyses after mirroring the MRI data according to the side of perceived......-sided pain. For aura-side normalized data, we found increased connectivity during attacks between visual area V5 and the lower middle frontal gyrus in the symptomatic hemisphere (peak voxel: P = 0.0194, (x, y, z) = (40, 40, 12). The present study provides evidence of altered intrinsic brain connectivity...

  17. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  18. STUDIES ON THE OCCURRENCE AND DAMAGE BY YAM TUBER BEETLES (HETEROLIGUS SPP IN ANIOCHA AND OSHIMILI AREAS OF DELTA STATE, NIGERIA

    Directory of Open Access Journals (Sweden)

    F TOBIH

    2007-11-01

    Full Text Available A two-year (2001 and 2002 studies to evaluate the occurrence, population distribution and damage by yam beetles: Heteroligus spp was undertaken in four Local Government Areas in Delta State, Nigeria namely: Oshimili South and North, Aniocha South and North. Beetle population were sampled from farmers fields using light traps in selected locations in the Council areas. Sampling period was April to December for both years. Data collected were number of beetles caught per month, damage indices such as number and size of beetle feeding holes, percentage tuber attacked and tuber yield. Beetle occurrence began in May and were encountered till November. Peak population of beetle occurred in August across the location for the two-year trials. Beetle species comprised of H. meles Billb and H. appiusBurm with the former, the most abundant species regarding the number caught across the locations. Oshimili North and South had higher beetle feeding holes significant at (P < 0.05 than Aniocha South and North for both years and across the locations. No significant difference in size of feeding hole but in terms of percentage tuber attacked, Oshimili South showed higher attack significantly different than Aniocha North both in 2001 and 2002 but not significantly higher than attacked in Oshimili North and Aniocha South in 2001. However, there were no significant difference in the yield of tuber across the locations and for the two-year period. Yam beetle is still a serious insect pest of yam and the two species responsible for tuber damages are H. meles Billb and H. appius Burm in these areas.

  19. Damage pattern and damage progression on breakwater roundheads under multidirectional waves

    DEFF Research Database (Denmark)

    Comola, F.; Andersen, Thomas Lykke; Martinelli, L.

    2014-01-01

    An experimental model test study is carried out to investigate damage pattern and progression on a rock armoured breakwater roundhead subjected to multidirectional waves. Concerning damage pattern, the most critical sector is observed to shift leeward with increasing wave period. Taking angles...... over the roundhead is developed. Thus the formula also considers the shifting of the critical sector due to increasing wave period which existing formulae do not include. Finally, analysing the damage produced by double peaked spectra, it is shown that the armour may be designed by the formula when...

  20. Salvaging and Conserving Water Damaged Photographic Materials

    Science.gov (United States)

    Suzuki, Ryuji

    Degradation of water damaged photographic materials is discussed; the most vulnerable elements are gelatin layers and silver image. A simple and inexpensive chemical treatment is proposed, consisting of a bath containing a gelatin-protecting biocide and a silver image protecting agent. These ingredients were selected among those used in manufacturing of silver halide photographic emulsions or processing chemicals. Experiments confirmed that this treatment significantly reduced oxidative attacks to silver image and bacterial degradation of gelatin layers. The treated material was also stable under intense light fading test. Method of hardening gelatin to suppress swelling is also discussed.

  1. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  2. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  3. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  4. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  5. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  6. Shark attack-related injuries: Epidemiology and implications for plastic surgeons.

    Science.gov (United States)

    Ricci, Joseph A; Vargas, Christina R; Singhal, Dhruv; Lee, Bernard T

    2016-01-01

    The increased media attention to shark attacks has led to a heightened fear and public awareness. Although few sharks are considered dangerous, attacks on humans can result in large soft tissue defects necessitating the intervention of reconstructive surgeons. This study aims to evaluate and describe the characteristics of shark-related injuries in order to improve treatment. The Global Shark Accident File, maintained by the Shark Research Institute (Princeton, NJ, USA), is a compilation of all known worldwide shark attacks. Database records since the 1900s were reviewed to identify differences between fatal and nonfatal attacks, including: geography, injury pattern, shark species, and victim activity. Since the 1900s, there have been 5034 reported shark attacks, of which 1205 (22.7%) were fatal. Although the incidence of attacks per decade has increased, the percentage of fatalities has decreased. Characteristics of fatal attacks included swimming (p = 0.001), boating (p = 0.001), three or more bite sites (p = 0.03), limb loss (p = 0.001), or tiger shark attack (p = 0.002). The most common attacks were bites to the legs (41.8%) or arms (18.4%), with limb loss occurring in 7% of attacks. Geographically, the majority of attacks occurred in North America (36.7%) and Australia (26.5%). Most attacks in the USA occurred in Florida (49.1%) and California (13.6%). Although rare, shark attacks result in devastating injuries to patients. As these injuries often involve multiple sites and limb loss, this creates a significant challenge for reconstructive surgeons. Proper identification of the characteristics of the attack can aid in providing optimal care for those affected. Copyright © 2015 British Association of Plastic, Reconstructive and Aesthetic Surgeons. Published by Elsevier Ltd. All rights reserved.

  7. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  8. Increased Incidence Rate of Trauma- and Stressor-related Disorders in Denmark After the Breivik Attacks in Norway.

    Science.gov (United States)

    Hansen, Bertel T; Dinesen, Peter T; Østergaard, Søren D

    2017-11-01

    On 22 July 2011, Anders Breivik killed 77 adults and children in Norway. Having recently documented increases in the incidence of trauma- and stressor-related disorders in Denmark after the 9/11 attacks, we hypothesized that the Breivik attacks-due to their geographic proximity-would be followed by even larger increases in Denmark. Using population-based data from the Danish Psychiatric Central Research Register (1995-2012), we conducted an intervention analysis of the change in the incidence of trauma- and stressor-related disorders after the Breivik attacks. The incidence rate increased by 16% over the following 1½ years after the Breivik attacks, corresponding to 2736 additional cases. In comparison, 9/11 was followed by a 4% increase. We also present evidence of a subsequent surge in incidence stimulated by media attention. This study bolsters previous findings on extra-national consequences of terrorism and indicates that geographic proximity and media coverage may exacerbate effects.

  9. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  10. Drivers of flood damage on event level

    DEFF Research Database (Denmark)

    Kreibich, H.; Aerts, J. C. J. H.; Apel, H.

    2016-01-01

    example are the 2002 and 2013 floods in the Elbe and Danube catchments in Germany. The 2002 flood caused the highest economic damage (EUR 11600 million) due to a natural hazard event in Germany. Damage was so high due to extreme flood hazard triggered by extreme precipitation and a high number......-level mitigation measures, 3) more effective early warning and improved coordination of disaster response and 4) a more targeted maintenance of flood defence systems and their deliberate relocation. Thus, despite higher hydrological severity damage due to the 2013 flood was significantly lower than in 2002. In our...

  11. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  12. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  13. Probabilistic analysis and fatigue damage assessment of offshore mooring system due to non-Gaussian bimodal tension processes

    Science.gov (United States)

    Chang, Anteng; Li, Huajun; Wang, Shuqing; Du, Junfeng

    2017-08-01

    Both wave-frequency (WF) and low-frequency (LF) components of mooring tension are in principle non-Gaussian due to nonlinearities in the dynamic system. This paper conducts a comprehensive investigation of applicable probability density functions (PDFs) of mooring tension amplitudes used to assess mooring-line fatigue damage via the spectral method. Short-term statistical characteristics of mooring-line tension responses are firstly investigated, in which the discrepancy arising from Gaussian approximation is revealed by comparing kurtosis and skewness coefficients. Several distribution functions based on present analytical spectral methods are selected to express the statistical distribution of the mooring-line tension amplitudes. Results indicate that the Gamma-type distribution and a linear combination of Dirlik and Tovo-Benasciutti formulas are suitable for separate WF and LF mooring tension components. A novel parametric method based on nonlinear transformations and stochastic optimization is then proposed to increase the effectiveness of mooring-line fatigue assessment due to non-Gaussian bimodal tension responses. Using time domain simulation as a benchmark, its accuracy is further validated using a numerical case study of a moored semi-submersible platform.

  14. Spatio-temporal patterns of attacks on human and economic losses from wildlife in Chitwan National Park, Nepal.

    Science.gov (United States)

    Lamichhane, Babu Ram; Persoon, Gerard A; Leirs, Herwig; Poudel, Shashank; Subedi, Naresh; Pokheral, Chiranjibi Prasad; Bhattarai, Santosh; Thapaliya, Bishnu Prasad; de Iongh, Hans H

    2018-01-01

    Wildlife attacks on humans and economic losses often result in reduced support of local communities for wildlife conservation. Information on spatial and temporal patterns of such losses in the highly affected areas contribute in designing and implementing effective mitigation measures. We analyzed the loss of humans, livestock and property caused by wildlife during 1998 to 2016, using victim family's reports to Chitwan National Park authorities and Buffer Zone User Committees. A total of 4,014 incidents were recorded including attacks on humans, livestock depredation, property damage and crop raiding caused by 12 wildlife species. In total >400,000 US dollar was paid to the victim families as a relief over the whole period. Most of the attacks on humans were caused by rhino, sloth bear, tiger, elephant, wild boar and leopard. A significantly higher number of conflict incidents caused by rhino and elephant were observed during full moon periods. An increase in the wildlife population did not coincide with an equal rise in conflict incidents reported. Underprivileged ethnic communities were attacked by wildlife more frequently than expected. Number of attacks on humans by carnivores and herbivores did not differ significantly. An insignificant decreasing trend of wildlife attacks on humans and livestock was observed with significant variation over the years. Tiger and leopard caused >90% of livestock depredation. Tigers killed both large (cattle and buffalo) and medium sized (goat, sheep, pig) livestock but leopard mostly killed medium sized livestock. Most (87%) of the livestock killing during 2012-2016 occurred within the stall but close (conflict mitigation measures (electric and mesh wire fences) have contributed to keep the conflict incidents in control. Strengthening mitigation measures like construction of electric or mesh wire fences and predator-proof livestock corrals along with educating local communities about wildlife behavior and timely management of

  15. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  16. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  17. Supraventricular Tachycardia Atackt Due to Losewieght Drug

    Directory of Open Access Journals (Sweden)

    Murat Yalcin

    2016-01-01

    Full Text Available Obesity is an important health problem. Treatment of obesity includes diet, exercise and drugs. Some of these drugs are out of prescription. Advers effects of these drugs have not been known. In this report; we present a case with supraventricular tachycardia attack due to loseweight drug containing mangostana (mango, hibiscus, citrus mate, L-karnitin, guarana.

  18. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  19. Occurrence of Solenopsis saevissima F Smith (Hymenoptera: Formicidae) damaging Schizolobium amazonicum

    International Nuclear Information System (INIS)

    Lunz, Alexandre M.; Aguiar, Tanice da S.; Cardoso, Andreza S.; Harada, Ana Y.

    2009-01-01

    Injuries by Solenopsis saevissima F Smith in parica (Schizolobium amazonicum) trees are described for the first time in Dom Eliseu County, Para State, Brazil. This ant damages leaves and the shaft where holes and galleries are opened up to the plant shoot. Terminal and new shoots are attacked and destroyed, harming the development of upright and uniform trunks for commercialization. Arboreal nests constructed by this ant were also observed in some plants. (author)

  20. [Occurrence of Solenopsis saevissima F Smith (Hymenoptera: Formicidae) damaging Schizolobium amazonicum].

    Science.gov (United States)

    Lunz, Alexandre M; Harada, Ana Y; Aguiar, Tanice da S; Cardoso, Andreza S

    2009-01-01

    Injuries by Solenopsis saevissima F Smith in paricá (Schizolobium amazonicum) trees are described for the first time in Dom Eliseu County, Pará State, Brazil. This ant damages leaves and the shaft where holes and galleries are opened up to the plant shoot. Terminal and new shoots are attacked and destroyed, harming the development of upright and uniform trunks for commercialization. Arboreal nests constructed by this ant were also observed in some plants.

  1. Expected damage to accelerator equipment due to the impact of the full LHC beam: beam instrumentation, experiments and simulations

    CERN Document Server

    Burkart, Florian

    The Large Hadron Collider (LHC) is the biggest and most powerful particle accelerator in the world, designed to collide two proton beams with particle momentum of 7 TeV/c each. The stored energy of 362MJ in each beam is sufficient to melt 500 kg of copper or to evaporate about 300 liter of water. An accidental release of even a small fraction of the beam energy can cause severe damage to accelerator equipment. Reliable machine protection systems are necessary to safely operate the accelerator complex. To design a machine protection system, it is essential to know the damage potential of the stored beam and the consequences in case of a failure. One (catastrophic) failure would be, if the entire beam is lost in the aperture due to a problem with the beam dumping system. This thesis presents the simulation studies, results of a benchmarking experiment, and detailed target investigation, for this failure case. In the experiment, solid copper cylinders were irradiated with the 440GeV proton beam delivered by the ...

  2. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  3. Novel types of DNA-sugar damage in neocarzinostatin cytotoxicity and mutagenesis

    International Nuclear Information System (INIS)

    Goldberg, I.H.

    1986-01-01

    Although a number of antitumor antibiotics interact with DNA to form covalent adducts with the bases, relatively few damage DNA by interacting with the deoxyribose moiety. Neocarzinostatin (NCS), a member of a family of macromolecular antibiotics obtained from filtrates of Streptomyces, is such an agent. Many of the biochemical and cellular effects of NCS resemble those of ionizing radiation. Most, possibly all, of the DNA lesions caused by NCS appear to result from the direct attack of an activated form of the drug on the deoxyribose of DNA. This is to be contrasted with ionizing radiation or the antibiotic bleomycin, that damage DNA deoxyribose through the intervention of a reduced form of oxygen. This paper describes the nature of the interaction between the active component of NCS and DNA, on the mechanism of the ensuing deoxyribose damage, and on some of the biological consequences of these actions. 24 refs., 7 figs

  4. Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits

    Science.gov (United States)

    Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph

    Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.

  5. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  6. Assessing the Stability and Robustness of Semantic Web Services Recommendation Algorithms Under Profile Injection Attacks

    Directory of Open Access Journals (Sweden)

    GRANDIN, P. H.

    2014-06-01

    Full Text Available Recommendation systems based on collaborative filtering are open by nature, what makes them vulnerable to profile injection attacks that insert biased evaluations in the system database in order to manipulate recommendations. In this paper we evaluate the stability and robustness of collaborative filtering algorithms applied to semantic web services recommendation when submitted to random and segment profile injection attacks. We evaluated four algorithms: (1 IMEAN, that makes predictions using the average of the evaluations received by the target item; (2 UMEAN, that makes predictions using the average of the evaluation made by the target user; (3 an algorithm based on the k-nearest neighbor (k-NN method and (4, an algorithm based on the k-means clustering method.The experiments showed that the UMEAN algorithm is not affected by the attacks and that IMEAN is the most vulnerable of all algorithms tested. Nevertheless, both UMEAN and IMEAN have little practical application due to the low precision of their predictions. Among the algorithms with intermediate tolerance to attacks but with good prediction performance, the algorithm based on k-nn proved to be more robust and stable than the algorithm based on k-means.

  7. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  8. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  9. Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering

    Directory of Open Access Journals (Sweden)

    Ru Zhang

    2017-01-01

    Full Text Available The APT attack on the Internet is becoming more serious, and most of intrusion detection systems can only generate alarms to some steps of APT attack and cannot identify the pattern of the APT attack. To detect APT attack, many researchers established attack models and then correlated IDS logs with the attack models. However, the accuracy of detection deeply relied on the integrity of models. In this paper, we propose a new method to construct APT attack scenarios by mining IDS security logs. These APT attack scenarios can be further used for the APT detection. First, we classify all the attack events by purpose of phase of the intrusion kill chain. Then we add the attack event dimension to fuzzy clustering, correlate IDS alarm logs with fuzzy clustering, and generate the attack sequence set. Next, we delete the bug attack sequences to clean the set. Finally, we use the nonaftereffect property of probability transfer matrix to construct attack scenarios by mining the attack sequence set. Experiments show that the proposed method can construct the APT attack scenarios by mining IDS alarm logs, and the constructed scenarios match the actual situation so that they can be used for APT attack detection.

  10. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  11. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  12. Are the rules for the right to self-defense outdated to address current conflicts like attacks from non-state actors and cyber-attacks?

    Directory of Open Access Journals (Sweden)

    Gonzalo J. Arias

    2017-06-01

    Full Text Available The latest US-led coalition’s attacks against ISIS in Syria raised the question whether states can use defensive force against non-state actors. Two critical incidents had previously triggered the discussion on the importance and consequences of cyber-attacks as a new form armed attacks. The first one occurred in Estonia in 2007, when the country experienced extensive computer hacking attacks that lasted several weeks. The second incident happened in 2008, during the Georgia–Russia conflict over South Ossetia, when Georgia experienced cyber-attacks similar to those suffered by Estonia in the previous year. Furthermore, on June 21, 2016, the central banks of Indonesia and South Korea were hit by cyber-attacks on their public websites since activist hacking group Anonymous pledged last month to target banks across the world. The previous incidents have created, once again, public questioning if the rules on the use of force and the right of self-defense established in the United Nations Charter are sufficient and efficient to address these new forms of attacks.

  13. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  14. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  15. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  16. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  17. Research on high power intra-channel crosstalk attack in optical networks

    Science.gov (United States)

    Ren, Shuai; Zhang, Yinfa; Wang, Jingyu; Zhang, Jumei; Rao, Xuejun; Fang, Yuanyuan

    2017-02-01

    The mechanism of high power intra-channel crosstalk attack is analyzed theoretically and the conclusion that power of attack signal and crosstalk coefficient of optical switch are the main factors for which high power intra-channel have destructive effect on quality of legitimate signals is drawn. Effects of high power intra-channel crosstalk attack on quality of legitimate signals and its capability of attack propagation are investigated quantitatively by building the simulation system in VPI software. The results show that legitimate signals through the first and the second stage optical switch are affected by attack and legitimate signal through the third stage optical switch is almost unaffected by attack when power of original attack signal (OAS) is above 20dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB at optical cross connect 1 (OXC1). High power intra-channel crosstalk attack has a certain capability of attack propagation. Attack capability of OAS can be propagated to OXC3 when power of OAS is 27dB more than that of legitimate signals and crosstalk coefficient of optical switch is -20dB. We also find that the secondary attack signal (SAS) does not have capability of attack propagation.

  18. Mutism and auditory agnosia due to bilateral insular damage--role of the insula in human communication.

    Science.gov (United States)

    Habib, M; Daquin, G; Milandre, L; Royere, M L; Rey, M; Lanteri, A; Salamon, G; Khalil, R

    1995-03-01

    We report a case of transient mutism and persistent auditory agnosia due to two successive ischemic infarcts mainly involving the insular cortex on both hemispheres. During the 'mutic' period, which lasted about 1 month, the patient did not respond to any auditory stimuli and made no effort to communicate. On follow-up examinations, language competences had re-appeared almost intact, but a massive auditory agnosia for non-verbal sounds was observed. From close inspection of lesion site, as determined with brain resonance imaging, and from a study of auditory evoked potentials, it is concluded that bilateral insular damage was crucial to both expressive and receptive components of the syndrome. The role of the insula in verbal and non-verbal communication is discussed in the light of anatomical descriptions of the pattern of connectivity of the insular cortex.

  19. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  20. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  1. A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks.

    Science.gov (United States)

    Cao, Yuan; Zhao, Xiaojin; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang

    2018-01-23

    Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of -40∼120 ∘ C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.

  2. 'Cryptogenic Drop Attacks' revisited: evidence of overlap with functional neurological disorder.

    Science.gov (United States)

    Hoeritzauer, Ingrid; Carson, Alan J; Stone, Jon

    2018-02-07

    In their 1973 BMJ paper 'Cryptogenic Drop Attacks', Stevens and Matthews described 40, mostly middle-aged, female patients with drop attacks of unknown cause. Although clinically common, there has been little on this topic since. We aimed to determine clinical features, comorbidity and outcome of patients with drop attacks. We carried out a retrospective review of patients with cryptogenic drop attacks seen consecutively by one clinician (JS) between 2006 and 2016. Demographics, phenomenology, duration and frequency of attacks, attack description and comorbid diagnoses were recorded. Patients were followed up with a notes review. 83 patients with cryptogenic drop attacks were predominantly female (89%, n=79), mean age 44  years. The majority (93%, n=77) could not remember the fall itself and almost half (43%, n=36) experienced prodromal dissociative symptoms. Mechanical trips or syncope preceded drop attacks, historically, in 24% (n=20) of cases. Persistent fatigue (73%, n=61), chronic pain (40%, n=33), functional limb weakness (31%,n=26) and dissociative (non-epileptic) attacks 28% (n=23) were common, with the latter usually preceding or emerging from drop attacks. At follow-up (88%, mean 38 months), 28% (n=23) had resolution of their drop attacks. Predisposing (but non-causative) disease comorbidity was found at baseline (n=12) and follow-up (n=5). Cryptogenic drop attacks are associated with high frequency of comorbid functional somatic and functional neurological disorders. Patients commonly have prodromal dissociative symptoms and in some there was a clear relationship with prior or subsequent dissociative (non-epileptic) attacks. Some cryptogenic drop attacks may be best understood as phenomena on the spectrum of dissociative attacks. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  3. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  4. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  5. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  6. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  7. Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters

    Directory of Open Access Journals (Sweden)

    Dapeng Man

    2017-01-01

    Full Text Available Occupancy information is one of the most important privacy issues of a home. Unfortunately, an attacker is able to detect occupancy from smart meter data. The current battery-based load hiding (BLH methods cannot solve this problem. To thwart occupancy detection attacks, we propose a framework of battery-based schemes to prevent occupancy detection (BPOD. BPOD monitors the power consumption of a home and detects the occupancy in real time. According to the detection result, BPOD modifies those statistical metrics of power consumption, which highly correlate with the occupancy by charging or discharging a battery, creating a delusion that the home is always occupied. We evaluate BPOD in a simulation using several real-world smart meter datasets. Our experiment results show that BPOD effectively prevents the threshold-based and classifier-based occupancy detection attacks. Furthermore, BPOD is also able to prevent nonintrusive appliance load monitoring attacks (NILM as a side-effect of thwarting detection attacks.

  8. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  9. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  10. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  11. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  12. Quantitative assessment of intergranular damage due to PWR primary water exposure in structural Ni-based alloys

    International Nuclear Information System (INIS)

    Ter-Ovanessian, Benoît; Deleume, Julien; Cloué, Jean-Marc; Andrieu, Eric

    2013-01-01

    Highlights: ► IG damage occurred on Ni-base alloys during exposure at high temperature water. ► Two characterization methods yield a tomographic analysis of this IG damage. ► Connected or isolated intergranular oxygen/oxide penetrations are quantified. ► Such quantitative description provides information on IGSCC susceptibility. - Abstract: Two nickel-based alloys, alloy 718 and alloy 600, known to have different resistances to IGSCC, were exposed to a simulated PWR primary water environment at 360 °C for 1000 h. The intergranular oxidation damage was analyzed in detail using an original approach involving two characterization methods (Incremental Mechanical Polishing/Microcopy procedure and SIMS imaging) which yielded a tomographic analysis of the damage. Intergranular oxygen/oxide penetrations occurred either as connected or isolated penetrations deep under the external oxide/substrate interface as far as 10 μm for alloy 600 and only 4 μm for alloy 718. Therefore, assessing this damage precisely is essential to interpret IGSCC susceptibility.

  13. A Centralized Detection of Sinkhole Attacks Based on Energy Level of the Nodes on Cluster-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Merve Nilay Aydın

    2017-10-01

    Full Text Available Wireless Sensor Networks is consist of thousands of small and low-cost devices, which communicate over wireless medium. Due to locating in harsh environment and having limited resources, WSN is prone to various attacks. One of the most dangerous attacks threatening WSN is the sinkhole attack. In this paper, sinkhole attack is modelled on a cluster-based WSN, and a centralized detection algorithm based on the remaining energies of the nodes is proposed. The simulations were run for different values of energy thresholds and various numbers of nodes. The performance of the system was investigated over total energy consumption in the system, the number of packets arrived at base station and true detection rate of the sinkhole node(s. The results showed that the proposed method is energy-efficient and detects the malicious nodes with a 100% accuracy for all number of nodes.

  14. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  15. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  16. Drivers of flood damage on event level

    DEFF Research Database (Denmark)

    Kreibich, H.; Aerts, J. C. J. H.; Apel, H.

    2016-01-01

    Flood risk is dynamic and influenced by many processes related to hazard, exposure and vulnerability. Flood damage increased significantly over the past decades, however, resulting overall economic loss per event is an aggregated indicator and it is difficult to attribute causes to this increasing...... trend. Much has been learned about damaging processes during floods at the micro-scale, e.g. building level. However, little is known about the main factors determining the amount of flood damage on event level. Thus, we analyse and compare paired flood events, i.e. consecutive, similar damaging floods...... example are the 2002 and 2013 floods in the Elbe and Danube catchments in Germany. The 2002 flood caused the highest economic damage (EUR 11600 million) due to a natural hazard event in Germany. Damage was so high due to extreme flood hazard triggered by extreme precipitation and a high number...

  17. Aircraft Battle Damage Repair for the 90’s and Beyond

    Science.gov (United States)

    1994-03-01

    far greater than was the US system during the Viet - nam Conflict. In fact, the United States mounted a large-scale resupply effort to assirt the...8217,luded. The procedures restore suffi. ciezu strength to accomplish the required mnission while avoidilig unnecessar-y or cosmetic repairs. The ABDR...from a mission with structural damage. 4 As the war escalated in 1964, the Viet Cong began their attack on US Air Force bases and during the course of

  18. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  19. A Comprehensive Taxonomy and Analysis of IEEE 802.15.4 Attacks

    Directory of Open Access Journals (Sweden)

    Yasmin M. Amin

    2016-01-01

    Full Text Available The IEEE 802.15.4 standard has been established as the dominant enabling technology for Wireless Sensor Networks (WSNs. With the proliferation of security-sensitive applications involving WSNs, WSN security has become a topic of great significance. In comparison with traditional wired and wireless networks, WSNs possess additional vulnerabilities which present opportunities for attackers to launch novel and more complicated attacks against such networks. For this reason, a thorough investigation of attacks against WSNs is required. This paper provides a single unified survey that dissects all IEEE 802.15.4 PHY and MAC layer attacks known to date. While the majority of existing references investigate the motive and behavior of each attack separately, this survey classifies the attacks according to clear metrics within the paper and addresses the interrelationships and differences between the attacks following their classification. The authors’ opinions and comments regarding the placement of the attacks within the defined classifications are also provided. A comparative analysis between the classified attacks is then performed with respect to a set of defined evaluation criteria. The first half of this paper addresses attacks on the IEEE 802.15.4 PHY layer, whereas the second half of the paper addresses IEEE 802.15.4 MAC layer attacks.

  20. Failure Analysis of End Grain Attack and Pit Corrosion in 316L Stainless Steel Pipe

    Energy Technology Data Exchange (ETDEWEB)

    Baek, Un Bong; Nam, Sung Hoon [Korea Research Institute of Standards and Science, Daejeon (Korea, Republic of); Choe, Byung Hak; Shim, Jong Hun [Gangneung-Wonju National University, Gangneung (Korea, Republic of); Lee, Jin Hee [Oil and Gas Technology SK E and C, Junggu (Korea, Republic of); Kim, Eui Soo [National Forensic Service, Wonju (Korea, Republic of)

    2015-01-15

    The aim of this paper was to analyze the cause of surface cracks and pit corrosion on 316L pipe. An End Grain Attack (EGA) as a kind of pit mechanism was conducted on the pipe surface. The early stage of the EGA may come from under-deposit of caustic-water formation compositions like Na+, K+, Ca+, and Mg+ etc. The under-deposit corrosion is caused by the corrosion layer on the pipe surface followed by crevice corrosion due to accumulation of Cl‒ or S‒ composition between the corrosion layer and the pipe surface. In the early stage, the EGA occurred in all grain boundaries beneath the under-deposit corrosion. In the later stage of EGA, almost all the early attacked grain boundaries stopped at a limited depth of about 10 µm. Meanwhile, only the smallest number of the attacked boundaries progressed into the pipe as pit corrosion and resulted in leak failure.