WorldWideScience

Sample records for attack radar system

  1. A Defender-Attacker Optimization of Port Radar Surveillance

    Science.gov (United States)

    2011-01-01

    security; optimization; attacker-defender “And thence discover how with most advantage They may vex us with shot, or with assault.” Shakespeare , KingHenryVI...1. INTRODUCTION We introduce a new planning tool for locating shore radars and mobile picket boats with radar to maximize the probabil- ity that one

  2. Modeling and Simulation for the Investigation of Radar Responses to Electronic Attacks in Electronic Warfare Environments

    Directory of Open Access Journals (Sweden)

    So Ryoung Park

    2018-01-01

    Full Text Available An electronic warfare (EW simulator is presented to investigate and evaluate the tracking performance of radar system under the electronic attack situations. The EW simulator has the input section in which the characteristic parameters of radar threat, radar warning receiver, jammer, electromagnetic wave propagation, and simulation scenario can be set up. During the process of simulation, the simulator displays the situations of simulation such as the received signal and its spectrum, radar scope, and angle tracking scope and also calculates the transient and root-mean-squared tracking errors of the range and angle tracking system of radar. Using the proposed EW simulator, we analyze the effect of concealment according to the noise and signal powers under the noise jamming and also analyze the effect of deception by calculating errors between the desired value and the estimated one under the deceptive jamming. Furthermore, the proposed EW simulator can be used to figure out the feature of radar threats based on the information collected from the EW receiver and also used to carry out the electronic attacks efficiently in electronic warfare.

  3. Construction and Operation of the West Coast OTH-B Radar System

    Science.gov (United States)

    1983-11-07

    prob- ably. I can see what your concerns are. You are concerned about that word radiation, which is kind of a bugaboo . Mrs Morehouse: How dangerous is... invest our defense dollar. An effective radar system will serve not only as a deterrent to a potential aggressor, but help us to neutralize an attack...OTH-BS radar is for me a wise and cost-effective way to invest our defense dollar. An effective radar system will serve not only as a deterrant to a

  4. Understanding radar systems

    CERN Document Server

    Kingsley, Simon

    1999-01-01

    What is radar? What systems are currently in use? How do they work? This book provides engineers and scientists with answers to these critical questions, focusing on actual radar systems in use today. It is a perfect resource for those just entering the field, or as a quick refresher for experienced practitioners. The book leads readers through the specialized language and calculations that comprise the complex world of radar engineering as seen in dozens of state-of-the-art radar systems. An easy to read, wide ranging guide to the world of modern radar systems.

  5. Radar principles for the nonspecialist, 3rd edition

    CERN Document Server

    Toomay, John

    2004-01-01

    Radar Principles for the Non-specialist, Third Edition continues its popular tradition: to distill the very complex technology of radar into its fundamentals, tying them to the laws of nature on one end and to the most modern and complex systems on the other. It starts with electromagnetic propagation, describes a radar of the utmost simplicity, and derives the radar range equation from that simple radar. Once the range equation is available, the book attacks the meaning of each term in it, moving through antennas, detection and tracking, radar cross-section, waveforms andsignal proces

  6. Systems and Methods for Radar Data Communication

    Science.gov (United States)

    Bunch, Brian (Inventor); Szeto, Roland (Inventor); Miller, Brad (Inventor)

    2013-01-01

    A radar information processing system is operable to process high bandwidth radar information received from a radar system into low bandwidth radar information that may be communicated to a low bandwidth connection coupled to an electronic flight bag (EFB). An exemplary embodiment receives radar information from a radar system, the radar information communicated from the radar system at a first bandwidth; processes the received radar information into processed radar information, the processed radar information configured for communication over a connection operable at a second bandwidth, the second bandwidth lower than the first bandwidth; and communicates the radar information from a radar system, the radar information communicated from the radar system at a first bandwidth.

  7. Combined radar and telemetry system

    Energy Technology Data Exchange (ETDEWEB)

    Rodenbeck, Christopher T.; Young, Derek; Chou, Tina; Hsieh, Lung-Hwa; Conover, Kurt; Heintzleman, Richard

    2017-08-01

    A combined radar and telemetry system is described. The combined radar and telemetry system includes a processing unit that executes instructions, where the instructions define a radar waveform and a telemetry waveform. The processor outputs a digital baseband signal based upon the instructions, where the digital baseband signal is based upon the radar waveform and the telemetry waveform. A radar and telemetry circuit transmits, simultaneously, a radar signal and telemetry signal based upon the digital baseband signal.

  8. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  9. Principles of modern radar systems

    CERN Document Server

    Carpentier, Michel H

    1988-01-01

    Introduction to random functions ; signal and noise : the ideal receiver ; performance of radar systems equipped with ideal receivers ; analysis of the operating principles of some types of radar ; behavior of real targets, fluctuation of targets ; angle measurement using radar ; data processing of radar information, radar coverage ; applications to electronic scanning antennas to radar ; introduction to Hilbert spaces.

  10. Air and spaceborne radar systems an introduction

    CERN Document Server

    Lacomme, Philippe; Hardange, Jean-Philippe; Normant, Eric

    2001-01-01

    A practical tool on radar systems that will be of major help to technicians, student engineers and engineers working in industry and in radar research and development. The many users of radar as well as systems engineers and designers will also find it highly useful. Also of interest to pilots and flight engineers and military command personnel and military contractors. """"This introduction to the field of radar is intended for actual users of radar. It focuses on the history, main principles, functions, modes, properties and specific nature of modern airborne radar. The book examines radar's

  11. Penn State Radar Systems: Implementation and Observations

    Science.gov (United States)

    Urbina, J. V.; Seal, R.; Sorbello, R.; Kuyeng, K.; Dyrud, L. P.

    2014-12-01

    Software Defined Radio/Radar (SDR) platforms have become increasingly popular as researchers, hobbyists, and military seek more efficient and cost-effective means for radar construction and operation. SDR platforms, by definition, utilize a software-based interface for configuration in contrast to traditional, hard-wired platforms. In an effort to provide new and improved radar sensing capabilities, Penn State has been developing advanced instruments and technologies for future radars, with primary objectives of making such instruments more capable, portable, and more cost effective. This paper will describe the design and implementation of two low-cost radar systems and their deployment in ionospheric research at both low and mid-latitudes. One radar has been installed near Penn State campus, University Park, Pennsylvania (77.97°W, 40.70°N), to make continuous meteor observations and mid-latitude plasma irregularities. The second radar is being installed in Huancayo (12.05°S, -75.33°E), Peru, which is capable of detecting E and F region plasma irregularities as well as meteor reflections. In this paper, we examine and compare the diurnal and seasonal variability of specular, non- specular, and head-echoes collected with these two new radar systems and discuss sampling biases of each meteor observation technique. We report our current efforts to validate and calibrate these radar systems with other VHF radars such as Jicamarca and SOUSY. We also present the general characteristics of continuous measurements of E-region and F-region coherent echoes using these modern radar systems and compare them with coherent radar events observed at other geographic mid-latitude radar stations.

  12. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  13. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  14. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  15. Development of Radar Control system for Multi-mode Active Phased Array Radar for atmospheric probing

    Science.gov (United States)

    Yasodha, Polisetti; Jayaraman, Achuthan; Thriveni, A.

    2016-07-01

    Modern multi-mode active phased array radars require highly efficient radar control system for hassle free real time radar operation. The requirement comes due to the distributed architecture of the active phased array radar, where each antenna element in the array is connected to a dedicated Transmit-Receive (TR) module. Controlling the TR modules, which are generally few hundreds in number, and functioning them in synchronisation, is a huge task during real time radar operation and should be handled with utmost care. Indian MST Radar, located at NARL, Gadanki, which is established during early 90's, as an outcome of the middle atmospheric program, is a remote sensing instrument for probing the atmosphere. This radar has a semi-active array, consisting of 1024 antenna elements, with limited beam steering, possible only along the principle planes. To overcome the limitations and difficulties, the radar is being augmented into fully active phased array, to accomplish beam agility and multi-mode operations. Each antenna element is excited with a dedicated 1 kW TR module, located in the field and enables to position the radar beam within 20° conical volume. A multi-channel receiver makes the radar to operate in various modes like Doppler Beam Swinging (DBS), Spaced Antenna (SA), Frequency Domain Interferometry (FDI) etc. Present work describes the real-time radar control (RC) system for the above described active phased array radar. The radar control system consists of a Spartan 6 FPGA based Timing and Control Signal Generator (TCSG), and a computer containing the software for controlling all the subsystems of the radar during real-time radar operation and also for calibrating the radar. The main function of the TCSG is to generate the control and timing waveforms required for various subsystems of the radar. Important components of the RC system software are (i) TR module configuring software which does programming, controlling and health parameter monitoring of the

  16. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  17. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  18. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  19. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  20. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Djouadi, Seddik M [ORNL; Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Dong, Jin [ORNL; Drira, Anis [ORNL

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  1. Proceedings of the COST 75 final seminar on advanced weather radar systems; Beitraege des Instituts zum COST 75 final seminar on advanced weather radar systems

    Energy Technology Data Exchange (ETDEWEB)

    Baumann, R.; Flender, F.; Hagen, M.; Hoeller, H.; Keil, C.; Meischner, P.

    1998-07-01

    Across Europe more than 110 weather radars are in operation. More than 60 of them are Doppler radars and this number is increasing steadily. Doppler systems are becoming an operational standard. Most systems operate in C-band, with the exception of the Spanish radar network which is composed of S-band Doppler radars. Radar product composites are available for Scandinavia and Central Europe. National networks exist for the UK, France and Spain. Europe further is fortunate to have 8 polarimetric Doppler radars used mainly for research. In Italy some of those systems are used also for operational nowcasting applications for dedicated customers. The Chilbolton multiparameter Doppler radar operates at S-band. (orig.)

  2. Study on the shipboard radar reconnaissance equipment azimuth benchmark method

    Science.gov (United States)

    Liu, Zhenxing; Jiang, Ning; Ma, Qian; Liu, Songtao; Wang, Longtao

    2015-10-01

    The future naval battle will take place in a complex electromagnetic environment. Therefore, seizing the electromagnetic superiority has become the major actions of the navy. Radar reconnaissance equipment is an important part of the system to obtain and master battlefield electromagnetic radiation source information. Azimuth measurement function is one of the main function radar reconnaissance equipments. Whether the accuracy of direction finding meets the requirements, determines the vessels successful or not active jamming, passive jamming, guided missile attack and other combat missions, having a direct bearing on the vessels combat capabilities . How to test the performance of radar reconnaissance equipment, while affecting the task as little as possible is a problem. This paper, based on radar signal simulator and GPS positioning equipment, researches and experiments on one new method, which povides the azimuth benchmark required by the direction-finding precision test anytime anywhere, for the ships at jetty to test radar reconnaissance equipment performance in direction-finding. It provides a powerful means for the naval radar reconnaissance equipments daily maintenance and repair work[1].

  3. Trojan-horse attacks on quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G.

    2006-01-01

    General Trojan-horse attacks on quantum-key-distribution systems, i.e., attacks on Alice or Bob's system via the quantum channel, are analyzed. We illustrate the power of such attacks with today's technology and conclude that all systems must implement active counter measures. In particular, all systems must include an auxiliary detector that monitors any incoming light. We show that such counter measures can be efficient, provided that enough additional privacy amplification is applied to the data. We present a practical way to reduce the maximal information gain that an adversary can gain using Trojan-horse attacks. This does reduce the security analysis of the two-way plug-and-play implementation to those of the standard one-way systems

  4. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  5. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  6. Study to investigate and evaluate means of optimizing the radar function. [systems engineering of pulse radar for the space shuttle

    Science.gov (United States)

    1975-01-01

    The investigations for a rendezvous radar system design and an integrated radar/communication system design are presented. Based on these investigations, system block diagrams are given and system parameters are optimized for the noncoherent pulse and coherent pulse Doppler radar modulation types. Both cooperative (transponder) and passive radar operation are examined including the optimization of the corresponding transponder design for the cooperative mode of operation.

  7. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  8. Department of the Air Force Environmental Statement. Construction and Operation of the West Coast OTH-B Radar System, Lake and Klamath Counties, Oregon; Modoc and Sacramento Counties, California; Pierce County, Washington; Elmore County, Idaho

    Science.gov (United States)

    1984-02-01

    You are concerned about that word radiation, which is kind of a bugaboo . Mrs Morehouse: How dangerous is this kind of radiation? Mr Raffa: That one... invest our defense dollar. An effective radar system will serve not only as a deterrent to a potential aggressor, but help us to neutralize an attack if...and cost-effective way to invest our defense dollar. An effective radar system will serve not only as a deterrant to a potential agressor, but help us

  9. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  10. Radar sensing via a Micro-UAV-borne system

    Science.gov (United States)

    Catapano, Ilaria; Ludeno, Giovanni; Gennarelli, Gianluca; Soldovieri, Francesco; Rodi Vetrella, Amedeo; Fasano, Giancarmine

    2017-04-01

    In recent years, the miniaturization of flight control systems and payloads has contributed to a fast and widespread diffusion of micro-UAV (Unmanned Aircraft Vehicle). While micro-UAV can be a powerful tool in several civil applications such as environmental monitoring and surveillance, unleashing their full potential for societal benefits requires augmenting their sensing capability beyond the realm of active/passive optical sensors [1]. In this frame, radar systems are drawing attention since they allow performing missions in all-weather and day/night conditions and, thanks to the microwave ability to penetrate opaque media, they enable the detection and localization not only of surface objects but also of sub-surface/hidden targets. However, micro-UAV-borne radar imaging represents still a new frontier, since it is much more than a matter of technology miniaturization or payload installation, which can take advantage of the newly developed ultralight systems. Indeed, micro-UAV-borne radar imaging entails scientific challenges in terms of electromagnetic modeling and knowledge of flight dynamics and control. As a consequence, despite Synthetic Aperture Radar (SAR) imaging is a traditional remote sensing tool, its adaptation to micro-UAV is an open issue and so far only few case studies concerning the integration of SAR and UAV technologies have been reported worldwide [2]. In addition, only early results concerning subsurface imaging by means of an UAV-mounted radar are available [3]. As a contribution to radar imaging via autonomous micro-UAV, this communication presents a proof-of-concept experiment. This experiment represents the first step towards the development of a general methodological approach that exploits expertise about (sub-)surface imaging and aerospace systems with the aim to provide high-resolution images of the surveyed scene. In details, at the conference, we will present the results of a flight campaign carried out by using a single radar

  11. REAL-TIME INTELLIGENT MULTILAYER ATTACK CLASSIFICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    T. Subbhulakshmi

    2014-01-01

    Full Text Available Intrusion Detection Systems (IDS takes the lion’s share of the current security infrastructure. Detection of intrusions is vital for initiating the defensive procedures. Intrusion detection was done by statistical and distance based methods. A threshold value is used in these methods to indicate the level of normalcy. When the network traffic crosses the level of normalcy then above which it is flagged as anomalous. When there are occurrences of new intrusion events which are increasingly a key part of system security, the statistical techniques cannot detect them. To overcome this issue, learning techniques are used which helps in identifying new intrusion activities in a computer system. The objective of the proposed system designed in this paper is to classify the intrusions using an Intelligent Multi Layered Attack Classification System (IMLACS which helps in detecting and classifying the intrusions with improved classification accuracy. The intelligent multi layered approach contains three intelligent layers. The first layer involves Binary Support Vector Machine classification for detecting the normal and attack. The second layer involves neural network classification to classify the attacks into classes of attacks. The third layer involves fuzzy inference system to classify the attacks into various subclasses. The proposed IMLACS can be able to detect an intrusion behavior of the networks since the system contains a three intelligent layer classification and better set of rules. Feature selection is also used to improve the time of detection. The experimental results show that the IMLACS achieves the Classification Rate of 97.31%.

  12. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  13. Radar-to-Radar Interference Suppression for Distributed Radar Sensor Networks

    Directory of Open Access Journals (Sweden)

    Wen-Qin Wang

    2014-01-01

    Full Text Available Radar sensor networks, including bi- and multi-static radars, provide several operational advantages, like reduced vulnerability, good system flexibility and an increased radar cross-section. However, radar-to-radar interference suppression is a major problem in distributed radar sensor networks. In this paper, we present a cross-matched filtering-based radar-to-radar interference suppression algorithm. This algorithm first uses an iterative filtering algorithm to suppress the radar-to-radar interferences and, then, separately matched filtering for each radar. Besides the detailed algorithm derivation, extensive numerical simulation examples are performed with the down-chirp and up-chirp waveforms, partially overlapped or inverse chirp rate linearly frequency modulation (LFM waveforms and orthogonal frequency division multiplexing (ODFM chirp diverse waveforms. The effectiveness of the algorithm is verified by the simulation results.

  14. Single Bit Radar Systems for Digital Integration

    OpenAIRE

    Bjørndal, Øystein

    2017-01-01

    Small, low cost, radar systems have exciting applications in monitoring and imaging for the industrial, healthcare and Internet of Things (IoT) sectors. We here explore, and show the feasibility of, several single bit square wave radar architectures; that benefits from the continuous improvement in digital technologies for system-on-chip digital integration. By analysis, simulation and measurements we explore novel and harmonic-rich continuous wave (CW), stepped-frequency CW (SFCW) and freque...

  15. Detecting and mitigating wind turbine clutter for airspace radar systems.

    Science.gov (United States)

    Wang, Wen-Qin

    2013-01-01

    It is well recognized that a wind turbine has a large radar cross-section (RCS) and, due to the movement of the blades, the wind turbine will generate a Doppler frequency shift. This scattering behavior may cause severe interferences on existing radar systems including static ground-based radars and spaceborne or airborne radars. To resolve this problem, efficient techniques or algorithms should be developed to mitigate the effects of wind farms on radars. Herein, one transponder-based mitigation technique is presented. The transponder is not a new concept, which has been proposed for calibrating high-resolution imaging radars. It modulates the radar signal in a manner that the retransmitted signals can be separated from the scene echoes. As wind farms often occupy only a small area, mitigation processing in the whole radar operation will be redundant and cost inefficient. Hence, this paper uses a transponder to determine whether the radar is impacted by the wind farms. If so, the effects of wind farms are then mitigated with subsequent Kalman filtering or plot target extraction algorithms. Taking airborne synthetic aperture radar (SAR) and pulse Doppler radar as the examples, this paper provides the corresponding system configuration and processing algorithms. The effectiveness of the mitigation technique is validated by numerical simulation results.

  16. Detecting and Mitigating Wind Turbine Clutter for Airspace Radar Systems

    Directory of Open Access Journals (Sweden)

    Wen-Qin Wang

    2013-01-01

    Full Text Available It is well recognized that a wind turbine has a large radar cross-section (RCS and, due to the movement of the blades, the wind turbine will generate a Doppler frequency shift. This scattering behavior may cause severe interferences on existing radar systems including static ground-based radars and spaceborne or airborne radars. To resolve this problem, efficient techniques or algorithms should be developed to mitigate the effects of wind farms on radars. Herein, one transponder-based mitigation technique is presented. The transponder is not a new concept, which has been proposed for calibrating high-resolution imaging radars. It modulates the radar signal in a manner that the retransmitted signals can be separated from the scene echoes. As wind farms often occupy only a small area, mitigation processing in the whole radar operation will be redundant and cost inefficient. Hence, this paper uses a transponder to determine whether the radar is impacted by the wind farms. If so, the effects of wind farms are then mitigated with subsequent Kalman filtering or plot target extraction algorithms. Taking airborne synthetic aperture radar (SAR and pulse Doppler radar as the examples, this paper provides the corresponding system configuration and processing algorithms. The effectiveness of the mitigation technique is validated by numerical simulation results.

  17. Convolutional neural network based side attack explosive hazard detection in three dimensional voxel radar

    Science.gov (United States)

    Brockner, Blake; Veal, Charlie; Dowdy, Joshua; Anderson, Derek T.; Williams, Kathryn; Luke, Robert; Sheen, David

    2018-04-01

    The identification followed by avoidance or removal of explosive hazards in past and/or present conflict zones is a serious threat for both civilian and military personnel. This is a challenging task as variability exists with respect to the objects, their environment and emplacement context, to name a few factors. A goal is the development of automatic or human-in-the-loop sensor technologies that leverage signal processing, data fusion and machine learning. Herein, we explore the detection of side attack explosive hazards (SAEHs) in three dimensional voxel space radar via different shallow and deep convolutional neural network (CNN) architectures. Dimensionality reduction is performed by using multiple projected images versus the raw three dimensional voxel data, which leads to noteworthy savings in input size and associated network hyperparameters. Last, we explore the accuracy and interpretation of solutions learned via random versus intelligent network weight initialization. Experiments are provided on a U.S. Army data set collected over different times, weather conditions, target types and concealments. Preliminary results indicate that deep learning can perform as good as, if not better, than a skilled domain expert, even in light of limited training data with a class imbalance.

  18. Cost, Capability, and the Hunt for a Lightweight Ground Attack Aircraft

    Science.gov (United States)

    2009-06-12

    or Foe IFR Instrument Flight Rules ISR Intelligence Surveillance and Reconnaissance JP Joint Publication JTAC Joint Terminal Attack...capable, combat range, loiter time, weapons payloads, ejection seats, NVG compatible cockpits, IFR avionics, etc.8 One of the primary enablers for cost...to-air threats. In cases where radar guided air defense systems are present, the lack of an RWR puts the aircraft at a definite disadvantage and is

  19. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  20. Phase-remapping attack in practical quantum-key-distribution systems

    International Nuclear Information System (INIS)

    Fung, Chi-Hang Fred; Qi, Bing; Lo, Hoi-Kwong; Tamaki, Kiyoshi

    2007-01-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the 'plug-and-play' system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem

  1. Software Radar Technology

    Directory of Open Access Journals (Sweden)

    Tang Jun

    2015-08-01

    Full Text Available In this paper, the definition and the key features of Software Radar, which is a new concept, are proposed and discussed. We consider the development of modern radar system technology to be divided into three stages: Digital Radar, Software radar and Intelligent Radar, and the second stage is just commencing now. A Software Radar system should be a combination of various modern digital modular components conformed to certain software and hardware standards. Moreover, a software radar system with an open system architecture supporting to decouple application software and low level hardware would be easy to adopt "user requirements-oriented" developing methodology instead of traditional "specific function-oriented" developing methodology. Compared with traditional Digital Radar, Software Radar system can be easily reconfigured and scaled up or down to adapt to the changes of requirements and technologies. A demonstration Software Radar signal processing system, RadarLab 2.0, which has been developed by Tsinghua University, is introduced in this paper and the suggestions for the future development of Software Radar in China are also given in the conclusion.

  2. Preliminary radar systems analysis for Venus orbiter missions

    Science.gov (United States)

    Brandenburg, R. K.; Spadoni, D. J.

    1971-01-01

    A short, preliminary analysis is presented of the problems involved in mapping the surface of Venus with radar from an orbiting spacecraft. Two types of radar, the noncoherent sidelooking and the focused synthetic aperture systems, are sized to fulfill two assumed levels of Venus exploration. The two exploration levels, regional and local, assumed for this study are based on previous Astro Sciences work (Klopp 1969). The regional level is defined as 1 to 3 kilometer spatial and 0.5 to 1 km vertical resolution of 100 percent 0 of the planet's surface. The local level is defined as 100 to 200 meter spatial and 50-10 m vertical resolution of about 100 percent of the surfAce (based on the regional survey). A 10cm operating frequency was chosen for both radar systems in order to minimize the antenna size and maximize the apparent radar cross section of the surface.

  3. Defending majority voting systems against a strategic attacker

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Ben Haim, Hanoch

    2013-01-01

    Voting systems used in technical and tactical decision making in pattern recognition and target detection, data handling, signal processing, distributed and secure computing etc. are considered. A maxmin two period game is analyzed where the defender first protects and chooses units for participation in voting. The attacker thereafter attacks a subset of units. It is shown that when the defender protects all the voting units, the optimal number of units chosen for voting is either one or the maximal possible odd number. When the defender protects only the units chosen for voting, the optimal number of chosen units increases with the defender resource superiority (i.e., more resources than the attacker) and with probability of providing correct output by any unit. The system success probability always increases in the total number of voting units, the defender–attacker resource ratio, and the probability that each voting unit produces a correct output. The system success probability increases in the attacker–defender contest intensity if the defender achieves per-unit resource superiority, and otherwise decreases in the contest intensity. The presented model and enumerative algorithm allow obtaining optimal voting system defense strategy for any combination of parameters: total number of units, attack and defense resources, unit success probability and contest intensity.

  4. The Goldstone solar system radar: A science instrument for planetary research

    Science.gov (United States)

    Dvorsky, J. D.; Renzetti, N. A.; Fulton, D. E.

    1992-01-01

    The Goldstone Solar System Radar (GSSR) station at NASA's Deep Space Communications Complex in California's Mojave Desert is described. A short chronological account of the GSSR's technical development and scientific discoveries is given. This is followed by a basic discussion of how information is derived from the radar echo and how the raw information can be used to increase understanding of the solar system. A moderately detailed description of the radar system is given, and the engineering performance of the radar is discussed. The operating characteristics of the Arcibo Observatory in Puerto Rico are briefly described and compared with those of the GSSR. Planned and in-process improvements to the existing radar, as well as the performance of a hypothetical 128-m diameter antenna radar station, are described. A comprehensive bibliography of referred scientific and engineering articles presenting results that depended on data gathered by the instrument is provided.

  5. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  6. Radar Fundamentals, Presentation

    OpenAIRE

    Jenn, David

    2008-01-01

    Topics include: introduction, radar functions, antennas basics, radar range equation, system parameters, electromagnetic waves, scattering mechanisms, radar cross section and stealth, and sample radar systems.

  7. Multiple-scattering in radar systems: A review

    International Nuclear Information System (INIS)

    Battaglia, Alessandro; Tanelli, Simone; Kobayashi, Satoru; Zrnic, Dusan; Hogan, Robin J.; Simmer, Clemens

    2010-01-01

    Although extensively studied within the lidar community, the multiple scattering phenomenon has always been considered a rare curiosity by radar meteorologists. Up to few years ago its appearance has only been associated with two- or three-body-scattering features (e.g. hail flares and mirror images) involving highly reflective surfaces. Recent atmospheric research aimed at better understanding of the water cycle and the role played by clouds and precipitation in affecting the Earth's climate has driven the deployment of high frequency radars in space. Examples are the TRMM 13.5 GHz, the CloudSat 94 GHz, the upcoming EarthCARE 94 GHz, and the GPM dual 13-35 GHz radars. These systems are able to detect the vertical distribution of hydrometeors and thus provide crucial feedbacks for radiation and climate studies. The shift towards higher frequencies increases the sensitivity to hydrometeors, improves the spatial resolution and reduces the size and weight of the radar systems. On the other hand, higher frequency radars are affected by stronger extinction, especially in the presence of large precipitating particles (e.g. raindrops or hail particles), which may eventually drive the signal below the minimum detection threshold. In such circumstances the interpretation of the radar equation via the single scattering approximation may be problematic. Errors will be large when the radiation emitted from the radar after interacting more than once with the medium still contributes substantially to the received power. This is the case if the transport mean-free-path becomes comparable with the instrument footprint (determined by the antenna beam-width and the platform altitude). This situation resembles to what has already been experienced in lidar observations, but with a predominance of wide- versus small-angle scattering events. At millimeter wavelengths, hydrometeors diffuse radiation rather isotropically compared to the visible or near infrared region where scattering is

  8. Coherent Doppler Laser Radar: Technology Development and Applications

    Science.gov (United States)

    Kavaya, Michael J.; Arnold, James E. (Technical Monitor)

    2000-01-01

    NASA's Marshall Space Flight Center has been investigating, developing, and applying coherent Doppler laser radar technology for over 30 years. These efforts have included the first wind measurement in 1967, the first airborne flights in 1972, the first airborne wind field mapping in 1981, and the first measurement of hurricane eyewall winds in 1998. A parallel effort at MSFC since 1982 has been the study, modeling and technology development for a space-based global wind measurement system. These endeavors to date have resulted in compact, robust, eyesafe lidars at 2 micron wavelength based on solid-state laser technology; in a factor of 6 volume reduction in near diffraction limited, space-qualifiable telescopes; in sophisticated airborne scanners with full platform motion subtraction; in local oscillator lasers capable of rapid tuning of 25 GHz for removal of relative laser radar to target velocities over a 25 km/s range; in performance prediction theory and simulations that have been validated experimentally; and in extensive field campaign experience. We have also begun efforts to dramatically improve the fundamental photon efficiency of the laser radar, to demonstrate advanced lower mass laser radar telescopes and scanners; to develop laser and laser radar system alignment maintenance technologies; and to greatly improve the electrical efficiency, cooling technique, and robustness of the pulsed laser. This coherent Doppler laser radar technology is suitable for high resolution, high accuracy wind mapping; for aerosol and cloud measurement; for Differential Absorption Lidar (DIAL) measurements of atmospheric and trace gases; for hard target range and velocity measurement; and for hard target vibration spectra measurement. It is also suitable for a number of aircraft operations applications such as clear air turbulence (CAT) detection; dangerous wind shear (microburst) detection; airspeed, angle of attack, and sideslip measurement; and fuel savings through

  9. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  11. Phased-array radar design application of radar fundamentals

    CERN Document Server

    Jeffrey, Thomas

    2009-01-01

    Phased-Array Radar Design is a text-reference designed for electrical engineering graduate students in colleges and universities as well as for corporate in-house training programs for radar design engineers, especially systems engineers and analysts who would like to gain hands-on, practical knowledge and skills in radar design fundamentals, advanced radar concepts, trade-offs for radar design and radar performance analysis.

  12. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  13. Cyber attack analysis on cyber-physical systems: Detectability, severity, and attenuation strategy

    Science.gov (United States)

    Kwon, Cheolhyeon

    Security of Cyber-Physical Systems (CPS) against malicious cyber attacks is an important yet challenging problem. Since most cyber attacks happen in erratic ways, it is usually intractable to describe and diagnose them systematically. Motivated by such difficulties, this thesis presents a set of theories and algorithms for a cyber-secure architecture of the CPS within the control theoretic perspective. Here, instead of identifying a specific cyber attack model, we are focused on analyzing the system's response during cyber attacks. Firstly, we investigate the detectability of the cyber attacks from the system's behavior under cyber attacks. Specifically, we conduct a study on the vulnerabilities in the CPS's monitoring system against the stealthy cyber attack that is carefully designed to avoid being detected by its detection scheme. After classifying three kinds of cyber attacks according to the attacker's ability to compromise the system, we derive the necessary and sufficient conditions under which such stealthy cyber attacks can be designed to cause the unbounded estimation error while not being detected. Then, the analytical design method of the optimal stealthy cyber attack that maximizes the estimation error is developed. The proposed stealthy cyber attack analysis is demonstrated with illustrative examples on Air Traffic Control (ATC) system and Unmanned Aerial Vehicle (UAV) navigation system applications. Secondly, in an attempt to study the CPSs' vulnerabilities in more detail, we further discuss a methodology to identify potential cyber threats inherent in the given CPSs and quantify the attack severity accordingly. We then develop an analytical algorithm to test the behavior of the CPS under various cyber attack combinations. Compared to a numerical approach, the analytical algorithm enables the prediction of the most effective cyber attack combinations without computing the severity of all possible attack combinations, thereby greatly reducing the

  14. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  15. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  16. Reconfigurable signal processor designs for advanced digital array radar systems

    Science.gov (United States)

    Suarez, Hernan; Zhang, Yan (Rockee); Yu, Xining

    2017-05-01

    The new challenges originated from Digital Array Radar (DAR) demands a new generation of reconfigurable backend processor in the system. The new FPGA devices can support much higher speed, more bandwidth and processing capabilities for the need of digital Line Replaceable Unit (LRU). This study focuses on using the latest Altera and Xilinx devices in an adaptive beamforming processor. The field reprogrammable RF devices from Analog Devices are used as analog front end transceivers. Different from other existing Software-Defined Radio transceivers on the market, this processor is designed for distributed adaptive beamforming in a networked environment. The following aspects of the novel radar processor will be presented: (1) A new system-on-chip architecture based on Altera's devices and adaptive processing module, especially for the adaptive beamforming and pulse compression, will be introduced, (2) Successful implementation of generation 2 serial RapidIO data links on FPGA, which supports VITA-49 radio packet format for large distributed DAR processing. (3) Demonstration of the feasibility and capabilities of the processor in a Micro-TCA based, SRIO switching backplane to support multichannel beamforming in real-time. (4) Application of this processor in ongoing radar system development projects, including OU's dual-polarized digital array radar, the planned new cylindrical array radars, and future airborne radars.

  17. Pulse Doppler radar

    CERN Document Server

    Alabaster, Clive

    2012-01-01

    This book is a practitioner's guide to all aspects of pulse Doppler radar. It concentrates on airborne military radar systems since they are the most used, most complex, and most interesting of the pulse Doppler radars; however, ground-based and non-military systems are also included. It covers the fundamental science, signal processing, hardware issues, systems design and case studies of typical systems. It will be a useful resource for engineers of all types (hardware, software and systems), academics, post-graduate students, scientists in radar and radar electronic warfare sectors and milit

  18. Possibility of spoof attack against robustness of multibiometric authentication systems

    Science.gov (United States)

    Hariri, Mahdi; Shokouhi, Shahriar Baradaran

    2011-07-01

    Multibiometric systems have been recently developed in order to overcome some weaknesses of single biometric authentication systems, but security of these systems against spoofing has not received enough attention. In this paper, we propose a novel practical method for simulation of possibilities of spoof attacks against a biometric authentication system. Using this method, we model matching scores from standard to completely spoofed genuine samples. Sum, product, and Bayes fusion rules are applied for score level combination. The security of multimodal authentication systems are examined and compared with the single systems against various spoof possibilities. However, vulnerability of fused systems is considerably increased against spoofing, but their robustness is generally higher than single matcher systems. In this paper we show that robustness of a combined system is not always higher than a single system against spoof attack. We propose empirical methods for upgrading the security of multibiometric systems, which contain how to organize and select biometric traits and matchers against various possibilities of spoof attack. These methods provide considerable robustness and present an appropriate reason for using combined systems against spoof attacks.

  19. Time-Efficient Cloning Attacks Identification in Large-Scale RFID Systems

    Directory of Open Access Journals (Sweden)

    Ju-min Zhao

    2017-01-01

    Full Text Available Radio Frequency Identification (RFID is an emerging technology for electronic labeling of objects for the purpose of automatically identifying, categorizing, locating, and tracking the objects. But in their current form RFID systems are susceptible to cloning attacks that seriously threaten RFID applications but are hard to prevent. Existing protocols aimed at detecting whether there are cloning attacks in single-reader RFID systems. In this paper, we investigate the cloning attacks identification in the multireader scenario and first propose a time-efficient protocol, called the time-efficient Cloning Attacks Identification Protocol (CAIP to identify all cloned tags in multireaders RFID systems. We evaluate the performance of CAIP through extensive simulations. The results show that CAIP can identify all the cloned tags in large-scale RFID systems fairly fast with required accuracy.

  20. Interval forecasting of cyber-attacks on industrial control systems

    Science.gov (United States)

    Ivanyo, Y. M.; Krakovsky, Y. M.; Luzgin, A. N.

    2018-03-01

    At present, cyber-security issues of industrial control systems occupy one of the key niches in a state system of planning and management Functional disruption of these systems via cyber-attacks may lead to emergencies related to loss of life, environmental disasters, major financial and economic damage, or disrupted activities of cities and settlements. There is then an urgent need to develop protection methods against cyber-attacks. This paper studied the results of cyber-attack interval forecasting with a pre-set intensity level of cyber-attacks. Interval forecasting is the forecasting of one interval from two predetermined ones in which a future value of the indicator will be obtained. For this, probability estimates of these events were used. For interval forecasting, a probabilistic neural network with a dynamic updating value of the smoothing parameter was used. A dividing bound of these intervals was determined by a calculation method based on statistical characteristics of the indicator. The number of cyber-attacks per hour that were received through a honeypot from March to September 2013 for the group ‘zeppo-norcal’ was selected as the indicator.

  1. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim' based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks.

  2. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Koh, Yun Sing; Xiong, Qingyu; Gao, Min; Dobbie, Gillian; Alam, Shafiq

    2015-01-01

    Recommender systems are highly vulnerable to shilling attacks, both by individuals and groups. Attackers who introduce biased ratings in order to affect recommendations, have been shown to negatively affect collaborative filtering (CF) algorithms. Previous research focuses only on the differences between genuine profiles and attack profiles, ignoring the group characteristics in attack profiles. In this paper, we study the use of statistical metrics to detect rating patterns of attackers and group characteristics in attack profiles. Another question is that most existing detecting methods are model specific. Two metrics, Rating Deviation from Mean Agreement (RDMA) and Degree of Similarity with Top Neighbors (DegSim), are used for analyzing rating patterns between malicious profiles and genuine profiles in attack models. Building upon this, we also propose and evaluate a detection structure called RD-TIA for detecting shilling attacks in recommender systems using a statistical approach. In order to detect more complicated attack models, we propose a novel metric called DegSim’ based on DegSim. The experimental results show that our detection model based on target item analysis is an effective approach for detecting shilling attacks. PMID:26222882

  3. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  4. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  5. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  6. Fiber optic coherent laser radar 3d vision system

    International Nuclear Information System (INIS)

    Sebastian, R.L.; Clark, R.B.; Simonson, D.L.

    1994-01-01

    Recent advances in fiber optic component technology and digital processing components have enabled the development of a new 3D vision system based upon a fiber optic FMCW coherent laser radar. The approach includes a compact scanner with no moving parts capable of randomly addressing all pixels. The system maintains the immunity to lighting and surface shading conditions which is characteristic of coherent laser radar. The random pixel addressability allows concentration of scanning and processing on the active areas of a scene, as is done by the human eye-brain system

  7. On resilience studies of system detection and recovery techniques against stealthy insider attacks

    Science.gov (United States)

    Wei, Sixiao; Zhang, Hanlin; Chen, Genshe; Shen, Dan; Yu, Wei; Pham, Khanh D.; Blasch, Erik P.; Cruz, Jose B.

    2016-05-01

    With the explosive growth of network technologies, insider attacks have become a major concern to business operations that largely rely on computer networks. To better detect insider attacks that marginally manipulate network traffic over time, and to recover the system from attacks, in this paper we implement a temporal-based detection scheme using the sequential hypothesis testing technique. Two hypothetical states are considered: the null hypothesis that the collected information is from benign historical traffic and the alternative hypothesis that the network is under attack. The objective of such a detection scheme is to recognize the change within the shortest time by comparing the two defined hypotheses. In addition, once the attack is detected, a server migration-based system recovery scheme can be triggered to recover the system to the state prior to the attack. To understand mitigation of insider attacks, a multi-functional web display of the detection analysis was developed for real-time analytic. Experiments using real-world traffic traces evaluate the effectiveness of Detection System and Recovery (DeSyAR) scheme. The evaluation data validates the detection scheme based on sequential hypothesis testing and the server migration-based system recovery scheme can perform well in effectively detecting insider attacks and recovering the system under attack.

  8. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  9. Transponder-aided joint calibration and synchronization compensation for distributed radar systems.

    Science.gov (United States)

    Wang, Wen-Qin

    2015-01-01

    High-precision radiometric calibration and synchronization compensation must be provided for distributed radar system due to separate transmitters and receivers. This paper proposes a transponder-aided joint radiometric calibration, motion compensation and synchronization for distributed radar remote sensing. As the transponder signal can be separated from the normal radar returns, it is used to calibrate the distributed radar for radiometry. Meanwhile, the distributed radar motion compensation and synchronization compensation algorithms are presented by utilizing the transponder signals. This method requires no hardware modifications to both the normal radar transmitter and receiver and no change to the operating pulse repetition frequency (PRF). The distributed radar radiometric calibration and synchronization compensation require only one transponder, but the motion compensation requires six transponders because there are six independent variables in the distributed radar geometry. Furthermore, a maximum likelihood method is used to estimate the transponder signal parameters. The proposed methods are verified by simulation results.

  10. Modulation, resolution and signal processing in radar, sonar and related systems

    CERN Document Server

    Benjamin, R; Costrell, L

    1966-01-01

    Electronics and Instrumentation, Volume 35: Modulation, Resolution and Signal Processing in Radar, Sonar and Related Systems presents the practical limitations and potentialities of advanced modulation systems. This book discusses the concepts and techniques in the radar context, but they are equally essential to sonar and to a wide range of signaling and data-processing applications, including seismology, radio astronomy, and band-spread communications.Organized into 15 chapters, this volume begins with an overview of the principal developments sought in pulse radar. This text then provides a

  11. A Machine Learning-based Rainfall System for GPM Dual-frequency Radar

    Science.gov (United States)

    Tan, H.; Chandrasekar, V.; Chen, H.

    2017-12-01

    Precipitation measurement produced by the Global Precipitation Measurement (GPM) Dual-frequency Precipitation Radar (DPR) plays an important role in researching the water circle and forecasting extreme weather event. Compare with its predecessor - Tropical Rainfall Measuring Mission (TRMM) Precipitation Radar (PR), GRM DPR measures precipitation in two different frequencies (i.e., Ku and Ka band), which can provide detailed information on the microphysical properties of precipitation particles, quantify particle size distribution and quantitatively measure light rain and falling snow. This paper presents a novel Machine Learning system for ground-based and space borne radar rainfall estimation. The system first trains ground radar data for rainfall estimation using rainfall measurements from gauges and subsequently uses the ground radar based rainfall estimates to train GPM DPR data in order to get space based rainfall product. Therein, data alignment between space DPR and ground radar is conducted using the methodology proposed by Bolen and Chandrasekar (2013), which can minimize the effects of potential geometric distortion of GPM DPR observations. For demonstration purposes, rainfall measurements from three rain gauge networks near Melbourne, Florida, are used for training and validation purposes. These three gauge networks, which are located in Kennedy Space Center (KSC), South Florida Water Management District (SFL), and St. Johns Water Management District (STJ), include 33, 46, and 99 rain gauge stations, respectively. Collocated ground radar observations from the National Weather Service (NWS) Weather Surveillance Radar - 1988 Doppler (WSR-88D) in Melbourne (i.e., KMLB radar) are trained with the gauge measurements. The trained model is then used to derive KMLB radar based rainfall product, which is used to train GPM DPR data collected from coincident overpasses events. The machine learning based rainfall product is compared against the GPM standard products

  12. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  13. Optimum radars and filters for the passive sphere system

    Science.gov (United States)

    Luers, J. K.; Soltes, A.

    1971-01-01

    Studies have been conducted to determine the influence of the tracking radar and data reduction technique on the accuracy of the meteorological measurements made in the 30 to 100 kilometer altitude region by the ROBIN passive falling sphere. A survey of accuracy requirements was made of agencies interested in data from this region of the atmosphere. In light of these requirements, various types of radars were evaluated to determine the tracking system most applicable to the ROBIN, and methods were developed to compute the errors in wind and density that arise from noise errors in the radar supplied data. The effects of launch conditions on the measurements were also examined. Conclusions and recommendations have been made concerning the optimum tracking and data reduction techniques for the ROBIN falling sphere system.

  14. 77 FR 48097 - Operation of Radar Systems in the 76-77 GHz Band

    Science.gov (United States)

    2012-08-13

    ... modify the emission limits for vehicular radar systems operating within the 76-77 GHz band. Specifically.... 15.253 of the rules for vehicular radar systems operating in the 76-77 GHz band. Vehicular radars can... sensors operating in the 76-77 GHz band, the spectrum shall be investigated up to 231 GHz. (f) Fundamental...

  15. Minimum redundancy MIMO radars

    OpenAIRE

    Chen, Chun-Yang; Vaidyanathan, P. P.

    2008-01-01

    The multiple-input multiple-output (MIMO) radar concept has drawn considerable attention recently. In the traditional single-input multiple-output (SIMO) radar system, the transmitter emits scaled versions of a single waveform. However, in the MIMO radar system, the transmitter transmits independent waveforms. It has been shown that the MIMO radar can be used to improve system performance. Most of the MIMO radar research so far has focused on the uniform array. However, i...

  16. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks.

    Science.gov (United States)

    Feng, Zhi; Wen, Guanghui; Hu, Guoqiang

    2017-05-01

    This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.

  17. THz impulse radar for biomedical sensing: nonlinear system behavior

    Science.gov (United States)

    Brown, E. R.; Sung, Shijun; Grundfest, W. S.; Taylor, Z. D.

    2014-03-01

    The THz impulse radar is an "RF-inspired" sensor system that has performed remarkably well since its initial development nearly six years ago. It was developed for ex vivo skin-burn imaging, and has since shown great promise in the sensitive detection of hydration levels in soft tissues of several types, such as in vivo corneal and burn samples. An intriguing aspect of the impulse radar is its hybrid architecture which combines the high-peak-power of photoconductive switches with the high-responsivity and -bandwidth (RF and video) of Schottky-diode rectifiers. The result is a very sensitive sensor system in which the post-detection signal-to-noise ratio depends super-linearly on average signal power up to a point where the diode is "turned on" in the forward direction, and then behaves quasi-linearly beyond that point. This paper reports the first nonlinear systems analysis done on the impulse radar using MATLAB.

  18. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  19. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-01-01

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113

  20. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  1. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-04-24

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  2. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  3. IoSiS: a radar system for imaging of satellites in space

    Science.gov (United States)

    Jirousek, M.; Anger, S.; Dill, S.; Schreiber, E.; Peichl, M.

    2017-05-01

    Space debris nowadays is one of the main threats for satellite systems especially in low earth orbit (LEO). More than 700,000 debris objects with potential to destroy or damage a satellite are estimated. The effects of an impact often are not identifiable directly from ground. High-resolution radar images are helpful in analyzing a possible damage. Therefor DLR is currently developing a radar system called IoSiS (Imaging of Satellites in Space), being based on an existing steering antenna structure and our multi-purpose high-performance radar system GigaRad for experimental investigations. GigaRad is a multi-channel system operating at X band and using a bandwidth of up to 4.4 GHz in the IoSiS configuration, providing fully separated transmit (TX) and receive (RX) channels, and separated antennas. For the observation of small satellites or space debris a highpower traveling-wave-tube amplifier (TWTA) is mounted close to the TX antenna feed. For the experimental phase IoSiS uses a 9 m TX and a 1 m RX antenna mounted on a common steerable positioner. High-resolution radar images are obtained by using Inverse Synthetic Aperture Radar (ISAR) techniques. The guided tracking of known objects during overpass allows here wide azimuth observation angles. Thus high azimuth resolution comparable to the range resolution can be achieved. This paper outlines technical main characteristics of the IoSiS radar system including the basic setup of the antenna, the radar instrument with the RF error correction, and the measurement strategy. Also a short description about a simulation tool for the whole instrument and expected images is shown.

  4. Planetary Radar

    Science.gov (United States)

    Neish, Catherine D.; Carter, Lynn M.

    2015-01-01

    This chapter describes the principles of planetary radar, and the primary scientific discoveries that have been made using this technique. The chapter starts by describing the different types of radar systems and how they are used to acquire images and accurate topography of planetary surfaces and probe their subsurface structure. It then explains how these products can be used to understand the properties of the target being investigated. Several examples of discoveries made with planetary radar are then summarized, covering solar system objects from Mercury to Saturn. Finally, opportunities for future discoveries in planetary radar are outlined and discussed.

  5. Advances in bistatic radar

    CERN Document Server

    Willis, Nick

    2007-01-01

    Advances in Bistatic Radar updates and extends bistatic and multistatic radar developments since publication of Willis' Bistatic Radar in 1991. New and recently declassified military applications are documented. Civil applications are detailed including commercial and scientific systems. Leading radar engineers provide expertise to each of these applications. Advances in Bistatic Radar consists of two major sections: Bistatic/Multistatic Radar Systems and Bistatic Clutter and Signal Processing. Starting with a history update, the first section documents the early and now declassified military

  6. Computing Preferred Extensions for Argumentation Systems with Sets of Attacking

    DEFF Research Database (Denmark)

    Nielsen, Søren Holbech; Parsons, Simon

    2006-01-01

    The hitherto most abstract, and hence general, argumentation system, is the one described by Dung in a paper from 1995. This framework does not allow for joint attacks on arguments, but in a recent paper we adapted it to support such attacks, and proved that this adapted framework enjoyed the same...... formal properties as that of Dung. One problem posed by Dung's original framework, which was neglected for some time, is how to compute preferred extensions of the argumentation systems. However, in 2001, in a paper by Doutre and Mengin, a procedure was given for enumerating preferred extensions...... for these systems. In this paper we propose a method for enumerating preferred extensions of the potentially more complex systems, where joint attacks are allowed. The method is inspired by the one given by Doutre and Mengin....

  7. Reducing an attack surface of an operating system

    OpenAIRE

    VALKONEN, VILLE

    2012-01-01

    Certain security choices done on the operating system level can mitigate harm done by an malicious attacker or a program. The main focus in the thesis is on open source operating systems. Asiasanat: software security, operating system security

  8. Radar and ARPA manual

    CERN Document Server

    Bole, A G

    2013-01-01

    Radar and ARPA Manual focuses on the theoretical and practical aspects of electronic navigation. The manual first discusses basic radar principles, including principles of range and bearing measurements and picture orientation and presentation. The text then looks at the operational principles of radar systems. Function of units; aerial, receiver, and display principles; transmitter principles; and sitting of units on board ships are discussed. The book also describes target detection, Automatic Radar Plotting Aids (ARPA), and operational controls of radar systems, and then discusses radar plo

  9. Attack tree based cyber security analysis of nuclear digital instrumentation and control systems

    International Nuclear Information System (INIS)

    Khand, P.A.

    2009-01-01

    To maintain the cyber security, nuclear digital Instrumentation and Control (I and C) systems must be analyzed for security risks because a single security breach due to a cyber attack can cause system failure, which can have catastrophic consequences on the environment and staff of a Nuclear Power Plant (NPP). Attack trees have been widely used to analyze the cyber security of digital systems due to their ability to capture system specific as well as attacker specific details. Therefore, a methodology based on attack trees has been proposed to analyze the cyber security of the systems. The methodology has been applied for the Cyber Security Analysis (CSA) of a Bistable Processor (BP) of a Reactor Protection System (RPS). Threats have been described according to their source. Attack scenarios have been generated using the attack tree and possible counter measures according to the Security Risk Level (SRL) of each scenario have been suggested. Moreover, cyber Security Requirements (SRs) have been elicited, and suitability of the requirements has been checked. (author)

  10. A Doppler Radar System for Sensing Physiological Parameters in Walking and Standing Positions

    Directory of Open Access Journals (Sweden)

    Malikeh Pour Ebrahim

    2017-03-01

    Full Text Available Doppler radar can be implemented for sensing physiological parameters wirelessly at a distance. Detecting respiration rate, an important human body parameter, is essential in a range of applications like emergency and military healthcare environments, and Doppler radar records actual chest motion. One challenge in using Doppler radar is being able to monitor several patients simultaneously and in different situations like standing, walking, or lying. This paper presents a complete transmitter-receiver Doppler radar system, which uses a 4 GHz continuous wave radar signal transmission and receiving system, to extract base-band data from a phase-shifted signal. This work reports experimental evaluations of the system for one and two subjects in various standing and walking positions. It provides a detailed signal analysis of various breathing rates of these two subjects simultaneously. These results will be useful in future medical monitoring applications.

  11. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  12. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  13. Environmental Statement. Continental United States Over-the-Horizon Backscatter Radar System

    Science.gov (United States)

    1984-02-01

    kind of a bugaboo . Mrs Morehouse: How dangerous is this kind of radiation? Mr Raffa: That one has been determined by Doctor Polson and others. Since we...quality. From a broader perspective, the OTH-BS radar is for me a wise and cost-effective way to invest our defense dollar. An effective radar system...transportation scheduling and carrier quality. From a broader perspective, the OTH-BS radar is for me a wise and cost-effective way to invest our

  14. Localization Capability of Cooperative Anti-Intruder Radar Systems

    Directory of Open Access Journals (Sweden)

    Mauro Montanari

    2008-06-01

    Full Text Available System aspects of an anti-intruder multistatic radar based on impulse radio ultrawideband (UWB technology are addressed. The investigated system is composed of one transmitting node and at least three receiving nodes, positioned in the surveillance area with the aim of detecting and locating a human intruder (target that moves inside the area. Such systems, referred to also as UWB radar sensor networks, must satisfy severe power constraints worldwide imposed by, for example, the Federal Communications Commission (FCC and by the European Commission (EC power spectral density masks. A single transmitter-receiver pair (bistatic radar is considered at first. Given the available transmitted power and the capability of the receiving node to resolve the UWB pulses in the time domain, the surveillance area regions where the target is detectable, and those where it is not, are obtained. Moreover, the range estimation error for the transmitter-receiver pair is discussed. By employing this analysis, a multistatic system is then considered, composed of one transmitter and three or four cooperating receivers. For this multistatic system, the impact of the nodes location on area coverage, necessary transmitted power and localization uncertainty is studied, assuming a circular surveillance area. It is highlighted how area coverage and transmitted power, on one side, and localization uncertainty, on the other side, require opposite criteria of nodes placement. Consequently, the need for a system compromising between these factors is shown. Finally, a simple and effective criterion for placing the transmitter and the receivers is drawn.

  15. Countermeasure against probabilistic blinding attack in practical quantum key distribution systems

    International Nuclear Information System (INIS)

    Qian Yong-Jun; Li Hong-Wei; He De-Yong; Yin Zhen-Qiang; Zhang Chun-Mei; Chen Wei; Wang Shuang; Han Zheng-Fu

    2015-01-01

    In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. (paper)

  16. Attack Detection/Isolation via a Secure Multisensor Fusion Framework for Cyberphysical Systems

    Directory of Open Access Journals (Sweden)

    Arash Mohammadi

    2018-01-01

    Full Text Available Motivated by rapid growth of cyberphysical systems (CPSs and the necessity to provide secure state estimates against potential data injection attacks in their application domains, the paper proposes a secure and innovative attack detection and isolation fusion framework. The proposed multisensor fusion framework provides secure state estimates by using ideas from interactive multiple models (IMM combined with a novel fuzzy-based attack detection/isolation mechanism. The IMM filter is used to adjust the system’s uncertainty adaptively via model probabilities by using a hybrid state model consisting of two behaviour modes, one corresponding to the ideal scenario and one associated with the attack behaviour mode. The state chi-square test is then incorporated through the proposed fuzzy-based fusion framework to detect and isolate potential data injection attacks. In other words, the validation probability of each sensor is calculated based on the value of the chi-square test. Finally, by incorporation of the validation probability of each sensor, the weights of its associated subsystem are computed. To be concrete, an integrated navigation system is simulated with three types of attacks ranging from a constant bias attack to a non-Gaussian stochastic attack to evaluate the proposed attack detection and isolation fusion framework.

  17. Biometric Authentication Systems Attacks: Liveness Detection to the ...

    African Journals Online (AJOL)

    AFRICAN JOURNALS ONLINE (AJOL) · Journals · Advanced Search · USING AJOL · RESOURCES ... access control, sensitive data protection and on-line tracking systems. ... This paper has identified such vulnerabilities and threats, particularly ... Systems, Authentication, Verification, Vulnerabilities, attacks, Threats.

  18. Attacks to Cryptography Protocols of Wireless Industrial Communication Systems

    Directory of Open Access Journals (Sweden)

    Tomas Ondrasina

    2010-01-01

    Full Text Available The paper deals with problems of safety and security principles within wireless industrial communication systems. First safety requirements to wireless industrial communication system, summarisation of attack methods and the available measures for risks elimination are described with orientation to safety critical applications. The mainly part is oriented to identification of risks and summarisation of defensive methods of wireless communication based on cryptographic techniques. Practical part the cryptoanalytic’s attacks to COTS (Commercial Off-The-Shelf wireless communications are mentioned based on the IEEE 802.11 standards.

  19. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    International Nuclear Information System (INIS)

    Hartman, Steven M.

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  20. 47 CFR 15.509 - Technical requirements for ground penetrating radars and wall imaging systems.

    Science.gov (United States)

    2010-10-01

    ..., fire fighting, emergency rescue, scientific research, commercial mining, or construction. (1) Parties... radars and wall imaging systems. 15.509 Section 15.509 Telecommunication FEDERAL COMMUNICATIONS... ground penetrating radars and wall imaging systems. (a) The UWB bandwidth of an imaging system operating...

  1. Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems

    Directory of Open Access Journals (Sweden)

    Yao Pan

    2017-03-01

    Full Text Available The Internet of Things (IoT has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.

  2. Synchronous Design and Test of Distributed Passive Radar Systems Based on Digital Broadcasting and Television

    Directory of Open Access Journals (Sweden)

    Wan Xianrong

    2017-02-01

    Full Text Available Digital broadcasting and television are important classes of illuminators of opportunity for passive radars. Distributed and multistatic structure are the development trends for passive radars. Most modern digital broadcasting and television systems work on a network, which not only provides a natural condition to distributed passive radar but also puts forward higher requirements on the design of passive radar systems. Among those requirements, precise synchronization among the receivers and transmitters as well as among multiple receiving stations, which mainly involves frequency and time synchronization, is the first to be solved. To satisfy the synchronization requirements of distributed passive radars, a synchronization scheme based on GPS is presented in this paper. Moreover, an effective scheme based on the China Mobile Multimedia Broadcasting signal is proposed to test the system synchronization performance. Finally, the reliability of the synchronization design is verified via the distributed multistatic passive radar experiments.

  3. From control system security indices to attack identifiability

    NARCIS (Netherlands)

    Herdeiro Teixeira, A.M.; Sandberg, H

    2016-01-01

    In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources

  4. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 2

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-11-01

    Full Text Available The possibility of applying machine learning for the classification of malicious requests to aWeb application is considered. This approach excludes the use of deterministic analysis systems (for example, expert systems,and is based on the application of a cascade of neural networks or perceptrons on an approximate model to the real humanbrain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms forcompiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participatingin the work, with the ability to adjust not the entire network, but only a small part of it, in the training of which a mistake orinaccuracy crept in. The design of the developed network can be described as a cascaded, scalable neural network.When using neural networks to detect attacks on web systems, the issue of vectorization and normalization of features isacute. The most commonly used methods for solving these problems are not designed for the case of deliberate distortion ofthe signs of an attack.The proposed approach makes it possible to obtain a neural network that has been studied in more detail by small features,and also to eliminate the normalization issues in order to avoid deliberately bypassing the intrusion detection system. Byisolating one more group of neurons in the network and teaching it to samples containing various variants of circumvention ofthe attack classification, the developed intrusion detection system remains able to classify any types of attacks as well as theiraggregates, putting forward more stringent measures to counteract attacks. This allows you to follow the life cycle of theattack in more detail: from the starting trial attack to deliberate sophisticated attempts to bypass the system and introducemore decisive measures to actively counteract the attack, eliminating the chances of a false alarm system.

  5. Development of passive radar systems at TNO

    NARCIS (Netherlands)

    Gelsema, S.J.

    2007-01-01

    Since 2002, the Netherlands Organisation for Applied Scientific Research – TNO, has been involved in the development of passive radar systems for research purposes. The development has been sponsored partly by the Royal Netherlands Air Force – whose main interest is threat evaluation – and partly by

  6. Anti-spoofing for display and print attacks on palmprint verification systems

    Science.gov (United States)

    Kanhangad, Vivek; Bhilare, Shruti; Garg, Pragalbh; Singh, Pranjalya; Chaudhari, Narendra

    2015-05-01

    A number of approaches for personal authentication using palmprint features have been proposed in the literature, majority of which focus on improving the matching performance. However, of late, preventing potential attacks on biometric systems has become a major concern as more and more biometric systems get deployed for wide range of applications. Among various types of attacks, sensor level attack, commonly known as spoof attack, has emerged as the most common attack due to simplicity in its execution. In this paper, we present an approach for detection of display and print based spoof attacks on palmprint verifcation systems. The approach is based on the analysis of acquired hand images for estimating surface re ectance. First and higher order statistical features computed from the distributions of pixel intensities and sub-band wavelet coeefficients form the feature set. A trained binary classifier utilizes the discriminating information to determine if the acquired image is of real hand or a fake one. Experiments are performed on a publicly available hand image dataset, containing 1300 images corresponding to 230 subjects. Experimental results show that the real hand biometrics samples can be substituted by the fake digital or print copies with an alarming spoof acceptance rate as high as 79.8%. Experimental results also show that the proposed spoof detection approach is very effective for discriminating between real and fake palmprint images. The proposed approach consistently achieves over 99% average 10-fold cross validation classification accuracy in our experiments.

  7. Performance test and verification of an off-the-shelf automated avian radar tracking system.

    Science.gov (United States)

    May, Roel; Steinheim, Yngve; Kvaløy, Pål; Vang, Roald; Hanssen, Frank

    2017-08-01

    Microwave radar is an important tool for observation of birds in flight and represents a tremendous increase in observation capability in terms of amount of surveillance space that can be covered at relatively low cost. Based on off-the-shelf radar hardware, automated radar tracking systems have been developed for monitoring avian movements. However, radar used as an observation instrument in biological research has its limitations that are important to be aware of when analyzing recorded radar data. This article describes a method for exploring the detection capabilities of a dedicated short-range avian radar system used inside the operational Smøla wind-power plant. The purpose of the testing described was to find the maximum detection range for various sized birds, while controlling for the effects of flight tortuosity, flight orientation relative to the radar and ground clutter. The method was to use a dedicated test target in form of a remotely controlled unmanned aerial vehicle (UAV) with calibrated radar cross section (RCS), which enabled the design of virtually any test flight pattern within the area of interest. The UAV had a detection probability of 0.5 within a range of 2,340 m from the radar. The detection performance obtained by the RCS-calibrated test target (-11 dBm 2 , 0.08 m 2 RCS) was then extrapolated to find the corresponding performance of differently sized birds. Detection range depends on system sensitivity, the environment within which the radar is placed and the spatial distribution of birds. The avian radar under study enables continuous monitoring of bird activity within a maximum range up to 2 km dependent on the size of the birds in question. While small bird species may be detected up to 0.5-1 km, larger species may be detected up to 1.5-2 km distance from the radar.

  8. Real-data tests of a single-Doppler radar assimilation system

    Science.gov (United States)

    Nehrkorn, Thomas; Hegarty, James; Hamill, Thomas M.

    1994-06-01

    Real data tests of a single-Doppler radar data assimilation and forecast system have been conducted for a Florida sea breeze case. The system consists of a hydrostatic mesoscale model used for prediction of the preconvective boundary layer, an objective analysis that combines model first guess fields with radar derived horizontal winds, a thermodynamic retrieval scheme that obtains temperature information from the three-dimensional wind field and its temporal evolution, and a Newtonian nudging scheme for forcing the model forecast to closer agreement with the analysis. As was found in earlier experiments with simulated data, assimilation using Newtonian nudging benefits from temperature data in addition to wind data. The thermodynamic retrieval technique was successful in retrieving a horizontal temperature gradient from the radar-derived wind fields that, when assimilated into the model, led to a significantly improved forecast of the seabreeze strength and position.

  9. Radar remote sensing in biology

    Science.gov (United States)

    Moore, Richard K.; Simonett, David S.

    1967-01-01

    The present status of research on discrimination of natural and cultivated vegetation using radar imaging systems is sketched. The value of multiple polarization radar in improved discrimination of vegetation types over monoscopic radars is also documented. Possible future use of multi-frequency, multi-polarization radar systems for all weather agricultural survey is noted.

  10. Robust Structural Analysis and Design of Distributed Control Systems to Prevent Zero Dynamics Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Liu, Xiaofei [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-12-12

    We consider the design and analysis of robust distributed control systems (DCSs) to ensure the detection of integrity attacks. DCSs are often managed by independent agents and are implemented using a diverse set of sensors and controllers. However, the heterogeneous nature of DCSs along with their scale leave such systems vulnerable to adversarial behavior. To mitigate this reality, we provide tools that allow operators to prevent zero dynamics attacks when as many as p agents and sensors are corrupted. Such a design ensures attack detectability in deterministic systems while removing the threat of a class of stealthy attacks in stochastic systems. To achieve this goal, we use graph theory to obtain necessary and sufficient conditions for the presence of zero dynamics attacks in terms of the structural interactions between agents and sensors. We then formulate and solve optimization problems which minimize communication networks while also ensuring a resource limited adversary cannot perform a zero dynamics attacks. Polynomial time algorithms for design and analysis are provided.

  11. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  12. Radar and electronic navigation

    CERN Document Server

    Sonnenberg, G J

    2013-01-01

    Radar and Electronic Navigation, Sixth Edition discusses radar in marine navigation, underwater navigational aids, direction finding, the Decca navigator system, and the Omega system. The book also describes the Loran system for position fixing, the navy navigation satellite system, and the global positioning system (GPS). It reviews the principles, operation, presentations, specifications, and uses of radar. It also describes GPS, a real time position-fixing system in three dimensions (longitude, latitude, altitude), plus velocity information with Universal Time Coordinated (UTC). It is accur

  13. Social engineering attacks: an augmentation of the socio-technical systems framework

    CSIR Research Space (South Africa)

    Shozi, A

    2015-03-01

    Full Text Available or organisation’s information. We analyse social engineering attacks as a Socio-technical System because it recognises the interaction between people and technology in a work environment. In the case of social engineering attacks, the social subsystem would...

  14. F-DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber-Physical Systems

    Directory of Open Access Journals (Sweden)

    Jingxuan Wang

    2017-01-01

    Full Text Available Data injection attacks in a cyber-physical system aim at manipulating a number of measurements to alter the estimated real-time system states. Many researchers recently focus on how to detect such attacks. However, most of the detection methods do not work well for the nonlinear systems. In this paper, we present a compressive sampling methodology to identify the attack, which allows determining how many and which measurement signals are launched. The sparsity feature is used. Generally, our methodology can be applied to both linear and nonlinear systems. The experimental testing, which includes realistic load patterns from NYISO with various attack scenarios in the IEEE 14-bus system, confirms that our detector performs remarkably well.

  15. Improving Weather Radar Precipitation Estimates by Combining two Types of Radars

    DEFF Research Database (Denmark)

    Nielsen, Jesper Ellerbæk; Thorndahl, Søren Liedtke; Rasmussen, Michael R.

    2014-01-01

    This paper presents a demonstration of how Local Area Weather Radar (LAWR) X-band measurements can be combined with meteorological C–band measurements into a single radar product. For this purpose, a blending method has been developed which combines the strengths of the two radar systems. Combining...... the two radar types achieves a radar product with both long range and high temporal resolution. It is validated that the blended radar product performs better than the individual radars based on ground observations from laser disdrometers. However, the data combination is challenged by lower performance...... of the LAWR. Although both radars benefits from the data combination, it is also found that advection based temporal interpolation is a more favourable method for increasing the temporal resolution of meteorological C–band measurements....

  16. Development Of Signal Detection For Radar Navigation System

    OpenAIRE

    Theingi Win Hlaing; Hla Myo Tun; Zaw Min Naing; Win Khaing Moe

    2017-01-01

    This paper aims to evaluate the performance of target detection in the presence of sea clutter. Radar detection of a background of unwanted clutter due to echoes from sea clutter or land is a problem of interest in the radar field. Radar detector has been developed by assuming the radar clutter is Gaussian distributed. However as technology emerges the radar distribution is seen to deviates from the Gaussian assumption. Thus detectors designs based on Gaussian assumption are no longer optimum...

  17. A two-tier system for web attack detection using linear discriminant method

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; Nanda, Priyadarsi; He, Xiangjian; Liu, Ren Ping; Jia, Wenjing; Yeh, Wei-chang

    2010-01-01

    Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs). Although these systems are proven to be promising in detecting network attacks, they need to check all the signatures to identify a suspicious attack in the worst case. This is time consuming. This

  18. Social Radar

    Science.gov (United States)

    2012-01-01

    RTA HFM-201/RSM PAPER 3 - 1 © 2012 The MITRE Corporation. All Rights Reserved. Social Radar Barry Costa and John Boiney MITRE Corporation...defenders require an integrated set of capabilities that we refer to as a “ social radar.” Such a system would support strategic- to operational-level...situation awareness, alerting, course of action analysis, and measures of effectiveness for each action undertaken. Success of a social radar

  19. Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro; Hartel, Pieter H.; Kirda, E.; Jha, S.; Balzarotti, D.

    Anomaly-based intrusion detection systems are usually criticized because they lack a classication of attack, thus security teams have to manually inspect any raised alert to classify it. We present a new approach, Panacea, to automatically and systematically classify attacks detected by an

  20. Panacea : Automating attack classification for anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Hartel, P.H.; Kirda, E.; Jha, S.; Balzarotti, D.

    2009-01-01

    Anomaly-based intrusion detection systems are usually criticized because they lack a classification of attacks, thus security teams have to manually inspect any raised alert to classify it. We present a new approach, Panacea, to automatically and systematically classify attacks detected by an

  1. Panacea : Automating attack classification for anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Hartel, P.H.

    2009-01-01

    Anomaly-based intrusion detection systems are usually criticized because they lack a classification of attack, thus security teams have to manually inspect any raised alert to classify it. We present a new approach, Panacea, to automatically and systematically classify attacks detected by an

  2. Panacea: Automating Attack Classification for Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro; Hartel, Pieter H.

    2009-01-01

    Anomaly-based intrusion detection systems are usually criticized because they lack a classication of attack, thus security teams have to manually inspect any raised alert to classify it. We present a new approach, Panacea, to automatically and systematically classify attacks detected by an

  3. Coherent Laser Radar Metrology System for Large Scale Optical Systems, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — A new type of laser radar metrology inspection system is proposed that incorporates a novel, dual laser coherent detection scheme capable of eliminating both...

  4. A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2010-04-01

    Full Text Available Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses' normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs' packet statistics so as to create their normal packet distribution. Once some IPs' current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

  5. Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems

    International Nuclear Information System (INIS)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2017-01-01

    This paper studies an attacker against a cyberphysical system (CPS) whose goal is to move the state of a CPS to a target state while ensuring that his or her probability of being detected does not exceed a given bound. The attacker’s probability of being detected is related to the nonnegative bias induced by his or her attack on the CPS’s detection statistic. We formulate a linear quadratic cost function that captures the attacker’s control goal and establish constraints on the induced bias that reflect the attacker’s detection-avoidance objectives. When the attacker is constrained to be detected at the false-alarm rate of the detector, we show that the optimal attack strategy reduces to a linear feedback of the attacker’s state estimate. In the case that the attacker’s bias is upper bounded by a positive constant, we provide two algorithms – an optimal algorithm and a sub-optimal, less computationally intensive algorithm – to find suitable attack sequences. Lastly, we illustrate our attack strategies in numerical examples based on a remotely-controlled helicopter under attack.

  6. Network connectivity paradigm for the large data produced by weather radar systems

    Science.gov (United States)

    Guenzi, Diego; Bechini, Renzo; Boraso, Rodolfo; Cremonini, Roberto; Fratianni, Simona

    2014-05-01

    The traffic over Internet is constantly increasing; this is due in particular to social networks activities but also to the enormous exchange of data caused especially by the so-called "Internet of Things". With this term we refer to every device that has the capability of exchanging information with other devices on the web. In geoscience (and, in particular, in meteorology and climatology) there is a constantly increasing number of sensors that are used to obtain data from different sources (like weather radars, digital rain gauges, etc.). This information-gathering activity, frequently, must be followed by a complex data analysis phase, especially when we have large data sets that can be very difficult to analyze (very long historical series of large data sets, for example), like the so called big data. These activities are particularly intensive in resource consumption and they lead to new computational models (like cloud computing) and new methods for storing data (like object store, linked open data, NOSQL or NewSQL). The weather radar systems can be seen as one of the sensors mentioned above: it transmit a large amount of raw data over the network (up to 40 megabytes every five minutes), with 24h/24h continuity and in any weather condition. Weather radar are often located in peaks and in wild areas where connectivity is poor. For this reason radar measurements are sometimes processed partially on site and reduced in size to adapt them to the limited bandwidth currently available by data transmission systems. With the aim to preserve the maximum flow of information, an innovative network connectivity paradigm for the large data produced by weather radar system is here presented. The study is focused on the Monte Settepani operational weather radar system, located over a wild peak summit in north-western Italy.

  7. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  8. Radar Observations of Convective Systems from a High-Altitude Aircraft

    Science.gov (United States)

    Heymsfield, G.; Geerts, B.; Tian, L.

    1999-01-01

    Reflectivity data collected by the precipitation radar on board the tropical Rainfall Measuring Mission (TRMM) satellite, orbiting at 350 km altitude, are compared to reflectivity data collected nearly simultaneously by a doppler radar aboard the NASA ER-2 flying at 19-20 km altitude, i.e. above even the deepest convection. The TRMM precipitation radar is a scanning device with a ground swath width of 215 km, and has a resolution of about a4.4 km in the horizontal and 250 m in the vertical (125 m in the core swath 48 km wide). The TRMM radar has a wavelength of 217 cm (13.8 GHz) and the Nadir mirror echo below the surface is used to correct reflectivity for loss by attenuation. The ER-2 Doppler radar (EDOP) has two antennas, one pointing to the nadir, 34 degrees forward. The forward pointing beam receives both the normal and the cross-polarized echos, so the linear polarization ratio field can be monitored. EDOP has a wavelength of 3.12 cm (9.6 GHz), a vertical resolution of 37.5 m and a horizontal along-track resolution of about 100 m. The 2-D along track airflow field can be synthesized from the radial velocities of both beams, if a reflectivity-based hydrometer fall speed relation can be assumed. It is primarily the superb vertical resolution that distinguishes EDOP from other ground-based or airborne radars. Two experiments were conducted during 1998 into validate TRMM reflectivity data over convection and convectively-generated stratiform precipitation regions. The Teflun-A (TEXAS-Florida Underflight) experiment, was conducted in April and May and focused on mesoscale convective systems mainly in southeast Texas. TEFLUN-B was conducted in August-September in central Florida, in coordination with CAMEX-3 (Convection and Moisture Experiment). The latter was focused on hurricanes, especially during landfall, whereas TEFLUN-B concentrated on central; Florida convection, which is largely driven and organized by surface heating and ensuing sea breeze circulations

  9. Development Of Signal Detection For Radar Navigation System

    Directory of Open Access Journals (Sweden)

    Theingi Win Hlaing

    2017-09-01

    Full Text Available This paper aims to evaluate the performance of target detection in the presence of sea clutter. Radar detection of a background of unwanted clutter due to echoes from sea clutter or land is a problem of interest in the radar field. Radar detector has been developed by assuming the radar clutter is Gaussian distributed. However as technology emerges the radar distribution is seen to deviates from the Gaussian assumption. Thus detectors designs based on Gaussian assumption are no longer optimum for detection in non-Gaussian nature. The theory of target detection in Gaussian distributed clutter has been well established and the closed form of the detection performances can be easily obtained. However that is not the case in non-Gaussian clutter distributions. The operation of radar detection is determined by radar detection theory with different types of Swerling target models such as Swerling I II III IV and V. By using MATLAB these signal detection techniques are developed.

  10. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-09-01

    Database applications have become a core component in control systems and their associated record keeping utilities. Traditional security models attempt to secure systems by isolating core software components and concentrating security efforts against threats specific to those computers or software components. Database security within control systems follows these models by using generally independent systems that rely on one another for proper functionality. The high level of reliance between the two systems creates an expanded threat surface. To understand the scope of a threat surface, all segments of the control system, with an emphasis on entry points, must be examined. The communication link between data and decision layers is the primary attack surface for SQL injection. This paper facilitates understanding what SQL injection is and why it is a significant threat to control system environments.

  11. Cyber attacks against state estimation in power systems: Vulnerability analysis and protection strategies

    Science.gov (United States)

    Liu, Xuan

    Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, false data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the damage effects of false data injection attacks by protecting a small set of critical measurements. To further reduce the computation complexity, a mixed integer linear programming approach is also proposed to

  12. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  13. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  14. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-12-01

    Full Text Available Forensic readiness can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business frauds. To establish forensics readiness, it is essential for an organization to identify what evidences are relevant and where they can be found, to determine whether they are logged in a forensic sound way and whether all the needed evidences are available to reconstruct the events successfully.  Our goal of this research is to ensure evidence availability. First, both external and internal attacks are molded as augmented attack trees/graphs based on the system vulnerabilities. Second, modeled attacks are conducted against a honeynet simulating an online business information system, and each honeypot's hard drive is forensic sound imaged for each individual attack. Third, an evidence tree/graph will be built after forensics examination on the disk images for each attack. The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.

  15. High-resolution imaging using a wideband MIMO radar system with two distributed arrays.

    Science.gov (United States)

    Wang, Dang-wei; Ma, Xiao-yan; Chen, A-Lei; Su, Yi

    2010-05-01

    Imaging a fast maneuvering target has been an active research area in past decades. Usually, an array antenna with multiple elements is implemented to avoid the motion compensations involved in the inverse synthetic aperture radar (ISAR) imaging. Nevertheless, there is a price dilemma due to the high level of hardware complexity compared to complex algorithm implemented in the ISAR imaging system with only one antenna. In this paper, a wideband multiple-input multiple-output (MIMO) radar system with two distributed arrays is proposed to reduce the hardware complexity of the system. Furthermore, the system model, the equivalent array production method and the imaging procedure are presented. As compared with the classical real aperture radar (RAR) imaging system, there is a very important contribution in our method that the lower hardware complexity can be involved in the imaging system since many additive virtual array elements can be obtained. Numerical simulations are provided for testing our system and imaging method.

  16. CORESAFE: A Formal Approach against Code Replacement Attacks on Cyber Physical Systems

    Science.gov (United States)

    2018-04-19

    AFRL-AFOSR-JP-TR-2018-0035 CORESAFE:A Formal Approach against Code Replacement Attacks on Cyber Physical Systems Sandeep Shukla INDIAN INSTITUTE OF...Formal Approach against Code Replacement Attacks on Cyber Physical Systems 5a.  CONTRACT NUMBER 5b.  GRANT NUMBER FA2386-16-1-4099 5c.  PROGRAM ELEMENT...SUPPLEMENTARY NOTES 14.  ABSTRACT Industrial Control Systems (ICS) used in manufacturing, power generators and other critical infrastructure monitoring and

  17. Advanced unambiguous state discrimination attack and countermeasure strategy in a practical B92 QKD system

    Science.gov (United States)

    Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Youn, Chun Ju

    2018-01-01

    Even though unconditional security of B92 quantum key distribution (QKD) system is based on the assumption of perfect positive-operator-valued measures, practical B92 systems only utilize two projective measurements. Unfortunately, such implementation may degrade the security of the B92 QKD system due to Eve's potential attack exploiting the imperfection of system. In this paper, we propose an advanced attack strategy with an unambiguous state discrimination (USD) measurement which makes practical B92 QKD systems insecure even under a lossless channel. In addition, we propose an effective countermeasure against the advanced USD attack model by monitoring double-click events. We further address a fundamental approach to make the B92 QKD system tolerable to attack strategies with USD measurements using a multi-qubit scheme.

  18. 46 CFR 184.404 - Radars.

    Science.gov (United States)

    2010-10-01

    ... within one mile of land must be fitted with a FCC Type Accepted general marine radar system for surface... Federal Communications Commission (FCC) type accepted general marine radar system for surface navigation... 46 Shipping 7 2010-10-01 2010-10-01 false Radars. 184.404 Section 184.404 Shipping COAST GUARD...

  19. A Bernoulli Gaussian Watermark for Detecting Integrity Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-11-02

    We examine the merit of Bernoulli packet drops in actively detecting integrity attacks on control systems. The aim is to detect an adversary who delivers fake sensor measurements to a system operator in order to conceal their effect on the plant. Physical watermarks, or noisy additive Gaussian inputs, have been previously used to detect several classes of integrity attacks in control systems. In this paper, we consider the analysis and design of Gaussian physical watermarks in the presence of packet drops at the control input. On one hand, this enables analysis in a more general network setting. On the other hand, we observe that in certain cases, Bernoulli packet drops can improve detection performance relative to a purely Gaussian watermark. This motivates the joint design of a Bernoulli-Gaussian watermark which incorporates both an additive Gaussian input and a Bernoulli drop process. We characterize the effect of such a watermark on system performance as well as attack detectability in two separate design scenarios. Here, we consider a correlation detector for attack recognition. We then propose efficiently solvable optimization problems to intelligently select parameters of the Gaussian input and the Bernoulli drop process while addressing security and performance trade-offs. Finally, we provide numerical results which illustrate that a watermark with packet drops can indeed outperform a Gaussian watermark.

  20. Analysis of Radar and ADS-B Influences on Aircraft Detect and Avoid (DAA Systems

    Directory of Open Access Journals (Sweden)

    William Semke

    2017-09-01

    Full Text Available Detect and Avoid (DAA systems are complex communication and locational technologies comprising multiple independent components. DAA technologies support communications between ground-based and space-based operations with aircraft. Both manned and unmanned aircraft systems (UAS rely on DAA communication and location technologies for safe flight operations. We examined the occurrence and duration of communication losses between radar and automatic dependent surveillance–broadcast (ADS-B systems with aircraft operating in proximate airspace using data collected during actual flight operations. Our objectives were to identify the number and duration of communication losses for both radar and ADS-B systems that occurred within a discrete time period. We also investigated whether other unique communication behavior and anomalies were occurring, such as reported elevation deviations. We found that loss of communication with both radar and ADS-B systems does occur, with variation in the length of communication losses. We also discovered that other unexpected behaviors were occurring with communications. Although our data were gathered from manned aircraft, there are also implications for UAS that are operating within active airspaces. We are unaware of any previously published work on occurrence and duration of communication losses between radar and ADS-B systems.

  1. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2007-10-15

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation

  2. An Attack Model Development Process for the Cyber Security of Safety Related Nuclear Digital I and C Systems

    International Nuclear Information System (INIS)

    Khand, Parvaiz Ahmed; Seong, Poong Hyun

    2007-01-01

    Nuclear power plants (NPPs), the redundant safety related systems are designed to take automatic action to prevent and mitigate accident conditions if the operators and the non-safety systems fail to maintain the plant within normal operating conditions. Presently, there is trend of connecting computer networks of commercial NPPs to corporate local area networks (LANs) to give engineers access to plant data for economic benefits. An increase in plant efficiency of a couple percentage points can translate to millions upon millions of dollars per year. The nuclear industry is also moving in the direction of installing digital controls that would allow for remote operation of plant functions, perhaps within a few years. However, this connectivity may also cause new security problems such as: in 2003, a computer worm named as slammer penetrated a private computer network at Ohio's Davis-Besse nuclear plant and disabled a safety monitoring system called a safety parameter display system (SPDS). Moreover, the present systems were developed with consideration of reliability and safety rather than security. In present scenario, there is a need to model and understand the cyber attacks towards these systems in a systematic way, and to demonstrate that the plant specific procedures and the imposed security controls adequately protect the systems from analyzed cyber security attacks. Attack trees provide a systematic, disciplined and effective way to model and understand cyber attacks towards any type of systems, make it possible to understand risks from deliberate, malicious intrusions from attackers, and make security decisions. Using attack trees the security of large systems can be modeled by considering a security breach as a system failure, and describing it with a set of events that can lead to system failure in a combinatorial way. The attacks towards the system are represented in a tree structure, with an attack that can significantly damage the system operation as a

  3. Trilateration-based localization algorithm for ADS-B radar systems

    Science.gov (United States)

    Huang, Ming-Shih

    Rapidly increasing growth and demand in various unmanned aerial vehicles (UAV) have pushed governmental regulation development and numerous technology research advances toward integrating unmanned and manned aircraft into the same civil airspace. Safety of other airspace users is the primary concern; thus, with the introduction of UAV into the National Airspace System (NAS), a key issue to overcome is the risk of a collision with manned aircraft. The challenge of UAV integration is global. As automatic dependent surveillance-broadcast (ADS-B) system has gained wide acceptance, additional exploitations of the radioed satellite-based information are topics of current interest. One such opportunity includes the augmentation of the communication ADS-B signal with a random bi-phase modulation for concurrent use as a radar signal for detecting other aircraft in the vicinity. This dissertation provides detailed discussion about the ADS-B radar system, as well as the formulation and analysis of a suitable non-cooperative multi-target tracking method for the ADS-B radar system using radar ranging techniques and particle filter algorithms. In order to deal with specific challenges faced by the ADS-B radar system, several estimation algorithms are studied. Trilateration-based localization algorithms are proposed due to their easy implementation and their ability to work with coherent signal sources. The centroid of three most closely spaced intersections of constant-range loci is conventionally used as trilateration estimate without rigorous justification. In this dissertation, we address the quality of trilateration intersections through range scaling factors. A number of well-known triangle centers, including centroid, incenter, Lemoine point (LP), and Fermat point (FP), are discussed in detail. To the author's best knowledge, LP was never associated with trilateration techniques. According our study, LP is proposed as the best trilateration estimator thanks to the

  4. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  5. A Dual Polarization, Active, Microstrip Antenna for an Orbital Imaging Radar System Operating at L-Band

    Science.gov (United States)

    Kelly, Kenneth C.; Huang, John

    2000-01-01

    A highly successful Earth orbiting synthetic antenna aperture radar (SAR) system, known as the SIR-C mission, was carried into orbit in 1994 on a U.S. Shuttle (Space Transportation System) mission. The radar system was mounted in the cargo bay with no need to fold, or in any other way reduce the size of the antennas for launch. Weight and size were not limited for the L-Band, C-Band, and X-Band radar systems of the SIR-C radar imaging mission; the set of antennas weighed 10,500 kg, the L-Band antenna having the major share of the weight. This paper treats designing an L-Band antenna functionally similar to that used for SIR-C, but at a fraction of the cost and at a weight in the order of 250 kg. Further, the antenna must be folded to fit into the small payload shroud of low cost booster rocket systems. Over 31 square meters of antenna area is required. This low weight, foldable, electronic scanning antenna is for the proposed LightSAR radar system which is to be placed in Earth orbit on a small, dedicated space craft at the lowest possible cost for an efficient L- Band radar imaging system. This LightSAR spacecraft radar is to be continuously available for at least five operational years, and have the ability to map or repeat-map any area on earth within a few days of any request. A microstrip patch array, with microstrip transmission lines heavily employed in the aperture and in the corporate feed network, was chosen as the low cost approach for this active dual-polarization, 80 MHz (6.4%) bandwidth antenna design.

  6. Shilling Attack Prevention for Recommender Systems Using Social-based Clustering

    KAUST Repository

    Lee, Tak

    2011-06-06

    A Recommender System (RS) is a system that utilizes user and item information to predict the feeling of users towards unfamiliar items. Recommender Systems have become popular tools for online stores due to their usefulness in confidently recommending items to users. A popular algorithm for recommender system is Collaborative Filtering (CF). CF uses other users\\' profiles to predict whether a user is interested in a particular object. This system, however, is vulnerable to malicious users seeking to promote items by manipulating rating predictions with fake user profiles. Profiles with behaviors similar to "victim" users alter the prediction of a Recommender System. Manipulating rating predictions through injected profiles is referred to as a shilling attack. It is important to develop shilling attack prevention frameworks for to protect the trustworthiness of Recommender Systems. In this thesis, we will demonstrate a new methodology that utilizes social information to prevent malicious users from manipulating the prediction system. The key element in our new methodology rests upon the concept of trust among real users, an element we claim absent among malicious profiles. In order to use trust information for shilling attack prevention, we first develop a weighting system which makes the system rely more on trustworthy users when making predictions. We then use this trust information to cluster out untrustworthy users to improve rating robustness. The robustness of the new and classic systems is then evaluated with data from a public commercial consumer RS, Epinions.com. Several complexity reduction procedures are also introduced to make implementing the algorithms mentioned possible for a huge commercial database.

  7. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  8. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  9. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  10. Radar spectrum opportunities for cognitive communications transmission

    OpenAIRE

    Wang, L; McGeehan, JP; Williams, C; Doufexi, A

    2008-01-01

    In relation to opportunistic access to radar spectrum, the impact of the radar on a communication system is investigated in this paper. This paper illustrates that by exploring the spatial and temporal opportunities in the radar spectrum and therefore improving the tolerance level to radar interference, a substantial increase on the throughput of a communication system is possible. Results are presented regarding the impact of swept radars on a WiMAX system. The results show the impact of SIR...

  11. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  12. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    Science.gov (United States)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  13. Detecting Attacks in CyberManufacturing Systems: Additive Manufacturing Example

    Directory of Open Access Journals (Sweden)

    Wu Mingtao

    2017-01-01

    Full Text Available CyberManufacturing System is a vision for future manufacturing where physical components are fully integrated with computational processes in a connected environment. However, realizing the vision requires that its security be adequately ensured. This paper presents a vision-based system to detect intentional attacks on additive manufacturing processes, utilizing machine learning techniques. Particularly, additive manufacturing systems have unique vulnerabilities to malicious attacks, which can result in defective infills but without affecting the exterior. In order to detect such infill defects, the research uses simulated 3D printing process images as well as actual 3D printing process images to compare accuracies of machine learning algorithms in classifying, clustering and detecting anomalies on different types of infills. Three algorithms - (i random forest, (ii k nearest neighbor, and (iii anomaly detection - have been adopted in the research and shown to be effective in detecting such defects.

  14. Radar Plan Position Indicator Scope

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Radar Plan Position Indicator Scope is the collection of weather radar imagery for the period prior to the beginning of the Next Generation Radar (NEXRAD) system...

  15. Modelling of long-wave chaotic radar system for anti-stealth applications

    Science.gov (United States)

    Al-Suhail, Ghaida A.; Tahir, Fadhil Rahma; Abd, Mariam Hussien; Pham, Viet-Thanh; Fortuna, Luigi

    2018-04-01

    Although the Very Low-Frequency (VLF) waveforms have limited practical applications in acoustics (sonar) and secure military communications with radars and submarines; to this end; this paper presents a new and simple analytical model of VLF monostatic direct chaotic radar system. The model hypothetically depends on the two identical coupled time-delayed feedback chaotic systems which can generate and recover a long-wave chaotic signal. To resist the influence of positive Lyapunov exponents of the time-delay chaotic systems, the complete replacement of Pecaro and Carroll (PC) synchronization is employed. It can faithfully recover the chaotic signal from the back-scattered (echo) signal from the target over a noisy channel. The system performance is characterized in terms of the time series of synchronization in addition to the peak of the cross-correlation. Simulation results are conducted for substantial sensitivities of the chaotic signal to the system parameters and initial conditions. As a result, it is found that an effective and robust chaotic radar (CRADAR) model can be obtained when the signal-to-noise ratio (SNR) highly degrades to 0 dB, but with clear peak in correlation performance for detecting the target. Then, the model can be considered as a state of the art towards counter stealth technology and might be developed for other acoustic secure applications.

  16. Assessment of information impacts in power system security against malicious attacks in a general framework

    International Nuclear Information System (INIS)

    Bompard, E.; Napoli, R.; Xue, F.

    2009-01-01

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios

  17. Assessment of information impacts in power system security against malicious attacks in a general framework

    Energy Technology Data Exchange (ETDEWEB)

    Bompard, E. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)], E-mail: ettore.bompard@polito.it; Napoli, R.; Xue, F. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)

    2009-06-15

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios.

  18. Investigations on the sensitivity of a stepped-frequency radar utilizing a vector network analyzer for Ground Penetrating Radar

    Science.gov (United States)

    Seyfried, Daniel; Schubert, Karsten; Schoebel, Joerg

    2014-12-01

    Employing a continuous-wave radar system, with the stepped-frequency radar being one type of this class, all reflections from the environment are present continuously and simultaneously at the receiver. Utilizing such a radar system for Ground Penetrating Radar purposes, antenna cross-talk and ground bounce reflection form an overall dominant signal contribution while reflections from objects buried in the ground are of quite weak amplitude due to attenuation in the ground. This requires a large dynamic range of the receiver which in turn requires high sensitivity of the radar system. In this paper we analyze the sensitivity of our vector network analyzer utilized as stepped-frequency radar system for GPR pipe detection. We furthermore investigate the performance of increasing the sensitivity of the radar by means of appropriate averaging and low-noise pre-amplification of the received signal. It turns out that the improvement in sensitivity actually achievable may differ significantly from theoretical expectations. In addition, we give a descriptive explanation why our appropriate experiments demonstrate that the sensitivity of the receiver is independent of the distance between the target object and the source of dominant signal contribution. Finally, our investigations presented in this paper lead to a preferred setting of operation for our vector network analyzer in order to achieve best detection capability for weak reflection amplitudes, hence making the radar system applicable for Ground Penetrating Radar purposes.

  19. Radar Precoder Design for Spectral Coexistence with Coordinated Multi-point (CoMP) System

    OpenAIRE

    Mahal, Jasmin A.; Khawar, Awais; Abdelhadi, Ahmed; Clancy, T. Charles

    2015-01-01

    This paper details the design of precoders for a MIMO radar spectrally coexistent with a MIMO cellular network. We focus on a coordinated multi-point (CoMP) system where a cluster of base stations (BSs) coordinate their transmissions to the intended user. The radar operates in two modes, interference-mitigation mode when it avoids interference with the CoMP system and cooperation mode when it exchanges information with it. Using either the conventional Switched Null Space Projection (SNSP) or...

  20. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Recent antenna- and microwave systems designed at CSIR, DPSS for radar systems

    CSIR Research Space (South Africa)

    Botha, Louis

    2016-07-01

    Full Text Available We have decided to develop some common building blocks for use in radar system at the CSIR, DPSS. The reasons for doing this are: a) The cost of ad-hoc- developed RF subsystems (using connectorised components) is getting to be prohibitive as a...

  2. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  3. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  4. Evaluating a Radar-Based, Non Contact Streamflow Measurement System in the San Joaquin River at Vernalis, California

    Science.gov (United States)

    Cheng, Ralph T.; Gartner, Jeffrey W.; Mason, Jr., Robert R.; Costa, John E.; Plant, William J.; Spicer, Kurt R.; Haeni, F. Peter; Melcher, Nick B.; Keller, William C.; Hayes, Ken

    2004-01-01

    Accurate measurement of flow in the San Joaquin River at Vernalis, California, is vital to a wide range of Federal and State agencies, environmental interests, and water contractors. The U.S. Geological Survey uses a conventional stage-discharge rating technique to determine flows at Vernalis. Since the flood of January 1997, the channel has scoured and filled as much as 20 feet in some sections near the measurement site resulting in an unstable stage-discharge rating. In response to recent advances in measurement techniques and the need for more accurate measurement methods, the Geological Survey has undertaken a technology demonstration project to develop and deploy a radar-based streamflow measuring system on the bank of the San Joaquin River at Vernalis, California. The proposed flow-measurement system consists of a ground-penetrating radar system for mapping channel geometries, a microwave radar system for measuring surface velocities, and other necessary infrastructure. Cross-section information derived from ground penetrating radar provided depths similar to those measured by other instruments during the study. Likewise, surface-velocity patterns and magnitudes measured by the pulsed Doppler radar system are consistent with near surface current measurements derived from acoustic velocity instruments. Since the ratio of surface velocity to mean velocity falls to within a small range of theoretical value, using surface velocity as an index velocity to compute river discharge is feasable. Ultimately, the non-contact radar system may be used to make continuous, near-real-time flow measurements during high and medium flows. This report documents the data collected between April 14, 2002 and May 17, 2002 for the purposes of testing this radar based system. Further analyses of the data collected during this field effort will lead to further development and improvement of the system.

  5. Signal processing in noise waveform radar

    CERN Document Server

    Kulpa, Krzysztof

    2013-01-01

    This book is devoted to the emerging technology of noise waveform radar and its signal processing aspects. It is a new kind of radar, which use noise-like waveform to illuminate the target. The book includes an introduction to basic radar theory, starting from classical pulse radar, signal compression, and wave radar. The book then discusses the properties, difficulties and potential of noise radar systems, primarily for low-power and short-range civil applications. The contribution of modern signal processing techniques to making noise radar practical are emphasized, and application examples

  6. Securing recommender systems against shilling attacks using social-based clustering

    KAUST Repository

    Zhang, Xiangliang

    2013-07-01

    Recommender systems (RS) have been found supportive and practical in e-commerce and been established as useful aiding services. Despite their great adoption in the user communities, RS are still vulnerable to unscrupulous producers who try to promote their products by shilling the systems. With the advent of social networks new sources of information have been made available which can potentially render RS more resistant to attacks. In this paper we explore the information provided in the form of social links with clustering for diminishing the impact of attacks. We propose two algorithms, CluTr and WCluTr, to combine clustering with "trust" among users. We demonstrate that CluTr and WCluTr enhance the robustness of RS by experimentally evaluating them on data from a public consumer recommender system Epinions.com. © 2013 Springer Science+Business Media New York & Science Press, China.

  7. 'RADAR': Euratom's standard unattended data acquisition system

    International Nuclear Information System (INIS)

    Schwalbach, P.; Holzleitner, L.; Jung, S.; Chare, P.; Smejkal, A.; Swinhoe, M.; Kloeckner, W.

    2001-01-01

    Full text: The physical verification of nuclear material is an essential part of Euratom's inspection activities. Industrial plants handling large amounts of bulk material typically require large numbers of measurements. Modem plants, particularly plutonium-handling facilities, are normally automated and make it difficult for the inspector to access the material. Adapting to the plant requirements with respect to safety and security as well as economics (throughput), safeguards instrumentation is today often integrated into the plant. In order to optimize scarce inspection resources, the required measurements as well as the data analysis have to be done automatically as far as feasible. For automatic measurements Euratom has developed a new unattended data acquisition system, called RADAR (Remote Acquisition of Data and Review), which has been deployed to more than a dozen installations, handling more than 100 sensors (neutron and gamma radiations detectors, balances, seals, identity readers, switches, etc.). RADAR is the standard choice for new systems but is also replacing older automatic data systems slowly as they become outdated. RADAR and most of the associated analysis tools are the result of an in-house development, with the support of external software contractors where appropriate. Experience with turn-key systems led, in 1997, to the conclusion that in-house development would be a more effective use of resources than to buy third party products. RADAR has several layers, which will be discussed in detail in the presentation. The inner core of the package consists of services running under Windows NT. This core has watchdog and logging functions, contains a scheduler and takes care of replicating files across a network. Message and file exchange is based on TCP/IP. The replicator service contains compression and encryption facilities, the encryption is based on POP. With the help of routers, e.g. from CISCO, network connections to remote locations can be

  8. Implementation of an attack scheme on a practical QKD system

    Science.gov (United States)

    Lamas-Linares, Antia; Liu, Qin; Gerhardt, Ilja; Makarov, Vadim; Kurtsiefer, Christian

    2010-03-01

    We report on an experimental implementation of an attack of a practical quantum key distribution system [1], based on a vulnerability of single photon detectors [2]. An intercept/resend-like attack has been carried out which revealed 100% of the raw key generated between the legitimate communication partners. No increase of the error ratio was observed, which is usually considered a reliable witness for any eavesdropping attempt. We also present an experiment which shows that this attack is not revealed by key distribution protocols probing for eavesdroppers by testing a Bell inequality [3], and discuss implications for practical quantum key distribution.[4pt] [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006); [2] V. Makarov, New J. Phys. 11, 065003 (2009); [3] A. Ling et al., Phys. Rev. A 78, 020301(R), (2008)

  9. Doppler radar physiological sensing

    CERN Document Server

    Lubecke, Victor M; Droitcour, Amy D; Park, Byung-Kwon; Singh, Aditya

    2016-01-01

    Presents a comprehensive description of the theory and practical implementation of Doppler radar-based physiological monitoring. This book includes an overview of current physiological monitoring techniques and explains the fundamental technology used in remote non-contact monitoring methods. Basic radio wave propagation and radar principles are introduced along with the fundamentals of physiological motion and measurement. Specific design and implementation considerations for physiological monitoring radar systems are then discussed in detail. The authors address current research and commercial development of Doppler radar based physiological monitoring for healthcare and other applications.

  10. MACHINE LEARNING IMPLEMENTATION FOR THE CLASSIFICATION OF ATTACKS ON WEB SYSTEMS. PART 1

    Directory of Open Access Journals (Sweden)

    K. Smirnova

    2017-08-01

    Full Text Available The possibility of applying machine learning is considered for the classification of malicious requests to a Web application. This approach excludes the use of deterministic analysis systems (for example, expert systems, and based on the application of a cascade of neural networks or perceptrons on an approximate model to the real human brain. The main idea of the work is to enable to describe complex attack vectors consisting of feature sets, abstract terms for compiling a training sample, controlling the quality of recognition and classifying each of the layers (networks participating in the work, with the ability to adjust not the entire network, But only a small part of it, in the training of which a mistake or inaccuracy crept in.  The design of the developed network can be described as a cascaded, scalable neural network.  The developed system of intrusion detection uses a three-layer neural network. Layers can be built independently of each other by cascades. In the first layer, for each class of attack recognition, there is a corresponding network and correctness is checked on this network. To learn this layer, we have chosen classes of things that can be classified uniquely as yes or no, that is, they are linearly separable. Thus, a layer is obtained not just of neurons, but of their microsets, which can best determine whether is there some data class in the query or not. The following layers are not trained to recognize the attacks themselves, they are trained that a set of attacks creates certain threats. This allows you to more accurately recognize the attacker's attempts to bypass the defense system, as well as classify the target of the attack, and not just its fact. Simple layering allows you to minimize the percentage of false positives.

  11. Radar Based Flow and Water Level Forecasting in Sewer Systems

    DEFF Research Database (Denmark)

    Thorndahl, Søren; Rasmussen, Michael R.; Grum, M.

    2009-01-01

    This paper describes the first radar based forecast of flow and/or water level in sewer systems in Denmark. The rainfall is successfully forecasted with a lead time of 1-2 hours, and flow/levels are forecasted an additional ½-1½ hours using models describing the behaviour of the sewer system. Bot...

  12. Introduction to radar target recognition

    CERN Document Server

    Tait, P

    2006-01-01

    This new text provides an overview of the radar target recognition process and covers the key techniques being developed for operational systems. It is based on the fundamental scientific principles of high resolution radar, and explains how the techniques can be used in real systems, taking into account the characteristics of practical radar system designs and component limitations. It also addresses operational aspects, such as how high resolution modes would fit in with other functions such as detection and tracking. Mathematics is kept to a minimum and the complex techniques and issues are

  13. Radar equations for modern radar

    CERN Document Server

    Barton, David K

    2012-01-01

    Based on the classic Radar Range-Performance Analysis from 1980, this practical volume extends that work to ensure applicability of radar equations to the design and analysis of modern radars. This unique book helps you identify what information on the radar and its environment is needed to predict detection range. Moreover, it provides equations and data to improve the accuracy of range calculations. You find detailed information on propagation effects, methods of range calculation in environments that include clutter, jamming and thermal noise, as well as loss factors that reduce radar perfo

  14. Radar network communication through sensing of frequency hopping

    Science.gov (United States)

    Dowla, Farid; Nekoogar, Faranak

    2013-05-28

    In one embodiment, a radar communication system includes a plurality of radars having a communication range and being capable of operating at a sensing frequency and a reporting frequency, wherein the reporting frequency is different than the sensing frequency, each radar is adapted for operating at the sensing frequency until an event is detected, each radar in the plurality of radars has an identification/location frequency for reporting information different from the sensing frequency, a first radar of the radars which senses the event sends a reporting frequency corresponding to its identification/location frequency when the event is detected, and all other radars in the plurality of radars switch their reporting frequencies to match the reporting frequency of the first radar upon detecting the reporting frequency switch of a radar within the communication range. In another embodiment, a method is presented for communicating information in a radar system.

  15. Assessment of human respiration patterns via noncontact sensing using Doppler multi-radar system.

    Science.gov (United States)

    Gu, Changzhan; Li, Changzhi

    2015-03-16

    Human respiratory patterns at chest and abdomen are associated with both physical and emotional states. Accurate measurement of the respiratory patterns provides an approach to assess and analyze the physical and emotional states of the subject persons. Not many research efforts have been made to wirelessly assess different respiration patterns, largely due to the inaccuracy of the conventional continuous-wave radar sensor to track the original signal pattern of slow respiratory movements. This paper presents the accurate assessment of different respiratory patterns based on noncontact Doppler radar sensing. This paper evaluates the feasibility of accurately monitoring different human respiration patterns via noncontact radar sensing. A 2.4 GHz DC coupled multi-radar system was used for accurate measurement of the complete respiration patterns without any signal distortion. Experiments were carried out in the lab environment to measure the different respiration patterns when the subject person performed natural breathing, chest breathing and diaphragmatic breathing. The experimental results showed that accurate assessment of different respiration patterns is feasible using the proposed noncontact radar sensing technique.

  16. Principles of modern radar radar applications

    CERN Document Server

    Scheer, James A

    2013-01-01

    Principles of Modern Radar: Radar Applications is the third of the three-volume seriesof what was originally designed to be accomplished in one volume. As the final volumeof the set, it finishes the original vision of a complete yet bounded reference for radartechnology. This volume describes fifteen different system applications or class ofapplications in more detail than can be found in Volumes I or II.As different as the applications described, there is a difference in how these topicsare treated by the authors. Whereas in Volumes I and II there is strict adherence tochapter format and leve

  17. Evaluation of a radar-based proximity warning system for off-highway dump trucks.

    Science.gov (United States)

    Ruff, Todd

    2006-01-01

    A radar-based proximity warning system was evaluated by researchers at the Spokane Research Laboratory of the National Institute for Occupational Safety and Health to determine if the system would be effective in detecting objects in the blind spots of an off-highway dump truck. An average of five fatalities occur each year in surface mines as a result of an equipment operator not being aware of a smaller vehicle, person or change in terrain near the equipment. Sensor technology that can detect such obstacles and that also is designed for surface mining applications is rare. Researchers worked closely with the radar system manufacturer to test and modify the system on large, off-highway dump trucks at a surface mine over a period of 2 years. The final system was thoroughly evaluated by recording video images from a camera on the rear of the truck and by recording all alarms from the rear-mounted radar. Data show that the system reliably detected small vehicles, berms, people and other equipment. However, alarms from objects that posed no immediate danger were common, supporting the assertion that sensor-based systems for proximity warning should be used in combination with other devices, such as cameras, that would allow the operator to check the source of any alarm.

  18. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  19. The Reliability and Effectiveness of a Radar-Based Animal Detection System

    Science.gov (United States)

    2017-09-22

    This document contains data on the reliability and effectiveness of an animal detection system along U.S. Hwy 95 near Bonners Ferry, Idaho. The system uses a Doppler radar to detect large mammals (e.g., deer and elk) when they approach the highway. T...

  20. The Reliability and Effectiveness of a Radar-Based Animal Detection System

    Science.gov (United States)

    2017-09-01

    This document contains data on the reliability and effectiveness of an animal detection system along U.S. Hwy 95 near Bonners Ferry, Idaho. The system uses a Doppler radar to detect large mammals (e.g., deer and elk) when they approach the highway. T...

  1. Content modification attacks on consensus seeking multi-agent system with double-integrator dynamics

    Science.gov (United States)

    Dong, Yimeng; Gupta, Nirupam; Chopra, Nikhil

    2016-11-01

    In this paper, vulnerability of a distributed consensus seeking multi-agent system (MAS) with double-integrator dynamics against edge-bound content modification cyber attacks is studied. In particular, we define a specific edge-bound content modification cyber attack called malignant content modification attack (MCoMA), which results in unbounded growth of an appropriately defined group disagreement vector. Properties of MCoMA are utilized to design detection and mitigation algorithms so as to impart resilience in the considered MAS against MCoMA. Additionally, the proposed detection mechanism is extended to detect the general edge-bound content modification attacks (not just MCoMA). Finally, the efficacies of the proposed results are illustrated through numerical simulations.

  2. Sensor management in RADAR/IRST track fusion

    Science.gov (United States)

    Hu, Shi-qiang; Jing, Zhong-liang

    2004-07-01

    In this paper, a novel radar management strategy technique suitable for RADAR/IRST track fusion, which is based on Fisher Information Matrix (FIM) and fuzzy stochastic decision approach, is put forward. Firstly, optimal radar measurements' scheduling is obtained by the method of maximizing determinant of the Fisher information matrix of radar and IRST measurements, which is managed by the expert system. Then, suggested a "pseudo sensor" to predict the possible target position using the polynomial method based on the radar and IRST measurements, using "pseudo sensor" model to estimate the target position even if the radar is turned off. At last, based on the tracking performance and the state of target maneuver, fuzzy stochastic decision is used to adjust the optimal radar scheduling and retrieve the module parameter of "pseudo sensor". The experiment result indicates that the algorithm can not only limit Radar activity effectively but also keep the tracking accuracy of active/passive system well. And this algorithm eliminates the drawback of traditional Radar management methods that the Radar activity is fixed and not easy to control and protect.

  3. A New Mechanism to Improve the Detection Rate of Shilling Attacks in the Recommender Systems

    Directory of Open Access Journals (Sweden)

    javad nehriri

    2017-12-01

    Full Text Available Recommender systems are widely used, in social networks and online stores, to overcome the problems caused by the large amount of information. Most of these systems use a collaborative filtering method to generate recommendations to the users. But, as in this method users’ feedback is considered for recommendations, it can be significantly erroneous by the malicious people. In other words, there may be some users who open fake profiles and vote one-sided or biased in the system that may cause disturbance in providing proper recommendations to other users. This kind of damage is said to be shiling attacks. If the attackers succeed, the user's trust in the recommender systems will reduce. In recent years, efficient attack detection algorithms have been proposed, but each has its own limitations. In this paper, we use profile-based and item-based algorithms to provide a new mechanism to significantly reduce the detection error for shilling attacks.

  4. Small battery operated unattended radar sensor for security systems

    Science.gov (United States)

    Plummer, Thomas J.; Brady, Stephen; Raines, Robert

    2013-06-01

    McQ has developed, tested, and is supplying to Unattended Ground Sensor (UGS) customers a new radar sensor. This radar sensor is designed for short range target detection and classification. The design emphasis was to have low power consumption, totally automated operation, a very high probability of detection coupled with a very low false alarm rate, be able to locate and track targets, and have a price compatible with the UGS market. The radar sensor complements traditional UGS sensors by providing solutions for scenarios that are difficult for UGS. The design of this radar sensor and the testing are presented in this paper.

  5. UAV-Borne Profiling Radar for Forest Research

    Directory of Open Access Journals (Sweden)

    Yuwei Chen

    2017-01-01

    Full Text Available Microwave Radar is an attractive solution for forest mapping and inventories because microwave signals penetrates into the forest canopy and the backscattering signal can provide information regarding the whole forest structure. Satellite-borne and airborne imaging radars have been used in forest resources mapping for many decades. However, their accuracy with respect to the main forest inventory attributes substantially varies depending on the wavelength and techniques used in the estimation. Systems providing canopy backscatter as a function of canopy height are, practically speaking, missing. Therefore, there is a need for a radar system that would enable the scientific community to better understand the radar backscatter response from the forest canopy. Consequently, we undertook a research study to develop an unmanned aerial vehicle (UAV-borne profiling (i.e., waveform radar that could be used to improve the understanding of the radar backscatter response for forestry mapping and inventories. A frequency modulation continuous waveform (FMCW profiling radar, termed FGI-Tomoradar, was introduced, designed and tested. One goal is the total weight of the whole system is less than 7 kg, including the radar system and georeferencing system, with centimetre-level positioning accuracy. Achieving this weight goal would enable the FGI-Tomoradar system to be installed on the Mini-UAV platform. The prototype system had all four linear polarization measuring capabilities, with bistatic configuration in Ku-band. In system performance tests in this study, FGI-Tomoradar was mounted on a manned helicopter together with a Riegl VQ-480-U laser scanner and tested in several flight campaigns performed at the Evo site, Finland. Airborne laser scanning data was simultaneously collected to investigate the differences and similarities of the outputs for the same target area for better understanding the penetration of the microwave signal into the forest canopy

  6. Performance indicators modern surveillance radar

    NARCIS (Netherlands)

    Nooij, P.N.C.; Theil, A.

    2014-01-01

    Blake chart computations are widely employed to rank detection coverage capabilities of competitive search radar systems. Developed for comparable 2D radar systems with a mechanically rotating reflector antenna, it was not necessary to regard update rate and plot quality in Blake's chart. To

  7. Identification of Successive ``Unobservable'' Cyber Data Attacks in Power Systems Through Matrix Decomposition

    Science.gov (United States)

    Gao, Pengzhi; Wang, Meng; Chow, Joe H.; Ghiocel, Scott G.; Fardanesh, Bruce; Stefopoulos, George; Razanousky, Michael P.

    2016-11-01

    This paper presents a new framework of identifying a series of cyber data attacks on power system synchrophasor measurements. We focus on detecting "unobservable" cyber data attacks that cannot be detected by any existing method that purely relies on measurements received at one time instant. Leveraging the approximate low-rank property of phasor measurement unit (PMU) data, we formulate the identification problem of successive unobservable cyber attacks as a matrix decomposition problem of a low-rank matrix plus a transformed column-sparse matrix. We propose a convex-optimization-based method and provide its theoretical guarantee in the data identification. Numerical experiments on actual PMU data from the Central New York power system and synthetic data are conducted to verify the effectiveness of the proposed method.

  8. System aspects of the Indian MST radar facility

    Science.gov (United States)

    Viswanathan, G.

    1986-01-01

    One of the major objectives of the Indian Middle Atmosphere Program is to investigate the motions of the middle atmosphere on temporal and spatial scales and the interaction between the three height regions of the middle atmosphere. Realizing the fact that radar technique has proven to be a very powerful tool for the study of Earth atmosphere, the Indian Middle Atmosphere Program has recommended establishing a mesosphere-stratosphere-troposphere (MST) radar as a national facility for atmospheric research. The major landmarks in this attempt to setup the MST radar as a national facility are described.

  9. Classification of radar echoes using fractal geometry

    International Nuclear Information System (INIS)

    Azzaz, Nafissa; Haddad, Boualem

    2017-01-01

    Highlights: • Implementation of two concepts of fractal geometry to classify two types of meteorological radar echoes. • A new approach, called a multi-scale fractal dimension is used for classification between fixed echoes and rain echoes. • An Automatic identification system of meteorological radar echoes was proposed using fractal geometry. - Abstract: This paper deals with the discrimination between the precipitation echoes and the ground echoes in meteorological radar images using fractal geometry. This study aims to improve the measurement of precipitations by weather radars. For this, we considered three radar sites: Bordeaux (France), Dakar (Senegal) and Me lbourne (USA). We showed that the fractal dimension based on contourlet and the fractal lacunarity are pertinent to discriminate between ground and precipitation echoes. We also demonstrated that the ground echoes have a multifractal structure but the precipitations are more homogeneous than ground echoes whatever the prevailing climate. Thereby, we developed an automatic classification system of radar using a graphic interface. This interface, based on the fractal geometry makes possible the identification of radar echoes type in real time. This system can be inserted in weather radar for the improvement of precipitation estimations.

  10. Optimal Power Allocation Strategy in a Joint Bistatic Radar and Communication System Based on Low Probability of Intercept.

    Science.gov (United States)

    Shi, Chenguang; Wang, Fei; Salous, Sana; Zhou, Jianjiang

    2017-11-25

    In this paper, we investigate a low probability of intercept (LPI)-based optimal power allocation strategy for a joint bistatic radar and communication system, which is composed of a dedicated transmitter, a radar receiver, and a communication receiver. The joint system is capable of fulfilling the requirements of both radar and communications simultaneously. First, assuming that the signal-to-noise ratio (SNR) corresponding to the target surveillance path is much weaker than that corresponding to the line of sight path at radar receiver, the analytically closed-form expression for the probability of false alarm is calculated, whereas the closed-form expression for the probability of detection is not analytically tractable and is approximated due to the fact that the received signals are not zero-mean Gaussian under target presence hypothesis. Then, an LPI-based optimal power allocation strategy is presented to minimize the total transmission power for information signal and radar waveform, which is constrained by a specified information rate for the communication receiver and the desired probabilities of detection and false alarm for the radar receiver. The well-known bisection search method is employed to solve the resulting constrained optimization problem. Finally, numerical simulations are provided to reveal the effects of several system parameters on the power allocation results. It is also demonstrated that the LPI performance of the joint bistatic radar and communication system can be markedly improved by utilizing the proposed scheme.

  11. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  12. Modern devices of optimum filtration for the active radar system

    OpenAIRE

    V. E. Bychkov; O. D. Mrachkovskiy; V. I. Pravda

    2006-01-01

    The principle of construction the matched filter and correlator, for the active radar system operating with a broadband noise signal is esteemed. The example of construction a сhan-nel of processing on the basis of microcircuits of a programmed logic (PLD) is shown

  13. Auroral ion acoustic wave enhancement observed with a radar interferometer system

    Directory of Open Access Journals (Sweden)

    N. M. Schlatter

    2015-07-01

    Full Text Available Measurements of naturally enhanced ion acoustic line (NEIAL echoes obtained with a five-antenna interferometric imaging radar system are presented. The observations were conducted with the European Incoherent SCATter (EISCAT radar on Svalbard and the EISCAT Aperture Synthesis Imaging receivers (EASI installed at the radar site. Four baselines of the interferometer are used in the analysis. Based on the coherence estimates derived from the measurements, we show that the enhanced backscattering region is of limited extent in the plane perpendicular to the geomagnetic field. Previously it has been argued that the enhanced backscatter region is limited in size; however, here the first unambiguous observations are presented. The size of the enhanced backscatter region is determined to be less than 900 × 500 m, and at times less than 160 m in the direction of the longest antenna separation, assuming the scattering region to have a Gaussian scattering cross section in the plane perpendicular to the geomagnetic field. Using aperture synthesis imaging methods volumetric images of the NEIAL echo are obtained showing the enhanced backscattering region to be aligned with the geomagnetic field. Although optical auroral emissions are observed outside the radar look direction, our observations are consistent with the NEIAL echo occurring on field lines with particle precipitation.

  14. Reconstruction of the sea surface elevation from the analysis of the data collected by a wave radar system

    Science.gov (United States)

    Ludeno, Giovanni; Soldovieri, Francesco; Serafino, Francesco; Lugni, Claudio; Fucile, Fabio; Bulian, Gabriele

    2016-04-01

    X-band radar system is able to provide information about direction and intensity of the sea surface currents and dominant waves in a range of few kilometers from the observation point (up to 3 nautical miles). This capability, together with their flexibility and low cost, makes these devices useful tools for the sea monitoring either coastal or off-shore area. The data collected from wave radar system can be analyzed by using the inversion strategy presented in [1,2] to obtain the estimation of the following sea parameters: peak wave direction; peak period; peak wavelength; significant wave height; sea surface current and bathymetry. The estimation of the significant wave height represents a limitation of the wave radar system because of the radar backscatter is not directly related to the sea surface elevation. In fact, in the last period, substantial research has been carried out to estimate significant wave height from radar images either with or without calibration using in-situ measurements. In this work, we will present two alternative approaches for the reconstruction of the sea surface elevation from wave radar images. In particular, the first approach is based on the basis of an approximated version of the modulation transfer function (MTF) tuned from a series of numerical simulation, following the line of[3]. The second approach is based on the inversion of radar images using a direct regularised least square technique. Assuming a linearised model for the tilt modulation, the sea elevation has been reconstructed as a least square fitting of the radar imaging data[4]. References [1]F. Serafino, C. Lugni, and F. Soldovieri, "A novel strategy for the surface current determination from marine X-band radar data," IEEE Geosci.Remote Sens. Lett., vol. 7, no. 2, pp. 231-235, Apr. 2010. [2]Ludeno, G., Brandini, C., Lugni, C., Arturi, D., Natale, A., Soldovieri, F., Serafino, F. (2014). Remocean System for the Detection of the Reflected Waves from the Costa

  15. Through-the-Wall Localization of a Moving Target by Two Independent Ultra Wideband (UWB Radar Systems

    Directory of Open Access Journals (Sweden)

    Jana Rovňáková

    2013-09-01

    Full Text Available In the case of through-the-wall localization of moving targets by ultra wideband (UWB radars, there are applications in which handheld sensors equipped only with one transmitting and two receiving antennas are applied. Sometimes, the radar using such a small antenna array is not able to localize the target with the required accuracy. With a view to improve through-the-wall target localization, cooperative positioning based on a fusion of data retrieved from two independent radar systems can be used. In this paper, the novel method of the cooperative localization referred to as joining intersections of the ellipses is introduced. This method is based on a geometrical interpretation of target localization where the target position is estimated using a properly created cluster of the ellipse intersections representing potential positions of the target. The performance of the proposed method is compared with the direct calculation method and two alternative methods of cooperative localization using data obtained by measurements with the M-sequence UWB radars. The direct calculation method is applied for the target localization by particular radar systems. As alternative methods of cooperative localization, the arithmetic average of the target coordinates estimated by two single independent UWB radars and the Taylor series method is considered.

  16. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  17. German Radar Observation Shuttle Experiment (ROSE)

    Science.gov (United States)

    Sleber, A. J.; Hartl, P.; Haydn, R.; Hildebrandt, G.; Konecny, G.; Muehlfeld, R.

    1984-01-01

    The success of radar sensors in several different application areas of interest depends on the knowledge of the backscatter of radar waves from the targets of interest, the variance of these interaction mechanisms with respect to changing measurement parameters, and the determination of the influence of he measuring systems on the results. The incidence-angle dependency of the radar cross section of different natural targets is derived. Problems involved by the combination of data gained with different sensors, e.g., MSS-, TM-, SPOTand SAR-images are analyzed. Radar cross-section values gained with ground-based radar spectrometers and spaceborne radar imaging, and non-imaging scatterometers and spaceborne radar images from the same areal target are correlated. The penetration of L-band radar waves into vegetated and nonvegetated surfaces is analyzed.

  18. Radar Based Flow and Water Level Forecasting in Sewer Systems:a danisk case study

    OpenAIRE

    Thorndahl, Søren; Rasmussen, Michael R.; Grum, M.; Neve, S. L.

    2009-01-01

    This paper describes the first radar based forecast of flow and/or water level in sewer systems in Denmark. The rainfall is successfully forecasted with a lead time of 1-2 hours, and flow/levels are forecasted an additional ½-1½ hours using models describing the behaviour of the sewer system. Both radar data and flow/water level model are continuously updated using online rain gauges and online in-sewer measurements, in order to make the best possible predictions. The project show very promis...

  19. MST radar data-base management

    Science.gov (United States)

    Wickwar, V. B.

    1983-01-01

    Data management for Mesospheric-Stratospheric-Tropospheric, (MST) radars is addressed. An incoherent-scatter radar data base is discussed in terms of purpose, centralization, scope, and nature of the data base management system.

  20. FMCW radar system for detection and classification of small vessels in high sea state conditions

    NARCIS (Netherlands)

    Wasselin, J.-P.; Mazuel, S.; Itcia, E.; Huizing, A.G.; Theil, A.

    2012-01-01

    The ROCKWELL COLLINS France radar department is currently developing a FMCW radar system for the detection and the classification of small maritime targets in the frame of the SISMARIS, SARGOS & I2C projects. Several test campaigns have been conducted since 2009 to develop a sensor as well as an

  1. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources

    International Nuclear Information System (INIS)

    Li, Hong-Wei; Wang, Shuang; Huang, Jing-Zheng; Chen, Wei; Yin, Zhen-Qiang; Li, Fang-Yi; Zhou, Zheng; Liu, Dong; Zhang, Yang; Guo, Guang-Can; Han, Zheng-Fu; Bao, Wan-Su

    2011-01-01

    It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost of only increasing the quantum bit error rate from 1.3 to 1.4%.

  2. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks.

    Science.gov (United States)

    Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li; Bo Chen; Ho, Daniel W C; Guoqiang Hu; Li Yu; Chen, Bo; Ho, Daniel W C; Hu, Guoqiang; Yu, Li

    2018-06-01

    State estimation plays an essential role in the monitoring and supervision of cyber-physical systems (CPSs), and its importance has made the security and estimation performance a major concern. In this case, multisensor information fusion estimation (MIFE) provides an attractive alternative to study secure estimation problems because MIFE can potentially improve estimation accuracy and enhance reliability and robustness against attacks. From the perspective of the defender, the secure distributed Kalman fusion estimation problem is investigated in this paper for a class of CPSs under replay attacks, where each local estimate obtained by the sink node is transmitted to a remote fusion center through bandwidth constrained communication channels. A new mathematical model with compensation strategy is proposed to characterize the replay attacks and bandwidth constrains, and then a recursive distributed Kalman fusion estimator (DKFE) is designed in the linear minimum variance sense. According to different communication frameworks, two classes of data compression and compensation algorithms are developed such that the DKFEs can achieve the desired performance. Several attack-dependent and bandwidth-dependent conditions are derived such that the DKFEs are secure under replay attacks. An illustrative example is given to demonstrate the effectiveness of the proposed methods.

  3. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  4. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Science.gov (United States)

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  5. ICUD-0471 Weather radar rainfall for design of urban storm water systems

    DEFF Research Database (Denmark)

    Thorndahl, Søren Liedtke; Wright, D. B.; Nielsen, Jesper Ellerbæk

    2017-01-01

    Long continuous series of high-resolution radar rainfall series provides valuable information on spatial and temporal variability of rainfall, which can be used in design of urban drainage systems. In design of especially large drainage systems with complex flow patterns (and potentially surface ...

  6. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  7. HF radar and drifter observing system in the Adriatic for fishery management and security

    DEFF Research Database (Denmark)

    Corgnati, Lorenzo; Carlson, Daniel Frazier; Mantovani, Carlo

    2014-01-01

    A HF radar system has been operating since May 2013 in the Southern Adriatic between the Gargano Cape and the Manfredonia Gulf. The system, that has been tested and complemented with drifter launchings during three experiments, produces maps of surface ocean velocities at 2 km resolution every hour....... These data support fishery management as well as search and rescue and pollution mitigation operations. The Manfredonia Gulf is a known nursery area for small pelagic fish (anchovies and sardines), and its dynamics and connectivity properties are very relevant to the study of population dynamics. HF radar...

  8. Pedestrian recognition using automotive radar sensors

    Science.gov (United States)

    Bartsch, A.; Fitzek, F.; Rasshofer, R. H.

    2012-09-01

    The application of modern series production automotive radar sensors to pedestrian recognition is an important topic in research on future driver assistance systems. The aim of this paper is to understand the potential and limits of such sensors in pedestrian recognition. This knowledge could be used to develop next generation radar sensors with improved pedestrian recognition capabilities. A new raw radar data signal processing algorithm is proposed that allows deep insights into the object classification process. The impact of raw radar data properties can be directly observed in every layer of the classification system by avoiding machine learning and tracking. This gives information on the limiting factors of raw radar data in terms of classification decision making. To accomplish the very challenging distinction between pedestrians and static objects, five significant and stable object features from the spatial distribution and Doppler information are found. Experimental results with data from a 77 GHz automotive radar sensor show that over 95% of pedestrians can be classified correctly under optimal conditions, which is compareable to modern machine learning systems. The impact of the pedestrian's direction of movement, occlusion, antenna beam elevation angle, linear vehicle movement, and other factors are investigated and discussed. The results show that under real life conditions, radar only based pedestrian recognition is limited due to insufficient Doppler frequency and spatial resolution as well as antenna side lobe effects.

  9. First Measurements of Polar Mesospheric Summer Echoes by a Tri-static Radar System

    Science.gov (United States)

    La Hoz, C.

    2015-12-01

    Polar Mesospheric Summer Echoes (PMSE) have been observed for the first time by a tri-static radar system comprising the EISCAT VHF (224 MHz, 0.67 m Bragg wavelength) active radar in Tromso (Norway) and passive receiving stations in Kiruna, (Sweden) and Sodankyla (Finland). The antennas at the receiving stations, originally part of the EISCAT tri-static UHF radar system at 930 MHz, have been refitted with new feeder systems at the VHF frequency of the transmitter in Tromso. The refitted radar system opens new opportunities to study PMSE for its own sake and as a tracer of the dynamics of the polar mesosphere, a region that is difficult to investigate by other means. The measurements show that very frequently both remote receiving antennas detect coherent signals that are much greater than the regular incoherent scattering due to thermal electrons and coinciding in time and space with PMSE measured by the transmitter station in Tromso. This represents further evidence that PMSE is not aspect sensitive, as was already indicated by a less sensitive radar system in a bi-static configuration, and implying that the underlying atmospheric turbulence, at least at sub-meter scales, is isotropic in agreement with Kolmogorov's hypothesis. Measurements also show that the vertical rate of fall of persistent features of PMSE is the same as the vertical line of sight velocity inferred from the doppler shift of the PMSE signals. This equivalence forms the basis for using PMSE as a tracer of the dynamics of the background mesosphere. Thus, it is possible to measure the 3-dimensional velocity field in the PMSE layer over the intersection volume of the three antennas. Since the signals have large signal-to-noise ratios (up to 30 dB), the inferred velocities have high accuracies and good time resolutions. This affords the possibility to make estimates of momentum flux in the mesosphere deposited by overturning gravity waves. Gravity wave momentum flux is believed to be the engine of a

  10. Securing recommender systems against shilling attacks using social-based clustering

    KAUST Repository

    Zhang, Xiangliang; Lee, Tak Man Desmond; Pitsilis, Georgios

    2013-01-01

    to promote their products by shilling the systems. With the advent of social networks new sources of information have been made available which can potentially render RS more resistant to attacks. In this paper we explore the information provided in the form

  11. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  13. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  14. Security Attacks and Solutions in Electronic Health (E-health) Systems.

    Science.gov (United States)

    Zeadally, Sherali; Isaac, Jesús Téllez; Baig, Zubair

    2016-12-01

    For centuries, healthcare has been a basic service provided by many governments to their citizens. Over the past few decades, we have witnessed a significant transformation in the quality of healthcare services provided by healthcare organizations and professionals. Recent advances have led to the emergence of Electronic Health (E-health), largely made possible by the massive deployment and adoption of information and communication technologies (ICTs). However, cybercriminals and attackers are exploiting vulnerabilities associated primarily with ICTs, causing data breaches of patients' confidential digital health information records. Here, we review recent security attacks reported for E-healthcare and discuss the solutions proposed to mitigate them. We also identify security challenges that must be addressed by E-health system designers and implementers in the future, to respond to threats that could arise as E-health systems become integrated with technologies such as cloud computing, the Internet of Things, and smart cities.

  15. Pocket radar guide key facts, equations, and data

    CERN Document Server

    Curry, G Richard

    2010-01-01

    ThePocket Radar Guideis a concise collection of key radar facts and important radar data that provides you with necessary radar information when you are away from your office or references. It includes statements and comments on radar design, operation, and performance; equations describing the characteristics and performance of radar systems and their components; and tables with data on radar characteristics and key performance issues.It is intended to supplement other radar information sources by providing a pocket companion to refresh memory and provide details whenever you need them such a

  16. Synthetic aperture radar capabilities in development

    Energy Technology Data Exchange (ETDEWEB)

    Miller, M. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    The Imaging and Detection Program (IDP) within the Laser Program is currently developing an X-band Synthetic Aperture Radar (SAR) to support the Joint US/UK Radar Ocean Imaging Program. The radar system will be mounted in the program`s Airborne Experimental Test-Bed (AETB), where the initial mission is to image ocean surfaces and better understand the physics of low grazing angle backscatter. The Synthetic Aperture Radar presentation will discuss its overall functionality and a brief discussion on the AETB`s capabilities. Vital subsystems including radar, computer, navigation, antenna stabilization, and SAR focusing algorithms will be examined in more detail.

  17. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.

    2013-01-01

    Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill-Whitham- Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. We use this fact to pose the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offline. A numerical implementation is performed on a cyber-attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © 2013 IEEE.

  18. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.

    2013-09-01

    Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill- Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data generated by multiple sensors of different types, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for a specific decision variable. We use this fact to pose the problem of detecting spoofing cyber attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offliine. A numerical implementation is performed on a cyber attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © American Institute of Mathematical Sciences.

  19. Embedded DSP-based telehealth radar system for remote in-door fall detection.

    Science.gov (United States)

    Garripoli, Carmine; Mercuri, Marco; Karsmakers, Peter; Jack Soh, Ping; Crupi, Giovanni; Vandenbosch, Guy A E; Pace, Calogero; Leroux, Paul; Schreurs, Dominique

    2015-01-01

    Telehealth systems and applications are extensively investigated nowadays to enhance the quality-of-care and, in particular, to detect emergency situations and to monitor the well-being of elderly people, allowing them to stay at home independently as long as possible. In this paper, an embedded telehealth system for continuous, automatic, and remote monitoring of real-time fall emergencies is presented and discussed. The system, consisting of a radar sensor and base station, represents a cost-effective and efficient healthcare solution. The implementation of the fall detection data processing technique, based on the least-square support vector machines, through a digital signal processor and the management of the communication between radar sensor and base station are detailed. Experimental tests, for a total of 65 mimicked fall incidents, recorded with 16 human subjects (14 men and two women) that have been monitored for 320 min, have been used to validate the proposed system under real circumstances. The subjects' weight is between 55 and 90 kg with heights between 1.65 and 1.82 m, while their age is between 25 and 39 years. The experimental results have shown a sensitivity to detect the fall events in real time of 100% without reporting false positives. The tests have been performed in an area where the radar's operation was not limited by practical situations, namely, signal power, coverage of the antennas, and presence of obstacles between the subject and the antennas.

  20. Phased-array radars

    Science.gov (United States)

    Brookner, E.

    1985-02-01

    The operating principles, technology, and applications of phased-array radars are reviewed and illustrated with diagrams and photographs. Consideration is given to the antenna elements, circuitry for time delays, phase shifters, pulse coding and compression, and hybrid radars combining phased arrays with lenses to alter the beam characteristics. The capabilities and typical hardware of phased arrays are shown using the US military systems COBRA DANE and PAVE PAWS as examples.

  1. Planning a radar system for protection from the airborne threat

    International Nuclear Information System (INIS)

    Greneker, E.F.; McGee, M.C.

    1986-01-01

    A planning methodology for developing a radar system to protect nuclear materials facilities from the airborne threat is presented. Planning for physical security to counter the airborne threat is becoming even more important because hostile acts by terrorists are increasing and airborne platforms that can be used to bypass physical barriers are readily available. The comprehensive system planning process includes threat and facility surveys, defense hardening, analysis of detection and early warning requirements, optimization of sensor mix and placement, and system implementation considerations

  2. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  3. Bistatic radar

    CERN Document Server

    Willis, Nick

    2004-01-01

    Annotation his book is a major extension of a chapter on bistatic radar written by the author for the Radar Handbook, 2nd edition, edited by Merrill Skolnik. It provides a history of bistatic systems that points out to potential designers the applications that have worked and the dead-ends not worth pursuing. The text reviews the basic concepts and definitions, and explains the mathematical development of relationships, such as geometry, Ovals of Cassini, dynamic range, isorange and isodoppler contours, target doppler, and clutter doppler spread.Key Features * All development and analysis are

  4. Improving quantitative precipitation nowcasting with a local ensemble transform Kalman filter radar data assimilation system: observing system simulation experiments

    Directory of Open Access Journals (Sweden)

    Chih-Chien Tsai

    2014-03-01

    Full Text Available This study develops a Doppler radar data assimilation system, which couples the local ensemble transform Kalman filter with the Weather Research and Forecasting model. The benefits of this system to quantitative precipitation nowcasting (QPN are evaluated with observing system simulation experiments on Typhoon Morakot (2009, which brought record-breaking rainfall and extensive damage to central and southern Taiwan. The results indicate that the assimilation of radial velocity and reflectivity observations improves the three-dimensional winds and rain-mixing ratio most significantly because of the direct relations in the observation operator. The patterns of spiral rainbands become more consistent between different ensemble members after radar data assimilation. The rainfall intensity and distribution during the 6-hour deterministic nowcast are also improved, especially for the first 3 hours. The nowcasts with and without radar data assimilation have similar evolution trends driven by synoptic-scale conditions. Furthermore, we carry out a series of sensitivity experiments to develop proper assimilation strategies, in which a mixed localisation method is proposed for the first time and found to give further QPN improvement in this typhoon case.

  5. Radar reflection off extensive air showers

    CERN Document Server

    Stasielak, J; Bertaina, M; Blümer, J; Chiavassa, A; Engel, R; Haungs, A; Huege, T; Kampert, K -H; Klages, H; Kleifges, M; Krömer, O; Ludwig, M; Mathys, S; Neunteufel, P; Pekala, J; Rautenberg, J; Riegel, M; Roth, M; Salamida, F; Schieler, H; Šmída, R; Unger, M; Weber, M; Werner, F; Wilczyński, H; Wochele, J

    2012-01-01

    We investigate the possibility of detecting extensive air showers by the radar technique. Considering a bistatic radar system and different shower geometries, we simulate reflection of radio waves off the static plasma produced by the shower in the air. Using the Thomson cross-section for radio wave reflection, we obtain the time evolution of the signal received by the antennas. The frequency upshift of the radar echo and the power received are studied to verify the feasibility of the radar detection technique.

  6. An approach to Identify the Risk Induced by Cyber-Attack on the Non-safety NPP I and C System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hee Eun; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Kim, Jong Hyun [Chosun University, Gwangju (Korea, Republic of); Son, Han Sung [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    In this study, influence of the attack on the non-safety system will be investigated, because the cyber-attack on the safety system cannot be accomplished easily. To identify the risk from cyber-attack, the result of PSA will be applied. Cyber-attack may cause other risks except for the core damage. Those risks also can be identified by applying this method. This study could be reinforced in a more realistic way if the information on the maintenance is considered, because certain type of cyber-attack could be detected during the maintenance. Also, possible set of wrong actions need to be selected, based on the knowledge of I and C system and its vulnerabilities because the hacker might not attack every information. To obtain the realistic result information that can be manipulated need to be listed, because the hacker may not attack certain information, not to be detected during the maintenance. In addition, by using the result of this study, the test plan for the cyber-attack can be suggested. If the scenario is given, the criteria for the test target selection can be obtained. It includes the target component and information.

  7. An approach to Identify the Risk Induced by Cyber-Attack on the Non-safety NPP I and C System

    International Nuclear Information System (INIS)

    Kim, Hee Eun; Kang, Hyun Gook; Kim, Jong Hyun; Son, Han Sung

    2016-01-01

    In this study, influence of the attack on the non-safety system will be investigated, because the cyber-attack on the safety system cannot be accomplished easily. To identify the risk from cyber-attack, the result of PSA will be applied. Cyber-attack may cause other risks except for the core damage. Those risks also can be identified by applying this method. This study could be reinforced in a more realistic way if the information on the maintenance is considered, because certain type of cyber-attack could be detected during the maintenance. Also, possible set of wrong actions need to be selected, based on the knowledge of I and C system and its vulnerabilities because the hacker might not attack every information. To obtain the realistic result information that can be manipulated need to be listed, because the hacker may not attack certain information, not to be detected during the maintenance. In addition, by using the result of this study, the test plan for the cyber-attack can be suggested. If the scenario is given, the criteria for the test target selection can be obtained. It includes the target component and information

  8. Low-Cost Mini Radar: Design Prototyping and Tests

    Directory of Open Access Journals (Sweden)

    Dario Tarchi

    2017-01-01

    Full Text Available Radar systems are largely employed for surveillance of wide and remote areas; the recent advent of drones gives the opportunity to exploit radar sensors on board of unmanned aerial platforms. Nevertheless, whereas drone radars are currently available for military applications, their employment in the civilian domain is still limited. The present research focuses on design, prototyping, and testing of an agile, low-cost, mini radar system, to be carried on board of Remotely Piloted Aircraft (RPAs or tethered aerostats. In particular, the paper faces the challenge to integrate the in-house developed radar sensor with a low-cost navigation board, which is used to estimate attitude and positioning data. In fact, a suitable synchronization between radar and navigation data is essential to properly reconstruct the radar picture whenever the platform is moving or the radar is scanning different azimuthal sectors. Preliminary results, relative to tests conducted in preoperational conditions, are provided and exploited to assert the suitable consistency of the obtained radar pictures. From the results, there is a high consistency between the radar images and the picture of the current environment emerges; finally, the comparison of radar images obtained in different scans shows the stability of the platform.

  9. Target scattering characteristics for OAM-based radar

    Directory of Open Access Journals (Sweden)

    Kang Liu

    2018-02-01

    Full Text Available The target scattering characteristics are crucial for radar systems. However, there is very little study conducted for the recently developed orbital angular momentum (OAM based radar system. To illustrate the role of OAM-based radar cross section (ORCS, conventional radar equation is modified by taking characteristics of the OAM waves into account. Subsequently, the ORCS is defined in analogy to classical radar cross section (RCS. The unique features of the incident OAM-carrying field are analyzed. The scattered field is derived, and the analytical expressions of ORCSs for metal plate and cylinder targets are obtained. Furthermore, the ORCS and RCS are compared to illustrate the influences of OAM mode number, target size and signal frequency on the ORCS. Analytical studies demonstrate that the mirror-reflection phenomenon disappears and peak values of ORCS are in the non-specular direction. Finally, the ORCS features are summarized to show its advantages in radar target detection. This work can provide theoretical guidance to the design of OAM-based radar as well as the target detection and identification applications.

  10. Target scattering characteristics for OAM-based radar

    Science.gov (United States)

    Liu, Kang; Gao, Yue; Li, Xiang; Cheng, Yongqiang

    2018-02-01

    The target scattering characteristics are crucial for radar systems. However, there is very little study conducted for the recently developed orbital angular momentum (OAM) based radar system. To illustrate the role of OAM-based radar cross section (ORCS), conventional radar equation is modified by taking characteristics of the OAM waves into account. Subsequently, the ORCS is defined in analogy to classical radar cross section (RCS). The unique features of the incident OAM-carrying field are analyzed. The scattered field is derived, and the analytical expressions of ORCSs for metal plate and cylinder targets are obtained. Furthermore, the ORCS and RCS are compared to illustrate the influences of OAM mode number, target size and signal frequency on the ORCS. Analytical studies demonstrate that the mirror-reflection phenomenon disappears and peak values of ORCS are in the non-specular direction. Finally, the ORCS features are summarized to show its advantages in radar target detection. This work can provide theoretical guidance to the design of OAM-based radar as well as the target detection and identification applications.

  11. μShield : Configurable Code-Reuse Attacks Mitigation For Embedded Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzels, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro; Yan, Zheng; Molva, Refik; Mazurczyk, Wojciech; Kantola, Raimo

    2017-01-01

    Embedded devices are playing a major role in our way of life. Similar to other computer systems embedded devices are vulnerable to code-reuse attacks. Compromising these devices in a critical environment constitute a significant security and safety risk. In this paper, we present μShield, a memory

  12. Micropower radar systems for law enforcement technology

    Energy Technology Data Exchange (ETDEWEB)

    Azevedo, S.G.; Mast, J.; Brase, J. [Lawrence Livermore National Lab., CA (United States)] [and others

    1994-11-15

    LLNL researchers have pioneered a unique compact low-power and inexpensive radar technology (microradar) that has enormous potential in various industries. Some licenses are currently in place for motion sensors and stud finders. The ultra-wideband characteristics of the microradar (4 to 10 GHz) make it difficult to detect, yet provide potential range resolution of 1 cm at ranges of greater than 20 meters. Real and synthetic apertures arrays of radar elements can address imaging applications behind walls at those distances. Personnel detection applications are currently being tested.

  13. Radar reflection off extensive air showers

    Directory of Open Access Journals (Sweden)

    Werner F.

    2013-06-01

    Full Text Available We investigate the possibility of detecting extensive air showers by the radar technique. Considering a bistatic radar system and different shower geometries, we simulate reflection of radio waves off the static plasma produced by the shower in the air. Using the Thomson cross-section for radio wave reflection, we obtain the time evolution of the signal received by the antennas. The frequency upshift of the radar echo and the power received are studied to verify the feasibility of the radar detection technique.

  14. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    Directory of Open Access Journals (Sweden)

    Aaron Zimba

    2018-03-01

    Full Text Available The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes in different SCADA and production subnets, and for the subsequent network propagation. Based on the uncovered artifacts, we recommend a cascaded network segmentation approach, which prioritizes the security of production network devices. Keywords: Critical infrastructure, Cyber-attack, Industrial control system, Crypto ransomware, Vulnerability

  15. Radar techniques using array antennas

    CERN Document Server

    Wirth, Wulf-Dieter

    2013-01-01

    Radar Techniques Using Array Antennas is a thorough introduction to the possibilities of radar technology based on electronic steerable and active array antennas. Topics covered include array signal processing, array calibration, adaptive digital beamforming, adaptive monopulse, superresolution, pulse compression, sequential detection, target detection with long pulse series, space-time adaptive processing (STAP), moving target detection using synthetic aperture radar (SAR), target imaging, energy management and system parameter relations. The discussed methods are confirmed by simulation stud

  16. Target Detection Based on EBPSK Satellite Passive Radar

    Directory of Open Access Journals (Sweden)

    Lu Zeyuan

    2015-05-01

    Full Text Available Passive radar is a topic anti stealth technology with simple structure, and low cost. Radiation source model, signal transmission model, and target detection are the key points of passive radar technology research. The paper analyzes the characteristics of EBPSK signal modulation and target detection method aspect of spaceborne radiant source. By comparison with other satellite navigation and positioning system, the characteristics of EBPSK satellite passive radar system are analyzed. It is proved that the maximum detection range of EBPSK satellite signal can satisfy the needs of the proposed model. In the passive radar model, sparse representation is used to achieve high resolution DOA detection. The comparison with the real target track by simulation demonstrates that effective detection of airborne target using EBPSK satellite passive radar system based on sparse representation is efficient.

  17. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  18. Meteor observation by the Kyoto meteor radar

    International Nuclear Information System (INIS)

    Kato, S.; Tsuda, T.

    1987-01-01

    The Kyoto Meteor Radar is a monostatic coherent pulsed Doppler radar operating on the frequency of 31.57 MH. The system is computer controlled and uses radio interferometry for echo height determination. The antenna, an improvement, can be directed either to the north or the east. The system has been continuously collecting data on winds at meteor heights by radar observation. The meteor echo rate was also measured, the echo rate distribution with height and the daily variation in height integrated echo rate are discussed. Investigations of atmospheric tides are being pursued by cooperative observations. A novel approach to the study of gravity waves was attempted using the meteor radar which is able to detect the horizontal propagation of the waves by observing the changing phase through the region illuminated by the radar

  19. HF Radar Sea-echo from Shallow Water

    Directory of Open Access Journals (Sweden)

    Josh Kohut

    2008-08-01

    Full Text Available HF radar systems are widely and routinely used for the measurement of ocean surface currents and waves. Analysis methods presently in use are based on the assumption of infinite water depth, and may therefore be inadequate close to shore where the radar echo is strongest. In this paper, we treat the situation when the radar echo is returned from ocean waves that interact with the ocean floor. Simulations are described which demonstrate the effect of shallow water on radar sea-echo. These are used to investigate limits on the existing theory and to define water depths at which shallow-water effects become significant. The second-order spectral energy increases relative to the first-order as the water depth decreases, resulting in spectral saturation when the waveheight exceeds a limit defined by the radar transmit frequency. This effect is particularly marked for lower radar transmit frequencies. The saturation limit on waveheight is less for shallow water. Shallow water affects second-order spectra (which gives wave information far more than first-order (which gives information on current velocities, the latter being significantly affected only for the lowest radar transmit frequencies for extremely shallow water. We describe analysis of radar echo from shallow water measured by a Rutgers University HF radar system to give ocean wave spectral estimates. Radar-derived wave height, period and direction are compared with simultaneous shallow-water in-situ measurements.

  20. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  1. Design of multi-frequency CW radars

    CERN Document Server

    Jankiraman, Mohinder

    2007-01-01

    This book deals with the basic theory for design and analysis of Low Probability of Intercept (LPI) radar systems. The design of one such multi-frequency high resolution LPI radar, PANDORA, is covered.

  2. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  3. Detection performance improvement of FMCW radar using frequency shift

    NARCIS (Netherlands)

    Wu, Y.; Linnartz, J.P.M.G.

    2011-01-01

    Frequency modulated continuous wave (FMCW) radars have been widely used for measuring target range and speed. In this paper, we present a mathematical model that quantifies the system-level performance of FMCW radar systems. In FMCW radar, the target range is measured through measuring the beat

  4. Extended Target Recognition in Cognitive Radar Networks

    Directory of Open Access Journals (Sweden)

    Xiqin Wang

    2010-11-01

    Full Text Available We address the problem of adaptive waveform design for extended target recognition in cognitive radar networks. A closed-loop active target recognition radar system is extended to the case of a centralized cognitive radar network, in which a generalized likelihood ratio (GLR based sequential hypothesis testing (SHT framework is employed. Using Doppler velocities measured by multiple radars, the target aspect angle for each radar is calculated. The joint probability of each target hypothesis is then updated using observations from different radar line of sights (LOS. Based on these probabilities, a minimum correlation algorithm is proposed to adaptively design the transmit waveform for each radar in an amplitude fluctuation situation. Simulation results demonstrate performance improvements due to the cognitive radar network and adaptive waveform design. Our minimum correlation algorithm outperforms the eigen-waveform solution and other non-cognitive waveform design approaches.

  5. Establishment Criteria for Integrated Wind Shear Detection Systems: Low-Level Wind Shear Alert System (LLWAS), Terminal Doppler Weather Radar (TDWR), and Modified Airport Surveillance Radar

    Science.gov (United States)

    1990-12-01

    Overviev . ......................................... 9 2. Programs , Syr!ems, and Services ........................ 11 a. National Weather Service...Equipment Appropriation. ADA, a computer system developed and maintained by the Office of Aviation Policy and rlans, facilitates APS-I processing... Program Plan. The primary benefit of LLWAS, TDWR, and modified airport surveillance radar is reduced risk and expected incidence of wind shear-related

  6. Comparative of signal processing techniques for micro-Doppler signature extraction with automotive radar systems

    Science.gov (United States)

    Rodriguez-Hervas, Berta; Maile, Michael; Flores, Benjamin C.

    2014-05-01

    In recent years, the automotive industry has experienced an evolution toward more powerful driver assistance systems that provide enhanced vehicle safety. These systems typically operate in the optical and microwave regions of the electromagnetic spectrum and have demonstrated high efficiency in collision and risk avoidance. Microwave radar systems are particularly relevant due to their operational robustness under adverse weather or illumination conditions. Our objective is to study different signal processing techniques suitable for extraction of accurate micro-Doppler signatures of slow moving objects in dense urban environments. Selection of the appropriate signal processing technique is crucial for the extraction of accurate micro-Doppler signatures that will lead to better results in a radar classifier system. For this purpose, we perform simulations of typical radar detection responses in common driving situations and conduct the analysis with several signal processing algorithms, including short time Fourier Transform, continuous wavelet or Kernel based analysis methods. We take into account factors such as the relative movement between the host vehicle and the target, and the non-stationary nature of the target's movement. A comparison of results reveals that short time Fourier Transform would be the best approach for detection and tracking purposes, while the continuous wavelet would be the best suited for classification purposes.

  7. Quantum radar

    CERN Document Server

    Lanzagorta, Marco

    2011-01-01

    This book offers a concise review of quantum radar theory. Our approach is pedagogical, making emphasis on the physics behind the operation of a hypothetical quantum radar. We concentrate our discussion on the two major models proposed to date: interferometric quantum radar and quantum illumination. In addition, this book offers some new results, including an analytical study of quantum interferometry in the X-band radar region with a variety of atmospheric conditions, a derivation of a quantum radar equation, and a discussion of quantum radar jamming.This book assumes the reader is familiar w

  8. A portable W-band radar system for enhancement of infrared vision in fire fighting operations

    Science.gov (United States)

    Klenner, Mathias; Zech, Christian; Hülsmann, Axel; Kühn, Jutta; Schlechtweg, Michael; Hahmann, Konstantin; Kleiner, Bernhard; Ulrich, Michael; Ambacher, Oliver

    2016-10-01

    In this paper, we present a millimeter wave radar system which will enhance the performance of infrared cameras used for fire-fighting applications. The radar module is compact and lightweight such that the system can be combined with inertial sensors and integrated in a hand-held infrared camera. This allows for precise distance measurements in harsh environmental conditions, such as tunnel or industrial fires, where optical sensors are unreliable or fail. We discuss the design of the RF front-end, the antenna and a quasi-optical lens for beam shaping as well as signal processing and demonstrate the performance of the system by in situ measurements in a smoke filled environment.

  9. Detecting and classifying low probability of intercept radar

    CERN Document Server

    Pace, Phillip E

    2003-01-01

    The drive is on to devise LPI radar systems that evade hostile detection as well as develop non-cooperative intercept devices that outsmart enemy LPI radar. Based on the author's own design experience, this comprehensive, hands-on book gives you the latest design and development techniques to innovate new LPI radar systems and discover new ways to intercept enemy LPI radar. and help you visually identify waveform parameters. Filled with more than 500 equations that provide rigorous mathematical detail, this book can be used by both entry-level and seasoned engineers. Besides thoroughly treatin

  10. Interception of LPI radar signals

    Science.gov (United States)

    Lee, Jim P.

    1991-11-01

    Most current radars are designed to transmit short duration pulses with relatively high peak power. These radars can be detected easily by the use of relatively modest EW intercept receivers. Three radar functions (search, anti-ship missile (ASM) seeker, and navigation) are examined to evaluate the effectiveness of potential low probability of intercept (LPI) techniques, such as waveform coding, antenna profile control, and power management that a radar may employ against current Electronic Warfare (EW) receivers. The general conclusion is that it is possible to design a LPI radar which is effective against current intercept EW receivers. LPI operation is most easily achieved at close ranges and against a target with a large radar cross section. The general system sensitivity requirement for the detection of current and projected LPI radars is found to be on the order of -100 dBmi which cannot be met by current EW receivers. Finally, three potential LPI receiver architectures, using channelized, superhet, and acousto-optic receivers with narrow RF and video bandwidths are discussed. They have shown some potential in terms of providing the sensitivity and capability in an environment where both conventional and LPI signals are present.

  11. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  12. Solid-state radar switchboard

    Science.gov (United States)

    Thiebaud, P.; Cross, D. C.

    1980-07-01

    A new solid-state radar switchboard equipped with 16 input ports which will output data to 16 displays is presented. Each of the ports will handle a single two-dimensional radar input, or three ports will accommodate a three-dimensional radar input. A video switch card of the switchboard is used to switch all signals, with the exception of the IFF-mode-control lines. Each card accepts inputs from up to 16 sources and can pass a signal with bandwidth greater than 20 MHz to the display assigned to that card. The synchro amplifier of current systems has been eliminated and in the new design each PPI receives radar data via a single coaxial cable. This significant reduction in cabling is achieved by adding a serial-to-parallel interface and a digital-to-synchro converter located at the PPI.

  13. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  14. An optimal beam alignment method for large-scale distributed space surveillance radar system

    Science.gov (United States)

    Huang, Jian; Wang, Dongya; Xia, Shuangzhi

    2018-06-01

    Large-scale distributed space surveillance radar is a very important ground-based equipment to maintain a complete catalogue for Low Earth Orbit (LEO) space debris. However, due to the thousands of kilometers distance between each sites of the distributed radar system, how to optimally implement the Transmitting/Receiving (T/R) beams alignment in a great space using the narrow beam, which proposed a special and considerable technical challenge in the space surveillance area. According to the common coordinate transformation model and the radar beam space model, we presented a two dimensional projection algorithm for T/R beam using the direction angles, which could visually describe and assess the beam alignment performance. Subsequently, the optimal mathematical models for the orientation angle of the antenna array, the site location and the T/R beam coverage are constructed, and also the beam alignment parameters are precisely solved. At last, we conducted the optimal beam alignment experiments base on the site parameters of Air Force Space Surveillance System (AFSSS). The simulation results demonstrate the correctness and effectiveness of our novel method, which can significantly stimulate the construction for the LEO space debris surveillance equipment.

  15. Monitoring internal organ motion with continuous wave radar in CT

    International Nuclear Information System (INIS)

    Pfanner, Florian; Maier, Joscha; Allmendinger, Thomas; Flohr, Thomas; Kachelrieß, Marc

    2013-01-01

    Purpose: To avoid motion artifacts in medical imaging or to minimize the exposure of healthy tissues in radiation therapy, medical devices are often synchronized with the patient's respiratory motion. Today's respiratory motion monitors require additional effort to prepare the patients, e.g., mounting a motion belt or placing an optical reflector on the patient's breast. Furthermore, they are not able to measure internal organ motion without implanting markers. An interesting alternative to assess the patient's organ motion is continuous wave radar. The aim of this work is to design, implement, and evaluate such a radar system focusing on application in CT.Methods: The authors designed a radar system operating in the 860 MHz band to monitor the patient motion. In the intended application of the radar system, the antennas are located close to the patient's body inside the table of a CT system. One receive and four transmitting antennas are used to avoid the requirement of exact patient positioning. The radar waves propagate into the patient's body and are reflected at tissue boundaries, for example at the borderline between muscle and adipose tissue, or at the boundaries of organs. At present, the authors focus on the detection of respiratory motion. The radar system consists of the hardware mentioned above as well as of dedicated signal processing software to extract the desired information from the radar signal. The system was evaluated using simulations and measurements. To simulate the radar system, a simulation model based on radar and wave field equations was designed and 4D respiratory-gated CT data sets were used as input. The simulated radar signals and the measured data were processed in the same way. The radar system hardware and the signal processing algorithms were tested with data from ten volunteers. As a reference, the respiratory motion signal was recorded using a breast belt simultaneously with the radar measurements.Results: Concerning the

  16. Architecture for a 1-GHz Digital RADAR

    Science.gov (United States)

    Mallik, Udayan

    2011-01-01

    An architecture for a Direct RF-digitization Type Digital Mode RADAR was developed at GSFC in 2008. Two variations of a basic architecture were developed for use on RADAR imaging missions using aircraft and spacecraft. Both systems can operate with a pulse repetition rate up to 10 MHz with 8 received RF samples per pulse repetition interval, or at up to 19 kHz with 4K received RF samples per pulse repetition interval. The first design describes a computer architecture for a Continuous Mode RADAR transceiver with a real-time signal processing and display architecture. The architecture can operate at a high pulse repetition rate without interruption for an infinite amount of time. The second design describes a smaller and less costly burst mode RADAR that can transceive high pulse repetition rate RF signals without interruption for up to 37 seconds. The burst-mode RADAR was designed to operate on an off-line signal processing paradigm. The temporal distribution of RF samples acquired and reported to the RADAR processor remains uniform and free of distortion in both proposed architectures. The majority of the RADAR's electronics is implemented in digital CMOS (complementary metal oxide semiconductor), and analog circuits are restricted to signal amplification operations and analog to digital conversion. An implementation of the proposed systems will create a 1-GHz, Direct RF-digitization Type, L-Band Digital RADAR--the highest band achievable for Nyquist Rate, Direct RF-digitization Systems that do not implement an electronic IF downsample stage (after the receiver signal amplification stage), using commercially available off-the-shelf integrated circuits.

  17. Design and Implementation of a FPGA and DSP Based MIMO Radar Imaging System

    Directory of Open Access Journals (Sweden)

    Wei Wang

    2015-06-01

    Full Text Available The work presented in this paper is aimed at the implementation of a real-time multiple-input multiple-output (MIMO imaging radar used for area surveillance. In this radar, the equivalent virtual array method and time-division technique are applied to make 16 virtual elements synthesized from the MIMO antenna array. The chirp signal generater is based on a combination of direct digital synthesizer (DDS and phase locked loop (PLL. A signal conditioning circuit is used to deal with the coupling effect within the array. The signal processing platform is based on an efficient field programmable gates array (FPGA and digital signal processor (DSP pipeline where a robust beamforming imaging algorithm is running on. The radar system was evaluated through a real field experiment. Imaging capability and real-time performance shown in the results demonstrate the practical feasibility of the implementation.

  18. Probabilities of False Alarm for Vital Sign Detection on the Basis of a Doppler Radar System

    Directory of Open Access Journals (Sweden)

    Nguyen Thi Phuoc Van

    2018-02-01

    Full Text Available Vital detection on the basis of Doppler radars has drawn a great deal of attention from researchers because of its high potential for applications in biomedicine, surveillance, and finding people alive under debris during natural hazards. In this research, the signal-to-noise ratio (SNR of the remote vital-sign detection system is investigated. On the basis of different types of noise, such as phase noise, Gaussian noise, leakage noise between the transmitting and receiving antennae, and so on, the SNR of the system has first been examined. Then the research has focused on the investigation of the detection and false alarm probabilities of the system when the transmission link between the human and the radar sensor system took the Nakagami-m channel model. The analytical model for the false alarm and the detection probabilities of the system have been derived. The proposed theoretical models for the SNR and detection probability match with the simulation and measurement results. These theoretical models have the potential to be used as good references for the hardware development of the vital-sign detection radar sensor system.

  19. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  20. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  1. Wind farm radar study

    International Nuclear Information System (INIS)

    Davies, N.G.

    1995-01-01

    This report examines the possible degradations of radar performance that may be caused by the presence of a wind turbine generator within the radar coverage area. A brief literature survey reviews the previously published work, which is mainly concerned with degradation of broadcast TV reception. Estimates are made of wind turbine generator scattering cross-sections, and of the time and Doppler characteristics of the echo signals from representative wind turbine generator. The general characteristics of radar detection and tracking methods are described, and the behaviour of such systems in the presence of strong returns from a wind turbine generator (or an array of them) is discussed. (author)

  2. Pedestrian recognition using automotive radar sensors

    OpenAIRE

    A. Bartsch; F. Fitzek; R. H. Rasshofer

    2012-01-01

    The application of modern series production automotive radar sensors to pedestrian recognition is an important topic in research on future driver assistance systems. The aim of this paper is to understand the potential and limits of such sensors in pedestrian recognition. This knowledge could be used to develop next generation radar sensors with improved pedestrian recognition capabilities. A new raw radar data signal processing algorithm is proposed that allows deep insight...

  3. Digital data acquisition for laser radar for vibration analysis

    OpenAIRE

    Montes, Felix G.

    1998-01-01

    Approved for public release; distribution is unlimited Laser radar for vibration analysis represents a military application to develop a target identification system in the future. The problem addressed is how to analyze the vibrations of a target illuminated by the laser radar to achieve a positive identification. This thesis develops a computer-based data acquisition and analysis system for improving the laser radar capability. Specifically, a review is made of the CO2 laser radar, coher...

  4. Imaging with Synthetic Aperture Radar

    CERN Document Server

    Massonnet, Didier

    2008-01-01

    Describing a field that has been transformed by the recent availability of data from a new generation of space and airborne systems, the authors offer a synthetic geometrical approach to the description of synthetic aperture radar, one that addresses physicists, radar specialists, as well as experts in image processing.  

  5. VHF/UHF radar observations of tropical mesoscale convective systems over southern India

    Directory of Open Access Journals (Sweden)

    K. Kishore Kumar

    2005-07-01

    Full Text Available Several campaigns have been carried out to study the convective systems over Gadanki (13.5° N, 79.2° E, a tropical station in India, using VHF and UHF radars. The height-time sections of several convective systems are investigated in detail to study reflectivity, turbulence and vertical velocity structure. Structure and dynamics of the convective systems are the main objectives of these campaigns. The observed systems are classified into single- and multi-cell systems. It has been observed that most of the convective systems at this latitude are multi-cellular in nature. Simultaneous VHF and UHF radar observations are used to classify the observed precipitating systems as convective, intermediary and stratiform regions. Composite height profiles of vertical velocities in these regions were obtained and the same were compared with the profiles obtained at other geographical locations. These composite profiles of vertical velocity in the convective regions have shown their peaks in the mid troposphere, indicating that the maximum latent heat is being released at those heights. These profiles are very important for numerical simulations of the convective systems, which vary significantly from one geographical location to the other.

    Keywords. Meteorology and atmospheric dynamics (Mesoscale meteorology; Convective processes – Radio science (Remote sensing

  6. VHF/UHF radar observations of tropical mesoscale convective systems over southern India

    Directory of Open Access Journals (Sweden)

    K. Kishore Kumar

    2005-07-01

    Full Text Available Several campaigns have been carried out to study the convective systems over Gadanki (13.5° N, 79.2° E, a tropical station in India, using VHF and UHF radars. The height-time sections of several convective systems are investigated in detail to study reflectivity, turbulence and vertical velocity structure. Structure and dynamics of the convective systems are the main objectives of these campaigns. The observed systems are classified into single- and multi-cell systems. It has been observed that most of the convective systems at this latitude are multi-cellular in nature. Simultaneous VHF and UHF radar observations are used to classify the observed precipitating systems as convective, intermediary and stratiform regions. Composite height profiles of vertical velocities in these regions were obtained and the same were compared with the profiles obtained at other geographical locations. These composite profiles of vertical velocity in the convective regions have shown their peaks in the mid troposphere, indicating that the maximum latent heat is being released at those heights. These profiles are very important for numerical simulations of the convective systems, which vary significantly from one geographical location to the other. Keywords. Meteorology and atmospheric dynamics (Mesoscale meteorology; Convective processes – Radio science (Remote sensing

  7. Initial results from SKiYMET meteor radar at Thumba (8.5°N, 77°E): 1. Comparison of wind measurements with MF spaced antenna radar system

    Science.gov (United States)

    Kumar, Karanam Kishore; Ramkumar, Geetha; Shelbi, S. T.

    2007-12-01

    In the present communication, initial results from the allSKy interferometric METeor (SKiYMET) radar installed at Thumba (8.5°N, 77°E) are presented. The meteor radar system provides hourly zonal and meridional winds in the mesosphere lower thermosphere (MLT) region. The meteor radar measured zonal and meridional winds are compared with nearby MF radar at Tirunalveli (8.7°N, 77.8°E). The present study provided an opportunity to compare the winds measured by the two different techniques, namely, interferometry and spaced antenna drift methods. Simultaneous wind measurements for a total number of 273 days during September 2004 to May 2005 are compared. The comparison showed a very good agreement between these two techniques in the height region 82-90 km and poor agreement above this height region. In general, the zonal winds compare very well as compared to the meridional winds. The observed discrepancies in the wind comparison above 90 km are discussed in the light of existing limitations of both the radars. The detailed analysis revealed the consistency of the measured winds by both the techniques. However, the discrepancies are observed at higher altitudes and are attributed to the contamination of MF radar neutral wind measurements with Equatorial Electro Jet (EEJ) induced inospheric drifts rather than the limitations of the spaced antenna technique. The comparison of diurnal variation of zonal winds above 90 km measured by both the radars is in reasonably good agreement in the absence of EEJ (during local nighttime). It is also been noted that the difference in the zonal wind measurements by both the radars is directly related to the strength of EEJ, which is a noteworthy result from the present study.

  8. Radar-based alert system to operate a sewerage network: relevance and operational effectiveness after several years of use.

    Science.gov (United States)

    Faure, D; Payrastre, O; Auchet, P

    2005-01-01

    Since January 2000, the sewerage network of a very urbanised catchment area in the Greater Nancy Urban Community has been operated according to the alarms generated in real time by a storm alert system using weather radar data. This alert system is based on an automatic identification of intense rain cells in the radar images. This paper presents the characteristics of this alert system and synthesises the main results of two complementary studies realised in 2002 in order to estimate the relevance and the operational effectiveness of the alert system. The first study consisted in an off-line analysis of almost 50,000 intense rain cells detected in four years of historical radar data. The second study was an analysis of the experience feedback after two years of operational use of this alert system. The results of these studies are discussed in function of the initial operational objectives.

  9. Waveform design and diversity for advanced radar systems

    CERN Document Server

    Gini, Fulvio

    2012-01-01

    In recent years, various algorithms for radar signal design, that rely heavily upon complicated processing and/or antenna architectures, have been suggested. These techniques owe their genesis to several factors, including revolutionary technological advances (new flexible waveform generators, high speed signal processing hardware, digital array radar technology, etc.) and the stressing performance requirements, often imposed by defence applications in areas such as airborne early warning and homeland security.Increasingly complex operating scenarios calls for sophisticated algorithms with the

  10. Classification of Agricultural Crops in Radar Images

    NARCIS (Netherlands)

    Hoogeboom, P.

    1983-01-01

    For the past few years an accurate X-band SLAR system with digital recording has been available in The Netherlands. The images of this system are corrected to indicate radar backscatter coefficients (gamma) instead of arbitrary greytones. In 1980 a radar measurement campaign was organized in the

  11. Nanosecond radar system based on repetitive pulsed relativistic BWO

    International Nuclear Information System (INIS)

    Bunkin, B.V.; Gaponov-Grekhov, A.V.; Eltchaninov, A.S.; Zagulov, F.Ya.; Korovin, S.D.; Mesyats, G.A.; Osipov, M.L.; Otlivantchik, E.A.; Petelin, M.I.; Prokhorov, A.M.

    1993-01-01

    The paper presents the results of studies of a nanosecond radar system based on repetitive pulsed relativistic BWO. A pulsed power repetitive accelerator producing electron beams of electron energy 500-700 keV and current 5 kA in pulses of duraction 10 ns with a repetition rate of 100 pps is described. The results of experiments with a high-voltage gas-filled spark gap and a cold-cathode vacuum diode under the conditions of high repetition rates are given. Also presented are the results of studies of a relativistic BWO operating with a wavelength of 3 cm. It is shown that for a high-current beam electron energy of 500-700 keV, the BWO efficiency can reach 35%, the microwave power being 10 9 W. A superconducting solenoid creating a magnetic field of 30 kOe was used for the formation and transportation of the high-current electron beam. In conclusion, the outcome of tests of a nanosecond radar station based on a pulsed power repetitive accelerator and a relativistic BWO is reported

  12. Block diagrams of the radar interface and control unit

    Science.gov (United States)

    Collier, J. W.

    1989-01-01

    The Interface and Control Unit is the heart of the radar module, which occupies one complex channel of the High-Speed Data Acquisition System of the Goldstone Solar System Radar. Block diagrams of the interface unit are presented as an aid to understanding its operation and interconnections to the rest of the radar module.

  13. Radar-based Flood Warning System for Houston, Texas and Its Performance Evaluation

    Science.gov (United States)

    Fang, N.; Bedient, P.

    2009-12-01

    Houston has a long history of flooding problems as a serious nature. For instance, Houstonians suffered from severe flood inundation during Tropical Storm Allison in 2001 and Hurricane Ike in 2008. Radar-based flood warning systems as non-structural tools to provide accurate and timely warnings to the public and private entities are greatly needed for urban areas prone to flash floods. Fortunately, the advent of GIS, radar-based rainfall estimation using NEXRAD, and real-time delivery systems on the internet have allowed flood alert systems to provide important advanced warning of impending flood conditions. Thus, emergency personnel can take proper steps to mitigate against catastrophic losses. The Rice and Texas Medical Center (TMC) Flood Alert System (FAS2) has been delivering warning information with 2 to 3 hours of lead time to facility personnel in a readily understood format for more than 40 events since 1997. The system performed well during these major rainfall events with R square value of 93%. The current system has been improved by incorporating a new hydraulic prediction tool - FloodPlain Map Library (FPML). The FPML module aims to provide visualized information such as floodplain maps and water surface elevations instead of just showing hydrographs in real time based on NEXRAD radar rainfall data. During Hurricane Ike (September, 2008), FAS2 successfully provided precise and timely flood warning information to TMC with the peak flow difference of 3.6% and the volume difference of 5.6%; timing was excellent for this double-peaked event. With the funding from the Texas Department of Transportation, a similar flood warning system has been developed at a critical transportation pass along Highway 288 in Houston, Texas. In order to enable emergency personnel to begin flood preparation with as much lead time as possible, FAS2 is being used as a prototype to develop warning system for other flood-prone areas such as City of Sugar Land.

  14. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    Energy Technology Data Exchange (ETDEWEB)

    Lee, In Hyo; Kang, Hyun Gook [KAIST, Daejeon (Korea, Republic of); Son, Han Seong [Joonbu University, Geumsan (Korea, Republic of)

    2016-05-15

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans.

  15. An Analysis of Cyber-Attack on NPP Considering Physical Impact

    International Nuclear Information System (INIS)

    Lee, In Hyo; Kang, Hyun Gook; Son, Han Seong

    2016-01-01

    Some research teams performed related works on cyber-physical system which is a system that cyber-attack can lead to serious consequences including product loss, damage, injury and death when it is attacked. They investigated the physical impact on cyber-physical system due to the cyber-attack. But it is hard to find the research about NPP cyber security considering the physical impact or safety. In this paper, to investigate the relationship between physical impact and cyber-attack, level 1 PSA results are utilized in chapter 2 and cyber-attack analysis is performed in chapter 3. The cyber security issue on NPP is inevitable issue. Unlike general cyber security, cyber-physical system like NPP can induce serious consequences such as core damage by cyber-attack. So in this paper, to find how hacker can attack the NPP, (1) PSA results were utilized to find the relationship between physical system and cyber-attack and (2) vulnerabilities on digital control systems were investigated to find how hacker can implement the possible attack. It is expected that these steps are utilized when establishing penetration test plans or cyber security drill plans

  16. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  17. Airborne Radar Observations of Severe Hailstorms: Implications for Future Spaceborne Radar

    Science.gov (United States)

    Heymsfield, Gerald M.; Tian, Lin; Li, Lihua; McLinden, Matthew; Cervantes, Jaime I.

    2013-01-01

    A new dual-frequency (Ku and Ka band) nadir-pointing Doppler radar on the high-altitude NASA ER-2 aircraft, called the High-Altitude Imaging Wind and Rain Airborne Profiler (HIWRAP), has collected data over severe thunderstorms in Oklahoma and Kansas during the Midlatitude Continental Convective Clouds Experiment (MC3E). The overarching motivation for this study is to understand the behavior of the dualwavelength airborne radar measurements in a global variety of thunderstorms and how these may relate to future spaceborne-radar measurements. HIWRAP is operated at frequencies that are similar to those of the precipitation radar on the Tropical Rainfall Measuring Mission (Ku band) and the upcoming Global Precipitation Measurement mission satellite's dual-frequency (Ku and Ka bands) precipitation radar. The aircraft measurements of strong hailstorms have been combined with ground-based polarimetric measurements to obtain a better understanding of the response of the Ku- and Ka-band radar to the vertical distribution of the hydrometeors, including hail. Data from two flight lines on 24 May 2011 are presented. Doppler velocities were approx. 39m/s2at 10.7-km altitude from the first flight line early on 24 May, and the lower value of approx. 25m/s on a second flight line later in the day. Vertical motions estimated using a fall speed estimate for large graupel and hail suggested that the first storm had an updraft that possibly exceeded 60m/s for the more intense part of the storm. This large updraft speed along with reports of 5-cm hail at the surface, reflectivities reaching 70 dBZ at S band in the storm cores, and hail signals from polarimetric data provide a highly challenging situation for spaceborne-radar measurements in intense convective systems. The Ku- and Ka-band reflectivities rarely exceed approx. 47 and approx. 37 dBZ, respectively, in these storms.

  18. A 24 GHz Waveguide based Radar System using an Advanced Algorithm for I/Q Offset Cancelation

    Directory of Open Access Journals (Sweden)

    C. Will

    2017-10-01

    Full Text Available Precise position measurement with micrometer accuracy plays an important role in modern industrial applications. Herewith, a guided wave Six-Port interferometric radar system is presented. Due to limited matching and discontinuities in the radio frequency part of the system, the designers have to deal with DC offsets. The offset voltages in the baseband lead to worse relative modulation dynamics relating to the full scale range of the analog-to-digital converters and thus, considerably degrade the system performance. While common cancelation techniques try to estimate and extinguish the DC offsets directly, the proposed radar system is satisfied with equalizing both DC offsets for each of the two differential baseband signal pairs. Since the complex representation of the baseband signals is utilized for a subsequent arctangent demodulation, the proposed offset equalization implicates a centering of the in-phase and quadrature (I/Q components of the received signal, which is sufficient to simplify the demodulation and improve the phase accuracy. Therefore, a standard Six-Port radar system is extended and a variable phase shifter plus variable attenuators are inserted at different positions. An intelligent algorithm adjusts these configurable components to achieve optimal I/Q offset cancelation.

  19. The NASA radar entomology program at Wallops Flight Center

    Science.gov (United States)

    Vaughn, C. R.

    1979-01-01

    NASA contribution to radar entomology is presented. Wallops Flight Center is described in terms of its radar systems. Radar tracking of birds and insects was recorded from helicopters for airspeed and vertical speed.

  20. FPGA based hardware optimized implementation of signal processing system for LFM pulsed radar

    Science.gov (United States)

    Azim, Noor ul; Jun, Wang

    2016-11-01

    Signal processing is one of the main parts of any radar system. Different signal processing algorithms are used to extract information about different parameters like range, speed, direction etc, of a target in the field of radar communication. This paper presents LFM (Linear Frequency Modulation) pulsed radar signal processing algorithms which are used to improve target detection, range resolution and to estimate the speed of a target. Firstly, these algorithms are simulated in MATLAB to verify the concept and theory. After the conceptual verification in MATLAB, the simulation is converted into implementation on hardware using Xilinx FPGA. Chosen FPGA is Xilinx Virtex-6 (XC6LVX75T). For hardware implementation pipeline optimization is adopted and also other factors are considered for resources optimization in the process of implementation. Focusing algorithms in this work for improving target detection, range resolution and speed estimation are hardware optimized fast convolution processing based pulse compression and pulse Doppler processing.

  1. New Vacuum Electronic Devices for Radar

    Directory of Open Access Journals (Sweden)

    Hu Yinfu

    2016-08-01

    Full Text Available Vacuum Electronic Devices (VEDs which are considered as the heart of a radar system, play an important role in their development. VEDs and radar systems supplement and promote each other. Some new trends in VEDs have been observed with advancements in the simulation tools for designing VEDs, new materials, new fabrication techniques. Recently, the performance of VEDs has greatly improved. In addition, new devices have been invented, which have laid the foundation for the developments of radar detection technology. This study introduces the recent development trends and research results of VEDs from microwave and millimeter wave devices and power modules, integrated VEDs, terahertz VEDs, and high power VEDs.

  2. Simulating lightning tests to radar system

    NARCIS (Netherlands)

    Blaj, M.A.; Buesink, Frederik Johannes Karel; Leferink, Frank Bernardus Johannes

    2010-01-01

    The risk of destruction due to lightning makes simulating the effects of lightning strikes a necessity. We modeled a radar enclosure and simulated the effect of a lightning strike. The results have been validated using full threat lightning current tests.

  3. Characterization of Adolescent Prescription Drug Abuse and Misuse Using the Researched Abuse Diversion and Addiction-Related Surveillance (RADARS[R]) System

    Science.gov (United States)

    Zosel, Amy; Bartelson, Becki Bucher; Bailey, Elise; Lowenstein, Steven; Dart, Rick

    2013-01-01

    Objective: To describe the characteristics and health effects of adolescent (age 13-19 years) prescription drug abuse and misuse using the Researched Abuse Diversion and Addiction-Related Surveillance (RADARS[R])) System. Method: Secondary analysis of data collected from RADARS System participating poison centers was performed. Data for all…

  4. Developing hydrological monitoring system based on HF radar for islands and reefs in the South China Sea

    Science.gov (United States)

    Li, J.; Shi, P.; Chen, J.; Zhu, Y.; Li, B.

    2016-12-01

    There are many islands (or reefs) in the South China Sea. The hydrological properties (currents and waves) around the islands are highly spatially variable compared to those of coastal region of mainland, because the shorelines are more complex with much smaller scale, and the topographies are step-shape with a much sharper slope. The currents and waves with high spatial variations may destroy the buildings or engineering on shorelines, or even influence the structural stability of reefs. Therefore, it is necessary to establish monitoring systems to obtain the high-resolution hydrological information. This study propose a plan for developing a hydrological monitoring system based on HF radar on the shoreline of a typical island in the southern South China Sea: firstly, the HF radar are integrated with auxiliary equipment (such as dynamo, fuel tank, air conditioner, communication facilities) in a container to build a whole monitoring platform; synchronously, several buoys are set within the radar visibility for data calibration and validation; and finally, the current and wave observations collected by the HF radar are assimilated with numerical models to obtain long-term and high-precision reanalysis products. To test the feasibility of this plan, our research group has built two HF radar sites at the western coastal region of Guangdong Province. The collected data were used to extract surface current information and assimilated with an ocean model. The results show that the data assimilation can highly improve the surface current simulation, especially for typhoon periods. Continuous data with intervals between 6 and 12 hour are the most suitable for ideal assimilations. On the other hand, the test also reveal that developing similar monitoring system on island environments need advanced radars that have higher resolutions and a better performance for persistent work.

  5. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  6. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    OpenAIRE

    Aaron Zimba; Zhaoshun Wang; Hongsong Chen

    2018-01-01

    The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes...

  7. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  8. Radar probing of the auroral plasma

    International Nuclear Information System (INIS)

    Brekke, A.

    1977-01-01

    The European Incoherent Scatter Radar in the Auroral Zone (EISCAT) is an intereuropean organization planning to install an incoherent scatter radar system in Northern Scandinavia. It is supported by Finland, France, Norway, Great Britain, Sweden and West Germany, and its headquarters is in Kiruna, Sweden. The radar is planned to be operating in 1979. In order to introduce students and young scientists to the incoherent scatter radar technique, a summer school was held in Tromsoe, from 5th to 13th June 1975. In these proceedings an introduction to the basic theory of fluctuations in a plasma is given. Some of the present incoherent scatter radars now in use are presented and special considerations with respect to the planned EISACT facility are discussed. Reviews of some recent results and scientific problems relevant to EISCAT are also presented and finally a presentation of some observational techniques complementary to incoherent scatter radars is included. (Ed.)

  9. Micropower impulse radar technology and applications

    Energy Technology Data Exchange (ETDEWEB)

    Mast, J., LLNL

    1998-04-15

    The LLNL-developed Micropower Impulse Radar (MIR) technology has quickly gone from laboratory concept to embedded circuitry in numerous government and commercial systems in the last few years[l]. The main ideas behind MIR, invented by T. McEwan in the Laser Program, are the generation and detection systems for extremely low- power ultra-wideband pulses in the gigaHertz regime using low-cost components. These ideas, coupled with new antenna systems, timing and radio-frequency (RF) circuitry, computer interfaces, and signal processing, have provided the catalyst for a new generation of compact radar systems. Over the past several years we have concentrated on a number of applications of MIR which address a number of remote-sensing applications relevant to emerging programs in defense, transportation, medical, and environmental research. Some of the past commercial successes have been widely publicized [2] and are only now starting to become available for market. Over 30 patents have been filed and over 15 licenses have been signed on various aspects of the MIR technology. In addition, higher performance systems are under development for specific laboratory programs and government reimbursables. The MIR is an ultra- wideband, range-gated radar system that provides the enabling hardware technology used in the research areas mentioned above. It has numerous performance parameters that can be Selected by careful design to fit the requirements. We have improved the baseline, short- range, MIR system to demonstrate its effectiveness. The radar operates over the hand from approximately I to 4 GHz with pulse repetition frequencies up to 10 MHz. It provides a potential range resolution of I cm at ranges of greater than 20 m. We have developed a suite of algorithms for using MIR for image formation. These algorithms currently support Synthetic aperture and multistate array geometries. This baseline MIR radar imaging system has been used for several programmatic applications.

  10. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  11. Research on the technology of detecting the SQL injection attack and non-intrusive prevention in WEB system

    Science.gov (United States)

    Hu, Haibin

    2017-05-01

    Among numerous WEB security issues, SQL injection is the most notable and dangerous. In this study, characteristics and procedures of SQL injection are analyzed, and the method for detecting the SQL injection attack is illustrated. The defense resistance and remedy model of SQL injection attack is established from the perspective of non-intrusive SQL injection attack and defense. Moreover, the ability of resisting the SQL injection attack of the server has been comprehensively improved through the security strategies on operation system, IIS and database, etc.. Corresponding codes are realized. The method is well applied in the actual projects.

  12. Wind farms impact on radar aviation interests - final report

    Energy Technology Data Exchange (ETDEWEB)

    Poupart, G.J.

    2003-09-01

    The main objectives of the study were: to determine the effects of siting wind turbines adjacent to primary air traffic control radar; to gather the information required for the generation of guidelines by civil, military and wind farm developer stakeholders; to determine the extent to which the design of wind turbines influences their effects on radar systems and to determine the extent to which design of the radar processing influences the effects of wind turbines on radar systems. A computer model was developed to predict the Radar Cross Section (RCS) of wind turbines and understand the interaction of radar energy and turbines. The model was designed to predict and simulate the impact of wind farms on the primary radar display. Validation of the model was carried out in a full-scale trial and modelling process, with data collected from a number of sources. The model was validated against a single turbine scenario and showed an accurate prediction capability. Further validation of the model could be gained through a multiple turbine trial. The knowledge gained from the development and validation of the predictive computer model has been used to conduct a sensitivity analysis (of the sub-elements of the radar and wind farm interaction) and to compile a list of the key factors influencing the radar signature of wind turbines. The result is a more detailed quantification of the complex interactions between wind turbines and radar systems than was previously available. The key findings of how the design, size and construction materials of wind turbines affect RCS are summarised.

  13. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  14. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  15. Radar Location Equipment Development Program: Phase I

    Energy Technology Data Exchange (ETDEWEB)

    Sandness, G.A.; Davis, K.C.

    1985-06-01

    The work described in this report represents the first phase of a planned three-phase project designed to develop a radar system for monitoring waste canisters stored in a thick layer of bedded salt at the Waste Isolation Pilot Plant near Carlsbad, New Mexico. The canisters will be contained in holes drilled into the floor of the underground waste storage facility. It is hoped that these measurements can be made to accuracies of +-5 cm and +-2/sup 0/, respectively. The initial phase of this project was primarily a feasibility study. Its principal objective was to evaluate the potential effectiveness of the radar method in the planned canister monitoring application. Its scope included an investigation of the characteristics of radar signals backscattered from waste canisters, a test of preliminary data analysis methods, an assessment of the effects of salt and bentonite (a proposed backfill material) on the propagation of the radar signals, and a review of current ground-penetrating radar technology. A laboratory experiment was performed in which radar signals were backscattered from simulated waste canisters. The radar data were recorded by a digital data acquisition system and were subsequently analyzed by three different computer-based methods to extract estimates of canister location and tilt. Each of these methods yielded results that were accurate within a few centimeters in canister location and within 1/sup 0/ in canister tilt. Measurements were also made to determine the signal propagation velocities in salt and bentonite (actually a bentonite/sand mixture) and to estimate the signal attenuation rate in the bentonite. Finally, a product survey and a literature search were made to identify available ground-penetrating radar systems and alternative antenna designs that may be particularly suitable for this unique application. 10 refs., 21 figs., 4 tabs.

  16. Radar Location Equipment Development Program: Phase I

    International Nuclear Information System (INIS)

    Sandness, G.A.; Davis, K.C.

    1985-06-01

    The work described in this report represents the first phase of a planned three-phase project designed to develop a radar system for monitoring waste canisters stored in a thick layer of bedded salt at the Waste Isolation Pilot Plant near Carlsbad, New Mexico. The canisters will be contained in holes drilled into the floor of the underground waste storage facility. It is hoped that these measurements can be made to accuracies of +-5 cm and +-2 0 , respectively. The initial phase of this project was primarily a feasibility study. Its principal objective was to evaluate the potential effectiveness of the radar method in the planned canister monitoring application. Its scope included an investigation of the characteristics of radar signals backscattered from waste canisters, a test of preliminary data analysis methods, an assessment of the effects of salt and bentonite (a proposed backfill material) on the propagation of the radar signals, and a review of current ground-penetrating radar technology. A laboratory experiment was performed in which radar signals were backscattered from simulated waste canisters. The radar data were recorded by a digital data acquisition system and were subsequently analyzed by three different computer-based methods to extract estimates of canister location and tilt. Each of these methods yielded results that were accurate within a few centimeters in canister location and within 1 0 in canister tilt. Measurements were also made to determine the signal propagation velocities in salt and bentonite (actually a bentonite/sand mixture) and to estimate the signal attenuation rate in the bentonite. Finally, a product survey and a literature search were made to identify available ground-penetrating radar systems and alternative antenna designs that may be particularly suitable for this unique application. 10 refs., 21 figs., 4 tabs

  17. A hardware-in-the-loop simulation program for ground-based radar

    Science.gov (United States)

    Lam, Eric P.; Black, Dennis W.; Ebisu, Jason S.; Magallon, Julianna

    2011-06-01

    A radar system created using an embedded computer system needs testing. The way to test an embedded computer system is different from the debugging approaches used on desktop computers. One way to test a radar system is to feed it artificial inputs and analyze the outputs of the radar. More often, not all of the building blocks of the radar system are available to test. This will require the engineer to test parts of the radar system using a "black box" approach. A common way to test software code on a desktop simulation is to use breakpoints so that is pauses after each cycle through its calculations. The outputs are compared against the values that are expected. This requires the engineer to use valid test scenarios. We will present a hardware-in-the-loop simulator that allows the embedded system to think it is operating with real-world inputs and outputs. From the embedded system's point of view, it is operating in real-time. The hardware in the loop simulation is based on our Desktop PC Simulation (PCS) testbed. In the past, PCS was used for ground-based radars. This embedded simulation, called Embedded PCS, allows a rapid simulated evaluation of ground-based radar performance in a laboratory environment.

  18. Wave parameters comparisons between High Frequency (HF) radar system and an in situ buoy: a case study

    Science.gov (United States)

    Fernandes, Maria; Alonso-Martirena, Andrés; Agostinho, Pedro; Sanchez, Jorge; Ferrer, Macu; Fernandes, Carlos

    2015-04-01

    The coastal zone is an important area for the development of maritime countries, either in terms of recreation, energy exploitation, weather forecasting or national security. Field measurements are in the basis of understanding how coastal and oceanic processes occur. Most processes occur over long timescales and over large spatial ranges, like the variation of mean sea level. These processes also involve a variety of factors such as waves, winds, tides, storm surges, currents, etc., that cause huge interference on such phenomena. Measurement of waves have been carried out using different techniques. The instruments used to measure wave parameters can be very different, i.e. buoys, ship base equipment like sonar and satellites. Each equipment has its own advantage and disadvantage depending on the study subject. The purpose of this study is to evaluate the behaviour of a different technology available and presently adopted in wave measurement. In the past few years the measurement of waves using High Frequency (HF) Radars has had several developments. Such a method is already established as a powerful tool for measuring the pattern of surface current, but its use in wave measurements, especially in the dual arrangement is recent. Measurement of the backscatter of HF radar wave provides the raw dataset which is analyzed to give directional data of surface elevation at each range cell. Buoys and radars have advantages, disadvantages and its accuracy is discussed in this presentation. A major advantage with HF radar systems is that they are unaffected by weather, clouds or changing ocean conditions. The HF radar system is a very useful tool for the measurement of waves over a wide area with real-time observation, but it still lacks a method to check its accuracy. The primary goal of this study was to show how the HF radar system responds to high energetic variations when compared to wave buoy data. The bulk wave parameters used (significant wave height, period and

  19. Comparing and Merging Observation Data from Ka-Band Cloud Radar, C-Band Frequency-Modulated Continuous Wave Radar and Ceilometer Systems

    Directory of Open Access Journals (Sweden)

    Liping Liu

    2017-12-01

    Full Text Available Field experiment in South China was undertaken to improve understanding of cloud and precipitation properties. Measurements of the vertical structures of non-precipitating and precipitating clouds were obtained using passive and active remote sensing equipment: a Ka-band cloud radar (CR system, a C-band frequency modulated continuous wave vertical pointing radar (CVPR, a microwave radiometer and a laser ceilometer (CEIL. CR plays a key role in high-level cloud observation, whereas CVPR is important for observing low- and mid-level clouds and heavy precipitation. CEIL helps us diminish the effects of “clear-sky” in the planetary boundary layer. The experiment took place in Longmen, Guangdong Province, China from May to September of 2016. This study focuses on evaluating the ability of the two radars to deliver consistent observation data and develops an algorithm to merge the CR, CVPR and CEIL data. Cloud echo base, thickness, frequency of observed cloud types and reflectivity vertical distributions are analyzed in the radar data. Comparisons between the collocated data sets show that reflectivity biases between the CR three operating modes are less than 2 dB. The averaged difference between CR and CVPR reflectivity can be reduced with attenuation correction to 3.57 dB from the original 4.82 dB. No systemic biases were observed between velocity data collected in the three CR modes and CVPR. The corrected CR reflectivity and velocity data were then merged with the CVPR data and CEIL data to fill in the gaps during the heavy precipitation periods and reduce the effects of Bragg scattering and fog on cloud observations in the boundary layer. Meanwhile, the merging of velocity data with different Nyquist velocities and resolutions diminishes velocity folding to provide fine-grain information about cloud and precipitation dynamics. The three daily periods in which low-level clouds tended to occur were at sunrise, noon and sunset and large

  20. Optimal Power Allocation Algorithm for Radar Network Systems Based on Low Probability of Intercept Optimization(in English

    Directory of Open Access Journals (Sweden)

    Shi Chen-guang

    2014-08-01

    Full Text Available A novel optimal power allocation algorithm for radar network systems is proposed for Low Probability of Intercept (LPI technology in modern electronic warfare. The algorithm is based on the LPI optimization. First, the Schleher intercept factor for a radar network is derived, and then the Schleher intercept factor is minimized by optimizing the transmission power allocation among netted radars in the network to guarantee target-tracking performance. Furthermore, the Nonlinear Programming Genetic Algorithm (NPGA is used to solve the resulting nonconvex, nonlinear, and constrained optimization problem. Numerical simulation results show the effectiveness of the proposed algorithm.

  1. Weather Radar Stations

    Data.gov (United States)

    Department of Homeland Security — These data represent Next-Generation Radar (NEXRAD) and Terminal Doppler Weather Radar (TDWR) weather radar stations within the US. The NEXRAD radar stations are...

  2. 35-GHz radar sensor for automotive collision avoidance

    Science.gov (United States)

    Zhang, Jun

    1999-07-01

    This paper describes the development of a radar sensor system used for automotive collision avoidance. Because the heavy truck may have great larger radar cross section than a motorcyclist has, the radar receiver may have a large dynamic range. And multi-targets at different speed may confuse the echo spectrum causing the ambiguity between range and speed of target. To get more information about target and background and to adapt to the large dynamic range and multi-targets, a frequency modulated and pseudo- random binary sequences phase modulated continuous wave radar system is described. The analysis of this double- modulation system is given. A high-speed signal processing and data processing component are used to process and combine the data and information from echo at different direction and at every moment.

  3. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  4. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  5. Spectral Properties of Homogeneous and Nonhomogeneous Radar Images

    DEFF Research Database (Denmark)

    Madsen, Søren Nørvang

    1987-01-01

    On the basis of a two-dimensional, nonstationary white noisemodel for the complex radar backscatter, the spectral properties ofa one-look synthetic-aperture radar (SAR) system is derived. It isshown that the power spectrum of the complex SAR image is sceneindependent. It is also shown that the sp......On the basis of a two-dimensional, nonstationary white noisemodel for the complex radar backscatter, the spectral properties ofa one-look synthetic-aperture radar (SAR) system is derived. It isshown that the power spectrum of the complex SAR image is sceneindependent. It is also shown...... that the spectrum of the intensityimage is in general related to the radar scene spectrum by a linearintegral equation, a Fredholm's integral equation of the third kind.Under simplifying assumptions, a closed-form equation giving theradar scene spectrum as a function of the SAR image spectrum canbe derived....

  6. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  7. Impact of Cyber Attacks on High Voltage DC Transmission Damping Control

    Directory of Open Access Journals (Sweden)

    Rui Fan

    2018-04-01

    Full Text Available Hybrid AC/HVDC (AC-HVDC grids have evolved to become huge cyber-physical systems that are vulnerable to cyber attacks because of the wide attack surface and increasing dependence on intelligent electronic devices, computing resources and communication networks. This paper, for the first time, studies the impact of cyber attacks on HVDC transmission oscillation damping control.Three kinds of cyber attack models are considered: timing attack, replay attack and false data injection attack. Followed by a brief introduction of the HVDC model and conventional oscillation damping control method, the design of three attack models is described in the paper. These attacks are tested on a modified IEEE New England 39-Bus AC-HVDC system. Simulation results have shown that all three kinds of attacks are capable of driving the AC-HVDC system into large oscillations or even unstable conditions.

  8. Enhance the accuracy of radar snowfall estimation with Multi new Z-S relationships in MRMS system

    Science.gov (United States)

    Qi, Y.

    2017-12-01

    Snow may have negative affects on roadways and human lives, but the result of the melted snow/ice is good for farm, humans, and animals. For example, in the Southwest and West mountainous area of United States, water shortage is a very big concern. However, snowfall in the winter can provide humans, animals and crops an almost unlimited water supply. So, using radar to accurately estimate the snowfall is very important for human life and economic development in the water lacking area. The current study plans to analyze the characteristics of the horizontal and vertical variations of dry/wet snow using dual polarimetric radar observations, relative humidity and in situ snow water equivalent observations from the National Weather Service All Weather Prediction Accumulation Gauges (AWPAG) across the CONUS, and establish the relationships between the reflectivity (Z) and ground snow water equivalent (S). The new Z-S relationships will be evaluated with independent CoCoRaHS (Community Collaborative Rain, Hail & Snow Network) gauge observations and eventually implemented in the Multi-Radar Multi-Sensor system for improved quantitative precipitation estimation for snow. This study will analyze the characteristics of the horizontal and vertical variations of dry/wet snow using dual polarimetric radar observations, relative humidity and in situ snow water equivalent observations from the National Weather Service All Weather Prediction Accumulation Gauges (AWPAG) across the CONUS, and establish the relationships between the reflectivity (Z) and ground snow water equivalent (S). The new Z-S relationships will be used to reduce the error of snowfall estimation in Multi Radar and Multi Sensors (MRMS) system, and tested in MRMS system and evaluated with the COCORaHS observations. Finally, it will be ingested in MRMS sytem, and running in NWS/NCAR operationally

  9. Multi-antenna synthetic aperture radar

    CERN Document Server

    Wang, Wen-Qin

    2013-01-01

    Synthetic aperture radar (SAR) is a well-known remote sensing technique, but conventional single-antenna SAR is inherently limited by the minimum antenna area constraint. Although there are still technical issues to overcome, multi-antenna SAR offers many benefits, from improved system gain to increased degrees-of-freedom and system flexibility. Multi-Antenna Synthetic Aperture Radar explores the potential and challenges of using multi-antenna SAR in microwave remote sensing applications. These applications include high-resolution imaging, wide-swath remote sensing, ground moving target indica

  10. An X-Band Radar System for Bathymetry and Wave Field Analysis in a Harbour Area

    Directory of Open Access Journals (Sweden)

    Giovanni Ludeno

    2015-01-01

    Full Text Available Marine X-band radar based systems are well tested to provide information about sea state and bathymetry. It is also well known that complex geometries and non-uniform bathymetries provide a much bigger challenge than offshore scenarios. In order to tackle this issue a retrieval method is proposed, based on spatial partitioning of the data and the application of the Normalized Scalar Product (NSP, which is an innovative procedure for the joint estimation of bathymetry and surface currents. The strategy is then applied to radar data acquired around a harbour entrance, and results show that the reconstructed bathymetry compares well with ground truth data obtained by an echo-sounder campaign, thus proving the reliability of the whole procedure. The spectrum thus retrieved is then analysed to show the evidence of reflected waves from the harbour jetties, as confirmed by chain of hydrodynamic models of the sea wave field. The possibility of using a land based radar to reveal sea wave reflection is entirely new and may open up new operational applications of the system.

  11. A Wing Pod-based Millimeter Wave Cloud Radar on HIAPER

    Science.gov (United States)

    Vivekanandan, Jothiram; Tsai, Peisang; Ellis, Scott; Loew, Eric; Lee, Wen-Chau; Emmett, Joanthan

    2014-05-01

    One of the attractive features of a millimeter wave radar system is its ability to detect micron-sized particles that constitute clouds with lower than 0.1 g m-3 liquid or ice water content. Scanning or vertically-pointing ground-based millimeter wavelength radars are used to study stratocumulus (Vali et al. 1998; Kollias and Albrecht 2000) and fair-weather cumulus (Kollias et al. 2001). Airborne millimeter wavelength radars have been used for atmospheric remote sensing since the early 1990s (Pazmany et al. 1995). Airborne millimeter wavelength radar systems, such as the University of Wyoming King Air Cloud Radar (WCR) and the NASA ER-2 Cloud Radar System (CRS), have added mobility to observe clouds in remote regions and over oceans. Scientific requirements of millimeter wavelength radar are mainly driven by climate and cloud initiation studies. Survey results from the cloud radar user community indicated a common preference for a narrow beam W-band radar with polarimetric and Doppler capabilities for airborne remote sensing of clouds. For detecting small amounts of liquid and ice, it is desired to have -30 dBZ sensitivity at a 10 km range. Additional desired capabilities included a second wavelength and/or dual-Doppler winds. Modern radar technology offers various options (e.g., dual-polarization and dual-wavelength). Even though a basic fixed beam Doppler radar system with a sensitivity of -30 dBZ at 10 km is capable of satisfying cloud detection requirements, the above-mentioned additional options, namely dual-wavelength, and dual-polarization, significantly extend the measurement capabilities to further reduce any uncertainty in radar-based retrievals of cloud properties. This paper describes a novel, airborne pod-based millimeter wave radar, preliminary radar measurements and corresponding derived scientific products. Since some of the primary engineering requirements of this millimeter wave radar are that it should be deployable on an airborne platform

  12. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  13. Fpga based L-band pulse doppler radar design and implementation

    Science.gov (United States)

    Savci, Kubilay

    As its name implies RADAR (Radio Detection and Ranging) is an electromagnetic sensor used for detection and locating targets from their return signals. Radar systems propagate electromagnetic energy, from the antenna which is in part intercepted by an object. Objects reradiate a portion of energy which is captured by the radar receiver. The received signal is then processed for information extraction. Radar systems are widely used for surveillance, air security, navigation, weather hazard detection, as well as remote sensing applications. In this work, an FPGA based L-band Pulse Doppler radar prototype, which is used for target detection, localization and velocity calculation has been built and a general-purpose Pulse Doppler radar processor has been developed. This radar is a ground based stationary monopulse radar, which transmits a short pulse with a certain pulse repetition frequency (PRF). Return signals from the target are processed and information about their location and velocity is extracted. Discrete components are used for the transmitter and receiver chain. The hardware solution is based on Xilinx Virtex-6 ML605 FPGA board, responsible for the control of the radar system and the digital signal processing of the received signal, which involves Constant False Alarm Rate (CFAR) detection and Pulse Doppler processing. The algorithm is implemented in MATLAB/SIMULINK using the Xilinx System Generator for DSP tool. The field programmable gate arrays (FPGA) implementation of the radar system provides the flexibility of changing parameters such as the PRF and pulse length therefore it can be used with different radar configurations as well. A VHDL design has been developed for 1Gbit Ethernet connection to transfer digitized return signal and detection results to PC. An A-Scope software has been developed with C# programming language to display time domain radar signals and detection results on PC. Data are processed both in FPGA chip and on PC. FPGA uses fixed

  14. Electromagnetic characterization of white spruce at different moisture contents using synthetic aperture radar imaging

    Science.gov (United States)

    Ingemi, Christopher M.; Owusu Twumasi, Jones; Yu, Tzuyang

    2018-03-01

    Detection and quantification of moisture content inside wood (timber) is key to ensuring safety and reliability of timber structures. Moisture inside wood attracts insects and fosters the development of fungi to attack the timber, causing significant damages and reducing the load bearing capacity during their design life. The use of non-destructive evaluation (NDE) techniques (e.g., microwave/radar, ultrasonic, stress wave, and X-ray) for condition assessment of timber structures is a good choice. NDE techniques provide information about the level of deterioration and material properties of timber structures without obstructing their functionality. In this study, microwave/radar NDE technique was selected for the characterization of wood at different moisture contents. A 12 in-by-3.5 in-by-1.5 in. white spruce specimen (picea glauca) was imaged at different moisture contents using a 10 GHz synthetic aperture radar (SAR) sensor inside an anechoic chamber. The presence of moisture was found to increase the SAR image amplitude as expected. Additionally, integrated SAR amplitude was found beneficial in modeling the moisture content inside the wood specimen.

  15. Retrievals of Ice Cloud Microphysical Properties of Deep Convective Systems using Radar Measurements

    Science.gov (United States)

    Tian, J.; Dong, X.; Xi, B.; Wang, J.; Homeyer, C. R.

    2015-12-01

    This study presents innovative algorithms for retrieving ice cloud microphysical properties of Deep Convective Systems (DCSs) using Next-Generation Radar (NEXRAD) reflectivity and newly derived empirical relationships from aircraft in situ measurements in Wang et al. (2015) during the Midlatitude Continental Convective Clouds Experiment (MC3E). With composite gridded NEXRAD radar reflectivity, four-dimensional (space-time) ice cloud microphysical properties of DCSs are retrieved, which is not possible from either in situ sampling at a single altitude or from vertical pointing radar measurements. For this study, aircraft in situ measurements provide the best-estimated ice cloud microphysical properties for validating the radar retrievals. Two statistical comparisons between retrieved and aircraft in situ measured ice microphysical properties are conducted from six selected cases during MC3E. For the temporal-averaged method, the averaged ice water content (IWC) and median mass diameter (Dm) from aircraft in situ measurements are 0.50 g m-3 and 1.51 mm, while the retrievals from radar reflectivity have negative biases of 0.12 g m-3 (24%) and 0.02 mm (1.3%) with correlations of 0.71 and 0.48, respectively. For the spatial-averaged method, the IWC retrievals are closer to the aircraft results (0.51 vs. 0.47 g m-3) with a positive bias of 8.5%, whereas the Dm retrievals are larger than the aircraft results (1.65 mm vs. 1.51 mm) with a positive bias of 9.3%. The retrieved IWCs decrease from ~0.6 g m-3 at 5 km to ~0.15 g m-3 at 13 km, and Dm values decrease from ~2 mm to ~0.7 mm at the same levels. In general, the aircraft in situ measured IWC and Dm values at each level are within one standard derivation of retrieved properties. Good agreements between microphysical properties measured from aircraft and retrieved from radar reflectivity measurements indicate the reasonable accuracy of our retrievals.

  16. MAARSY - The new MST radar on Andøya: System description and first results

    Science.gov (United States)

    Latteck, Ralph; Zecha, Marius; Rapp, Markus; Stober, Gunter; Singer, Werner; Renkwitz, Toralf

    2012-07-01

    In 2011 the Leibniz-Institute of Atmospheric Physics in Kühlungsborn completed the installation of the Middle Atmosphere Alomar Radar System ({MAARSY}) on the North-Norwegian island Andøya. MAARSY is a 53.5 MHz monostatic radar with an active phased array antenna consisting of 433 Yagi antennas. The 3-element Yagi antennas are arranged in an equilateral triangular grid forming a circular aperture of approximately 6300 m^2. Each individual antenna is connected to its own transceiver with independent phase control and a scalable power output of up to 2 kW. This arrangement provides very high flexibility of beam forming and beam steering with a symmetric radar beam of a minimum beam width of 3.6°. The system allows classical beam swinging operation as well as experiments with simultaneous multiple beams and the use of interferometric applications for improved studies of the Arctic atmosphere from the troposphere up to the lower thermosphere with high spatio-temporal resolution. Standard observations of tropospheric winds and polar mesosphere summer echoes started immediately with an initial stage of expansion in spring 2010. Meteor head echo experiments and 3D observations of polar mesospheric winter echoes were conducted after an upgrade of the system in December 2010. Multi-beam experiments using up to 97 beams quasi-simultaneously in the mesosphere have been carried out during campaigns in summer 2011 with the completed system. We present a system description of MAARSY including beam pattern validation and show initial results from various campaigns obtained during the first 2 years of operation.

  17. Annual non-compliance report drops charge on Soviet radars

    International Nuclear Information System (INIS)

    Lockwood, D.

    1993-01-01

    Last year's non-compliance report said a data link between Soviet early warming radars and the Moscow ABM system may be a significant violation of fundamental provisions of the ABM Treaty. This year's report, however, reverses last years position by saying: In light of the ambiguity of the Treaty language, and based on further review of the issue and on the probable Soviet practice - the US now judges that the support of ABM systems by early warning radars providing precise handover data will not constitute use of the radars as ABM radars in violation of the ABM Treaty

  18. State transition storyboards: A tool for designing the Goldstone solar system radar data acquisition system user interface software

    Science.gov (United States)

    Howard, S. D.

    1987-01-01

    Effective user interface design in software systems is a complex task that takes place without adequate modeling tools. By combining state transition diagrams and the storyboard technique of filmmakers, State Transition Storyboards were developed to provide a detailed modeling technique for the Goldstone Solar System Radar Data Acquisition System human-machine interface. Illustrations are included with a description of the modeling technique.

  19. Radar-acoustic interaction for IFF applications

    Science.gov (United States)

    Saffold, James A.; Williamson, Frank R.; Ahuja, Krishan; Stein, Lawrence R.; Muller, Marjorie

    1998-08-01

    This paper describes the results of an internal development program (IDP) No. 97-1 conducted from August 1-October 1 1996 at the Georgia Tech Research Institute. The IDP program was implemented to establish theoretical relationships and verify the interaction between X-band radar waves and ultrasonic acoustics. Low cost, off-the-shelf components were used for the verification in order to illustrate the cost savings potential of developing and utilizing these systems. The measured data was used to calibrate the developed models of the phenomenology and to support extrapolation for radar systems which can exploit these interactions. One such exploitation is for soldier identification IFF and radar taggant concepts. The described IDP program provided the phenomenological data which is being used to extrapolate concept system performances based on technological limitations and battlefield conditions for low cost IFF and taggant configurations.

  20. A new ground-penetrating radar system for remote site characterization

    International Nuclear Information System (INIS)

    Davis, K.C.; Sandness, G.A.

    1994-08-01

    The cleanup of waste burial sites and military bombing ranges involves the risk of exposing field personnel to toxic chemicals, radioactive materials, or unexploded munitions. Time-consuming and costly measures are required to provide protection from those hazards. Therefore, there is a growing interest in developing remotely controlled sensors and sensor platforms that can be employed in site characterization surveys. A specialized ground-penetrating radar has been developed to operate on a remotely controlled vehicle for the non-intrusive subsurface characterization of buried waste sites. Improved radar circuits provide enhanced performance, and an embedded microprocessor dynamically optimizes operation. The radar unit is packaged to survive chemical contamination and decontamination

  1. Solution of inverse localization problem associated to multistatic radar system

    Directory of Open Access Journals (Sweden)

    Boutkhil M.

    2016-01-01

    Full Text Available This work deals with the problem of inverse localization by a target with the aim to retrieve the position of the target, given the intensity and phase of the electromagnetic waves scattered by this object. Assuming the surface cross section to be known as well as the intensity and phase of the scattered waves, the target position was reconstructed through the echo signals scattered of each bistatic. We develop in the same time a multistatic ambiguity function trough bistatic ambiguity function to investigate several fundamental aspects that determine multistatic radar performance. We used a multistatic radar constructed of two bistatic radars, two transmitters and one receiver.

  2. Shilling attack detection for recommender systems based on credibility of group users and rating time series.

    Science.gov (United States)

    Zhou, Wei; Wen, Junhao; Qu, Qiang; Zeng, Jun; Cheng, Tian

    2018-01-01

    Recommender systems are vulnerable to shilling attacks. Forged user-generated content data, such as user ratings and reviews, are used by attackers to manipulate recommendation rankings. Shilling attack detection in recommender systems is of great significance to maintain the fairness and sustainability of recommender systems. The current studies have problems in terms of the poor universality of algorithms, difficulty in selection of user profile attributes, and lack of an optimization mechanism. In this paper, a shilling behaviour detection structure based on abnormal group user findings and rating time series analysis is proposed. This paper adds to the current understanding in the field by studying the credibility evaluation model in-depth based on the rating prediction model to derive proximity-based predictions. A method for detecting suspicious ratings based on suspicious time windows and target item analysis is proposed. Suspicious rating time segments are determined by constructing a time series, and data streams of the rating items are examined and suspicious rating segments are checked. To analyse features of shilling attacks by a group user's credibility, an abnormal group user discovery method based on time series and time window is proposed. Standard testing datasets are used to verify the effect of the proposed method.

  3. A millimetre-wave MIMO radar system for threat detection in urban environments

    Science.gov (United States)

    Kirschner, A. J.; Guetlein, J.; Bertl, S.; Detlefsen, J.

    2012-10-01

    The European Defence Agency (EDA) engages countermeasures against Improvised Explosive Devices (IEDs) by funding several scientific programs on threat awareness, countermeasures IEDs or land-mine detection, in which this work is only one of numerous projects. The program, denoted as Surveillance in an urban environment using mobile sensors (SUM), covers the idea of equipping one or more vehicles of a patrol or a convoy with a set of sensors exploiting different physical principles in order to gain detailed insights of the road situation ahead. In order to give an added value to a conventional visual camera system, measurement data from an infra-red (IR) camera, a radiometer and a millimetre-wave radar are fused with data from an optical image and are displayed on a human-machine-interface (HMI) which shall assist the vehicle's co-driver to identify suspect objects or persons on or next to the road without forcing the vehicle to stop its cruise. This paper shall especially cover the role of the millimetre-wave radar sensor and its different operational modes. Measurement results are discussed. It is possible to alter the antenna mechanically which gives two choices for a field of view and angular resolution trade-off. Furthermore a synthetic aperture radar mode is possible and has been tested successfully. MIMO radar principles like orthogonal signal design were exploited tofrom a virtual array by 4 transmitters and 4 receivers. In joint evaluation, it was possible to detect e.g. grenade shells under cardboard boxes or covered metal barrels which were invisible for optical or infra-red detection.

  4. Noise and LPI radar as part of counter-drone mitigation system measures

    Science.gov (United States)

    Zhang, Yan (Rockee); Huang, Yih-Ru; Thumann, Charles

    2017-05-01

    With the rapid proliferation of small unmanned aerial systems (UAS) in the national airspace, small operational drones are being sometimes considered as a security threat for critical infrastructures, such as sports stadiums, military facilities, and airports. There have been many civilian counter-drone solutions and products reported, including radar and electromagnetic counter measures. For the current electromagnetic solutions, they are usually limited to particular type of detection and counter-measure scheme, which is usually effective for the specific type of drones. Also, control and communication link technologies used in even RC drones nowadays are more sophisticated, making them more difficult to detect, decode and counter. Facing these challenges, our team proposes a "software-defined" solution based on noise and LPI radar. For the detection, wideband-noise radar has the resolution performance to discriminate possible micro-Doppler features of the drone versus biological scatterers. It also has the benefit of more adaptive to different types of drones, and covertly detecting for security application. For counter-measures, random noise can be combined with "random sweeping" jamming scheme, to achieve the optimal balance between peak power allowed and the effective jamming probabilities. Some theoretical analysis of the proposed solution is provided in this study, a design case study is developed, and initial laboratory experiments, as well as outdoor tests are conducted to validate the basic concepts and theories. The study demonstrates the basic feasibilities of the Drone Detection and Mitigation Radar (DDMR) concept, while there are still much work needs to be done for a complete and field-worthy technology development.

  5. Sensor Systems for Biological Agent Attacks: Protecting Buildings and Military Bases

    Science.gov (United States)

    2004-01-01

    includes not only detection systems but vaccines, therapeutics , collective protection, and other means of protecting personnel in facilities and...attack. An overall biodefense architecture can include medical countermeasures (e.g., vaccines and therapeutics ) as well as personal and collective... Horticulture , aquaculture, seed/grain powders Small area sources, variable Other aerosols Arthropods Cosmopolitan, variable Sewage, stored

  6. A Scanning Microwave Radar and Radiometer

    DEFF Research Database (Denmark)

    Skou, Niels

    1995-01-01

    The Scanning Microwave Radar and Radiometer (SMRR) is a line scanner featuring a combined radar and radiometer system operating around 35 and 94 GHz. The layout of the SMRR is shown. The 2 offset antenna parabolas scan in synchronism, the receiver antenna has the highest gain in order to ensure...

  7. Research cooperation of the development of laser radar for environmental measurements; Kankyo keisokuyo laser radar no kaihatsu ni kansuru kenkyu kyoryoku

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    Research and development of the laser radar for measuring the air pollution in urban areas and the environmental information network have been conducted through the cooperation with Indonesian researchers. A measurement system suitable to actual situation of Indonesia has been constructed. In FY 1996, some works have been conducted as in the final fiscal year. To set the laser radar for environmental measurements and to make a plan of measurement research, conditions of air pollution in Indonesia and setting places of systems have been investigated. Opinions for the cooperation research have been exchanged with Indonesian researchers. Actual trends of the environmental measurements technology using laser radar have been surveyed. Indonesian researchers have been invited to learn operation and data processing of the system. One unit of MIE diffusion laser radar system has been designed and fabricated, and an additional data processing program has been made. The system has been delivered to Jakarta and installed. After the adjustment, performance tests have been conducted to complete the construction of the system. 3 refs., 72 figs., 10 tabs.

  8. FLIGHT DEVELOPMENT OF A DISTRIBUTED INERTIAL SATELLITE MICRONAVIGATTION SYSTEM FOR SYNTHETIC - APERTURE RADAR

    Directory of Open Access Journals (Sweden)

    Alexander Vladimirovich Chernodarov

    2017-01-01

    Full Text Available The current state of the onboard systems is characterized by the integration of aviation and radio-electronic equipment systems for solving problems of navigation and control. These problems include micro-navigation of the anten- na phase center (APC of the radar during the review of the Earth's surface from aboard the aircraft. Increasing of the reso- lution of the radar station (RLS by hardware increasing the antenna size is not always possible due to restrictions on the aircraft onboard equipment weight and dimensions. Therefore the implementation of analytic extension of the radiation pattern by "gluing" the images, obtained by RLS on the aircraft motion trajectory is embodied. The estimations are con- verted into amendments to the signals of RLS with synthetic aperture RSA to compensate instabilities. The purpose of the research is building a theoretical basis and a practical implementation of procedures for evaluating the trajectory APS in- stabilities using a distributed system of inertial-satellite micro-navigation (DSMN taking into account the RSA flight oper- ations actual conditions. The technology of evaluation and compensation of RSA trajectory instabilities via DSMN is con- sidered. The implementation of this technology is based on the mutual support of inertial, satellite and radar systems. Syn- chronization procedures of inertial and satellite measurements in the evaluation of DSMN errors are proposed. The given results of DSMN flight testing justify the possibility and expediency to apply the proposed technology in order to improve the resolution of RSA. The compensation of aircraft trajectory instabilities in RSA signals can be provided by inertial- satellite micro-navigation system, taking into account the actual conditions of the RSA flight operations. The researches show that in order to achieve the required resolution of RSA it seems to be appropriate to define the rational balance be- tween accuracy DSMN characteristics

  9. Mutual information-based LPI optimisation for radar network

    Science.gov (United States)

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  10. Improvement of antenna decoupling in radar systems

    Science.gov (United States)

    Anchidin, Liliana; Topor, Raluca; Tamas, Razvan D.; Dumitrascu, Ana; Danisor, Alin; Berescu, Serban

    2015-02-01

    In this paper we present a type of antipodal Vivaldi antenna design, which can be used for pulse radiation in UWB communication. The Vivaldi antenna is a special tapered slot antenna with planar structure which is easily to be integrated with transmitting elements and receiving elements to form a compact structure. When the permittivity is very large, the wavelength of slot mode is so short that the electromagnetic fields concentrate in the slot to form an effective and balanced transmission line. Due to its simple structure and small size the Vivaldi antennas are one of the most popular designs used in UWB applications. However, for a two-antenna radar system, there is a high mutual coupling between two such antennas due to open configuration. In this paper, we propose a new method for reducing this effect. The method was validated by simulating a system of two Vivaldi antennas in front of a standard target.

  11. Intercomparison of attenuation correction algorithms for single-polarized X-band radars

    Science.gov (United States)

    Lengfeld, K.; Berenguer, M.; Sempere Torres, D.

    2018-03-01

    Attenuation due to liquid water is one of the largest uncertainties in radar observations. The effects of attenuation are generally inversely proportional to the wavelength, i.e. observations from X-band radars are more affected by attenuation than those from C- or S-band systems. On the other hand, X-band radars can measure precipitation fields in higher temporal and spatial resolution and are more mobile and easier to install due to smaller antennas. A first algorithm for attenuation correction in single-polarized systems was proposed by Hitschfeld and Bordan (1954) (HB), but it gets unstable in case of small errors (e.g. in the radar calibration) and strong attenuation. Therefore, methods have been developed that restrict attenuation correction to keep the algorithm stable, using e.g. surface echoes (for space-borne radars) and mountain returns (for ground radars) as a final value (FV), or adjustment of the radar constant (C) or the coefficient α. In the absence of mountain returns, measurements from C- or S-band radars can be used to constrain the correction. All these methods are based on the statistical relation between reflectivity and specific attenuation. Another way to correct for attenuation in X-band radar observations is to use additional information from less attenuated radar systems, e.g. the ratio between X-band and C- or S-band radar measurements. Lengfeld et al. (2016) proposed such a method based isotonic regression of the ratio between X- and C-band radar observations along the radar beam. This study presents a comparison of the original HB algorithm and three algorithms based on the statistical relation between reflectivity and specific attenuation as well as two methods implementing additional information of C-band radar measurements. Their performance in two precipitation events (one mainly convective and the other one stratiform) shows that a restriction of the HB is necessary to avoid instabilities. A comparison with vertically pointing

  12. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  13. Security awareness for public bus transportation : case studies of attacks against the Israeli public bus system [research brief].

    Science.gov (United States)

    2012-03-01

    Government regulators and transportation operators of public bus systems are concerned about terrorist attacks. Bus attacks in Israel between late September 2000 and the end of 2006, a period known as the Second Intifada, are particularly well known....

  14. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems

    Science.gov (United States)

    Jaimez, Marc; Esparza, Oscar; Muñoz, Jose L.; Alins-Delgado, Juan J.; Mata-Díaz, Jorge

    Mobile agents are software entities consisting of code, data, state and itinerary that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In particular, collusion attacks have been barely studied in the literature. This paper presents a mechanism that avoids collusion attacks based on code passing. Our proposal is based on a Multi-Code agent, which contains a different variant of the code for each host. A Trusted Third Party is responsible for providing the information to extract its own variant to the hosts, and for taking trusted timestamps that will be used to verify time coherence.

  15. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

    Science.gov (United States)

    Yuan, Yuan; Sun, Fuchun; Liu, Huaping

    2016-07-01

    This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.

  16. Radar, sonar, and holography an introduction

    CERN Document Server

    Kock, Winston E

    1974-01-01

    Radar, Sonar, and Holography: An Introduction provides an introduction to the technology of radar and sonar. Because the new science of holography is affecting both these fields quite strongly, the book includes an explanation of the fundamental principles underlying this new art (including the subjects of wave coherence, interference, and diffraction) and of the hologram process itself. Finally, numerous examples are discussed which show how holography is providing new horizons to radar and sonar systems. The book thus also provides a simple approach to the new technology of holography. The

  17. A Tower-based Prototype VHF/UHF Radar for Subsurface Sensing: System Description and Data Inversion Results

    Science.gov (United States)

    Moghaddam, Mahta; Pierce, Leland; Tabatabaeenejad, Alireza; Rodriguez, Ernesto

    2005-01-01

    Knowledge of subsurface characteristics such as permittivity variations and layering structure could provide a breakthrough in many terrestrial and planetary science disciplines. For Earth science, knowledge of subsurface and subcanopy soil moisture layers can enable the estimation of vertical flow in the soil column linking surface hydrologic processes with that in the subsurface. For planetary science, determining the existence of subsurface water and ice is regarded as one of the most critical information needs for the study of the origins of the solar system. The subsurface in general can be described as several near-parallel layers with rough interfaces. Each homogenous rough layer can be defined by its average thickness, permittivity, and rms interface roughness assuming a known surface spectral distribution. As the number and depth of layers increase, the number of measurements needed to invert for the layer unknowns also increases, and deeper penetration capability would be required. To nondestructively calculate the characteristics of the rough layers, a multifrequency polarimetric radar backscattering approach can be used. One such system is that we have developed for data prototyping of the Microwave Observatory of Subcanopy and Subsurface (MOSS) mission concept. A tower-mounted radar makes backscattering measurements at VHF, UHF, and L-band frequencies. The radar is a pulsed CW system, which uses the same wideband antenna to transmit and receive the signals at all three frequencies. To focus the beam at various incidence angles within the beamwidth of the antenna, the tower is moved vertically and measurements made at each position. The signals are coherently summed to achieve focusing and image formation in the subsurface. This requires an estimate of wave velocity profiles. To solve the inverse scattering problem for subsurface velocity profile simultaneously with radar focusing, we use an iterative technique based on a forward numerical solution of

  18. Radar data processing using a distributed computational system

    Science.gov (United States)

    Mota, Gilberto F.

    1992-06-01

    This research specifies and validates a new concurrent decomposition scheme, called Confined Space Search Decomposition (CSSD), to exploit parallelism of Radar Data Processing algorithms using a Distributed Computational System. To formalize the specification, we propose and apply an object-oriented methodology called Decomposition Cost Evaluation Model (DCEM). To reduce the penalties of load imbalance, we propose a distributed dynamic load balance heuristic called Object Reincarnation (OR). To validate the research, we first compare our decomposition with an identified alternative using the proposed DCEM model and then develop a theoretical prediction of selected parameters. We also develop a simulation to check the Object Reincarnation Concept.

  19. Comparison of FPS-16 radar/jimsphere and NASA's 50-MHz radar wind profiler turbulence indicators

    Science.gov (United States)

    Susko, Michael

    1993-01-01

    Measurements of the wind and turbulent regions from the surface to 16 km by the FPS-11 radar/jimsphere system are reported with particular attention given to the use of these turbulence and wind assessments to validate the NASA 50-MHz radar wind profiler. Wind profile statistics were compared at 150-m wavelengths, a wavelength validated from 20 jimspheres, simultaneously tracked by FPS-16 and FPQ-14 radar, and the resulting analysis of auto spectra, cross-spectra, and coherence squared spectra of the wind profiles. Results demonstrate that the NASA prototype wind profiler is an excellent monitoring device illustrating the measurements of the winds within 1/2 hour of launch zero.

  20. Accuracy of three-dimensional glacier surface volocities derived from radar interfeometry and ice-soundin radar measurements

    DEFF Research Database (Denmark)

    Mohr, Johan Jacob; Reeh, Niels; Madsen, Søren Nørvang

    2003-01-01

    We present a method for analyzing the errors involved in measuring three-dimensional glacier velocities with interferometric radar. We address the surface-parallel flow assumption and an augmented approach with a flux-divergence (FD) term. The errors in an interferometric ERS-1/-2 satellite radar...... dataset with ascending- and descending-orbit data covering Storstrommen glacier, northeast Greenland, are assessed. The FD error assessment is carried out on airborne 60 MHz ice-sounding radar data from the same area. A simple model of an interferometric radar system is developed and analyzed. The error...... sources considered include phase noise, atmospheric distortions, baseline calibration errors, a dry snow layer, and the stationary-flow assumption used in differential interferometry. The additional error sources in the analysis of FD errors are noise, bias and unknown variations of the ice thickness...

  1. Investigating nearby exoplanets via interstellar radar

    Science.gov (United States)

    Scheffer, Louis K.

    2014-01-01

    Interstellar radar is a potential intermediate step between passive observation of exoplanets and interstellar exploratory missions. Compared with passive observation, it has the traditional advantages of radar astronomy. It can measure surface characteristics, determine spin rates and axes, provide extremely accurate ranges, construct maps of planets, distinguish liquid from solid surfaces, find rings and moons, and penetrate clouds. It can do this even for planets close to the parent star. Compared with interstellar travel or probes, it also offers significant advantages. The technology required to build such a radar already exists, radar can return results within a human lifetime, and a single facility can investigate thousands of planetary systems. The cost, although too high for current implementation, is within the reach of Earth's economy.

  2. New look at radar auroral motions

    International Nuclear Information System (INIS)

    Greenwald, R.A.; Ecklund, W.L.

    1975-01-01

    During October 1974, three modifications were temporarily added to the NOAA radar auroral backscatter facility located at Anchorage, Alaska. These modifications included (1) a multiple azimuth antenna system. (2) an on-line computer for processing amplitude and mean Doppler profiles of the radar backscatter, and (3) a 13-baud Barker coder. In combination with the radar these modifications provided data relevant to understanding both the microscopic and the macroscopic nature of the radar aurora. Appreciable structure was often found in the Doppler velocity profiles of radar auroral irregularities. Doppler velocities of nearly 2000 m/s were observed. By combining scatter amplitude profiles and mean Doppler profiles from the five azimuths we have produced contour maps of the scatter intensity and the Doppler velocity. The scatter intensity maps often indicate appreciable temporal and spatial structure in the radar auroral irregularities, corroborating the results of Tsunoda et al. (1974). The mean Doppler contour maps indicate that there is also appreciable temporal and spatial structure in the flow velocities of radar auroral irregularities. At those times when there appears to be large-scale uniformity in the irregularity flow, the Doppler velocity varies with azimuth in a manner that is consistent with a cosine-dependent azimuthal variation

  3. Advanced signal processing theory and implementation for sonar, radar, and non-invasive medical diagnostic systems

    CERN Document Server

    Stergiopoulos, Stergios

    2009-01-01

    Integrates topics of signal processing from sonar, radar, and medical system technologies by identifying their concept similarities. This book covers non-invasive medical diagnostic system applications, including intracranial ultrasound, a technology that attempts to address non-invasive detection on brain injuries and stroke.

  4. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  5. Foliage penetration radar detection and characterization of objects under trees

    CERN Document Server

    Davis, Mark

    2011-01-01

    This book covers all aspects of foliage penetration (FOPEN) radar, concentrating on both airborne military radar systems as well as earth resource mapping radars. It is the first concise and thorough treatment of FOPEN, covering the results of a decade-long investment by DARPA in characterizing foliage and earth surface with ultrawideband UHF and VHF synthetic aperture radar (SAR).

  6. Smoothing Motion Estimates for Radar Motion Compensation.

    Energy Technology Data Exchange (ETDEWEB)

    Doerry, Armin W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-07-01

    Simple motion models for complex motion environments are often not adequate for keeping radar data coherent. Eve n perfect motion samples appli ed to imperfect models may lead to interim calculations e xhibiting errors that lead to degraded processing results. Herein we discuss a specific i ssue involving calculating motion for groups of pulses, with measurements only available at pulse-group boundaries. - 4 - Acknowledgements This report was funded by General A tomics Aeronautical Systems, Inc. (GA-ASI) Mission Systems under Cooperative Re search and Development Agre ement (CRADA) SC08/01749 between Sandia National Laboratories and GA-ASI. General Atomics Aeronautical Systems, Inc. (GA-ASI), an affilia te of privately-held General Atomics, is a leading manufacturer of Remotely Piloted Aircraft (RPA) systems, radars, and electro-optic and rel ated mission systems, includin g the Predator(r)/Gray Eagle(r)-series and Lynx(r) Multi-mode Radar.

  7. Weather radar rainfall data in urban hydrology

    DEFF Research Database (Denmark)

    Thorndahl, Søren; Einfalt, Thomas; Willems, Patrick

    2017-01-01

    estimation, radar data adjustment and data quality, and (3) nowcasting of radar rainfall and real-time applications. Based on these three fields of research, the paper provides recommendations based on an updated overview of shortcomings, gains, and novel developments in relation to urban hydrological...... applications. The paper also reviews how the focus in urban hydrology research has shifted over the last decade to fields such as climate change impacts, resilience of urban areas to hydrological extremes, and online prediction/warning systems. It is discussed how radar rainfall data can add value......Application of weather radar data in urban hydrological applications has evolved significantly during the past decade as an alternative to traditional rainfall observations with rain gauges. Advances in radar hardware, data processing, numerical models, and emerging fields within urban hydrology...

  8. Test results for triple-modulation radar electronics with improved range disambiguation

    Energy Technology Data Exchange (ETDEWEB)

    Pollastrone, Fabio, E-mail: fabio.pollastrone@enea.it; Neri, Carlo

    2015-10-15

    Highlights: • A new digital radar electronic system based on triple-modulation has been developed. • The triple-modulation system uses an improved algorithm for the range-disambiguation. • The new radar electronics has been applied in the IVVS optical radar prototype for ITER. • The performances obtained with IVVS double and triple-modulation were compared. - Abstract: The In Vessel Viewing System (IVVS) is an optical radar with sub milimetrical resolution that will be used for imaging and metrology pourposes in ITER. The electronics of the system is based on a Digital Radar Electronics developed in ENEA Frascati laboratories during the past years. Until the present study, the system was based on amplitude modulation technique having double-modulation frequency. The power of the laser is sinusoidally modulated and the distance of the points scanned by the laser beam is obtained measuring the phase difference between outgoing and echo signals. Recently a triple-modulation radar electronics version and an algorithm able to solve the range disambiguation were developed. The aim of the upgrade was the increase of the robustness in the range disambiguation. The paper briefly describes the updates carried out on the Digital Radar Electronics and extensively the test results obtained by comparing the performance of the triple modulation versus the double modulation techniques.

  9. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  10. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  11. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  12. Artificial Neural Network-Based Clutter Reduction Systems for Ship Size Estimation in Maritime Radars

    Directory of Open Access Journals (Sweden)

    M. P. Jarabo-Amores

    2010-01-01

    Full Text Available The existence of clutter in maritime radars deteriorates the estimation of some physical parameters of the objects detected over the sea surface. For that reason, maritime radars should incorporate efficient clutter reduction techniques. Due to the intrinsic nonlinear dynamic of sea clutter, nonlinear signal processing is needed, what can be achieved by artificial neural networks (ANNs. In this paper, an estimation of the ship size using an ANN-based clutter reduction system followed by a fixed threshold is proposed. High clutter reduction rates are achieved using 1-dimensional (horizontal or vertical integration modes, although inaccurate ship width estimations are achieved. These estimations are improved using a 2-dimensional (rhombus integration mode. The proposed system is compared with a CA-CFAR system, denoting a great performance improvement and a great robustness against changes in sea clutter conditions and ship parameters, independently of the direction of movement of the ocean waves and ships.

  13. Research and development of laser radar for environmental measurements. Pt. 3; Kankyo keisokuyo laser radar no kenkyu kaihatsu. 3

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    Described herein are the results of the joint project between Japan and Indonesia to construct a new laser radar network system, which can three-dimensionally measure air pollution conditions in urban areas, in Djakarta. This joint project is implemented to elucidate the mechanisms involved in air pollution in the city, and thereby to contribute to environmental administration of Indonesia. This project is expected to give the basic approach to solution of environmental problems in urban areas, and eventually on a global scale, and hence to contribute to construction of the global network systems for environment-related information, which should be necessary in the near future. The (ODA Laser Radar Development Committee) is the deliberative body for the project, responsible for evaluating the project results. The project will be implemented on a 4-year plan from FY1993 to 1996. The activities in this year, the third year for the project, include on-the-spot survey, selection of the laser radar site, and development/improvement of the laser radar system. These results are described herein. (NEDO)

  14. Measurement of electromagnetic fields generated by air traffic control radar systems with spectrum analysers.

    Science.gov (United States)

    Barellini, A; Bogi, L; Licitra, G; Silvi, A M; Zari, A

    2009-12-01

    Air traffic control (ATC) primary radars are 'classical' radars that use echoes of radiofrequency (RF) pulses from aircraft to determine their position. High-power RF pulses radiated from radar antennas may produce high electromagnetic field levels in the surrounding area. Measurement of electromagnetic fields produced by RF-pulsed radar by means of a swept-tuned spectrum analyser are investigated here. Measurements have been carried out both in the laboratory and in situ on signals generated by an ATC primary radar.

  15. Measurement of electromagnetic fields generated by air traffic control radar systems with spectrum analysers

    International Nuclear Information System (INIS)

    Barellini, A.; Bogi, L.; Licitra, G.; Silvi, A. M.; Zari, A.

    2009-01-01

    Air traffic control (ATC) primary radars are 'classical' radars that use echoes of radiofrequency (RF) pulses from aircraft to determine their position. High-power RF pulses radiated from radar antennas may produce high electromagnetic field levels in the surrounding area. Measurement of electromagnetic fields produced by RF-pulsed radar by means of a swept-tuned spectrum analyser are investigated here. Measurements have been carried out both in the laboratory and in situ on signals generated by an ATC primary radar. (authors)

  16. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  17. Photoelectric radar servo control system based on ARM+FPGA

    Science.gov (United States)

    Wu, Kaixuan; Zhang, Yue; Li, Yeqiu; Dai, Qin; Yao, Jun

    2016-01-01

    In order to get smaller, faster, and more responsive requirements of the photoelectric radar servo control system. We propose a set of core ARM + FPGA architecture servo controller. Parallel processing capability of FPGA to be used for the encoder feedback data, PWM carrier modulation, A, B code decoding processing and so on; Utilizing the advantage of imaging design in ARM Embedded systems achieves high-speed implementation of the PID algorithm. After the actual experiment, the closed-loop speed of response of the system cycles up to 2000 times/s, in the case of excellent precision turntable shaft, using a PID algorithm to achieve the servo position control with the accuracy of + -1 encoder input code. Firstly, This article carry on in-depth study of the embedded servo control system hardware to determine the ARM and FPGA chip as the main chip with systems based on a pre-measured target required to achieve performance requirements, this article based on ARM chip used Samsung S3C2440 chip of ARM7 architecture , the FPGA chip is chosen xilinx's XC3S400 . ARM and FPGA communicate by using SPI bus, the advantage of using SPI bus is saving a lot of pins for easy system upgrades required thereafter. The system gets the speed datas through the photoelectric-encoder that transports the datas to the FPGA, Then the system transmits the datas through the FPGA to ARM, transforms speed datas into the corresponding position and velocity data in a timely manner, prepares the corresponding PWM wave to control motor rotation by making comparison between the position data and the velocity data setted in advance . According to the system requirements to draw the schematics of the photoelectric radar servo control system and PCB board to produce specially. Secondly, using PID algorithm to control the servo system, the datas of speed obtained from photoelectric-encoder is calculated position data and speed data via high-speed digital PID algorithm and coordinate models. Finally, a

  18. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  19. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  20. Radar efficiency and the calculation of decade-long PMSE backscatter cross-section for the Resolute Bay VHF radar

    Directory of Open Access Journals (Sweden)

    N. Swarnalingam

    2009-04-01

    Full Text Available The Resolute Bay VHF radar, located in Nunavut, Canada (75.0° N, 95.0° W and operating at 51.5 MHz, has been used to investigate Polar Mesosphere Summer Echoes (PMSE since 1997. PMSE are a unique form of strong coherent radar echoes, and their understanding has been a challenge to the scientific community since their discovery more than three decades ago. While other high latitude radars have recorded strong levels of PMSE activities, the Resolute Bay radar has observed relatively lower levels of PMSE strengths. In order to derive absolute measurements of PMSE strength at this site, a technique is developed to determine the radar efficiency using cosmic (sky noise variations along with the help of a calibrated noise source. VHF radars are only rarely calibrated, but determination of efficiency is even less common. Here we emphasize the importance of efficiency for determination of cross-section measurements. The significant advantage of this method is that it can be directly applied to any MST radar system anywhere in the world as long as the sky noise variations are known. The radar efficiencies for two on-site radars at Resolute Bay are determined. PMSE backscatter cross-section is estimated, and decade-long PMSE strength variations at this location are investigated. It was noticed that the median of the backscatter cross-section distribution remains relatively unchanged, but over the years a great level of variability occurs in the high power tail of the distribution.

  1. Preventing DoS attacks in peer-to-peer media streaming systems

    Science.gov (United States)

    Conner, William; Nahrstedt, Klara; Gupta, Indranil

    2006-01-01

    This paper presents a framework for preventing both selfishness and denial-of-service attacks in peer-to-peer media streaming systems. Our framework, called Oversight, achieves prevention of these undesirable activities by running a separate peer-to-peer download rate enforcement protocol along with the underlying peer-to-peer media streaming protocol. This separate Oversight protocol enforces download rate limitations on each participating peer. These limitations prevent selfish or malicious nodes from downloading an overwhelming amount of media stream data that could potentially exhaust the entire system. Since Oversight is based on a peer-to-peer architecture, it can accomplish this enforcement functionality in a scalable, efficient, and decentralized way that fits better with peer-to-peer media streaming systems compared to other solutions based on central server architectures. As peer-to-peer media streaming systems continue to grow in popularity, the threat of selfish and malicious peers participating in such large peer-to-peer networks will continue to grow as well. For example, since peer-to-peer media streaming systems allow users to send small request messages that result in the streaming of large media objects, these systems provide an opportunity for malicious users to exhaust resources in the system with little effort expended on their part. However, Oversight addresses these threats associated with selfish or malicious peers who cause such disruptions with excessive download requests. We evaluated our Oversight solution through simulations and our results show that applying Oversight to peer-to-peer media streaming systems can prevent both selfishness and denial-of-service attacks by effectively limiting the download rates of all nodes in the system.

  2. Weather radars – the new eyes for offshore wind farms?

    DEFF Research Database (Denmark)

    Trombe, Pierre-Julien; Pinson, Pierre; Vincent, Claire Louise

    2014-01-01

    Offshore wind fluctuations are such that dedicated prediction and control systems are needed for optimizing the management of wind farms in real-time. In this paper, we present a pioneer experiment – Radar@Sea – in which weather radars are used for monitoring the weather at the Horns Rev offshore...... inputs to prediction systems for anticipating changes in the wind fluctuation dynamics, generating improved wind power forecasts and developing specific control strategies. However, integrating weather radar observations into automated decision support systems is not a plug-and-play task...... observed at Horns Rev and (iv) we discuss the future perspectives for weather radars in wind energy. Copyright © 2013 John Wiley & Sons, Ltd....

  3. Physical working principles of medical radar.

    Science.gov (United States)

    Aardal, Øyvind; Paichard, Yoann; Brovoll, Sverre; Berger, Tor; Lande, Tor Sverre; Hamran, Svein-Erik

    2013-04-01

    There has been research interest in using radar for contactless measurements of the human heartbeat for several years. While many systems have been demonstrated, not much attention have been given to the actual physical causes of why this work. The consensus seems to be that the radar senses small body movements correlated with heartbeats, but whether only the movements of the body surface or reflections from internal organs are also monitored have not been answered definitely. There has recently been proposed another theory that blood perfusion in the skin could be the main reason radars are able to detect heartbeats. In this paper, an experimental approach is given to determine the physical causes. The measurement results show that it is the body surface reflections that dominate radar measurements of human heartbeats.

  4. Wind Turbine Radar Cross Section

    Directory of Open Access Journals (Sweden)

    David Jenn

    2012-01-01

    Full Text Available The radar cross section (RCS of a wind turbine is a figure of merit for assessing its effect on the performance of electronic systems. In this paper, the fundamental equations for estimating the wind turbine clutter signal in radar and communication systems are presented. Methods of RCS prediction are summarized, citing their advantages and disadvantages. Bistatic and monostatic RCS patterns for two wind turbine configurations, a horizontal axis three-blade design and a vertical axis helical design, are shown. The unique electromagnetic scattering features, the effect of materials, and methods of mitigating wind turbine clutter are also discussed.

  5. The Next Generation of Airborne Polarimetric Doppler Weather Radar: NCAR/EOL Airborne Phased Array Radar (APAR) Development

    Science.gov (United States)

    Moore, James; Lee, Wen-Chau; Loew, Eric; Vivekanandan, Jothiram; Grubišić, Vanda; Tsai, Peisang; Dixon, Mike; Emmett, Jonathan; Lord, Mark; Lussier, Louis; Hwang, Kyuil; Ranson, James

    2017-04-01

    The National Center for Atmospheric Research (NCAR) Earth observing Laboratory (EOL) is entering the third year of preliminary system design studies, engineering prototype testing and project management plan preparation for the development of a novel Airborne Phased Array Radar (APAR). This system being designed by NCAR/EOL will be installed and operated on the NSF/NCAR C-130 aircraft. The APAR system will consist of four removable C-band Active Electronically Scanned Arrays (AESA) strategically placed on the fuselage of the aircraft. Each AESA measures approximately 1.5 x 1.9 m and is composed of 3000 active radiating elements arranged in an array of line replaceable units (LRU) to simplify maintenance. APAR will provide unprecedented observations, and in conjunction with the advanced radar data assimilation schema, will be able to address the key science questions to improve understanding and predictability of significant and high-impact weather APAR, operating at C-band, allows the measurement of 3-D kinematics of the more intense portions of storms (e.g. thunderstorm dynamics and tornadic development, tropical cyclone rainband structure and evolution) with less attenuation compared with current airborne Doppler radar systems. Polarimetric measurements are not available from current airborne tail Doppler radars. However, APAR, with dual-Doppler and dual polarization diversity at a lesser attenuating C-band wavelength, will further advance the understanding of the microphysical processes within a variety of precipitation systems. The radar is sensitive enough to provide high resolution measurements of winter storm dynamics and microphysics. The planned APAR development that would bring the system to operational readiness for research community use aboard the C-130 is expected to take 8 years once major funding support is realized. The authors will review the overall APAR design and provide new details of the system based on our Technical Requirements Document

  6. Simulation of a weather radar display for over-water airborne radar approaches

    Science.gov (United States)

    Clary, G. R.

    1983-01-01

    Airborne radar approach (ARA) concepts are being investigated as a part of NASA's Rotorcraft All-Weather Operations Research Program on advanced guidance and navigation methods. This research is being conducted using both piloted simulations and flight test evaluations. For the piloted simulations, a mathematical model of the airborne radar was developed for over-water ARAs to offshore platforms. This simulated flight scenario requires radar simulation of point targets, such as oil rigs and ships, distributed sea clutter, and transponder beacon replies. Radar theory, weather radar characteristics, and empirical data derived from in-flight radar photographs are combined to model a civil weather/mapping radar typical of those used in offshore rotorcraft operations. The resulting radar simulation is realistic and provides the needed simulation capability for ongoing ARA research.

  7. Ground and Space Radar Volume Matching and Comparison Software

    Science.gov (United States)

    Morris, Kenneth; Schwaller, Mathew

    2010-01-01

    This software enables easy comparison of ground- and space-based radar observations. The software was initially designed to compare ground radar reflectivity from operational, ground based Sand C-band meteorological radars with comparable measurements from the Tropical Rainfall Measuring Mission (TRMM) satellite s Precipitation Radar (PR) instrument. The software is also applicable to other ground-based and space-based radars. The ground and space radar volume matching and comparison software was developed in response to requirements defined by the Ground Validation System (GVS) of Goddard s Global Precipitation Mission (GPM) project. This software innovation is specifically concerned with simplifying the comparison of ground- and spacebased radar measurements for the purpose of GPM algorithm and data product validation. This software is unique in that it provides an operational environment to routinely create comparison products, and uses a direct geometric approach to derive common volumes of space- and ground-based radar data. In this approach, spatially coincident volumes are defined by the intersection of individual space-based Precipitation Radar rays with the each of the conical elevation sweeps of the ground radar. Thus, the resampled volume elements of the space and ground radar reflectivity can be directly compared to one another.

  8. Fiber optic coherent laser radar 3D vision system

    International Nuclear Information System (INIS)

    Clark, R.B.; Gallman, P.G.; Slotwinski, A.R.; Wagner, K.; Weaver, S.; Xu, Jieping

    1996-01-01

    This CLVS will provide a substantial advance in high speed computer vision performance to support robotic Environmental Management (EM) operations. This 3D system employs a compact fiber optic based scanner and operator at a 128 x 128 pixel frame at one frame per second with a range resolution of 1 mm over its 1.5 meter working range. Using acousto-optic deflectors, the scanner is completely randomly addressable. This can provide live 3D monitoring for situations where it is necessary to update once per second. This can be used for decontamination and decommissioning operations in which robotic systems are altering the scene such as in waste removal, surface scarafacing, or equipment disassembly and removal. The fiber- optic coherent laser radar based system is immune to variations in lighting, color, or surface shading, which have plagued the reliability of existing 3D vision systems, while providing substantially superior range resolution

  9. Advanced Architectures for Modern Weather/Multifunction Radars

    Science.gov (United States)

    2017-03-01

    Radar (PAIR) system, a mobile , C-band, active phased array with multiple digital beams for imaging (under development). The digital transceiver... backend from Horus is also being used to drive row-based analog subarrays of the future Polarimetric Atmospheric Imaging Radar (PAIR, Fig. 6), which is

  10. Paleodrainages of the Eastern Sahara - The radar rivers revisited (SIR-A/B implications for a mid-tertiary Trans-African drainage system)

    Science.gov (United States)

    Mccauley, J. F.; Breed, C. S.; Schaber, G. G.; Mchugh, W. P.; Haynes, C. C.

    1986-01-01

    The images obtained by the Shuttle Imaging Radar (SIR)-A and -B systems over the southwestern Egypt and northwestern Sudan were coregistered with the Landsat images and the existing maps to aid in extrapolations of the buried paleodrainages ('radar rivers'), first discovered by SIR-A. Field observations explain the radar responses of three types of radar rivers, RR-1 (broad, aggraded valleys filled with alluvium), RR-2 (braided channels inset in the RR-1 valleys), and RR-3 (narrow, long, bedrock-incised channels). A generalized model of the radar rivers, based on field studies and regional geologic relations, shows inferred changes in river regimen since the large valleys were established during the later Paleogene-early Neogene. It is suggested that a former Trans-African master stream system may have flowed from headwaters in the Red Sea Hills southwestward across North Africa, discharging into the Atlantic at the Paleo-Niger delta, prior to the Neogene domal uplifts and building of volcanic edifices across the paths of these ancient watercourses.

  11. Evaluation of radar imagery for geological and cartographic applications

    Science.gov (United States)

    Moore, Gerald K.; Sheehan, Cynthia A.

    1981-01-01

    -cost method of reproducing the images. The images from modern, commercially available radar systems have good visual quality; they also have better geometric accuracy and higher information content than images from older systems. Images from modern systems, however, also have some of the same disadvantages as those from older systems. The most serious problem is that considerable information is lost in the process of recording the radar return on film. Another problem is that the oblique radar view of the landscape results in interpretations that are biased by look direction. A compromise antenna depression angle also commonly results in inadequate or excessive shadowing in parts of the image. There is a need for high-resolution digital data, not currently available from the private sector, to significantly improve the utility of radar data for geologic and cartographic applications.

  12. Discussion on informatization teaching of certain radar transmitter

    Science.gov (United States)

    Liang, Guanhui; Lv, Guizhou; Meng, Yafeng

    2017-04-01

    With the development of informatization, the traditional teaching method of certain radar transmitter is more and more difficult to meet the need of cultivating new type of high-quality military talents. This paper first analyzes the problems traditional teaching method of certain radar transmitter, and then puts forward the strategy of informatization teaching, and finally elaborates the concrete steps and contents of informatization teaching. Using the multimedia maintenance training system, information simulation training system and network courses and other informatization means, effectively improves the master degree to radar transmitter by trainees, but also lays a good foundation for repair in the next step.

  13. Using phase for radar scatterer classification

    Science.gov (United States)

    Moore, Linda J.; Rigling, Brian D.; Penno, Robert P.; Zelnio, Edmund G.

    2017-04-01

    Traditional synthetic aperture radar (SAR) systems tend to discard phase information of formed complex radar imagery prior to automatic target recognition (ATR). This practice has historically been driven by available hardware storage, processing capabilities, and data link capacity. Recent advances in high performance computing (HPC) have enabled extremely dense storage and processing solutions. Therefore, previous motives for discarding radar phase information in ATR applications have been mitigated. First, we characterize the value of phase in one-dimensional (1-D) radar range profiles with respect to the ability to correctly estimate target features, which are currently employed in ATR algorithms for target discrimination. These features correspond to physical characteristics of targets through radio frequency (RF) scattering phenomenology. Physics-based electromagnetic scattering models developed from the geometrical theory of diffraction are utilized for the information analysis presented here. Information is quantified by the error of target parameter estimates from noisy radar signals when phase is either retained or discarded. Operating conditions (OCs) of signal-tonoise ratio (SNR) and bandwidth are considered. Second, we investigate the value of phase in 1-D radar returns with respect to the ability to correctly classify canonical targets. Classification performance is evaluated via logistic regression for three targets (sphere, plate, tophat). Phase information is demonstrated to improve radar target classification rates, particularly at low SNRs and low bandwidths.

  14. Specification for a surface-search radar-detection-range model

    Science.gov (United States)

    Hattan, Claude P.

    1990-09-01

    A model that predicts surface-search radar detection range versus a variety of combatants has been developed at the Naval Ocean Systems Center. This model uses a simplified ship radar cross section (RCS) model and the U.S. Navy Oceanographic and Atmospheric Mission Library Standard Electromagnetic Propagation Model. It provides the user with a method of assessing the effects of the environment of the performance of a surface-search radar system. The software implementation of the model is written in ANSI FORTRAN 77, with MIL-STD-1753 extensions. The program provides the user with a table of expected detection ranges when the model is supplied with the proper environmental radar system inputs. The target model includes the variation in RCS as a function of aspect angle and the distribution of reflected radar energy as a function of height above the waterline. The modeled propagation effects include refraction caused by a multisegmented refractivity profile, sea-surface roughness caused by local winds, evaporation ducting, and surface-based ducts caused by atmospheric layering.

  15. Radar orthogonality and radar length in Finsler and metric spacetime geometry

    Science.gov (United States)

    Pfeifer, Christian

    2014-09-01

    The radar experiment connects the geometry of spacetime with an observers measurement of spatial length. We investigate the radar experiment on Finsler spacetimes which leads to a general definition of radar orthogonality and radar length. The directions radar orthogonal to an observer form the spatial equal time surface an observer experiences and the radar length is the physical length the observer associates to spatial objects. We demonstrate these concepts on a forth order polynomial Finsler spacetime geometry which may emerge from area metric or premetric linear electrodynamics or in quantum gravity phenomenology. In an explicit generalization of Minkowski spacetime geometry we derive the deviation from the Euclidean spatial length measure in an observers rest frame explicitly.

  16. Estimation of three-dimensional radar tracking using modified extended kalman filter

    Science.gov (United States)

    Aditya, Prima; Apriliani, Erna; Khusnul Arif, Didik; Baihaqi, Komar

    2018-03-01

    Kalman filter is an estimation method by combining data and mathematical models then developed be extended Kalman filter to handle nonlinear systems. Three-dimensional radar tracking is one of example of nonlinear system. In this paper developed a modification method of extended Kalman filter from the direct decline of the three-dimensional radar tracking case. The development of this filter algorithm can solve the three-dimensional radar measurements in the case proposed in this case the target measured by radar with distance r, azimuth angle θ, and the elevation angle ϕ. Artificial covariance and mean adjusted directly on the three-dimensional radar system. Simulations result show that the proposed formulation is effective in the calculation of nonlinear measurement compared with extended Kalman filter with the value error at 0.77% until 1.15%.

  17. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  18. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  19. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    International Nuclear Information System (INIS)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon

    2008-01-01

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS

  20. Computer-based test system for the Tactical Airfield Attack Munition (TAAM) safing, arming, and fuzing system

    International Nuclear Information System (INIS)

    Warhus, J.; Castleton, R.; Lanning, S.

    1981-12-01

    Testing and quality assurance of large numbers of firing systems are an essential part of the development of the Tactical Airfield Attack Munition (TAAM). A computerized test and data acquisition system has been developed to make the testing and quality assurance workload manageable. The system hardware utilizes an LSI-11/23 computer, a Tektronix 7612 transient digitizer, and various other programmable instruments and power supplies. The system is capable of measuring and analyzing mechanical shock and fireset transient waveforms, automating testing sequences, and making records and comparisons of the test results. The system architecture is flexible for general purpose firing system development work

  1. Development and Application of integrated monitoring platform for the Doppler Weather SA-BAND Radar

    Science.gov (United States)

    Zhang, Q.; Sun, J.; Zhao, C. C.; Chen, H. Y.

    2017-10-01

    The doppler weather SA-band radar is an important part of modern meteorological observation methods, monitoring the running status of radar and the data transmission is important.This paper introduced the composition of radar system and classification of radar data,analysed the characteristics and laws of the radar when is normal or abnormal. Using Macromedia Dreamweaver and PHP, developed the integrated monitoring platform for the doppler weather SA-band radar which could monitor the real-time radar system running status and important performance indicators such as radar power,status parameters and others on Web page,and when the status is abnormal it will trigger the audio alarm.

  2. Network Security Risk Assessment System Based on Attack Graph and Markov Chain

    Science.gov (United States)

    Sun, Fuxiong; Pi, Juntao; Lv, Jin; Cao, Tian

    2017-10-01

    Network security risk assessment technology can be found in advance of the network problems and related vulnerabilities, it has become an important means to solve the problem of network security. Based on attack graph and Markov chain, this paper provides a Network Security Risk Assessment Model (NSRAM). Based on the network infiltration tests, NSRAM generates the attack graph by the breadth traversal algorithm. Combines with the international standard CVSS, the attack probability of atomic nodes are counted, and then the attack transition probabilities of ones are calculated by Markov chain. NSRAM selects the optimal attack path after comprehensive measurement to assessment network security risk. The simulation results show that NSRAM can reflect the actual situation of network security objectively.

  3. Design of an ultra-wideband ground-penetrating radar system using impulse radiating antennas

    NARCIS (Netherlands)

    Rhebergen, J.B.; Zwamborn, A.P.M.; Giri, D.V.

    1998-01-01

    At TNO-FEL, one of the research programs is to explore the use of ultra-wideband (UWB) electromagnetic fields in a bi-static ground-penetrating radar (GPR) system for the detection, location and identification of buried items of unexploded ordnance (e.g. land mines). In the present paper we describe

  4. Design of an ultra-wideband ground-penetrating radar system using impulse radiating antennas

    NARCIS (Netherlands)

    Rhebergen, J.B.; Zwamborn, A.P.M.; Giri, D.V.

    1999-01-01

    At TNO-FEL, one of the research programs is to explore the use of ultra-wideband (UWB) electromagnetic fields in a bi-static ground-penetrating radar (GPR) system for the detection, location and identification of buried items of unexploded ordnance (e.g. land mines). In the present paper we describe

  5. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  6. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... Attack trees by themselves do not provide enough decision support to system defenders. This research develops the concept of using protection trees to offer a detailed risk analysis of a system...

  7. Quantitative gait measurement with pulse-Doppler radar for passive in-home gait assessment.

    Science.gov (United States)

    Wang, Fang; Skubic, Marjorie; Rantz, Marilyn; Cuddihy, Paul E

    2014-09-01

    In this paper, we propose a pulse-Doppler radar system for in-home gait assessment of older adults. A methodology has been developed to extract gait parameters including walking speed and step time using Doppler radar. The gait parameters have been validated with a Vicon motion capture system in the lab with 13 participants and 158 test runs. The study revealed that for an optimal step recognition and walking speed estimation, a dual radar set up with one radar placed at foot level and the other at torso level is necessary. An excellent absolute agreement with intraclass correlation coefficients of 0.97 was found for step time estimation with the foot level radar. For walking speed, although both radars show excellent consistency they all have a system offset compared to the ground truth due to walking direction with respect to the radar beam. The torso level radar has a better performance (9% offset on average) in the speed estimation compared to the foot level radar (13%-18% offset). Quantitative analysis has been performed to compute the angles causing the systematic error. These lab results demonstrate the capability of the system to be used as a daily gait assessment tool in home environments, useful for fall risk assessment and other health care applications. The system is currently being tested in an unstructured home environment.

  8. The NASA Polarimetric Radar (NPOL)

    Science.gov (United States)

    Petersen, Walter A.; Wolff, David B.

    2013-01-01

    Characteristics of the NASA NPOL S-band dual-polarimetric radar are presented including its operating characteristics, field configuration, scanning capabilities and calibration approaches. Examples of precipitation science data collections conducted using various scan types, and associated products, are presented for different convective system types and previous field campaign deployments. Finally, the NASA NPOL radar location is depicted in its home base configuration within the greater Wallops Flight Facility precipitation research array supporting NASA Global Precipitation Measurement Mission ground validation.

  9. Middle Atmosphere Program. Handbook for MAP. Volume 30: International School on Atmospheric Radar

    Science.gov (United States)

    Fukao, Shoichiro (Editor)

    1989-01-01

    Broad, tutorial coverage is given to the technical and scientific aspects of mesosphere stratosphere troposphere (MST) meteorological radar systems. Control issues, signal processing, atmospheric waves, the historical aspects of radar atmospheric dynamics, incoherent scatter radars, radar echoes, radar targets, and gravity waves are among the topics covered.

  10. After-gate attack on a quantum cryptosystem

    International Nuclear Information System (INIS)

    Wiechers, C; Wittmann, C; Elser, D; Marquardt, Ch; Leuchs, G; Lydersen, L; Skaar, J; Makarov, V

    2011-01-01

    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.

  11. Analysis on Target Detection and Classification in LTE Based Passive Forward Scattering Radar

    OpenAIRE

    Raja Syamsul Azmir Raja Abdullah; Noor Hafizah Abdul Aziz; Nur Emileen Abdul Rashid; Asem Ahmad Salah; Fazirulhisyam Hashim

    2016-01-01

    The passive bistatic radar (PBR) system can utilize the illuminator of opportunity to enhance radar capability. By utilizing the forward scattering technique and procedure into the specific mode of PBR can provide an improvement in target detection and classification. The system is known as passive Forward Scattering Radar (FSR). The passive FSR system can exploit the peculiar advantage of the enhancement in forward scatter radar cross section (FSRCS) for target detection. Thus, the aim of th...

  12. Propagation of radar rainfall uncertainty in urban flood simulations

    Science.gov (United States)

    Liguori, Sara; Rico-Ramirez, Miguel

    2013-04-01

    This work discusses the results of the implementation of a novel probabilistic system designed to improve ensemble sewer flow predictions for the drainage network of a small urban area in the North of England. The probabilistic system has been developed to model the uncertainty associated to radar rainfall estimates and propagate it through radar-based ensemble sewer flow predictions. The assessment of this system aims at outlining the benefits of addressing the uncertainty associated to radar rainfall estimates in a probabilistic framework, to be potentially implemented in the real-time management of the sewer network in the study area. Radar rainfall estimates are affected by uncertainty due to various factors [1-3] and quality control and correction techniques have been developed in order to improve their accuracy. However, the hydrological use of radar rainfall estimates and forecasts remains challenging. A significant effort has been devoted by the international research community to the assessment of the uncertainty propagation through probabilistic hydro-meteorological forecast systems [4-5], and various approaches have been implemented for the purpose of characterizing the uncertainty in radar rainfall estimates and forecasts [6-11]. A radar-based ensemble stochastic approach, similar to the one implemented for use in the Southern-Alps by the REAL system [6], has been developed for the purpose of this work. An ensemble generator has been calibrated on the basis of the spatial-temporal characteristics of the residual error in radar estimates assessed with reference to rainfall records from around 200 rain gauges available for the year 2007, previously post-processed and corrected by the UK Met Office [12-13]. Each ensemble member is determined by summing a perturbation field to the unperturbed radar rainfall field. The perturbations are generated by imposing the radar error spatial and temporal correlation structure to purely stochastic fields. A

  13. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    networking it has never been easier to penetrate the network. One of the biggest problems of today's wireless networks is the lack of effective systems for intrusion detection. Forgetting to cover gaps in wireless network security may result in intrusion into the network by an attacker. Security in IEEE 802.11 wireless networks Although the IEEE 802.11 protocol defines security standards, wireless networks are one of the weakest links in the chain of computer networks. The basic security requirements of each computer network are reliable user authentication, privacy protection and user authentication. Security attacks on IEEE 802.11 wireless networks Non-technical attacks include a variety of human weaknesses, such as lack of conscience, negligence or over-confidence towards the strangers. Network attacks include a number of techniques that enable attackers to penetrate into  the wireless network, or at least to disable it. Apart from the security problems with the IEEE 802.11 protocol, there are vulnerabilities in operating systems and applications on wireless clients. The methodology of attack Before testing wireless network security vulnerabilities, it is important to define a formal testing methodology. The first step before the actual attack is footprinting. The second step is the creation of a network map that shows how the wireless system looks. For this purpose, hackers are using specific tools, such as Network Stumbler, Nmap and Fping. When basic information about the wireless network is gathered, more information can be found out through the process of system scanning (enumeration. Attacks on IEEE 802.11 wireless networks Social engineering is a technique by which attackers exploit the natural trust of most people. Radio waves do not respect defined boundaries. If radio waves are broadcasted outside of the boundaries of the defined area, then it is necessary to reduce signal strength on wireless access points. In that way, radio waves travel over shorter distances

  14. Recommendation on Transition from Primary/Secondary Radar to Secondary- Only Radar Capability

    Science.gov (United States)

    1994-10-01

    Radar Beacon Performance Monitor RCIU Remote Control Interface Unit RCL Remote Communications Link R E&D Research, Engineering and Development RML Radar...rate. 3.1.2.5 Maintenance The current LRRs have limited remote maintenance monitoring (RMM) capabilities via the Remote Control Interface Unit ( RCIU ...1, -2 and FPS-20 radars required an upgrade of some of the radar subsystems, namely the RCIU to respond as an RMS and the CD to interface with radar

  15. Radar signal processing and its applications

    CERN Document Server

    Hummel, Robert; Stoica, Petre; Zelnio, Edmund

    2003-01-01

    Radar Signal Processing and Its Applications brings together in one place important contributions and up-to-date research results in this fast-moving area. In twelve selected chapters, it describes the latest advances in architectures, design methods, and applications of radar signal processing. The contributors to this work were selected from the leading researchers and practitioners in the field. This work, originally published as Volume 14, Numbers 1-3 of the journal, Multidimensional Systems and Signal Processing, will be valuable to anyone working or researching in the field of radar signal processing. It serves as an excellent reference, providing insight into some of the most challenging issues being examined today.

  16. Typhoon 9707 observations with the MU radar and L-band boundary layer radar

    Directory of Open Access Journals (Sweden)

    M. Teshiba

    2001-08-01

    Full Text Available Typhoon 9707 (Opal was observed with the VHF-band Middle and Upper atmosphere (MU radar, an L-band boundary layer radar (BLR, and a vertical-pointing C-band meteorological radar at the Shigaraki MU Observatory in Shiga prefecture, Japan on 20 June 1997. The typhoon center passed about 80 km southeast from the radar site. Mesoscale precipitating clouds developed due to warm-moist airmass transport from the typhoon, and passed over the MU radar site with easterly or southeasterly winds. We primarily present the wind behaviour including the vertical component which a conventional meteorological Doppler radar cannot directly observe, and discuss the relationship between the wind behaviour of the typhoon and the precipitating system. To investigate the dynamic structure of the typhoon, the observed wind was divided into radial and tangential wind components under the assumption that the typhoon had an axi-symmetric structure. Altitude range of outflow ascended from 1–3 km to 2–10 km with increasing distance (within 80–260 km range from the typhoon center, and in-flow was observed above and below the outflow. Outflow and inflow were associated with updraft and downdraft, respectively. In the tangential wind, the maximum speed of counterclockwise winds was confirmed at 1–2 km altitudes. Based on the vertical velocity and the reflectivity obtained with the MU radar and the C-band meteorological radar, respectively, precipitating clouds, accompanied by the wind behaviour of the typhoon, were classified into stratiform and convective precipitating clouds. In the stratiform precipitating clouds, a vertical shear of radial wind and the maximum speed of counterclockwise wind were observed. There was a strong reflectivity layer called a ‘bright band’ around the 4.2 km altitude. We confirmed strong updrafts and down-drafts below and above it, respectively, and the existence of a relatively dry layer around the bright band level from radiosonde

  17. Typhoon 9707 observations with the MU radar and L-band boundary layer radar

    Directory of Open Access Journals (Sweden)

    M. Teshiba

    Full Text Available Typhoon 9707 (Opal was observed with the VHF-band Middle and Upper atmosphere (MU radar, an L-band boundary layer radar (BLR, and a vertical-pointing C-band meteorological radar at the Shigaraki MU Observatory in Shiga prefecture, Japan on 20 June 1997. The typhoon center passed about 80 km southeast from the radar site. Mesoscale precipitating clouds developed due to warm-moist airmass transport from the typhoon, and passed over the MU radar site with easterly or southeasterly winds. We primarily present the wind behaviour including the vertical component which a conventional meteorological Doppler radar cannot directly observe, and discuss the relationship between the wind behaviour of the typhoon and the precipitating system. To investigate the dynamic structure of the typhoon, the observed wind was divided into radial and tangential wind components under the assumption that the typhoon had an axi-symmetric structure. Altitude range of outflow ascended from 1–3 km to 2–10 km with increasing distance (within 80–260 km range from the typhoon center, and in-flow was observed above and below the outflow. Outflow and inflow were associated with updraft and downdraft, respectively. In the tangential wind, the maximum speed of counterclockwise winds was confirmed at 1–2 km altitudes. Based on the vertical velocity and the reflectivity obtained with the MU radar and the C-band meteorological radar, respectively, precipitating clouds, accompanied by the wind behaviour of the typhoon, were classified into stratiform and convective precipitating clouds. In the stratiform precipitating clouds, a vertical shear of radial wind and the maximum speed of counterclockwise wind were observed. There was a strong reflectivity layer called a ‘bright band’ around the 4.2 km altitude. We confirmed strong updrafts and down-drafts below and above it, respectively, and the existence of a relatively dry layer around the bright band level from radiosonde

  18. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  19. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  20. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  1. Adaptive radar resource management

    CERN Document Server

    Moo, Peter

    2015-01-01

    Radar Resource Management (RRM) is vital for optimizing the performance of modern phased array radars, which are the primary sensor for aircraft, ships, and land platforms. Adaptive Radar Resource Management gives an introduction to radar resource management (RRM), presenting a clear overview of different approaches and techniques, making it very suitable for radar practitioners and researchers in industry and universities. Coverage includes: RRM's role in optimizing the performance of modern phased array radars The advantages of adaptivity in implementing RRMThe role that modelling and

  2. Incidence angle normalization of radar backscatter data

    Science.gov (United States)

    NASA’s Soil Moisture Passive Active (SMAP) satellite (~2014) will include a radar system that will provide L-band multi-polarization backscatter at a constant incidence angle of 40º. During the pre-launch phase of the project there is a need for observations that will support the radar-based soil mo...

  3. The Tokyo subway sarin attack-lessons learned

    International Nuclear Information System (INIS)

    Okumura, T.; Hisaoka, T.; Yamada, A.; Naito, T.; Isonuma, H.; Okumura, S.; Miura, K.; Sakurada, M.; Maekawa, H.; Ishimatsu, S.; Takasu, N.; Suzuki, K.

    2005-01-01

    The sarin gas attack in the Tokyo subway system is reviewed from a clinical toxicology perspective. Based on the lessons learned from this attack, the following areas should be addressed on a global scale. First, an adequate supply of protective equipment is required, including level B protective equipment with a pressure demand breathing apparatus. In addition, a system should be established that enables a possible cause to be determined based on symptoms, physical findings, general laboratory tests, and a simple qualitative analysis for poisonous substances. If an antidote is needed, the system should enable it to be administered to the victims as quickly as possible. Preparation for a large-scale chemical attack by terrorists requires the prior establishment of a detailed decontamination plan that utilizes not only mass decontamination facilities but also public facilities in the area. A system should be established for summarizing, evaluating, and disseminating information on poisonous substances. Finally, a large-scale scientific investigation of the Tokyo sarin attack should be conducted to examine its long-term and subclinical effects and the effects of exposure to asymptomatic low levels of sarin

  4. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS to Zero-Day and Stealth Attacks

    Directory of Open Access Journals (Sweden)

    Waqas Haider

    2016-07-01

    Full Text Available The Windows Operating System (OS is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting zero-day and stealth attacks, it needs an intelligent Host-based Intrusion Detection System (HIDS. Unfortunately, a comprehensive data set that reflects the modern Windows OS’s normal and attack surfaces is not publicly available. To fill this gap, in this paper two open data sets generated by the cyber security department of the Australian Defence Force Academy (ADFA are introduced, namely: Australian Defence Force Academy Windows Data Set (ADFA-WD; and Australian Defence Force Academy Windows Data Set with a Stealth Attacks Addendum (ADFA-WD: SAA. Statistical analysis results based on these data sets show that, due to the low foot prints of modern attacks and high similarity of normal and attacked data, both these data sets are complex, and highly intelligent Host based Anomaly Detection Systems (HADS design will be required.

  5. Simulator study of the effectiveness of an automatic control system designed to improve the high-angle-of-attack characteristics of a fighter airplane

    Science.gov (United States)

    Gilbert, W. P.; Nguyen, L. T.; Vangunst, R. W.

    1976-01-01

    A piloted, fixed-base simulation was conducted to study the effectiveness of some automatic control system features designed to improve the stability and control characteristics of fighter airplanes at high angles of attack. These features include an angle-of-attack limiter, a normal-acceleration limiter, an aileron-rudder interconnect, and a stability-axis yaw damper. The study was based on a current lightweight fighter prototype. The aerodynamic data used in the simulation were measured on a 0.15-scale model at low Reynolds number and low subsonic Mach number. The simulation was conducted on the Langley differential maneuvering simulator, and the evaluation involved representative combat maneuvering. Results of the investigation show the fully augmented airplane to be quite stable and maneuverable throughout the operational angle-of-attack range. The angle-of-attack/normal-acceleration limiting feature of the pitch control system is found to be a necessity to avoid angle-of-attack excursions at high angles of attack. The aileron-rudder interconnect system is shown to be very effective in making the airplane departure resistant while the stability-axis yaw damper provided improved high-angle-of-attack roll performance with a minimum of sideslip excursions.

  6. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  7. Novel radar techniques and applications

    CERN Document Server

    Klemm, Richard; Lombardo, Pierfrancesco; Nickel, Ulrich

    2017-01-01

    Novel Radar Techniques and Applications presents the state-of-the-art in advanced radar, with emphasis on ongoing novel research and development and contributions from an international team of leading radar experts. This volume covers: Real aperture array radar; Imaging radar and Passive and multistatic radar.

  8. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  9. Distributed radar network for real-time tracking of bullet trajectory

    Science.gov (United States)

    Zhang, Yimin; Li, Xin; Jin, Yuanwei; Amin, Moeness G.; Eydgahi, Ali

    2009-05-01

    Gunshot detection, sniper localization, and bullet trajectory prediction are of significant importance in military and homeland security applications. While the majority of existing work is based on acoustic and electro-optical sensors, this paper develops a framework of networked radar systems that uses distributed radar sensor networks to achieve the aforementioned objectives. The use of radio frequency radar systems allows the achievement of subtime- of-flight tracking response, enabling to response before the bullet reaches its target and, as such, effectively leading to the reduction of injuries and casualties in military and homeland security operations. The focus of this paper is to examine the MIMO radar concept with concurrent transmission of low-correlation waveforms from multiple radar sets to ensure wide surveillance coverage and maintain a high waveform repetition frequency for long coherent time interval required to achieve return signal concentration.

  10. Cyber Security Analysis by Attack Trees for a Reactor Protection System

    Energy Technology Data Exchange (ETDEWEB)

    Park, Gee-Yong; Lee, Cheol Kwon; Choi, Jong Gyun; Kim, Dong Hoon; Lee, Young Jun; Kwon, Kee-Choon [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2008-10-15

    As nuclear facilities are introducing digital systems, the cyber security becomes an emerging topic to be analyzed and resolved. The domestic and other nation's regulatory bodies notice this topic and are preparing an appropriate guidance. The nuclear industry where new construction or upgrade of I and C systems is planned is analyzing and establishing a cyber security. A risk-based analysis for the cyber security has been performed in the KNICS (Korea Nuclear I and C Systems) project where the cyber security analysis has been applied to a reactor protection system (RPS). In this paper, the cyber security analysis based on the attack trees is proposed for the KNICS RPS.

  11. Improved Laser Vibration Radar

    National Research Council Canada - National Science Library

    Hilaire, Pierre

    1998-01-01

    .... This thesis reconfigured an existing CO2 laboratory laser radar system that is capable of measuring the frequencies of vibration of a simulated target into a more compact and rugged form for field testing...

  12. Imaging observations of nighttime mid-latitude F-region field-aligned irregularities by an MU radar ultra-multi-channel system

    Directory of Open Access Journals (Sweden)

    S. Saito

    2008-08-01

    Full Text Available Mid-latitude F-region field-aligned irregularities (FAIs were studied by using the middle-and-upper atmosphere (MU radar ultra-multi-channel system with the radar imaging technique. On 12 June 2006, F-region FAI echoes with a period of about one hour were observed intermittently. These echoes were found to be embedded in medium-scale traveling ionospheric disturbances (MSTIDs observed as variations of total electron content (TEC. The echoes drifting away from (toward the radar were observed in the depletion (enhancement phase of the MSTID. The Doppler velocity of the echoes is consistent with the range rates in the the range-time-intensity (RTI maps. Fine scale structures with a spatial scale of 10 km or less were found by the radar imaging analysis. Those structures with positive Doppler velocities (moving away from the radar appeared to drift north- (up- westward, and those with negative Doppler velocities south- (down- eastward approximately along the wavefronts of the MSTID. FAIs with positive Doppler velocities filling TEC depletion regions were observed.

  13. Slope stability radar for monitoring mine walls

    Science.gov (United States)

    Reeves, Bryan; Noon, David A.; Stickley, Glen F.; Longstaff, Dennis

    2001-11-01

    Determining slope stability in a mining operation is an important task. This is especially true when the mine workings are close to a potentially unstable slope. A common technique to determine slope stability is to monitor the small precursory movements, which occur prior to collapse. The slope stability radar has been developed to remotely scan a rock slope to continuously monitor the spatial deformation of the face. Using differential radar interferometry, the system can detect deformation movements of a rough wall with sub-millimeter accuracy, and with high spatial and temporal resolution. The effects of atmospheric variations and spurious signals can be reduced via signal processing means. The advantage of radar over other monitoring techniques is that it provides full area coverage without the need for mounted reflectors or equipment on the wall. In addition, the radar waves adequately penetrate through rain, dust and smoke to give reliable measurements, twenty-four hours a day. The system has been trialed at three open-cut coal mines in Australia, which demonstrated the potential for real-time monitoring of slope stability during active mining operations.

  14. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  15. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  16. Modern Radar Techniques for Geophysical Applications: Two Examples

    Science.gov (United States)

    Arokiasamy, B. J.; Bianchi, C.; Sciacca, U.; Tutone, G.; Zirizzotti, A.; Zuccheretti, E.

    2005-01-01

    The last decade of the evolution of radar was heavily influenced by the rapid increase in the information processing capabilities. Advances in solid state radio HF devices, digital technology, computing architectures and software offered the designers to develop very efficient radars. In designing modern radars the emphasis goes towards the simplification of the system hardware, reduction of overall power, which is compensated by coding and real time signal processing techniques. Radars are commonly employed in geophysical radio soundings like probing the ionosphere; stratosphere-mesosphere measurement, weather forecast, GPR and radio-glaciology etc. In the laboratorio di Geofisica Ambientale of the Istituto Nazionale di Geofisica e Vulcanologia (INGV), Rome, Italy, we developed two pulse compression radars. The first is a HF radar called AIS-INGV; Advanced Ionospheric Sounder designed both for the purpose of research and for routine service of the HF radio wave propagation forecast. The second is a VHF radar called GLACIORADAR, which will be substituting the high power envelope radar used by the Italian Glaciological group. This will be employed in studying the sub glacial structures of Antarctica, giving information about layering, the bed rock and sub glacial lakes if present. These are low power radars, which heavily rely on advanced hardware and powerful real time signal processing. Additional information is included in the original extended abstract.

  17. Development of Bread Board Model of TRMM precipitation radar

    Science.gov (United States)

    Okamoto, Ken'ichi; Ihara, Toshio; Kumagai, Hiroshi

    The active array radar was selected as a reliable candidate for the TRMM (Tropical Rainfall Measuring Mission) precipitation radar after the trade off studies performed by Communications Research Laboratory (CRL) in the US-Japan joint feasibility study of TRMM in 1987-1988. Main system parameters and block diagram for TRMM precipitation radar are shown as the result of feasibility study. CRL developed key devices for the active array precipitation radar such as 8-element slotted waveguide array antenna, the 5 bit PIN diode phase shifters, solid state power amplifiers and low noise amplifiers in 1988-1990. Integration of these key devices was made to compose 8-element Bread Board Model of TRMM precipitation radar.

  18. Simultaneous observations of structure function parameter of refractive index using a high-resolution radar and the DataHawk small airborne measurement system

    Science.gov (United States)

    Scipión, Danny E.; Lawrence, Dale A.; Milla, Marco A.; Woodman, Ronald F.; Lume, Diego A.; Balsley, Ben B.

    2016-09-01

    The SOUSY (SOUnding SYstem) radar was relocated to the Jicamarca Radio Observatory (JRO) near Lima, Peru, in 2000, where the radar controller and acquisition system were upgraded with state-of-the-art parts to take full advantage of its potential for high-resolution atmospheric sounding. Due to its broad bandwidth (4 MHz), it is able to characterize clear-air backscattering with high range resolution (37.5 m). A campaign conducted at JRO in July 2014 aimed to characterize the lower troposphere with a high temporal resolution (8.1 Hz) using the DataHawk (DH) small unmanned aircraft system, which provides in situ atmospheric measurements at scales as small as 1 m in the lower troposphere and can be GPS-guided to obtain measurements within the beam of the radar. This was a unique opportunity to make coincident observations by both systems and to directly compare their in situ and remotely sensed parameters. Because SOUSY only points vertically, it is only possible to retrieve vertical radar profiles caused by changes in the refractive index within the resolution volume. Turbulent variations due to scattering are described by the structure function parameter of refractive index Cn2. Profiles of Cn2 from the DH are obtained by combining pressure, temperature, and relative humidity measurements along the helical trajectory and integrated at the same scale as the radar range resolution. Excellent agreement is observed between the Cn2 estimates obtained from the DH and SOUSY in the overlapping measurement regime from 1200 m up to 4200 m above sea level, and this correspondence provides the first accurate calibration of the SOUSY radar for measuring Cn2.

  19. Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack

    International Nuclear Information System (INIS)

    Wang Wei-Long; Gao Ming; Ma Zhi

    2015-01-01

    Passive Faraday-mirror (PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure (POVM) operators plays an important role in this attack. In this paper, we propose a simple scheme to implement the POVM in PFM attack on an Faraday–Michelson quantum cryptography system. Since the POVM can not be implemented directly with previous methods, in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first, without changing the attacking effect by calculation. Based on the methods proposed by Ahnert and Payne, the linear-optical setup for implementing the POVM operators is derived. At last, the complete setup for realizing the PFM attack is presented with all parameters. Furthermore, our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. (paper)

  20. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  1. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  2. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  3. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  5. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  6. Movement and respiration detection using statistical properties of the FMCW radar signal

    KAUST Repository

    Kiuru, Tero

    2016-07-26

    This paper presents a 24 GHz FMCW radar system for detection of movement and respiration using change in the statistical properties of the received radar signal, both amplitude and phase. We present the hardware and software segments of the radar system as well as algorithms with measurement results for two distinct use-cases: 1. FMCW radar as a respiration monitor and 2. a dual-use of the same radar system for smart lighting and intrusion detection. By using change in statistical properties of the signal for detection, several system parameters can be relaxed, including, for example, pulse repetition rate, power consumption, computational load, processor speed, and memory space. We will also demonstrate, that the capability to switch between received signal strength and phase difference enables dual-use cases with one requiring extreme sensitivity to movement and the other robustness against small sources of interference. © 2016 IEEE.

  7. Portable concealed weapon detection using millimeter-wave FMCW radar imaging

    Science.gov (United States)

    Johnson, Michael A.; Chang, Yu-Wen

    2001-02-01

    Unobtrusive detection of concealed weapons on persons or in abandoned bags would provide law enforcement a powerful tool to focus resources and increase traffic throughput in high- risk situations. We have developed a fast image scanning 94 GHz radar system that is suitable for portable operation and remote viewing of radar data. This system includes a novel fast image-scanning antenna that allows for the acquisition of medium resolution 3D millimeter wave images of stationary targets with frame times on order of one second. The 3D radar data allows for potential isolation of concealed weapons from body and environmental clutter such as nearby furniture or other people. The radar is an active system so image quality is not affected indoors, emitted power is however very low so there are no health concerns for operator or targets. The low power operation is still sufficient to penetrate heavy clothing or material. Small system size allows for easy transport and rapid deployment of the system as well as an easy migration path to future hand held systems.

  8. 5 year radar-based rainfall statistics: disturbances analysis and development of a post-correction scheme for the German radar composite

    Science.gov (United States)

    Wagner, A.; Seltmann, J.; Kunstmann, H.

    2015-02-01

    A radar-based rainfall statistic demands high quality data that provide realistic precipitation amounts in space and time. Instead of correcting single radar images, we developed a post-correction scheme for long-term composite radar data that corrects corrupted areas, but preserves the original precipitation patterns. The post-correction scheme is based on a 5 year statistical analysis of radar composite data and its constituents. The accumulation of radar images reveals artificial effects that are not visible in the individual radar images. Some of them are already inherent to single radar data such as the effect of increasing beam height, beam blockage or clutter remnants. More artificial effects are introduced in the process of compositing such as sharp gradients at the boundaries of overlapping areas due to different beam heights and resolution. The cause of these disturbances, their behaviour with respect to reflectivity level, season or altitude is analysed based on time-series of two radar products: the single radar reflectivity product PX for each of the 16 radar systems of the German Meteorological Service (DWD) for the time span 2000 to 2006 and the radar composite product RX of DWD from 2005 through to 2009. These statistics result in additional quality information on radar data that is not available elsewhere. The resulting robust characteristics of disturbances, e.g. the dependency of the frequencies of occurrence of radar reflectivities on beam height, are then used as a basis for the post-correction algorithm. The scheme comprises corrections for shading effects and speckles, such as clutter remnants or overfiltering, as well as for systematic differences in frequencies of occurrence of radar reflectivities between the near and the far ranges of individual radar sites. An adjustment to rain gauges is also included. Applying this correction, the Root-Mean-Square-Error for the comparison of radar derived annual rain amounts with rain gauge data

  9. Impact of Shutting Down En Route Primary Radars within CONUS Interior

    Science.gov (United States)

    1993-06-01

    Remote Control Interface Unit ( RCIU ) RMS software for the primary radar will be deleted. Any dependency of the secondary radar on the primary radar data...Generators RCIU Remote Control and Interface Unit RMM Remote Monitoring and Maintenance RMMS Remote Maintenance Monitoring System RMS Remote Maintenance

  10. Debris Examination Using Ballistic and Radar Integrated Software

    Science.gov (United States)

    Griffith, Anthony; Schottel, Matthew; Lee, David; Scully, Robert; Hamilton, Joseph; Kent, Brian; Thomas, Christopher; Benson, Jonathan; Branch, Eric; Hardman, Paul; hide

    2012-01-01

    The Debris Examination Using Ballistic and Radar Integrated Software (DEBRIS) program was developed to provide rapid and accurate analysis of debris observed by the NASA Debris Radar (NDR). This software provides a greatly improved analysis capacity over earlier manual processes, allowing for up to four times as much data to be analyzed by one-quarter of the personnel required by earlier methods. There are two applications that comprise the DEBRIS system: the Automated Radar Debris Examination Tool (ARDENT) and the primary DEBRIS tool.

  11. Attacker-defender game from a network science perspective

    Science.gov (United States)

    Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun

    2018-05-01

    Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.

  12. Flood Monitoring using X-band Dual-polarization Radar Network

    Science.gov (United States)

    Chandrasekar, V.; Wang, Y.; Maki, M.; Nakane, K.

    2009-09-01

    A dense weather radar network is an emerging concept advanced by the Center for Collaborative Adaptive Sensing of the Atmosphere (CASA). Using multiple radars observing over a common will create different data outcomes depending on the characteristics of the radar units employed and the network topology. To define this a general framework is developed to describe the radar network space, and formulations are obtained that can be used for weather radar network characterization. Current weather radar surveillance networks are based upon conventional sensing paradigm of widely-separated, standalone sensing systems using long range radars that operate at wavelengths in 5-10 cm range. Such configuration has limited capability to observe close to the surface of the earth because of the earth's curvature but also has poorer resolution at far ranges. The dense network radar system, observes and measures weather phenomenon such as rainfall and severe weather close to the ground at higher spatial and temporal resolution compared to the current paradigm. In addition the dense network paradigm also is easily adaptable to complex terrain. Flooding is one of the most common natural hazards in the world. Especially, excessive development decreases the response time of urban watersheds and complex terrain to rainfall and increases the chance of localized flooding events over a small spatial domain. Successful monitoring of urban floods requires high spatiotemporal resolution, accurate precipitation estimation because of the rapid flood response as well as the complex hydrologic and hydraulic characteristics in an urban environment. This paper reviews various aspects in radar rainfall mapping in urban coverage using dense X-band dual-polarization radar networks. By reducing the maximum range and operating at X-band, one can ensure good azimuthal resolution with a small-size antenna and keep the radar beam closer to the ground. The networked topology helps to achieve satisfactory

  13. Radar rainfall image repair techniques

    Directory of Open Access Journals (Sweden)

    Stephen M. Wesson

    2004-01-01

    Full Text Available There are various quality problems associated with radar rainfall data viewed in images that include ground clutter, beam blocking and anomalous propagation, to name a few. To obtain the best rainfall estimate possible, techniques for removing ground clutter (non-meteorological echoes that influence radar data quality on 2-D radar rainfall image data sets are presented here. These techniques concentrate on repairing the images in both a computationally fast and accurate manner, and are nearest neighbour techniques of two sub-types: Individual Target and Border Tracing. The contaminated data is estimated through Kriging, considered the optimal technique for the spatial interpolation of Gaussian data, where the 'screening effect' that occurs with the Kriging weighting distribution around target points is exploited to ensure computational efficiency. Matrix rank reduction techniques in combination with Singular Value Decomposition (SVD are also suggested for finding an efficient solution to the Kriging Equations which can cope with near singular systems. Rainfall estimation at ground level from radar rainfall volume scan data is of interest and importance in earth bound applications such as hydrology and agriculture. As an extension of the above, Ordinary Kriging is applied to three-dimensional radar rainfall data to estimate rainfall rate at ground level. Keywords: ground clutter, data infilling, Ordinary Kriging, nearest neighbours, Singular Value Decomposition, border tracing, computation time, ground level rainfall estimation

  14. Prospective IS-MST radar. Potential and diagnostic capabilities

    Directory of Open Access Journals (Sweden)

    Potekhin A.P.

    2016-09-01

    Full Text Available In the next few years, a new radar is planned to be built near Irkutsk. It should have capabilities of incoherent scatter (IS radars and mesosphere-stratosphere-troposphere (MST radars [Zherebtsov et al., 2011]. The IS-MST radar is a phased array of two separated antenna panels with a multichannel digital receiving system, which allows detailed space-time processing of backscattered signal. This paper describes characteristics, configuration, and capabilities of the antenna and transceiver systems of this radar. We estimate its potential in basic operating modes to study the ionosphere by the IS method at heights above 100 km and the atmosphere with the use of signals scattered from refractive index fluctuations, caused by turbulent mixing at heights below 100 km. The modeling shows that the radar will allow us to regularly measure neutral atmosphere parameters at heights up to 26 km as well as to observe mesosphere summer echoes at heights near 85 km in the presence of charged ice particles (an increase in Schmidt number and mesosphere winter echoes at heights near 65 km with increasing background electron density. Evaluation of radar resources at the IS mode in two height ranges 100–600 and 600–2000 km demonstrates that in the daytime and with the accumulation time of 10 min, the upper boundaries of electron density and ionospheric plasma temperature are ~1500 and ~1300 km respectively, with the standard deviation of no more than 10 %. The upper boundary of plasma drift velocity is ~1100 km with the standard deviation of 45 m/s. The estimation of interferometric capabilities of the MST radar shows that it has a high sensitivity to objects of angular size near 7.5 arc min, and its potential accuracy in determining target angles can reach 40 arc sec.

  15. Nash Bargaining Game-Theoretic Framework for Power Control in Distributed Multiple-Radar Architecture Underlying Wireless Communication System

    Directory of Open Access Journals (Sweden)

    Chenguang Shi

    2018-04-01

    Full Text Available This paper presents a novel Nash bargaining solution (NBS-based cooperative game-theoretic framework for power control in a distributed multiple-radar architecture underlying a wireless communication system. Our primary objective is to minimize the total power consumption of the distributed multiple-radar system (DMRS with the protection of wireless communication user’s transmission, while guaranteeing each radar’s target detection requirement. A unified cooperative game-theoretic framework is proposed for the optimization problem, where interference power constraints (IPCs are imposed to protect the communication user’s transmission, and a minimum signal-to-interference-plus-noise ratio (SINR requirement is employed to provide reliable target detection for each radar. The existence, uniqueness and fairness of the NBS to this cooperative game are proven. An iterative Nash bargaining power control algorithm with low computational complexity and fast convergence is developed and is shown to converge to a Pareto-optimal equilibrium for the cooperative game model. Numerical simulations and analyses are further presented to highlight the advantages and testify to the efficiency of our proposed cooperative game algorithm. It is demonstrated that the distributed algorithm is effective for power control and could protect the communication system with limited implementation overhead.

  16. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  17. Ranger© - An Affordable, Advanced, Next-Generation, Dual-Pol, X-Band Weather Radar

    Science.gov (United States)

    Stedronsky, Richard

    2014-05-01

    The Enterprise Electronics Corporation (EEC) Ranger© system is a new generation, X-band (3 cm), Adaptive Polarization Doppler Weather Surveillance Radar that fills the gap between high-cost, high-power traditional radar systems and the passive ground station weather sensors. Developed in partnership with the University of Oklahoma Advanced Radar Research Center (ARRC), the system uses relatively low power solid-state transmitters and pulse compression technology to attain nearly the same performance capabilities of much more expensive traditional radar systems. The Ranger© also employs Adaptive Dual Polarization (ADP) techniques to allow Alternating or Simultaneous Dual Polarization capability with total control over the transmission polarization state using dual independent coherent transmitters. Ranger© has been designed using the very latest technology available in the industry and the technical and manufacturing experience gained through over four decades of successful radar system design and production at EEC. The entire Ranger© design concept emphasizes precision, stability, reliability, and value using proven solid state technology combined with the most advanced motion control system ever conceived for weather radar. Key applications include meteorology, hydrology, aviation, offshore oil/gas drilling, wind energy, and outdoor event situational awareness.

  18. Development of a Software-Defined Radar

    Science.gov (United States)

    2017-10-01

    disrupt desired radar operation. The cognitive radar system discussed herein mitigates the effects of RFI by sensing and adapting the transmitted...present received data, and plot processed data. Top right: Calculates a “ flicker ” rate caused by an unknown issue where blank data are received due to...and plot processed data. Top right: Calculates a “ flicker ” rate caused by an unknown issue where blank data are received due to missed

  19. Radar Chart

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Radar Chart collection is an archived product of summarized radar data. The geographic coverage is the 48 contiguous states of the United States. These hourly...

  20. Shuttle orbiter Ku-band radar/communications system design evaluation. Deliverable test equipment evaluation

    Science.gov (United States)

    Maronde, R. G.

    1980-07-01

    The Ku-band test equipment, known as the Deliverable System Test equipment (DSTE), is reviewed and evaluated. The DSTE is semiautomated and computer programs were generated for 14 communication mode tests and 17 radar mode tests. The 31 test modules provide a good cross section of tests with which to exercise the Ku-band system; however, it is very limited when being used to verify Ku-band system performance. More detailed test descriptions are needed, and a major area of concern is the DSTE sell-off procedure which is inadequate.

  1. Navy Needs to Establish Effective Metrics to Achieve Desired Outcomes for SPY1 Radar Sustainment (Redacted)

    Science.gov (United States)

    2016-08-01

    subsystems in the AEGIS Weapon System that searches, detects, and tracks air and surface targets to support Anti -Air Warfare and Ballistic Missile... System that searches, detects, and tracks air and surface targets to support Anti -Air Warfare and Ballistic Missile Defense missions. The SPY-1 radar...a series on SPY-1 radar spare parts. The SPY-1 radar is an advanced, automatic detect and track radar system . The SPY-1 radar is one of 13 major

  2. Noise Parameters of CW Radar Sensors Used in Active Defense Systems

    Directory of Open Access Journals (Sweden)

    V. Jenik

    2012-06-01

    Full Text Available Active defense represents an innovative way of protecting military vehicles. It is based on the employment of a set of radar sensors which detect an approaching threat missile and activate a suitable counter-measure. Since the radar sensors are supposed to detect flying missiles very fast and, at the same time, distinguish them from stationary or slow-moving objects, CW Doppler radar sensors can be employed with a benefit. The submitted article deals with a complex noise analysis of this type of sensors. The analysis considers the noise of linear and quasi-linear RF components, phase-noise of the local oscillator as well as the noise of low-frequency circuits. Since the incidence of the phase-noise depends strongly upon the time delay between the reference and the cross-talked signals, a new method of measuring noise parameters utilizing a reflecting wall has been developed and verified. The achieved results confirm potentially high influence of the phase-noise on the noise parameters of the mentioned type of radar sensors. Obtained results can be used for the analysis of noise parameters of the similar but even more complex sensors.

  3. Analysis and Simulation of Multi-target Echo Signals from a Phased Array Radar

    OpenAIRE

    Jia Zhen; Zhou Rui

    2017-01-01

    The construction of digital radar simulation systems has been a research hotspot of the radar field. This paper focuses on theoretical analysis and simulation of multi-target echo signals produced in a phased array radar system, and constructs an array antenna element and a signal generation environment. The antenna element is able to simulate planar arrays and optimizes these arrays by adding window functions. And the signal environment can model and simulate radar transmission signals, rada...

  4. Trojan horse attacks on counterfactual quantum key distribution

    Energy Technology Data Exchange (ETDEWEB)

    Yang, Xiuqing, E-mail: xqqyang@163.com [School of Science, Beijing Jiaotong University, Beijing 100044 (China); College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wei, Kejin; Ma, Haiqiang [School of Science, Beijing University of Posts and Telecommunications, Beijing 100876 (China); Sun, Shihai, E-mail: shsun@nudt.edu.cn [Department of Physics, National University of Defense Technology, Changsha 410073 (China); Du, Yungang [College of Science, Inner Mongolia University of Technology, 010051 Hohhot (China); Wu, Lingan [Laboratory of Optical Physics, Institute of Physics, Chinese Academy of Sciences, Beijing 100080 (China)

    2016-04-22

    There has been much interest in “counterfactual quantum cryptography” (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes. - Highlights: • We find the attacks available for the two-way protocol become possible for the practical counterfactual systems. • It does not require the assumption that it works on the counterfactual systems only in a finite key scenario. • Compared to the other attack models, our scheme is relatively simple for an eavesdropper.

  5. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  6. Simultaneous observations of structure function parameter of refractive index using a high-resolution radar and the DataHawk small airborne measurement system

    Directory of Open Access Journals (Sweden)

    D. E. Scipión

    2016-09-01

    Full Text Available The SOUSY (SOUnding SYstem radar was relocated to the Jicamarca Radio Observatory (JRO near Lima, Peru, in 2000, where the radar controller and acquisition system were upgraded with state-of-the-art parts to take full advantage of its potential for high-resolution atmospheric sounding. Due to its broad bandwidth (4 MHz, it is able to characterize clear-air backscattering with high range resolution (37.5 m. A campaign conducted at JRO in July 2014 aimed to characterize the lower troposphere with a high temporal resolution (8.1 Hz using the DataHawk (DH small unmanned aircraft system, which provides in situ atmospheric measurements at scales as small as 1 m in the lower troposphere and can be GPS-guided to obtain measurements within the beam of the radar. This was a unique opportunity to make coincident observations by both systems and to directly compare their in situ and remotely sensed parameters. Because SOUSY only points vertically, it is only possible to retrieve vertical radar profiles caused by changes in the refractive index within the resolution volume. Turbulent variations due to scattering are described by the structure function parameter of refractive index Cn2. Profiles of Cn2 from the DH are obtained by combining pressure, temperature, and relative humidity measurements along the helical trajectory and integrated at the same scale as the radar range resolution. Excellent agreement is observed between the Cn2 estimates obtained from the DH and SOUSY in the overlapping measurement regime from 1200 m up to 4200 m above sea level, and this correspondence provides the first accurate calibration of the SOUSY radar for measuring Cn2.

  7. Space-Qualifiable Digital Radar Transceiver, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Historically, radar systems have tended to be either large, complex, power-hungry, purpose-built systems, or extremely simple systems of limited capability. More...

  8. Arecibo Radar Observation of Near-Earth Asteroids: Expanded Sample Size, Determination of Radar Albedos, and Measurements of Polarization Ratios

    Science.gov (United States)

    Lejoly, Cassandra; Howell, Ellen S.; Taylor, Patrick A.; Springmann, Alessondra; Virkki, Anne; Nolan, Michael C.; Rivera-Valentin, Edgard G.; Benner, Lance A. M.; Brozovic, Marina; Giorgini, Jon D.

    2017-10-01

    The Near-Earth Asteroid (NEA) population ranges in size from a few meters to more than 10 kilometers. NEAs have a wide variety of taxonomic classes, surface features, and shapes, including spheroids, binary objects, contact binaries, elongated, as well as irregular bodies. Using the Arecibo Observatory planetary radar system, we have measured apparent rotation rate, radar reflectivity, apparent diameter, and radar albedos for over 350 NEAs. The radar albedo is defined as the radar cross-section divided by the geometric cross-section. If a shape model is available, the actual cross-section is known at the time of the observation. Otherwise we derive a geometric cross-section from a measured diameter. When radar imaging is available, the diameter was measured from the apparent range depth. However, when radar imaging was not available, we used the continuous wave (CW) bandwidth radar measurements in conjunction with the period of the object. The CW bandwidth provides apparent rotation rate, which, given an independent rotation measurement, such as from lightcurves, constrains the size of the object. We assumed an equatorial view unless we knew the pole orientation, which gives a lower limit on the diameter. The CW also provides the polarization ratio, which is the ratio of the SC and OC cross-sections.We confirm the trend found by Benner et al. (2008) that taxonomic types E and V have very high polarization ratios. We have obtained a larger sample and can analyze additional trends with spin, size, rotation rate, taxonomic class, polarization ratio, and radar albedo to interpret the origin of the NEAs and their dynamical processes. The distribution of radar albedo and polarization ratio at the smallest diameters (≤50 m) differs from the distribution of larger objects (>50 m), although the sample size is limited. Additionally, we find more moderate radar albedos for the smallest NEAs when compared to those with diameters 50-150 m. We will present additional trends we

  9. Predictability of heavy sub-hourly precipitation amounts for a weather radar based nowcasting system

    Science.gov (United States)

    Bech, Joan; Berenguer, Marc

    2015-04-01

    Heavy precipitation events and subsequent flash floods are one of the most dramatic hazards in many regions such as the Mediterranean basin as recently stressed in the HyMeX (HYdrological cycle in the Mediterranean EXperiment) international programme. The focus of this study is to assess the quality of very short range (below 3 hour lead times) precipitation forecasts based on weather radar nowcasting system. Specific nowcasting amounts of 10 and 30 minutes generated with a nowcasting technique (Berenguer et al 2005, 2011) are compared against raingauge observations and also weather radar precipitation estimates observed over Catalonia (NE Spain) using data from the Meteorological Service of Catalonia and the Water Catalan Agency. Results allow to discuss the feasibility of issuing warnings for different precipitation amounts and lead times for a number of case studies, including very intense convective events with 30minute precipitation amounts exceeding 40 mm (Bech et al 2005, 2011). As indicated by a number of verification scores single based radar precipitation nowcasts decrease their skill quickly with increasing lead times and rainfall thresholds. This work has been done in the framework of the Hymex research programme and has been partly funded by the ProFEWS project (CGL2010-15892). References Bech J, N Pineda, T Rigo, M Aran, J Amaro, M Gayà, J Arús, J Montanyà, O van der Velde, 2011: A Mediterranean nocturnal heavy rainfall and tornadic event. Part I: Overview, damage survey and radar analysis. Atmospheric Research 100:621-637 http://dx.doi.org/10.1016/j.atmosres.2010.12.024 Bech J, R Pascual, T Rigo, N Pineda, JM López, J Arús, and M Gayà, 2007: An observational study of the 7 September 2005 Barcelona tornado outbreak. Natural Hazards and Earth System Science 7:129-139 http://dx.doi.org/10.5194/nhess-7-129-2007 Berenguer M, C Corral, R Sa0nchez-Diezma, D Sempere-Torres, 2005: Hydrological validation of a radar based nowcasting technique. Journal of

  10. Radar Polarimetry: Theory, Analysis, and Applications

    Science.gov (United States)

    Hubbert, John Clark

    The fields of radar polarimetry and optical polarimetry are compared. The mathematics of optic polarimetry are formulated such that a local right handed coordinate system is always used to describe the polarization states. This is not done in radar polarimetry. Radar optimum polarization theory is redeveloped within the framework of optical polarimetry. The radar optimum polarizations and optic eigenvalues of common scatterers are compared. In addition a novel definition of an eigenpolarization state is given and the accompanying mathematics is developed. The polarization response calculated using optic, radar and novel definitions is presented for a variety of scatterers. Polarimetric transformation provides a means to characterize scatters in more than one polarization basis. Polarimetric transformation for an ensemble of scatters is obtained via two methods: (1) the covariance method and (2) the instantaneous scattering matrix (ISM) method. The covariance method is used to relate the mean radar parameters of a +/-45^circ linear polarization basis to those of a horizontal and vertical polarization basis. In contrast the ISM method transforms the individual time samples. Algorithms are developed for transforming the time series from fully polarimetric radars that switch between orthogonal states. The transformed time series are then used to calculate the mean radar parameters of interest. It is also shown that propagation effects do not need to be removed from the ISM's before transformation. The techniques are demonstrated using data collected by POLDIRAD, the German Aerospace Research Establishment's fully polarimetric C-band radar. The differential phase observed between two copolar states, Psi_{CO}, is composed of two phases: (1) differential propagation phase, phi_{DP}, and (2) differential backscatter phase, delta. The slope of phi_{DP } with range is an estimate of the specific differential phase, K_{DP}. The process of estimating K_{DP} is complicated when

  11. Customizable Digital Receivers for Radar

    Science.gov (United States)

    Moller, Delwyn; Heavey, Brandon; Sadowy, Gregory

    2008-01-01

    Compact, highly customizable digital receivers are being developed for the system described in 'Radar Interferometer for Topographic Mapping of Glaciers and Ice Sheets' (NPO-43962), NASA Tech Briefs, Vol. 31, No. 7 (August 2007), page 72. The receivers are required to operate in unison, sampling radar returns received by the antenna elements in a digital beam-forming (DBF) mode. The design of these receivers could also be adapted to commercial radar systems. At the time of reporting the information for this article, there were no commercially available digital receivers capable of satisfying all of the operational requirements and compact enough to be mounted directly on the antenna elements. A provided figure depicts the overall system of which the digital receivers are parts. Each digital receiver includes an analog-to-digital converter (ADC), a demultiplexer (DMUX), and a field-programmable gate array (FPGA). The ADC effects 10-bit band-pass sampling of input signals having frequencies up to 3.5 GHz. The input samples are demultiplexed at a user-selectable rate of 1:2 or 1:4, then buffered in part of the FPGA that functions as a first-in/first-out (FIFO) memory. Another part of the FPGA serves as a controller for the ADC, DMUX, and FIFO memory and as an interface between (1) the rest of the receiver and (2) a front-panel data port (FPDP) bus, which is an industry-standard parallel data bus that has a high data-rate capability and multichannel configuration suitable for DBF. Still other parts of the FPGA in each receiver perform signal-processing functions. The digital receivers can be configured to operate in a stand-alone mode, or in a multichannel mode as needed for DBF. The customizability of the receiver makes it applicable to a broad range of system architectures. The capability for operation of receivers in either a stand-alone or a DBF mode enables the use of the receivers in an unprecedentedly wide variety of radar systems.

  12. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  13. Single Frequency Network Based Distributed Passive Radar Technology

    Directory of Open Access Journals (Sweden)

    Wan Xian-rong

    2015-01-01

    Full Text Available The research and application of passive radar are heading from single transmitter-receiver pair to multiple transmitter-receiver pairs. As an important class of the illuminators of opportunity, most of modern digital broadcasting and television systems work on Single Frequency Network (SFN, which intrinsically determines that the passive radar based on such illuminators must be distributed and networked. In consideration of the remarkable working and processing mode of passive radar under SFN configuration, this paper proposes the concept of SFN-based Distributed Passive Radar (SDPR. The main characteristics and key problems of SDPR are first described. Then several potential solutions are discussed for part of the key technologies. The feasibility of SDPR is demonstrated by preliminary experimental results. Finally, the concept of four network convergence that includes the broadcast based passive radar network is conceived, and its application prospects are discussed.

  14. Experimentelles FMCW-Radar zur hochfrequenten Charakterisierung von Windenergieanlagen

    Science.gov (United States)

    Schubert, Karsten; Werner, Jens; Schwartau, Fabian

    2017-09-01

    During the increasing dissemination of renewable energy sources the potential and actual interference effects of wind turbine plants became obvious. Turbines reflect the signals of weather radar and other radar systems. In addition to the static radar echoes, in particular the Doppler echoes are to be mentioned as an undesirable impairment Keränen (2014). As a result, building permit is refused for numerous new wind turbines, as the potential interference can not be reliably predicted. As a contribution to the improvement of this predictability, measurements are planned which aim at the high-frequency characterisation of wind energy installations. In this paper, a cost-effective FMCW radar is presented, which is operated in the same frequency band (C-band) as the weather radars of the German weather service. Here, the focus is on the description of the hardware design including the considerations used for its dimensioning.

  15. Improved Micro Rain Radar snow measurements using Doppler spectra post-processing

    Directory of Open Access Journals (Sweden)

    M. Maahn

    2012-11-01

    Full Text Available The Micro Rain Radar 2 (MRR is a compact Frequency Modulated Continuous Wave (FMCW system that operates at 24 GHz. The MRR is a low-cost, portable radar system that requires minimum supervision in the field. As such, the MRR is a frequently used radar system for conducting precipitation research. Current MRR drawbacks are the lack of a sophisticated post-processing algorithm to improve its sensitivity (currently at +3 dBz, spurious artefacts concerning radar receiver noise and the lack of high quality Doppler radar moments. Here we propose an improved processing method which is especially suited for snow observations and provides reliable values of effective reflectivity, Doppler velocity and spectral width. The proposed method is freely available on the web and features a noise removal based on recognition of the most significant peak. A dynamic dealiasing routine allows observations even if the Nyquist velocity range is exceeded. Collocated observations over 115 days of a MRR and a pulsed 35.2 GHz MIRA35 cloud radar show a very high agreement for the proposed method for snow, if reflectivities are larger than −5 dBz. The overall sensitivity is increased to −14 and −8 dBz, depending on range. The proposed method exploits the full potential of MRR's hardware and substantially enhances the use of Micro Rain Radar for studies of solid precipitation.

  16. Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

    Directory of Open Access Journals (Sweden)

    Mohamed Idhammad

    2018-01-01

    Full Text Available Cloud Computing services are often delivered through HTTP protocol. This facilitates access to services and reduces costs for both providers and end-users. However, this increases the vulnerabilities of the Cloud services face to HTTP DDoS attacks. HTTP request methods are often used to address web servers’ vulnerabilities and create multiple scenarios of HTTP DDoS attack such as Low and Slow or Flooding attacks. Existing HTTP DDoS detection systems are challenged by the big amounts of network traffic generated by these attacks, low detection accuracy, and high false positive rates. In this paper we present a detection system of HTTP DDoS attacks in a Cloud environment based on Information Theoretic Entropy and Random Forest ensemble learning algorithm. A time-based sliding window algorithm is used to estimate the entropy of the network header features of the incoming network traffic. When the estimated entropy exceeds its normal range the preprocessing and the classification tasks are triggered. To assess the proposed approach various experiments were performed on the CIDDS-001 public dataset. The proposed approach achieves satisfactory results with an accuracy of 99.54%, a FPR of 0.4%, and a running time of 18.5s.

  17. Movement and respiration detection using statistical properties of the FMCW radar signal

    KAUST Repository

    Kiuru, Tero; Metso, Mikko; Jardak, Seifallah; Pursula, Pekka; Hakli, Janne; Hirvonen, Mervi; Sepponen, Raimo

    2016-01-01

    This paper presents a 24 GHz FMCW radar system for detection of movement and respiration using change in the statistical properties of the received radar signal, both amplitude and phase. We present the hardware and software segments of the radar

  18. X-Band wave radar system for monitoring and risk management of the coastal infrastructures

    Science.gov (United States)

    Ludeno, Giovanni; Soldovieri, Francesco; Serafino, Francesco

    2017-04-01

    waves from the coastal infrastructures, e.g. from the harbor jetties. In fact, the reflected waves may significantly complicate the harbour activities (e.g., berthing operations), as they interfere with the oncoming waves thus creating a confused sea [2]. References [1] G. Ludeno, C. Brandini, C. Lugni, D. Arturi, A. Natale, F. Soldovieri, B. Gozzini, F. Serafino, "Remocean System for the Detection of the Reflected Waves from the Costa Concordia Ship Wreck", IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, Vol.7, no.3, pp.3011-3018, July 2014. [2] G. Ludeno, F. Reale, F. Dentale, E. Pugliese Carratelli, A. Natale, F. Soldovieri, F. Serafino "An X-Band Radar System for Bathymetry and Wave Field Analysis in Harbor Area", Sensors, Vol.15, no.1, pp. 1691-1707, January 2015. [3] F. Raffa, G. Ludeno, B. Patti, F. Soldovieri, S. Mazzola, and F. Serafino, "X-band wave radar for coastal upwelling detection off the southern coast of Sicily.", Journal of Atmospheric and Oceanic Technology, January 2017, Vol. 34, No. 1, Published online on 22 Dec 2016.

  19. Proposed satellite position determination systems and techniques for Geostationary Synthetic Aperture Radar

    OpenAIRE

    Martin Fuster, Roger; Fernández Usón, Marc; Casado Blanco, David; Broquetas Ibars, Antoni

    2016-01-01

    This paper proposes two different calibration techniques for Geostationary Synthetic Aperture Radar (GEOSAR) missions requiring a high precision positioning, based on Active Radar Calibrators and Ground Based Interferometry. The research is enclosed in the preparation studies of a future GEOSAR mission providing continuous monitoring at continental scale. Peer Reviewed

  20. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  1. Information Warfare: using the viable system model as a framework to attack organisations

    Directory of Open Access Journals (Sweden)

    Bill Hutchinson

    2002-05-01

    Full Text Available Information is the glue in any organization. It is needed for policy, decision-making, control, and co-ordination. If an organisation's information systems are disrupted or destroyed, then damage to the whole inevitably follows. This paper uses a proven systemic, analytic framework the Viable System Model (VSM - in a functionalist mode, to analyse the vulnerabilities of an organisation's information resources to this form of aggression. It examines the tactics available, and where they can be used to effectively attack an organisation.

  2. Terahertz radar cross section measurements.

    Science.gov (United States)

    Iwaszczuk, Krzysztof; Heiselberg, Henning; Jepsen, Peter Uhd

    2010-12-06

    We perform angle- and frequency-resolved radar cross section (RCS) measurements on objects at terahertz frequencies. Our RCS measurements are performed on a scale model aircraft of size 5-10 cm in polar and azimuthal configurations, and correspond closely to RCS measurements with conventional radar on full-size objects. The measurements are performed in a terahertz time-domain system with freely propagating terahertz pulses generated by tilted pulse front excitation of lithium niobate crystals and measured with sub-picosecond time resolution. The application of a time domain system provides ranging information and also allows for identification of scattering points such as weaponry attached to the aircraft. The shapes of the models and positions of reflecting parts are retrieved by the filtered back projection algorithm.

  3. Radar detection of ultra high energy cosmic rays

    Science.gov (United States)

    Myers, Isaac J.

    TARA (Telescope Array Radar) is a cosmic ray radar detection experiment co-located with Telescope Array, the conventional surface scintillation detector (SD) and fluorescence telescope detector (FD) near Delta, UT. The TARA detector combines a 40 kW transmitter and high gain transmitting antenna which broadcasts the radar carrier over the SD array and in the FD field of view to a 250 MS/s DAQ receiver. Data collection began in August, 2013. TARA stands apart from other cosmic ray radar experiments in that radar data is directly compared with conventional cosmic ray detector events. The transmitter is also directly controlled by TARA researchers. Waveforms from the FD-triggered data stream are time-matched with TA events and searched for signal using a novel signal search technique in which the expected (simulated) radar echo of a particular air shower is used as a matched filter template and compared to radio waveforms. This technique is used to calculate the radar cross-section (RCS) upper-limit on all triggers that correspond to well-reconstructed TA FD monocular events. Our lowest cosmic ray RCS upper-limit is 42 cm2 for an 11 EeV event. An introduction to cosmic rays is presented with the evolution of detection and the necessity of new detection techniques, of which radar detection is a candidate. The software simulation of radar scattering from cosmic rays follows. The TARA detector, including transmitter and receiver systems, are discussed in detail. Our search algorithm and methodology for calculating RCS is presented for the purpose of being repeatable. Search results are explained in context of the usefulness and future of cosmic ray radar detection.

  4. Determination of radar MTF

    Energy Technology Data Exchange (ETDEWEB)

    Chambers, D. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    The ultimate goal of the Current Meter Array (CMA) is to be able to compare the current patterns detected with the array with radar images of the water surface. The internal wave current patterns modulate the waves on the water surface giving a detectable modulation of the radar cross-section (RCS). The function relating the RCS modulations to the current patterns is the Modulation Transfer Function (MTF). By comparing radar images directly with co-located CMA measurements the MTF can be determined. In this talk radar images and CMA measurements from a recent experiment at Loch Linnhe, Scotland, will be used to make the first direct determination of MTF for an X and S band radar at low grazing angles. The technical problems associated with comparing radar images to CMA data will be explained and the solution method discussed. The results suggest the both current and strain rate contribute equally to the radar modulation for X band. For S band, the strain rate contributes more than the current. The magnitude of the MTF and the RCS modulations are consistent with previous estimates when the wind is blowing perpendicular to the radar look direction.

  5. Tenth Biennial Coherent Laser Radar Technology and Applications Conference

    Science.gov (United States)

    Kavaya, Michael J. (Compiler)

    1999-01-01

    The tenth conference on coherent laser radar technology and applications is the latest in a series beginning in 1980 which provides a forum for exchange of information on recent events current status, and future directions of coherent laser radar (or lidar or lader) technology and applications. This conference emphasizes the latest advancement in the coherent laser radar field, including theory, modeling, components, systems, instrumentation, measurements, calibration, data processing techniques, operational uses, and comparisons with other remote sensing technologies.

  6. Individual vs. overarching protection for minimizing the expected damage caused by an attack

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Dai, Yuanshun

    2013-01-01

    The article considers a system consisting of identical elements which can be protected and attacked individually and collectively. The system is aimed at supplying a demand. If, following the attack, the cumulative performance of the elements becomes less than the demand the damage proportional to the unsupplied demand is inflicted. Additional damage is associated with the destruction of the equipment. To destroy any system element the attacker always must penetrate/destroy the collective (overarching) protection. Both the attacker and the defender have limited resources and can distribute them freely between the two types of attack and protection. The attacker chooses the resource distribution and the number of attacked elements to maximize the expected damage associated with equipment losses and unsupplied demand. The defender chooses the resource distribution and the number of protected elements to minimize the system destruction probability. The bi-contest minmax game is formulated and its solutions are presented and analyzed. The influence of the game parameters on the optimal defense and attack strategies is discussed

  7. Drone Detection with Chirp‐Pulse Radar Based on Target Fluctuation Models

    Directory of Open Access Journals (Sweden)

    Byung‐Kwan Kim

    2018-04-01

    Full Text Available This paper presents a pulse radar system to detect drones based on a target fluctuation model, specifically the Swerling target model. Because drones are small atypical objects and are mainly composed of non‐conducting materials, their radar cross‐section value is low and fluctuating. Therefore, determining the target fluctuation model and applying a proper integration method are important. The proposed system is herein experimentally verified and the results are discussed. A prototype design of the pulse radar system is based on radar equations. It adopts three different pulse modes and a coherent pulse integration to ensure a high signal‐to‐noise ratio. Outdoor measurements are performed with a prototype radar system to detect Doppler frequencies from both the drone frame and blades. The results indicate that the drone frame and blades are detected within an instrumental maximum range. Additionally, the results show that the drone's frame and blades are close to the Swerling 3 and 4 target models, respectively. By the analysis of the Swerling target models, proper integration methods for detecting drones are verified and can thus contribute to increasing in detectability.

  8. Radar Scan Methods in Modern Multifunctional Radars

    Directory of Open Access Journals (Sweden)

    V. N. Skosyrev

    2014-01-01

    Full Text Available Considered urgent task of organizing the review space in modern multifunctional radar systems shall review the space in a wide range of elevation angles from minus 5 to 60-80 degrees and 360 degrees azimuth. MfRLS this type should provide an overview of the zone for a limited time (2-3 sec, detecting a wide range of subtle high and low-flying targets. The latter circumstance requires the organization to select targets against the background of reflections from the underlying surface and local objects (MP. When providing an overview of the space taken into account the need to increase not only the noise immunity, and survivability.Two variants of the review of space in the elevation plane in the solid-state AESA radar. In the first case the overview space narrow beam by one beam. In the second - the transfer of DNA is formed, covering the whole sector of responsibility in elevation and at the reception beam is formed in spetsvychislitele (CB as a result of the signal processing of digitized after emitters antenna web. The estimations of the parameters specific to the multifunction radar SAM air and missile defense. It is shown that in a number of practically important cases, preference should be given clearly one of the methods described review of space.The functional scheme with AESA radar for both variants of the review. Necessary to analyze their differences. Contains the problem of increasing the cost of MfRLS with digital beamforming DNA with increasing bandwidth probing signal being processed.Noted drawbacks of MfRLS with digital beamforming beam. Including: reduced accuracy of the coordinates at low elevation angles, the complexity of the organization of thermal regime of the solid element base using quasi-continuous signal with a low duty cycle. Shows their fundamentally unavoidable in the steppe and desert areas with uneven terrain (Kazakhstan, China, the Middle East.It is shown that for MfRLS working in strong clutter, more preferably

  9. Handbook of biometric anti-spoofing trusted biometrics under spoofing attacks

    CERN Document Server

    Marcel, Sébastien; Li, Stan Z

    2014-01-01

    As the plethora of approaches to biometrics and their deployment continues to grow, so too does the need to combat the techniques used to subvert the aim of such biometric systems. Presenting the first definitive study of the subject, this Handbook of Biometric Anti-Spoofing reviews the state of the art in covert attacks against biometric systems, and in deriving countermeasures to these attacks. Across a range of common biometrics, including face, iris, fingerprint, speaker and gait, the book describes spoofing methods and examines the vulnerabilities of biometric systems to these attacks.

  10. Quantitative Gait Measurement With Pulse-Doppler Radar for Passive In-Home Gait Assessment

    OpenAIRE

    Wang, Fang; Skubic, Marjorie; Rantz, Marilyn; Cuddihy, Paul E.

    2014-01-01

    In this paper, we propose a pulse-Doppler radar system for in-home gait assessment of older adults. A methodology has been developed to extract gait parameters including walking speed and step time using Doppler radar. The gait parameters have been validated with a Vicon motion capture system in the lab with 13 participants and 158 test runs. The study revealed that for an optimal step recognition and walking speed estimation, a dual radar set up with one radar placed at foot level and the ot...

  11. Development of radar cross section analysis system of naval ships

    Directory of Open Access Journals (Sweden)

    Kookhyun Kim

    2012-03-01

    Full Text Available A software system for a complex object scattering analysis, named SYSCOS, has been developed for a systematic radar cross section (RCS analysis and reduction design. The system is based on the high frequency analysis methods of physical optics, geometrical optics, and physical theory of diffraction, which are suitable for RCS analysis of electromagnetically large and complex targets as like naval ships. In addition, a direct scattering center analysis function has been included, which gives relatively simple and intuitive way to discriminate problem areas in design stage when comparing with conventional image-based approaches. In this paper, the theoretical background and the organization of the SYSCOS system are presented. To verify its accuracy and to demonstrate its applicability, numerical analyses for a square plate, a sphere and a cylinder, a weapon system and a virtual naval ship have been carried out, of which results have been compared with analytic solutions and those obtained by the other existing software.

  12. RADAR PPI Scope Overlay

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — RADAR PPI Scope Overlays are used to position a RADAR image over a station at the correct resolution. The archive maintains several different RADAR resolution types,...

  13. A Novel Covert Agent for Stealthy Attacks on Industrial Control Systems Using Least Squares Support Vector Regression

    Directory of Open Access Journals (Sweden)

    Weize Li

    2018-01-01

    Full Text Available Research on stealthiness has become an important topic in the field of data integrity (DI attacks. To construct stealthy DI attacks, a common assumption in most related studies is that attackers have prior model knowledge of physical systems. In this paper, such assumption is relaxed and a covert agent is proposed based on the least squares support vector regression (LSSVR. By estimating a plant model from control and sensory data, the LSSVR-based covert agent can closely imitate the behavior of the physical plant. Then, the covert agent is used to construct a covert loop, which can keep the controller’s input and output both stealthy over a finite time window. Experiments have been carried out to show the effectiveness of the proposed method.

  14. Towards an Autonomous System Monitor for Mitigating Correlation Attacks in the Tor Network

    OpenAIRE

    Hoang, Nguyen Phong

    2016-01-01

    After carefully considering the scalability problem in Tor and exhaustively evaluating related works on AS-level adversaries, the author proposes ASmoniTor, which is an autonomous system monitor for mitigating correlation attacks in the Tor network. In contrast to prior works, which often released offline packets, including the source code of a modified Tor client and a snapshot of the Internet topology, ASmoniTor is an online system that assists end users with mitigating the threat of AS-lev...

  15. Polarimetric borehole radar measurement near Nojima fault and its application to subsurface crack characterization; Polarimetric borehole radar ni yoru Nojima danso shuhen no chika kiretsu keisoku jikken

    Energy Technology Data Exchange (ETDEWEB)

    Sato, M.; Taniguchi, Y.; Miwa, T.; Niitsuma, H. [Tohoku University, Sendai (Japan); Ikeda, R. [National Research Institute for Disaster Prevention, Tsukuba (Japan); Makino, K. [Geophysical Surveying and Consulting Co. Ltd., Tokyo (Japan)

    1997-05-27

    Practical application of subsurface crack characterization by the borehole radar measurement to which the radar polarimetric method was introduced was attempted to measuring objects for which the borehole radar has not been much used, for example, the inside of low loss rock mass or fracture zone where cracks tightly exist. A system was trially manufactured which makes the radar polarimetric measurement possible in the borehole at a 1000m depth and with a about 10cm diameter, and a field experiment was conducted for realizing the subsurface crack characterization near the Nojima fault. For the measuring experiment by the polarimetric borehole radar, used were Iwaya borehole and Hirabayashi borehole drilled in the north of Awaji-shima, Hyogo-ken. In a comparison of both polarization systems of Hirabayashi borehole, reflected waves at depths of 1038m and 1047m are relatively stronger in both polarization systems than those with the same polarization form and at different depths, whereas reflected waves around a 1017m depth are strong only as to the parallel polarization system. Characteristics of the polarization in this experiment indirectly reflect crack structures. 6 refs., 6 figs., 1 tab.

  16. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  17. W-band spaceborne radar observations of atmospheric river events

    Science.gov (United States)

    Matrosov, S. Y.

    2010-12-01

    While the main objective of the world first W-band radar aboard the CloudSat satellite is to provide vertically resolved information on clouds, it proved to be a valuable tool for observing precipitation. The CloudSat radar is generally able to resolve precipitating cloud systems in their vertical entirety. Although measurements from the liquid hydrometer layer containing rainfall are strongly attenuated, special retrieval approaches can be used to estimate rainfall parameters. These approaches are based on vertical gradients of observed radar reflectivity factor rather than on absolute estimates of reflectivity. Concurrent independent estimations of ice cloud parameters in the same vertical column allow characterization of precipitating systems and provide information on coupling between clouds and rainfall they produce. The potential of CloudSat for observations atmospheric river events affecting the West Coast of North America is evaluated. It is shown that spaceborne radar measurements can provide high resolution information on the height of the freezing level thus separating areas of rainfall and snowfall. CloudSat precipitation rate estimates complement information from the surface-based radars. Observations of atmospheric rivers at different locations above the ocean and during landfall help to understand evolutions of atmospheric rivers and their structures.

  18. Imaging of concrete specimens using inverse synthetic aperture radar

    International Nuclear Information System (INIS)

    Rhim, Hong C.; Buyukozturk, Oral

    2000-01-01

    Radar Measurement results of laboratory size concrete specimens are presented in this paper. The purpose of this research work is to study various aspects of the radar method in an effort to develop an improved radar system for nondestructive testing of concrete structures. The radar system used for the study is an Inverse Synthetic Aperture Radar (ISAR), which is capable of transmitting microwaves at three different frequency ranges of 2-3.4, 3.4-5.8, and 8-12 GHz. Radar measurement setup is such that the radar is locates 14.4 m away from a concrete target to satisfy a far-field criterion. The concrete target is rotated for 20 degrees during the measurements for the generation of two-dimensional (cross-range) imagery. Concrete targets used for the measurements have the dimensions of 305 mm (width)x305 mm (height)x92 mm (thickness) with different inside configurations. Comparisons are made for dry and wet specimens, specimens with and without inclusions. Each specimen is made to model various situations that a concrete structure can have in reality. Results show that center frequency, frequency bandwidth, and polarization of the incident wave have different effects on identifying the thickness or inclusions inside concrete specimens. Results also suggest that a certain combination of measurement parameters is suitable for a specific application area. Thus, measurement parameters can be optimized for a specific problem. The findings are presented and discussed in details in the paper. Signal processing schemes implemented for imaging of the specimens are also discussed

  19. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  20. Java Radar Analysis Tool

    Science.gov (United States)

    Zaczek, Mariusz P.

    2005-01-01

    Java Radar Analysis Tool (JRAT) is a computer program for analyzing two-dimensional (2D) scatter plots derived from radar returns showing pieces of the disintegrating Space Shuttle Columbia. JRAT can also be applied to similar plots representing radar returns showing aviation accidents, and to scatter plots in general. The 2D scatter plots include overhead map views and side altitude views. The superposition of points in these views makes searching difficult. JRAT enables three-dimensional (3D) viewing: by use of a mouse and keyboard, the user can rotate to any desired viewing angle. The 3D view can include overlaid trajectories and search footprints to enhance situational awareness in searching for pieces. JRAT also enables playback: time-tagged radar-return data can be displayed in time order and an animated 3D model can be moved through the scene to show the locations of the Columbia (or other vehicle) at the times of the corresponding radar events. The combination of overlays and playback enables the user to correlate a radar return with a position of the vehicle to determine whether the return is valid. JRAT can optionally filter single radar returns, enabling the user to selectively hide or highlight a desired radar return.

  1. Synthetic pulse radar including a microprocessor based controller

    International Nuclear Information System (INIS)

    Fowler, J.C.; Rubin, L.A.; Still, W.L.

    1980-01-01

    This invention relates to pulse radar detection of targets in extended media, including natural phenomena such as oil, coal and ore deposits within the earth. In particular, this invention relates to a pulse radar system employing a synthetic pulse formed from a fourier spectrum of frequencies generated and detected by a digitally controlled transmitter and receiver circuits

  2. Research at the Stanford Center for Radar Astronomy

    Science.gov (United States)

    1972-01-01

    The research is reported in the applications of radar and radio techniques to the study of the solar system, and to space programs. Experiments reported include: bistatic-radar on Apollo missions, development of an unmanned geophysical observatory in the Antartic, Bragg scattering probes of sea states, characteristics of dense solar wind disturbances, and satellite communications for Alaska.

  3. MAARSY: The new MST radar on Andøya—System description and first results

    Science.gov (United States)

    Latteck, R.; Singer, W.; Rapp, M.; Vandepeer, B.; Renkwitz, T.; Zecha, M.; Stober, G.

    2012-02-01

    The Middle Atmosphere Alomar Radar System (MAARSY) on the North-Norwegian island Andøya is a 53.5 MHz monostatic radar with an active phased array antenna consisting of 433 Yagi antennas. The 3-element Yagi antennas are arranged in an equilateral triangle grid forming a circular aperture of approximately 6300 m2. Each individual antenna is connected to its own transceiver with independent phase control and a scalable power output up to 2 kW. This arrangement provides a very high flexibility of beam forming and beam steering with a symmetric radar beam of a minimum beam width of 3.6° allowing classical beam swinging operation as well as experiments with simultaneous multiple beams and the use of interferometric applications for improved studies of the Arctic atmosphere from the troposphere up to the lower thermosphere with high spatio-temporal resolution. The installation of the antenna array was completed in August 2009. The radar control and data acquisition hardware as well as an initial expansion stage of 196 transceiver modules was installed in spring 2010 and upgraded to 343 transceiver modules in November 2010. The final extension to 433 transceiver modules has recently been completed in May 2011. Beside standard observations of tropospheric winds and Polar Mesosphere Summer Echoes, the first multi-beam experiments using up to 97 quasi-simultaneous beams in the mesosphere have been carried out in 2010 and 2011. These results provide a first insight into the horizontal variability of polar mesosphere summer and winter echoes with time resolutions between 3 and 9 minutes. In addition, first meteor head echo observations were conducted during the Geminid meteor shower in December 2010.

  4. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  5. A Framework For Analyzing And Mitigating The Vulnerabilities Of Complex Systems Via Attack And Protection Trees

    National Research Council Canada - National Science Library

    Edge, Kenneth S

    2007-01-01

    .... In addition to developing protection trees, this research improves the existing concept of attack trees and develops rule sets for the manipulation of metrics used in the security of complex systems...

  6. Synthetic impulse and aperture radar (SIAR) a novel multi-frequency MIMO radar

    CERN Document Server

    Chen, Baixiao

    2014-01-01

    Analyzes and discusses the operating principle, signal processing method, and experimental results of this advanced radar technology This book systematically discusses the operating principle, signal processing method, target measurement technology, and experimental results of a new kind of radar called synthetic impulse and aperture radar (SIAR). The purpose is to help readers acquire an insight into the concept and principle of the SIAR, to know its operation mode, signal processing method, the difference between the traditional radar and itself, the designing ideals, and the developing me

  7. The membrane attack complex of the complement system is essential for rapid wallerian degeneration

    NARCIS (Netherlands)

    Ramaglia, Valeria; King, Rosalind Helen Mary; Nourallah, Michelle; Wolterman, Ruud; de Jonge, Rosalein; Ramkema, Marja; Vigar, Miriam Ann; van der Wetering, Sandra; Morgan, Brian Paul; Troost, Dirk; Baas, Frank

    2007-01-01

    The complement (C) system plays an important role in myelin breakdown during Wallerian degeneration (WD). The pathway and mechanism involved are, however, not clear. In a crush injury model of the sciatic nerve, we show that C6, necessary for the assembly of the membrane attack complex (MAC), is

  8. Phased Array Radar Network Experiment for Severe Weather

    Science.gov (United States)

    Ushio, T.; Kikuchi, H.; Mega, T.; Yoshikawa, E.; Mizutani, F.; Takahashi, N.

    2017-12-01

    Phased Array Weather Radar (PAWR) was firstly developed in 2012 by Osaka University and Toshiba under a grant of NICT using the Digital Beamforming Technique, and showed a impressive thunderstorm behavior with 30 second resolution. After that development, second PAWR was installed in Kobe city about 60 km away from the first PAWR site, and Tokyo Metropolitan University, Osaka Univeristy, Toshiba and the Osaka Local Government started a new project to develop the Osaka Urban Demonstration Network. The main sensor of the Osaka Network is a 2-node Phased Array Radar Network and lightning location system. Data products that are created both in local high performance computer and Toshiba Computer Cloud, include single and multi-radar data, vector wind, quantitative precipitation estimation, VIL, nowcasting, lightning location and analysis. Each radar node is calibarated by the baloon measurement and through the comparison with the GPM (Global Precipitation Measurement)/ DPR (Dual Frequency Space borne Radar) within 1 dB. The attenuated radar reflectivities obtained by the Phased Array Radar Network at X band are corrected based on the bayesian scheme proposed in Shimamura et al. [2016]. The obtained high resolution (every 30 seconds/ 100 elevation angles) 3D reflectivity and rain rate fields are used to nowcast the surface rain rate up to 30 minutes ahead. These new products are transferred to Osaka Local Government in operational mode and evaluated by several section in Osaka Prefecture. Furthermore, a new Phased Array Radar with polarimetric function has been developed in 2017, and will be operated in the fiscal year of 2017. In this presentation, Phased Array Radar, network architecuture, processing algorithm, evalution of the social experiment and first Multi-Prameter Phased Array Radar experiment are presented.

  9. Location detection and tracking of moving targets by a 2D IR-UWB radar system.

    Science.gov (United States)

    Nguyen, Van-Han; Pyun, Jae-Young

    2015-03-19

    In indoor environments, the Global Positioning System (GPS) and long-range tracking radar systems are not optimal, because of signal propagation limitations in the indoor environment. In recent years, the use of ultra-wide band (UWB) technology has become a possible solution for object detection, localization and tracking in indoor environments, because of its high range resolution, compact size and low cost. This paper presents improved target detection and tracking techniques for moving objects with impulse-radio UWB (IR-UWB) radar in a short-range indoor area. This is achieved through signal-processing steps, such as clutter reduction, target detection, target localization and tracking. In this paper, we introduce a new combination consisting of our proposed signal-processing procedures. In the clutter-reduction step, a filtering method that uses a Kalman filter (KF) is proposed. Then, in the target detection step, a modification of the conventional CLEAN algorithm which is used to estimate the impulse response from observation region is applied for the advanced elimination of false alarms. Then, the output is fed into the target localization and tracking step, in which the target location and trajectory are determined and tracked by using unscented KF in two-dimensional coordinates. In each step, the proposed methods are compared to conventional methods to demonstrate the differences in performance. The experiments are carried out using actual IR-UWB radar under different scenarios. The results verify that the proposed methods can improve the probability and efficiency of target detection and tracking.

  10. Development of Coatings for Radar Absorbing Materials at X-band

    Science.gov (United States)

    Kumar, Abhishek; Singh, Samarjit

    2018-03-01

    The present review gives a brief account on some of the technical features of radar absorbing materials (RAMs). The paper has been presented with a concentrated approach towards the material aspects for achieving enhanced radar absorption characteristics for its application as a promising candidate in stealth technology and electromagnetic interference (EMI) minimization problems. The effect of metal particles doping/dispersion in the ferrites and dielectrics has been discussed for obtaining tunable radar absorbing characteristics. A short theoretical overview on the development of absorber materials, implementation of genetic algorithm (GA) in multi-layering and frequency selective surfaces (FSSs) based multi-layer has also been presented for the development of radar absorbing coatings for achieving better absorption augmented with broadband features in order to counter the radar detection systems.

  11. To See the Unseen: A History of Planetary Radar Astronomy

    Science.gov (United States)

    Butrica, Andrew J.

    1996-01-01

    This book relates the history of planetary radar astronomy from its origins in radar to the present day and secondarily to bring to light that history as a case of 'Big Equipment but not Big Science'. Chapter One sketches the emergence of radar astronomy as an ongoing scientific activity at Jodrell Bank, where radar research revealed that meteors were part of the solar system. The chief Big Science driving early radar astronomy experiments was ionospheric research. Chapter Two links the Cold War and the Space Race to the first radar experiments attempted on planetary targets, while recounting the initial achievements of planetary radar, namely, the refinement of the astronomical unit and the rotational rate and direction of Venus. Chapter Three discusses early attempts to organize radar astronomy and the efforts at MIT's Lincoln Laboratory, in conjunction with Harvard radio astronomers, to acquire antenna time unfettered by military priorities. Here, the chief Big Science influencing the development of planetary radar astronomy was radio astronomy. Chapter Four spotlights the evolution of planetary radar astronomy at the Jet Propulsion Laboratory, a NASA facility, at Cornell University's Arecibo Observatory, and at Jodrell Bank. A congeries of funding from the military, the National Science Foundation, and finally NASA marked that evolution, which culminated in planetary radar astronomy finding a single Big Science patron, NASA. Chapter Five analyzes planetary radar astronomy as a science using the theoretical framework provided by philosopher of science Thomas Kuhn. Chapter Six explores the shift in planetary radar astronomy beginning in the 1970s that resulted from its financial and institutional relationship with NASA Big Science. Chapter Seven addresses the Magellan mission and its relation to the evolution of planetary radar astronomy from a ground-based to a space-based activity. Chapters Eight and Nine discuss the research carried out at ground

  12. Gesture recognition for smart home applications using portable radar sensors.

    Science.gov (United States)

    Wan, Qian; Li, Yiran; Li, Changzhi; Pal, Ranadip

    2014-01-01

    In this article, we consider the design of a human gesture recognition system based on pattern recognition of signatures from a portable smart radar sensor. Powered by AAA batteries, the smart radar sensor operates in the 2.4 GHz industrial, scientific and medical (ISM) band. We analyzed the feature space using principle components and application-specific time and frequency domain features extracted from radar signals for two different sets of gestures. We illustrate that a nearest neighbor based classifier can achieve greater than 95% accuracy for multi class classification using 10 fold cross validation when features are extracted based on magnitude differences and Doppler shifts as compared to features extracted through orthogonal transformations. The reported results illustrate the potential of intelligent radars integrated with a pattern recognition system for high accuracy smart home and health monitoring purposes.

  13. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  14. Detecting SYN flood attacks via statistical monitoring charts: A comparative study

    KAUST Repository

    Bouyeddou, Benamar; Harrou, Fouzi; Sun, Ying; Kadri, Benamar

    2017-01-01

    Accurate detection of cyber-attacks plays a central role in safeguarding computer networks and information systems. This paper addresses the problem of detecting SYN flood attacks, which are the most popular Denial of Service (DoS) attacks. Here, we

  15. Power centroid radar and its rise from the universal cybernetics duality

    Science.gov (United States)

    Feria, Erlan H.

    2014-05-01

    Power centroid radar (PC-Radar) is a fast and powerful adaptive radar scheme that naturally surfaced from the recent discovery of the time-dual for information theory which has been named "latency theory." Latency theory itself was born from the universal cybernetics duality (UC-Duality), first identified in the late 1970s, that has also delivered a time dual for thermodynamics that has been named "lingerdynamics" and anchors an emerging lifespan theory for biological systems. In this paper the rise of PC-Radar from the UC-Duality is described. The development of PC-Radar, US patented, started with Defense Advanced Research Projects Agency (DARPA) funded research on knowledge-aided (KA) adaptive radar of the last decade. The outstanding signal to interference plus noise ratio (SINR) performance of PC-Radar under severely taxing environmental disturbances will be established. More specifically, it will be seen that the SINR performance of PC-Radar, either KA or knowledgeunaided (KU), approximates that of an optimum KA radar scheme. The explanation for this remarkable result is that PC-Radar inherently arises from the UC-Duality, which advances a "first principles" duality guidance theory for the derivation of synergistic storage-space/computational-time compression solutions. Real-world synthetic aperture radar (SAR) images will be used as prior-knowledge to illustrate these results.

  16. Array-Based Ultrawideband through-Wall Radar: Prediction and Assessment of Real Radar Abilities

    Directory of Open Access Journals (Sweden)

    Nadia Maaref

    2013-01-01

    Full Text Available This paper deals with a new through-the-wall (TTW radar demonstrator for the detection and the localisation of people in a room (in a noncooperative way with the radar situated outside but in the vicinity of the first wall. After modelling the propagation through various walls and quantifying the backscattering by the human body, an analysis of the technical considerations which aims at defining the radar design is presented. Finally, an ultrawideband (UWB frequency modulated continuous wave (FMCW radar is proposed, designed, and implemented. Some representative trials show that this radar is able to localise and track moving people behind a wall in real time.

  17. A Simple Signal Processing Architecture for Instantaneous Radar Polarimetry

    Science.gov (United States)

    2006-11-01

    Stephen D. Howard, A. Robert Calderbank, Fellow, IEEE, and William Moran, Member, IEEE Abstract—This paper describes a new radar primitive that en...Skolnik, Introduction to Radar Systems, 3rd ed. New York: Mc- Graw -Hill, 2001. [14] S. Alamouti, “A simple transmit diversity technique for wireless

  18. A combined QC methodology in Ebro Delta HF radar system: real time web monitoring of diagnostic parameters and offline validation of current data

    Science.gov (United States)

    Lorente, Pablo; Piedracoba, Silvia; Soto-Navarro, Javier; Ruiz, Maria Isabel; Alvarez Fanjul, Enrique

    2015-04-01

    Over recent years, special attention has been focused on the development of protocols for near real-time quality control (QC) of HF radar derived current measurements. However, no agreement has been worldwide achieved to date to establish a standardized QC methodology, although a number of valuable international initiatives have been launched. In this context, Puertos del Estado (PdE) aims to implement a fully operational HF radar network with four different Codar SeaSonde HF radar systems by means of: - The development of a best-practices robust protocol for data processing and QC procedures to routinely monitor sites performance under a wide variety of ocean conditions. - The execution of validation works with in-situ observations to assess the accuracy of HF radar-derived current measurements. The main goal of the present work is to show this combined methodology for the specific case of Ebro HF radar (although easily expandable to the rest of PdE radar systems), deployed to manage Ebro River deltaic area and promote the conservation of an important aquatic ecosystem exposed to a severe erosion and reshape. To this aim, a web interface has been developed to efficiently monitor in real time the evolution of several diagnostic parameters provided by the manufacturer (CODAR) and used as indicators of HF radar system health. This web, updated automatically every hour, examines sites performance on different time basis in terms of: - Hardware parameters: power and temperature. - Radial parameters, among others: Signal-to-Noise Ratio (SNR), number of radial vectors provided by time step, maximum radial range and bearing. - Total uncertainty metrics provided by CODAR: zonal and meridional standard deviations and covariance between both components. - Additionally, a widget embedded in the web interface executes queries against PdE database, providing the chance to compare current time series observed by Tarragona buoy (located within Ebro HF radar spatial domain) and

  19. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  20. Progress in coherent laser radar

    Science.gov (United States)

    Vaughan, J. M.

    1986-01-01

    Considerable progress with coherent laser radar has been made over the last few years, most notably perhaps in the available range of high performance devices and components and the confidence with which systems may now be taken into the field for prolonged periods of operation. Some of this increasing maturity was evident at the 3rd Topical Meeting on Coherent Laser Radar: Technology and Applications. Topics included in discussions were: mesoscale wind fields, nocturnal valley drainage and clear air down bursts; airborne Doppler lidar studies and comparison of ground and airborne wind measurement; wind measurement over the sea for comparison with satellite borne microwave sensors; transport of wake vortices at airfield; coherent DIAL methods; a newly assembled Nd-YAG coherent lidar system; backscatter profiles in the atmosphere and wavelength dependence over the 9 to 11 micrometer region; beam propagation; rock and soil classification with an airborne 4-laser system; technology of a global wind profiling system; target calibration; ranging and imaging with coherent pulsed and CW system; signal fluctuations and speckle. Some of these activities are briefly reviewed.