WorldWideScience

Sample records for black sigatoka attack

  1. efficient screening procedure for black sigatoka disease of banana

    African Journals Online (AJOL)

    ACSS

    3 University of Copenhagen, Faculty of Science, Department of Plant and Environmental Sciences, ... procedure for black sigatoka disease in order to provide a reliable controlled environment ..... Inoculation of emerging leaves, on average.

  2. Biological control of banana black Sigatoka disease with Trichoderma

    OpenAIRE

    Poholl Adan Sagratzki Cavero; Rogério Eiji Hanada; Luadir Gasparotto; Rosalee Albuquerque Coelho Neto; Jorge Teodoro de Souza

    2015-01-01

    Black Sigatoka disease caused by Mycosphaerella fijiensis is the most severe banana disease worldwide. The pathogen is in an invasive phase in Brazil and is already present in most States of the country. The potential of 29 isolates of Trichoderma spp. was studied for the control of black Sigatoka disease under field conditions. Four isolates were able to significantly reduce disease severity and were further tested in a second field experiment. Isolate 2.047 showed the best results in both f...

  3. Biological control of banana black Sigatoka disease with Trichoderma

    Directory of Open Access Journals (Sweden)

    Poholl Adan Sagratzki Cavero

    2015-06-01

    Full Text Available Black Sigatoka disease caused by Mycosphaerella fijiensis is the most severe banana disease worldwide. The pathogen is in an invasive phase in Brazil and is already present in most States of the country. The potential of 29 isolates of Trichoderma spp. was studied for the control of black Sigatoka disease under field conditions. Four isolates were able to significantly reduce disease severity and were further tested in a second field experiment. Isolate 2.047 showed the best results in both field experiments and was selected for fungicide sensitivity tests and mass production. This isolate was identified as Trichoderma atroviride by sequencing fragments of the ITS region of the rDNA and tef-1α of the RNA polymerase. Trichoderma atroviride was as effective as the fungicide Azoxystrobin, which is recommended for controlling black Sigatoka. This biocontrol agent has potential to control the disease and may be scaled-up for field applications on rice-based solid fermentation

  4. Economic Impact and Trade Implications of the Introduction of Black Sigatoka (Mycosphaerella figiensis) into Puerto Rico

    OpenAIRE

    Alamo, Carmen I.; Evans, Edward A.; Brugueras, Alba; Nalampang, Sikavas

    2007-01-01

    This article addresses the issues of the potential impacts of the introduction of black sigatoka into Puerto Rico under situations in which the government assists growers in managing the spread of the disease, with and without prohibitions on imports of plantains and bananas. An equilibrium displacement model is used to quantify the impact of black sigatoka. The results indicate that under both scenarios the net economic benefits to society were negative. Over the long term, the government wo...

  5. The Draft Genome Sequence of Mycosphaerella fijiensis, the Black Sigatoka Pathogen of Banana

    Science.gov (United States)

    Mycosphaerella fijiensis is a fungal pathogen of banana and the causal agent of the devastating Black Sigatoka or black leaf streak disease. Its control requires weekly fungicide applications when bananas are grown under disease-conducive conditions, which mostly represent precarious tropical enviro...

  6. Same Disease—different research strategies: Bananas and Black Sigatoka in Brazil

    NARCIS (Netherlands)

    Cordoba, D.M.; Jansen, K.

    2014-01-01

    Fungal disease epidemics have the potential to bring about drastic innovations. However, in the case of the Black Sigatoka (Mycosphaerella fijiensis) fungus in bananas, producers and international traders are still awaiting a breakthrough in crop protection research. Using the cases of Brazil and

  7. Evaluation of Musa spp. hybrids for resistance to black Sigatoka, caused by Mycosphaerella fijiensis Morelet

    Science.gov (United States)

    In Puerto Rico, bananas and plantains are important agricultural commodities; their combined production totaled 133,500 tons in 2008. Black and yellow Sigatoka leaf spot diseases, caused by Mycosphaerella fijiensis and M. musicola respectively, are responsible for significant losses of these crops ...

  8. A new mechanism for reduced sensitivity to demethylation-inhibitor fungicides in the fungal banana black Sigatoka pathogen Pseudocercospora fijiensis

    NARCIS (Netherlands)

    Díaz-Trujillo, C.; Chong, P.; Stergiopoulos, I.; Meijer, H.J.G.; Wit, de P.J.G.M.; Kema, G.H.J.

    2018-01-01

    The Dothideomycete Pseudocercospora fijiensis, previously Mycosphaerella fijiensis, is the causal agent of black Sigatoka, one of the most destructive diseases of bananas and plantains. Disease management depends on fungicide applications with a major share for sterol demethylation-inhibitors

  9. A new mechanism for reduced sensitivity to demethylation-inhibitor fungicides in the fungal banana black Sigatoka pathogen Pseudocercospora fijiensis

    NARCIS (Netherlands)

    Díaz-Trujillo, C.; Chong, P.; Stergiopoulos, I.; Meijer, H.J.G.; Wit, de P.J.G.M.; Kema, G.H.J.

    2017-01-01

    The Dothideomycete Pseudocercospora fijiensis, previously Mycosphaerella fijiensis, is the causal agent of black Sigatoka, one of the most destructive diseases of bananas and plantains. Disease management depends on fungicide applications with a major share for sterol demethylation-inhibitors

  10. Inheritance of black sigatoka disease resistance in plantain-banana (Musa spp.) hybrids.

    Science.gov (United States)

    Ortiz, R; Vuylsteke, D

    1994-10-01

    Black sigatoka (Mycosphaerella fijiensis Morelet), an airborne fungal leaf-spot disease, is a major constraint to plantain and banana (Musa spp.) production world-wide. Gaining further knowledge of the genetics of host-plant resistance will enhance the development of resistant cultivars, which is considered to be the most appropriate means to achieve stable production. Genetic analysis was conducted on 101 euploid (2x, 3x and 4x) progenies, obtained from crossing two susceptible triploid plantain cultivars with the resistant wild diploid banana 'Calcutta 4'. Segregating progenies, and a susceptible reference plantain cultivar, were evaluated over 2 consecutive years. Three distinct levels of host response to black sigatoka were defined as follows: susceptible ( 10). Segregation ratios for resistance at the 2x level fitted a genetic model having one major recessive resistance allele (bs 1) and two independent alleles with additive effects (bsr 2 and bsr 3). A similar model explains the results at the 4x level assuming that the favourable resistance alleles have a dosage effect when four copies of them are present in their respective loci (bs i (4) ). The proposed model was further validated by segregation data of S 1 progenies. Mechanisms of black sigatoka resistance are discussed in relation to the genetic model.

  11. Field Plot Techniques for Black Sigatoka Evaluation in East African Highland Bananas

    Directory of Open Access Journals (Sweden)

    Okoro, JU.

    1997-01-01

    Full Text Available Number of plants per experimental unit and number of replications for the efficient and precise assessment of black sigatoka leaf spot disease caused by Mycosphaerella fijiensis in East African Highland bananas were determined. Two representative cultivars were used. Host response to black sigatoka infection was measured by recording the youngest leaf with necrotic spots. The number of plants per experimental unit was determined, using the methods of maximum curvature and comparison of variances, while the number of replications was estimated by Hatheway's method. The optimum experimental plot size was 3 plants (18 m2 for the beer banana cultivar 'Igitsiri', and 30 plants (180 m2 for the cooking banana cultivar 'Igisahira Gisanzwe', using the comparison of variances method. However, the optimum plot size was 15 plants (90 m2 for both cultivars using the method of maximum curvature. The latter statistical method was preferred because of the low precision of the estimates in the former method. Unreplicated trials with plots of 15 plants could be adequate to assess black sigatoka response in East African bananas if uniform disease pressure exists.

  12. Combating a Global Threat to a Clonal Crop : Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis) Genomes Reveal Clues for Disease Control

    NARCIS (Netherlands)

    Arango Isaza, Rafael E.; Diaz-Trujillo, Caucasella; Dhillon, Braham; Aerts, Andrea; Carlier, Jean; Crane, Charles F.; de Jong, Tristan V.; de Vries, Ineke; Dietrich, Robert; Farmer, Andrew D.; Fereira, Claudia Fortes; Garcia, Suzana; Guzman, Mauricio; Hamelin, Richard C.; Lindquist, Erika A.; Mehrabi, Rahim; Quiros, Olman; Schmutz, Jeremy; Shapiro, Harris; Reynolds, Elizabeth; Scalliet, Gabriel; Souza, Manoel; Stergiopoulos, Ioannis; Van der Lee, Theo A. J.; De Wit, Pierre J. G. M.; Zapater, Marie-Francoise; Zwiers, Lute-Harm; Grigoriev, Igor V.; Goodwin, Stephen B.; Kema, Gert H. J.

    2016-01-01

    Black Sigatoka or black leaf streak disease, caused by the Dothideomycete fungus Pseudocercospora fijiensis (previously: Mycosphaerella fijiensis), is the most significant foliar disease of banana worldwide. Due to the lack of effective host resistance, management of this disease requires frequent

  13. Climatic Forcing on Black Sigatoka Disease of Banana Crops in Urabá, Colombia

    Science.gov (United States)

    Ochoa, A.; Álvarez, P.; Poveda, G.; Buriticá, P.; Mira, J.

    2012-12-01

    Bananas are widely the most consumed fruit in the world and Colombia is one of the major producers and exporters of bananas worldwide. We analyzed the climatic forcing agents on banana crops in the Urabá region, the largest banana producer in Colombia. Although this crop is harvested continuously throughout the entire year, it exhibits climate driven seasonality. Black Sigatoka Disease (BSD) has been the most important threat for banana production worldwide. BSD attacks plant leaves producing small spots of dead material. When BSD is not treated, it can grow enough to damage the entire leaf, reducing both growth and developmental rates which may result in the loss of the plant. BSD is caused by Mycosphaerella fijiensis. This fungus is dispersed by wind with its inoculation occurring when there is water on the leaf. Thus, climatic variables such as wind, relative humidity of air (RH) and leaf wetness duration (LWD) all affect phenological phases of the banana crop (suckering, growing, flowering and harvesting). This study was carried out at the Cenibanano Experimental Plot located in Carepa (Urabá, Colombia) during 2007-2012. We used phytopathologic and weather data from the Cenibanano database along with climatic data from the North American Regional Reanalysis (NARR). BSD was diagnosed using the Biological Forecasting method. Results show that rainfall drives both plant and disease development rate. During wet periods the Foliar Emission Rate exceeds rates measured during dry periods. Although wetness is a positive factor for fungal reproduction (and BSD), it also heightens the chance for the plant to create more foliar tissue to fight against BSD. Hence, during wet periods the Severity Index of BSD is reduced in relation to dry periods. This effect was also observed at the inter-annual scale of the El Niño - South Oscillation (ENSO) phenomenon. During the ENSO warm/cold phase (El Niño/La Niña) rainfall anomalies in Colombia were observed as negative

  14. The origin, versatility and distribution of azole fungicide resistance in the banana black Sigatoka pathogen Pseudocercospora fijiensis

    NARCIS (Netherlands)

    Chong Aguirre, Pablo A.

    2016-01-01

    Pseudocercospora fijiensis causes black Sigatoka disease of banana. It is one of the most damaging threats of the crop requiring excessive fungicide applications for disease control as the major export “Cavendish” clones are highly susceptible. The consequence of this practice is the

  15. Plantio adensado não controla a sigatoka-negra da bananeira Dense plantation do not control banana black-sigatoka

    Directory of Open Access Journals (Sweden)

    Luadir Gasparotto

    2008-01-01

    Full Text Available Algumas publicações relatam que o adensamento populacional dos bananais reduz a severidade da sigatoka-negra (Mycosphaerella fijiensis. Instalou-se um ensaio com cinco tratamentos e quatro repetições. Os tratamentos 1.600, 2.000, 2.400, 2.800 e 3.200 plantas.ha-1 da cultivar D'Angola foram instalados em parcelas agrupadas de 2.000 m² cada. O tamanho das parcelas foi fixo e o número de plantas por parcela variou conforme o espaçamento adotado para cada população. A área de 2.000 m² foi dividida em quatro subáreas de 500 m², considerando-as como parcelas. Em cada subárea selecionaram-se 15 plantas centrais para serem avaliadas. Na época do florescimento registraram-se a severidade da doença na folha n.°10 e o número de folhas viáveis. Na colheita, a altura e o diâmetro do pseudocaule e o peso dos cachos, das pencas e dos frutos. A análise conjunta dos dados indica que todos os tratamentos foram semelhantes entre si e que o adensamento das plantas não controlou a sigatoka-negra.Many publications show that plantations of high density of bananas decrease the severity of black-sigatoka (Mycosphaerella fijiensis. To test this hypothesis it was instaled an experiment with five treatments and four repetitions. The treatments were density plant of 1.600, 2.000, 2.400, 2.800 e 3.200 plant.ha-1. The cultivar planted was D'Angola and each plot had fixed 2.000 m², the number of plants in each plot changed in accordance with the treatment tested. The plots were divided in four subplots of 500 m² where 15 plants located in the center were measured. The evaluation of severity was carried out in the leaf number ten during the flowering period. It was also evaluated the numbers of viable leaves, height, diameter and weight of production (banch, bunches and fruits. The analyses did not show effect of high density in the parameter measured and it was conclued that the treatments tested had not control black-sigatoka.

  16. Sensitivity of Mycosphaerella fijiensis, Causal Agent of Black Sigatoka of Banana, to Propiconazole.

    Science.gov (United States)

    Romero, R A; Sutton, T B

    1997-01-01

    ABSTRACT One hundred monoascosporic isolates of Mycosphaerella fijiensis were collected in February and November 1994 from each of two banana (Musa spp.) plantations in Costa Rica. Locations at San Pablo and Coopecariari had been sprayed with propiconazole for the past 7 years to control black Sigatoka. One hundred monoascosporic isolates from a third location, San Carlos, with no history of fungicide use, also were tested for sensitivity to propiconazole. Fifty percent effective concentration (EC(50)) values were calculated for individual isolates by regressing the relative inhibition of colony growth against the natural logarithm of the fungicide concentration. In the February sample, the mean EC(50) values for San Pablo and Coopecariari populations were 0.06 and 0.05 mug a.i. ml(-1), respectively, which were not statistically different (P = 0.05). The mean EC(50) value of the population at San Carlos was 0.008 mug a.i. ml(-1), which was significantly lower (P = 0.001) than the mean EC(50) values obtained at San Pablo and Coopecariari. Frequency distributions of EC(50) values of isolates from the three populations collected in February showed that 80% of isolates from San Pablo and Coopecariari had EC(50) values greater than the highest EC(50) value from San Carlos, indicating a significant shift in reduced sensitivity to propiconazole. Isolates collected in November 1994, after eight treatments of propiconazole at San Pablo and Coopecariari, showed a significant increase in mean EC(50) values compared with the means observed in February. The high proportion of isolates with reduced sensitivity to propiconazole may account for the unsatisfactory control of black Sigatoka between 1992 and 1993 in the two banana plantations at San Pablo and Coopecariari.

  17. Evaluation of indicators to determine black sigatoka susceptibility in five banana hybrid cultivars ( Mycosphaerella fijiensis Morelet

    Directory of Open Access Journals (Sweden)

    Reinaldo Pérez Armas

    2014-10-01

    Full Text Available This work had the objective of determining the variation of growth, development and yields indicators of five banana hybrid cultivars. The research was carried in the Agroindustrial Farm Marta Abreu, Cienfuegos, in a carbonated Brown soil. It was made a characterization of the soil and the climatic variables. A field experiment was developed with a design in blocks at random with four repetitions with five banana cultivars as treatments (‘FHIA-18’, ‘FHIA-02’, ‘FHIA-01’, ‘SH-3436 L-9’ and ‘FHIA-23’ . The plots had an area of 56 m2 with 16 plants, been evaluated eight for a total 32 plants for cultivar. The variable evaluated were the spotty youngest leaf, number of leaf by plant, incubation time (PI, evolution time of symptoms (TES and developing time of symptoms (TED, severity index (IS, active photosynthetic index (INHE and infection relative index. The cultivars FHIA-23 and SH 3436 L9 presented a hither time of development of the disease. In a general the more susceptible cultivar to the black Sigatoka under of the farm condition was FHIA-23. The clones FHIA-18, FHIA-01 and FHIA-02 presented the best behavior in the spotted youngest leaf and the number of leaf up to the flowering and the harvest time. The clones FHIA-01 and FHIA-18 have the better response to Black Sigatoka attending to the incubation period, the evolution time of the symptom and develo pment time of the disease

  18. Modified atmosphere together with refrigeration in the conservation of bananas resistant to black Sigatoka

    Directory of Open Access Journals (Sweden)

    Célia Lúcia Siqueira

    Full Text Available ABSTRACT The aim of this work was to evaluate the chemical, physical and sensory characteristics of the Caipira and Pakovan Ken cultivars of the banana (Musa spp., resistant to black Sigatoka (Mycosphaerella fijiensis Morelet, both with and without low-density polyethylene wrapping and together with refrigeration during the period of post-harvest storage. The experiment was carried out in 2012, in a randomised block design and an arrangement of lots split over time. A 3 x 2 factorial scheme was used for the lots, consisting of fruit with no wrapping and fruit wrapped in 10 and 16 µm polyethylene film, and two cultivars, Caipira and Pakovan Ken. The sub-lots consisted of evaluations made at intervals of six days (0, 6, 12, 18 and 24 and of two days (0, 2, 4, 6 and 8, for fruit stored at temperatures of 12, 15 and 25 ºC respectively. The following variables were evaluated: soluble solids, titratable acidity, ratio of soluble solids to titratable acidity, hydrogen potential, total soluble sugars, fruit colouration and sensory analysis. The polyethylene film together with the refrigeration enabled the fruit to be stored for 24 days, maintaining post-harvest characteristics suitable for consumption. The Pakovan Ken cultivar stood out when compared to the Caipira, with higher values for the fruit attributes under evaluation.

  19. Simulation of defoliation caused by Black Sigatoka in the yield and quality of banana 'Nanica ' fruits

    Directory of Open Access Journals (Sweden)

    Juliana Domingues Lima

    Full Text Available ABSTRACT: Defoliation caused by Black Sigatoka in yield and quality of banana 'Nanica' was stimulated in this study. A completely randomized 2x8 factorial design with six repetitions was used, in which period of bunch formation and number of leaves at flowering were established as factors. Plants for defoliation were selected on 04/05/2013 (Period 1, and on 07/01/2014 (Period 2. Six to to 13 leaves remained per plant by removing those with more than 50% of blade with injury or senescence. More appropriate climatic conditions before and after flowering, promoted greater mass accumulation in the bunch in Period 2. The increased number of leaves at flowering increased the length of the fruit and the mass of 4th hand, as well as the bunch mass and postharvest period. Defoliation is suggested only for non-functional leaves as well as the maintenance of at least 10 leaves per plant, independent of the period of bunch formation.

  20. Influence Of Crop Management And Soil On Plantain [Musa spp. z AAB Group Response To Black Sigatoka Infection In Southeastern Nigeria

    Directory of Open Access Journals (Sweden)

    Mobambo, KN.

    1994-01-01

    Full Text Available An on-farm survey was carried out to assess the severity of black sigatoka caused by Mycosphaerella fijiensis Morelet on plantain in southeastern Nigeria. Two different geomor-phological zones (Meander belts and Coastal plain sands were surveyed. Four locations were selected for each zone and two traditional farming systems (backyard and field were studied in each location. Based on geomorphological zones, less black sigatoka infection was observed in the Meander belts than in the Coastal plain sands. On farming systems basis, plantain grown in the backyard gardens had lower disease severity than that planted in the field plots. This difference in black sigatoka severity is attributable to the higher soil fertility in the Meander belts than in the Coastal plain sands and in the backyards than in the fields.

  1. Combating a Global Threat to a Clonal Crop: Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis) Genomes Reveal Clues for Disease Control

    NARCIS (Netherlands)

    Arango Isaza, Rafael E.; Diaz-Trujillo, Caucasella; Dhillon, Braham; Aerts, Andrea; Carlier, Jean; Crane, Charles F.; V. de Jong, Tristan; de Vries, Ineke; Dietrich, Robert; Farmer, Andrew D.; Fortes Fereira, Claudia; Garcia, Suzana; Guzman, Mauricio; Hamelin, Richard C.; Lindquist, Erika A.; Mehrabi, Rahim; Quiros, Olman; Schmutz, Jeremy; Shapiro, Harris; Reynolds, Elizabeth; Scalliet, Gabriel; Souza Manoel, Jr.; Stergiopoulos, Ioannis; Van der Lee, Theo A. J.; De Wit, Pierre J. G. M.; Zapater, Marie-Françoise; Zwiers, Lute-Harm; Grigoriev, Igor V.; Goodwin, Stephen B.; Kema, Gert H. J.

    2016-01-01

    Black Sigatoka or black leaf streak disease, caused by the ascomycete fungus Pseudocercospora fijiensis, inflicts huge costs on banana producers, due to crop losses and expenses for disease control. The global banana export trade relies on Cavendish clones that are highly susceptible to P.

  2. Azadirachta indica reduces black sigatoka in east african highland banana by direct antimicrobial effects against Mycosphaerella fijiensis without inducing resistance

    DEFF Research Database (Denmark)

    Kumakech, Alfred; Jørgensen, Hans Jørgen Lyngs; Collinge, David B.

    2017-01-01

    inoculation (DAI). Pathogenesis-related genes (PR-1 and PR-3) and non-expressor of PR-genes (NPR1B) were up-regulated in the resistant cultivar. The genes analysed responded at late time points to M. fijiensis inoculation in both extract-treated and control plants in the susceptible cv. Musakala. On the other...... hand, A. indica and C. annuum completely inhibited mycelial growth of M. fijiensis at 30% (w/v). These findings suggest that the effect of plant extracts on Black Sigatoka is strongly associated with the direct antimicrobial effects....

  3. Agrobacterium-mediated transformation of Mycosphaerella fijiensis, the devastating Black Sigatoka pathogen of bananas

    NARCIS (Netherlands)

    Díaz-Trujillo, C.; Adibon, H.; Kobayashi, K.; Zwiers, L.H.; Souza, M.T.; Kema, G.H.J.

    2010-01-01

    Mycosphaerella fijiensis, M. musicola en M. eumusae veroorzaken de Sigatoka-ziekte in banaan. Op dit moment is de toepassing van fungiciden de enige optie om deze ziekte te bestrijden. Het PRPB (Pesticide Reduction Program for Banana) investeert in de ontwikkeling van technieken voor de genotype- en

  4. Plantio irrigado de bananeiras resistentes à Sigatoka-negra consorciado com culturas anuais Irrigated banana resistant to black Sigatoka, with annual intercrops

    Directory of Open Access Journals (Sweden)

    Ildeu de Souza

    2010-03-01

    Full Text Available Com o objetivo de avaliar o plantio irrigado de bananeiras resistentes à Sigatoka-negra consorciado com cultura anuais, na região norte de Minas Gerais, um experimento foi instalado na Fazenda Experimental do Departamento de Ciências Agrárias da Universidade Estadual de Montes Claros, Câmpus de Janaúba-MG. O experimento foi conduzido no período de abril de 2006 a julho de 2007, delineado em blocos casualizados, segundo um esquema de parcelas subdivididas 3 x 5, tendo na parcela as três variedades de bananeiras: Pacovan Ken, Caipira e Thap Maeo, e na subparcela quatro culturas intercalares: Feijão-Pérola, Quiabo-Dardo, Melancia-Crimson-Sweet e Feijão-Caupi, e a testemunha (sem cultura intercalar, com três repetições. Ao todo, foram 756 bananeiras, em 45 parcelas, com 6 plantas úteis cada, constituindo a cultura principal. As culturas intercalares ocuparam as entrelinhas da bananeira, tanto aquelas com as linhas de irrigação como sem linha de irrigação. O plantio da bananeira e das culturas intercalares foi feito no mesmo período, utilizando-se do espaçamento de 3,0 m entre as linhas e 2,0 m entre as covas de bananeira, com microaspersores espaçados de 6 m. Avaliaram-se as características vegetativas e reprodutivas das variedades de bananeiras, no primeiro ciclo. Não foi observado efeito significativo dos cultivos intercalares sobre as variedades de bananeiras, com exceção do número de dias do plantio ao florescimento e do número de dias do plantio à colheita das variedades de bananeiras. O uso do feijão-caupi promoveu atraso no ciclo de produção das três variedades de bananeiras Pacovan Ken, Caipira e Thap Maeo.To assess the irrigated cultivation of banana resistant to black Sigatoka, intercropped with annual crops in the northern region of Minas Gerais, a trial was conducted on an experimental farm of the Universidade Estadual de Montes Claros, in Janaúba-MG. The experiment was carried out from April 2006 to

  5. Combating a global threat to a clonal crop: banana black sigatoka pathogen pseudocercospora fijiensis (synonym mycosphaerella fijiensis) genomes reveal clues for disease control

    Science.gov (United States)

    Mycosphaerella fijiensis is the fungal pathogen that causes black Sigatoka or leaf streak disease of banana. Control of this disease requires weekly applications of fungicides in most cultivation areas. Major problems for disease management are fungicide resistance and the lack of effective genes fo...

  6. The influence of exposure to ultraviolet radiation in simulated sunlight on ascospores causing Black Sigatoka disease of banana and plantain

    Science.gov (United States)

    Parnell, Mark; Burt, P. J. A.; Wilson, Kate

    The influence of ultraviolet (UV) radiation in simulated natural sunlight on the viability of ascospores of Mycosphaerella fijiensis, the cause of Black Sigatoka disease in banana and plantain, has been investigated as part of a study to assess the windborne spread of this pathogen from mainland Central and South America into the Caribbean. Spores were killed following continuous exposure to UV radiation for periods of 6 h or over. This relatively short exposure time suggests that the distances over which viable spores can be transported will be determined not only by the speed of the wind but also the amount of cloud cover and the time off day that spore release occurs. On this basis, wind dispersal of viable spores over distances greater than a few hundred kilometres is unlikely. These conclusions are reinforced by an examination of historical reports of the arrival of the disease in previously uninfected areas of the Americas and Africa.

  7. A new mechanism for reduced sensitivity to demethylation-inhibitor fungicides in the fungal banana black Sigatoka pathogen Pseudocercospora fijiensis.

    Science.gov (United States)

    Diaz-Trujillo, Caucasella; Chong, Pablo; Stergiopoulos, Ioannis; Cordovez, Viviane; Guzman, Mauricio; De Wit, Pierre J G M; Meijer, Harold J G; Scalliet, Gabriel; Sierotzki, Helge; Lilia Peralta, Esther; Arango Isaza, Rafael E; Kema, Gerrit H J

    2017-11-04

    The Dothideomycete Pseudocercospora fijiensis, previously Mycosphaerella fijiensis, is the causal agent of black Sigatoka, one of the most destructive diseases of bananas and plantains. Disease management depends on fungicide applications, with a major contribution from sterol demethylation-inhibitors (DMIs). The continued use of DMIs places considerable selection pressure on natural P. fijiensis populations, enabling the selection of novel genotypes with reduced sensitivity. The hitherto explanatory mechanism for this reduced sensitivity was the presence of non-synonymous point mutations in the target gene Pfcyp51, encoding the sterol 14α-demethylase enzyme. Here, we demonstrate a second mechanism involved in DMI sensitivity of P. fijiensis. We identified a 19-bp element in the wild-type (wt) Pfcyp51 promoter that concatenates in strains with reduced DMI sensitivity. A polymerase chain reaction (PCR) assay identified up to six Pfcyp51 promoter repeats in four field populations of P. fijiensis in Costa Rica. We used transformation experiments to swap the wt promoter of a sensitive field isolate with a promoter from a strain with reduced DMI sensitivity that comprised multiple insertions. Comparative in vivo phenotyping showed a functional and proportional up-regulation of Pfcyp51, which consequently decreased DMI sensitivity. Our data demonstrate that point mutations in the Pfcyp51 coding domain, as well as promoter inserts, contribute to the reduced DMI sensitivity of P. fijiensis. These results provide new insights into the importance of the appropriate use of DMIs and the need for the discovery of new molecules for black Sigatoka management. © 2017 The Authors. Molecular Plant Pathology published by British Society for Plant Pathology and John Wiley & Sons Ltd.

  8. Risk analysis of Black Sigatoka occurrence based on polynomial models: a case study

    OpenAIRE

    Bendini, Hugo do Nascimento; Moraes, Wilson da S.; Silva, Silvia H.M.G. da; Tezuka, Erika S.; Cruvinel, Paulo Estevão

    2013-01-01

    A Sigatoka-negra (Mycosphaerella fijiensis) ameaça os bananais comerciais em todas as áreas produtoras do mundo e provoca danos quantitativos e qualitativos na produção, acarretando sérios prejuízos financeiros. Faz-se necessário o estudo da vulnerabilidade das plantas em diversos estádios de desenvolvimento e das condições climáticas favoráveis à ocorrência da doença. Objetivou-se com este trabalho desenvolver um modelo probabilístico baseado em funções polinomiais que represente o risco de ...

  9. Analysis of some components of resistance in the hybrids of banana FHIA-23 and plantain FHIA-21 to black (Mycosphaerella fijiensis Morelet) and yellow (M. musicola Leach) sigatokas

    International Nuclear Information System (INIS)

    Guzman Piedrahita, Oscar Adrian; Castano Zapata, Jairo

    2009-01-01

    It was determined the performance of FHIA-20 and FHIA-23 to both Mycosphaerella fijiensis and M. musicola. The study was conducted in a screen house at the Montelindos farm of the University of Caldas, at 1010 most, average temperature 22.8 Celsius degrade, annual precipitation 2200 mm, and relative humidity 76%. Conidia of Paracercospora fijiensis and Pseudocercospora musae, and mixture of both, were inoculated to seedlings having between 4 and 6 leaves. It was evaluated incubation period (IP) of both pathogens, times of evolution of symptoms (TES) and disease development (TDD), also, lesions per leaf (NLL). In FHIA-20, P. musae, P. fijiensis and P. musae+P. fijiensis, had a longer IP than in Dominico Harton, being 3, 20 and 10 days longer, respectively; in addition, the TES of yellow and black sigatokas and the combination of both diseases, was more prolonged in FHIA-20, in 5, 49 and 26 days, respectively, than in local material. In FHIA-23, P. musae, P. fijiensis and P. musae + P. fijiensis, had 2, 6 and 3 more days of IP, respectively, than in Gros Michel; furthermore, FHIA-23 had a TES of yellow and black sigatokas and the combination of both, higher than in Gros Michel, in 9, 16 and 11 days, respectively. In general, FHIA-23 behaved as highly resistant and tolerant to black and yellow sigatokas, respectively, and FHIA-23, resistant.

  10. Aceitação de cultivares de bananas resistentes à Sigatoka Negra junto ao consumidor da região Nordeste do Brasil Acceptance of banana cultivars resistant to Black Sigatoka by the consumer market of Northeast Brazilian region

    Directory of Open Access Journals (Sweden)

    Deborah dos Santos Garruti

    2012-05-01

    Full Text Available O Mal da Sigatoka Negra é devastador para as cultivares tradicionais de banana. No Brasil, cultivares resistentes estão sendo desenvolvidas, mas se a preferência do consumidor não for considerada, o programa de melhoramento pode falhar. Neste trabalho, a aceitabilidade de quatro cultivares resistentes foi acessada no Nordeste brasileiro e comparada a quatro variedades comerciais. Dois grupos de consumidores participaram: adultos jovens e donas de casa. Escala hedônica foi aplicada para aparência externa dos cachos, aceitação global e aceitação por atributos dos frutos (aparência sem a casca, aroma, sabor e textura, além de testes de preferência e intenção de compra. Os dados foram submetidos à ANOVA e Mapa de Preferência Interno. Mulheres e jovens mostraram opiniões semelhantes. As cultivares 'Preciosa' e 'Pacovan Ken' mostraram ser as mais promissoras, sendo que a primeira já pode substituir as cultivares comerciais 'Prata' e 'Pacovan' sem prejudicar a sua aceitabilidade, mas a 'Pacovan Ken' ainda precisa ser melhorada quanto à aparência.The Black Sigatoka Disease is devastating to traditional banana cultivars. In Brazil, resistant cultivars are being developed but if the consumer's preference is not taken into account, the breeding program may not succeed. In this research the acceptability of four resistant cultivars was accessed in the Northeastern Brazilian region and compared to four commercial varieties. Two groups of consumers participated: young adults and housewives. Hedonic scale was applied to external appearance of bunches, global acceptance and acceptance of fruits' attributes (appearance without peel, aroma, flavor and texture. Preference and purchase intent were also evaluated. Data were submitted to ANOVA and Preference Mapping. Women and young adults showed similar opinions. 'Preciosa' and 'Pacovan Ken' cultivars showed to be the most promising ones. 'Preciosa' can already substitute the commercial 'Prata

  11. Construction and characterization of a bacterial artificial chromosome library of the causal agent of Black Sigatoka fungal leaf spot disease of banana and plantain, Mycosphaerella fijiensis.

    Science.gov (United States)

    Canto-Canché, Blondy; Guillén-Maldonado, Diana Karina; Peraza-Echeverría, Leticia; Conde-Ferráez, Laura; James-Kay, Andrew

    2007-05-01

    A bacterial artificial chromosome library of the causal agent of the Black Sigatoka leaf spot disease of banana and plantain, Mycosphaerella fijiensis, has been constructed using a non-sphaeroplasting technique and characterized using both homologous and heterologous probes. After first and a second size selection of PFGE-fractionated DNA, a ligation was obtained using a 1:4 molar ratio (insert:vector). One hundred random clones were analyzed, and the mean insert size was estimated to be 90 kb. The range of the insert sizes was between 40 and 160 kb. The highest percentage of inserts belonged to the range between 80 and 100 kb; 32% of the inserts had 2 or 3 internal NotI sites. This library consists of 1920 clones, if the genomic size is at least 35 Mb, then this represents 4.9 x genome equivalents, which was supported by hybridization results with homologous and heterologous probes.

  12. Combating a Global Threat to a Clonal Crop: Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis Genomes Reveal Clues for Disease Control.

    Directory of Open Access Journals (Sweden)

    Rafael E Arango Isaza

    2016-08-01

    Full Text Available Black Sigatoka or black leaf streak disease, caused by the Dothideomycete fungus Pseudocercospora fijiensis (previously: Mycosphaerella fijiensis, is the most significant foliar disease of banana worldwide. Due to the lack of effective host resistance, management of this disease requires frequent fungicide applications, which greatly increase the economic and environmental costs to produce banana. Weekly applications in most banana plantations lead to rapid evolution of fungicide-resistant strains within populations causing disease-control failures throughout the world. Given its extremely high economic importance, two strains of P. fijiensis were sequenced and assembled with the aid of a new genetic linkage map. The 74-Mb genome of P. fijiensis is massively expanded by LTR retrotransposons, making it the largest genome within the Dothideomycetes. Melting-curve assays suggest that the genomes of two closely related members of the Sigatoka disease complex, P. eumusae and P. musae, also are expanded. Electrophoretic karyotyping and analyses of molecular markers in P. fijiensis field populations showed chromosome-length polymorphisms and high genetic diversity. Genetic differentiation was also detected using neutral markers, suggesting strong selection with limited gene flow at the studied geographic scale. Frequencies of fungicide resistance in fungicide-treated plantations were much higher than those in untreated wild-type P. fijiensis populations. A homologue of the Cladosporium fulvum Avr4 effector, PfAvr4, was identified in the P. fijiensis genome. Infiltration of the purified PfAVR4 protein into leaves of the resistant banana variety Calcutta 4 resulted in a hypersensitive-like response. This result suggests that Calcutta 4 could carry an unknown resistance gene recognizing PfAVR4. Besides adding to our understanding of the overall Dothideomycete genome structures, the P. fijiensis genome will aid in developing fungicide treatment schedules

  13. Combating a Global Threat to a Clonal Crop: Banana Black Sigatoka Pathogen Pseudocercospora fijiensis (Synonym Mycosphaerella fijiensis) Genomes Reveal Clues for Disease Control.

    Science.gov (United States)

    Arango Isaza, Rafael E; Diaz-Trujillo, Caucasella; Dhillon, Braham; Aerts, Andrea; Carlier, Jean; Crane, Charles F; V de Jong, Tristan; de Vries, Ineke; Dietrich, Robert; Farmer, Andrew D; Fortes Fereira, Claudia; Garcia, Suzana; Guzman, Mauricio; Hamelin, Richard C; Lindquist, Erika A; Mehrabi, Rahim; Quiros, Olman; Schmutz, Jeremy; Shapiro, Harris; Reynolds, Elizabeth; Scalliet, Gabriel; Souza, Manoel; Stergiopoulos, Ioannis; Van der Lee, Theo A J; De Wit, Pierre J G M; Zapater, Marie-Françoise; Zwiers, Lute-Harm; Grigoriev, Igor V; Goodwin, Stephen B; Kema, Gert H J

    2016-08-01

    Black Sigatoka or black leaf streak disease, caused by the Dothideomycete fungus Pseudocercospora fijiensis (previously: Mycosphaerella fijiensis), is the most significant foliar disease of banana worldwide. Due to the lack of effective host resistance, management of this disease requires frequent fungicide applications, which greatly increase the economic and environmental costs to produce banana. Weekly applications in most banana plantations lead to rapid evolution of fungicide-resistant strains within populations causing disease-control failures throughout the world. Given its extremely high economic importance, two strains of P. fijiensis were sequenced and assembled with the aid of a new genetic linkage map. The 74-Mb genome of P. fijiensis is massively expanded by LTR retrotransposons, making it the largest genome within the Dothideomycetes. Melting-curve assays suggest that the genomes of two closely related members of the Sigatoka disease complex, P. eumusae and P. musae, also are expanded. Electrophoretic karyotyping and analyses of molecular markers in P. fijiensis field populations showed chromosome-length polymorphisms and high genetic diversity. Genetic differentiation was also detected using neutral markers, suggesting strong selection with limited gene flow at the studied geographic scale. Frequencies of fungicide resistance in fungicide-treated plantations were much higher than those in untreated wild-type P. fijiensis populations. A homologue of the Cladosporium fulvum Avr4 effector, PfAvr4, was identified in the P. fijiensis genome. Infiltration of the purified PfAVR4 protein into leaves of the resistant banana variety Calcutta 4 resulted in a hypersensitive-like response. This result suggests that Calcutta 4 could carry an unknown resistance gene recognizing PfAVR4. Besides adding to our understanding of the overall Dothideomycete genome structures, the P. fijiensis genome will aid in developing fungicide treatment schedules to combat this

  14. Progresso da sigatoka-negra (Mycosphaerella fijiensis em bananeiras após a emissão do cacho no Município de Cáceres, Mato Grosso-Brasil Progress of black sigatoka (Mycosphaerella fijiensis in banana plants after the bunch emergence in the district of Cáceres, Mato-Grosso-Brazil

    Directory of Open Access Journals (Sweden)

    Márcia Benedita Martins

    2007-09-01

    Full Text Available A sigatoka-negra, causada pelo fungo Mycosphaerella fijiensis, pode causar 100% de perdas na produção das cultivares suscetíveis. O objetivo deste trabalho foi avaliar o progresso da sigatoka-negra em bananeiras após a emissão do cacho no Município de Cáceres, Mato Grosso. O experimento foi conduzido no período de fevereiro a dezembro de 2004 em plantios das cultivares Grande Naine, Maçã e Farta Velhaco, sendo esta última uma cultivar de plátano, do grupo Terra. As avaliações foram efetuadas a intervalos de 15 dias, quantificando-se, através de uma escala diagramática, a severidade da sigatoka-negra em todas as folhas de 5 plantas de cada cultivar, marcadas logo após a emissão das inflorescências. A partir dos dados coletados no campo, computaram-se: a severidade da doença na folha n.º 10 e o número de folhas viáveis. Considerou-se como folha viável as folhas sadias e aquelas com até 15% de área foliar lesionada. Os dados de temperatura e da umidade relativa foram registrados por um aparelho eletrônico instalado na área. A precipitação pluvial foi registrada na Estação meteorológica de Cáceres, distante 12 km do experimento. As condições climáticas foram favoráveis à sigatoka negra durante o ano todo e as plantas das cultivares Grande Naine, Maçã e Farta Velhaco após a emissão do cacho, perderam totalmente as folhas antes dos frutos atingirem o pleno desenvolvimento, cujos prejuízos no primeiro semestre atingiram 100% de perdas na produção comercializável.The black sigatoka, caused by Mycosphaerella fijiensis may cause 100% of yield losses in susceptible cultivars. The objective of this work was to evaluate the progress of the black sigatoka in banana plants after the bunch emergence, in the district of Cáceres, Mato Grosso State - Brazil. The experiment was carried out from February to December 2004, in banana cultivars "Grande Naine" and "Maçã", as well as plantain cultivar Farta Velhaco (Terra

  15. Relationship between soil and edaphoclimatic properties and the Black Sigatoka incidence (Mycosphaerella fijiensis Morelet in the Banana Region of Magdalena - Colombia

    Directory of Open Access Journals (Sweden)

    Sonia Esperanza Aguirre Forero

    2012-10-01

    Full Text Available Black Sigatoka (Mycosphaerella fijiensis Morelet disease is the greatest limiting factor affecting banana crop production across the world. The pathogen´s severity has reached epidemic levels and is exacerbated by the cultivation of monocultures and genetically uniform clones. In Colombia, losses occur in the exporting regions of Uraba and Magdalena, where its management depends on the use of agrochemicals, without achieving eradication. In the search for methods to reduce the pathogen’s effect within the banana zone of the departamento del Magdalena, Colombia, the relationship between climate, soil properties, and the presence of the disease was determined. Were utilized data from geographic informational systems, digitalized the data from the soil variables reported in the soil study conducted by IGAC (2009, records from weather stations in the region, and data showing the incidence rate of the pathogen. As a result of the study were established three areas (high, medium and low incidence rate and discovered a positive correlation between the incidence rate of the disease with precipitation (r = 0.56, interchangeable magnesium, Mg+2 (r = 0.45, microporosity (r = 0.40, clay content (r = 0.54, and evaporation (r = 0.51. Were observed that there are soil conditions that influence the presence of the disease, variables that should be kept in mind in the management of banana cultivation.

  16. Construction and characterization of a plant transformation-competent BIBAC library of the black Sigatoka-resistant banana Musa acuminata cv. Tuu Gia (AA).

    Science.gov (United States)

    Ortiz-Vázquez, E; Kaemmer, D; Zhang, H-B; Muth, J; Rodríguez-Mendiola, M; Arias-Castro, C; James, Andrew

    2005-02-01

    A plant transformation-competent binary bacterial artificial chromosome (BIBAC) library was constructed from Musa acuminata cv. Tuu Gia (AA), a black Sigatoka-resistant diploid banana. After digestion of high-molecular-weight banana DNA by HindIII, several methods of DNA size selection were tested, followed by ligation, using a vector/insert molar ratio of 4:1. The library consists of 30,700 clones stored in 80 384-well microtiter plates. The mean insert size was estimated to be 100 kb, and the frequency of inserts with internal NotI sites was 61%. The majority of insert sizes fell into the range of 100+/-20 kb, making them suitable for Agrobacterium-mediated transformation. Only 1% and 0.9% of the clones contain chloroplast and mitochondrial DNA, respectively. This is the first BIBAC library for banana, estimated to represent five times its haploid genome (600 Mbp). It was demonstrated by hybridization that the library contains typical members of resistance gene and defense gene families that can be used for transformation of disease susceptible banana cultivars for banana genetic improvement.

  17. Black Sigatoka (Mycosphaerella fijiensis Morelet and food security. Bio-climate Scenarios in bananas under the effect of climate change in Ciego de Avila, Cuba

    Directory of Open Access Journals (Sweden)

    Hernández-Mansilla Alexis Augusto

    2016-11-01

    Full Text Available The negative evidence of climate change of high importance for the future agricultural production and the need of food sovereignty and security, impose to develop research to predict the phenology of plants and their pests, mainly those of economic importance. The aim of this work is to interpret the epidemiological behavior of the black Sigatoka disease (Mycosphaerella fijiensis Morelet in banana for the years 2020 and 2025 under the effects of climate change in Ciego de Avila. There were made bioclimatic scenarios using daily data of maximum temperature, minimum temperature and accumulated rainfall of 14 days generated by the Regional Climatic Model "PRECIS Caribbean" with boundary conditions of the global model ECHAM - 4 for future climate projections under scenarios of emission A2 and B2. The key indicators of this disease: "Sum of Speed ​​" and the "Evolution state" of 4 leaves were obtained. The results show Sums speeds above 11000 thermo-physiological units, as well as a continuous and progressive increase in the "Evolution State" with values above 500 units during the analyzed years. We infers will occur an increase in the number of treatments and the plant protection cost, which implies the need to draw integrated management measures that include agro-ecological principles, search for resistant varieties to replace those susceptible to the disease that are currently used and strengthen the climate change adaptation and the resilience in the agricultural ecosystem.

  18. Worldwide geographical distribution of Black Sigatoka for banana: predictions based on climate change models Distribuição geográfica da Sigatoka Negra da bananeira estimada por modelos de mudanças climáticas globais

    Directory of Open Access Journals (Sweden)

    Waldir Cintra de Jesus Júnior

    2008-12-01

    Full Text Available As mudanças climáticas poderão alterar as doenças de plantas e afetar a eficácia das medidas de manejo. Um dos prováveis impactos será na distribuição geográfica das doenças. A Sigatoka Negra é considerada a principal doença da cultura da banana em decorrência dos danos causados e aumento do custo de manejo. O impacto sócio-econômico da doença continua aumentando, uma vez que a doença tem atingido novas áreas de plantio, tornando o manejo mais difícil. Este trabalho tem por objetivos comparar a distribuição geográfica da doença por meio da elaboração de mapas nas seguintes situações: a clima atual e futuro (2020, 2050 e 2080, b cenários A2 e B2 do Painel Intergovernamental de Mudanças Climáticas, c predito por seis diferentes modelos de mudanças climáticas e pela média dos mesmos e, d entre meses. Haverá redução das áreas favoráveis à doença no futuro, sendo que tal redução será mais acentuada no cenário A2 do que no B2 e gradativa para as décadas de 2020, 2050 e 2080. Predições efetuadas com o uso da média dos dados estimados pelos modelos permitiram redução na variabilidade da simulação em comparação com a predição gerada por cada modelo individualmente. Alterações na distribuição geográfica da doença ocorrerão entre meses, de modo que áreas consideradas desfavoráveis tornar-se-ão favoráveis e vice-versa. Apesar disso, extensas áreas continuarão favoráveis ao desenvolvimento da Sigatoka Negra.Global climatic changes will potentially influence plant diseases and the efficacy of their management options. One of the most likely impacts of climate change will be felt by the geographical distribution of plant diseases. Black Sigatoka is considered the most damaging and costly disease of banana. The socio-economic impact of this disease has continued to increase as the pathogen reaches new areas and the disease becomes more difficult to be controled. The objectives of this

  19. Singlet molecular oxygen generation by light-activated DHN-melanin of the fungal pathogen Mycosphaerella fijiensis in black Sigatoka disease of bananas.

    Directory of Open Access Journals (Sweden)

    Miguel J Beltrán-García

    Full Text Available In pathogenic fungi, melanin contributes to virulence, allowing tissue invasion and inactivation of the plant defence system, but has never been implicated as a factor for host cell death, or as a light-activated phytotoxin. Our research shows that melanin synthesized by the fungal banana pathogen Mycosphaerella fijiensis acts as a virulence factor through the photogeneration of singlet molecular oxygen O2 (1Δg. Using analytical tools, including elemental analysis, ultraviolet/infrared absorption spectrophometry and MALDI-TOF mass spectrometry analysis, we characterized both pigment content in mycelia and secreted to the culture media as 1,8-dihydroxynaphthalene (DHN-melanin type compound. This is sole melanin-type in M. fijiensis. Isolated melanins irradiated with a Nd:YAG laser at 532 nm produced monomol light emission at 1270 nm, confirming generation of O2 (1Δg, a highly reactive oxygen specie (ROS that causes cellular death by reacting with all cellular macromolecules. Intermediary polyketides accumulated in culture media by using tricyclazole and pyroquilon (two inhibitors of DHN-melanin synthesis were identified by ESI-HPLC-MS/MS. Additionally, irradiation at 532 nm of that mixture of compounds and whole melanized mycelium also generated O2 (1Δg. A pigmented-strain generated more O2 (1Δg than a strain with low melanin content. Banana leaves of cultivar Cavendish, naturally infected with different stages of black Sigatoka disease, were collected from field. Direct staining of the naturally infected leaf tissues showed the presence of melanin that was positively correlated to the disease stage. We also found hydrogen peroxide (H2O2 but we cannot distinguish the source. Our results suggest that O2 (1Δg photogenerated by DHN-melanin may be involved in the destructive effects of Mycosphaerella fijiensis on banana leaf tissues. Further studies are needed to fully evaluate contributions of melanin-mediated ROS to microbial pathogenesis.

  20. Singlet molecular oxygen generation by light-activated DHN-melanin of the fungal pathogen Mycosphaerella fijiensis in black Sigatoka disease of bananas.

    Science.gov (United States)

    Beltrán-García, Miguel J; Prado, Fernanda M; Oliveira, Marilene S; Ortiz-Mendoza, David; Scalfo, Alexsandra C; Pessoa, Adalberto; Medeiros, Marisa H G; White, James F; Di Mascio, Paolo

    2014-01-01

    In pathogenic fungi, melanin contributes to virulence, allowing tissue invasion and inactivation of the plant defence system, but has never been implicated as a factor for host cell death, or as a light-activated phytotoxin. Our research shows that melanin synthesized by the fungal banana pathogen Mycosphaerella fijiensis acts as a virulence factor through the photogeneration of singlet molecular oxygen O2 (1Δg). Using analytical tools, including elemental analysis, ultraviolet/infrared absorption spectrophometry and MALDI-TOF mass spectrometry analysis, we characterized both pigment content in mycelia and secreted to the culture media as 1,8-dihydroxynaphthalene (DHN)-melanin type compound. This is sole melanin-type in M. fijiensis. Isolated melanins irradiated with a Nd:YAG laser at 532 nm produced monomol light emission at 1270 nm, confirming generation of O2 (1Δg), a highly reactive oxygen specie (ROS) that causes cellular death by reacting with all cellular macromolecules. Intermediary polyketides accumulated in culture media by using tricyclazole and pyroquilon (two inhibitors of DHN-melanin synthesis) were identified by ESI-HPLC-MS/MS. Additionally, irradiation at 532 nm of that mixture of compounds and whole melanized mycelium also generated O2 (1Δg). A pigmented-strain generated more O2 (1Δg) than a strain with low melanin content. Banana leaves of cultivar Cavendish, naturally infected with different stages of black Sigatoka disease, were collected from field. Direct staining of the naturally infected leaf tissues showed the presence of melanin that was positively correlated to the disease stage. We also found hydrogen peroxide (H2O2) but we cannot distinguish the source. Our results suggest that O2 (1Δg) photogenerated by DHN-melanin may be involved in the destructive effects of Mycosphaerella fijiensis on banana leaf tissues. Further studies are needed to fully evaluate contributions of melanin-mediated ROS to microbial pathogenesis.

  1. Evaluation in greenhouse of the response of two Musa cultivar to Black Sigatoka by artificial inoculation of conidial suspension of Pseudocercospora fijiensis

    Directory of Open Access Journals (Sweden)

    Mayra Acosta Suárez

    2004-04-01

    Full Text Available For evaluating the resistance of Black sigatoka in genotypes from breeding programmes different methods have been used, the artificial inoculation of pathogens reproduction structures is one of them. Nevertheless, is necessary the standardization of condition for it in vitro production and to know the response of cultivars to the diseases in greenhouse. It will permit to establish methods for evaluating and selecting the new resistant genotypes. This work was carried out with the objectives to evaluate different culture media and incubation conditions for obtaining P. fijiensis conidia and for evaluating the response of two cultivars to the artificial inoculation with conidial suspensions of this fungus. Different culture media and incubation conditions for obtaining the conidia and the cultivars Grande naine (susceptible and FHIA-18 (partially resistant were used. The conidia of P. fijiensis could be obtained in vitro at 20ºC and constant light from 10 days of incubation in culture media Potato Carrot Agar, modified V-8 Agar and Potato Dextrose Agar. However, the greatest concentration was reached in Potato Dextrose Agar after 20 days of incubation at 20ºC under continuous white fluorescent light. The artificial inoculation of conidial suspensions of P. fijiensis allowed to evaluate the response of Grande Naine and FHIA-18 cultivars in greenhouse. By the use of qualitative scale of symptoms stages and the quantitative variables symptoms evolution time and disease development time was possible to differentiate both cultivars. They maintained in greenhouse similar response to the disease that in the field. Key words: conidia, culture medium, FHIA-18, Grande naine, sporulation

  2. Progress of black sigatoka (Mycosphaerella fijiensis) in banana plants after the bunch emergence in the district of Cáceres, Mato-Grosso-Brazil

    OpenAIRE

    Martins, Márcia Benedita; Valente, João Pedro; Kobayasti, Leimi; Gasparotto, Luadir

    2007-01-01

    A sigatoka-negra, causada pelo fungo Mycosphaerella fijiensis, pode causar 100% de perdas na produção das cultivares suscetíveis. O objetivo deste trabalho foi avaliar o progresso da sigatoka-negra em bananeiras após a emissão do cacho no Município de Cáceres, Mato Grosso. O experimento foi conduzido no período de fevereiro a dezembro de 2004 em plantios das cultivares Grande Naine, Maçã e Farta Velhaco, sendo esta última uma cultivar de plátano, do grupo Terra. As avaliações foram efetuadas ...

  3. Caracterização morfológica e avaliação de cultivares de bananeira resistentes a Sigatoka Negra (Mycosphaerella fijiensis Morelet no sudoeste goiano Morphologic characterization and evaluation of banana cultivars resistant to the Black Sigatoka disease (Mycosphaerella fijiensis Morelet in the Southwest of the State of Goiás, Brazil

    Directory of Open Access Journals (Sweden)

    Silvia Correa Santos

    2006-12-01

    Full Text Available Cinco cultivares de bananeira resistentes a Sigatoka Negra foram cultivadas na área experimental da Universidade Federal de Goiás, no município de Jataí, localizado na região Sudoeste do Estado. O objetivo foi introduzir genótipos resistentes a Sigatoka Negra no Estado, bem como fazer a caracterização morfológica desses materiais nessas condições climáticas. O trabalho foi realizado por meio da avaliação, em três ciclos produtivos, dos seguintes componentes de produção: intervalo em dias entre o plantio e o florescimento, número de folhas no florescimento e na colheita, número de pencas por cacho, frutos por cacho e frutos por penca, comprimento do cacho e dos frutos e peso do engaço, das pencas e do cacho. As cultivares falsa FHIA-18 e Caipira produziram em média aos 393 dias, apresentando maior precocidade em relação às demais cultivares. Como era esperado, a FHIA-21, que é uma bananeira tipo Terra, apresentou um ciclo maior (488 dias. O clima e a altitude de Jataí-GO podem ter contribuído para o aumento do ciclo das cinco cultivares quando comparado com outras regiões. Para as características de produção, a FHIA-01 e a falsa FHIA-18 se destacaram das demais. Para o número de pencas, a Thap Maeo se destacou nos três ciclos, mostrando a característica deste genótipo. As maiores alturas na floração foram observadas nas cultivares FHIA-21 e Thap Maeo, que também foram as que mais sofreram com os efeitos do vento.Five banana cultivars resistant to the Black Sigatoka Disease were grown at the experimental field of the Universidade Federal de Goiás (UFG, located in the Southwest region of the State of Goiás (Brazil. This work aimed the introduction of Black Sigatoka resistant cultivars as well as the characterization of the morphological aspects of such cultivars at that climatic region. The following characteristics were evaluated, in the first three cycles: days between planting and flowering, leaf number at

  4. INTEGRACIÓN DE INDUCCIÓN DE RESISTENCIA CON BACTERIAS QUITINOLÍTICAS EN EL CONTROL DE LA SIGATOKA NEGRA (Mycosphaerella fijiensis Morelet EN BANANO INTEGRATION OF INDUCED RESISTANCE WITH CHITINOLYTIC BACTERIA IN BLACK SIGATOKA CONTROL (Mycosphaerella fijiensis Morelet IN BANANA

    Directory of Open Access Journals (Sweden)

    Catalina María Zuluaga Amaya

    2007-12-01

    Full Text Available Se evaluó en condiciones de campo en la zona bananera de Urabá-Colombia, el efecto de inductores de resistencia y bacterias quitinolíticas sobre el desarrollo de la Sigatoka Negra en plantas de banano del cultivar Gran Enano. Como inductores de resistencia se utilizaron acibenzolar-s-metil (ASM (20 cm³ · ha-1 i.a. y ácido salicílico (AS (20 cm³ · ha-1 i.a cada uno en rotación y en mezcla con fungicidas utilizados en el control convencional de la enfermedad; se evaluó también la mezcla de estos inductores con bacterias quitinolíticas aisladas de la filosfera de banano; así como el efecto del fungicida biológico Biofun® ( 1,5 L · ha-1 de p.c. en rotación con fungicidas y en mezcla con ASM. La aplicación de ASM en rotación y en mezcla con fungicidas convencionales presentó un control de la enfermedad hasta un 50% mayor al obtenido con el control convencional, evidenciado esto en los valores más bajos del área bajo la curva del índice de severidad de la enfermedad (IS y más altos de hojas sanas (HS al momento de la floración. Los tratamientos, que incluyeron AS en rotación y mezcla con fungicidas convencionales, al igual que el producto Biofun® en rotación y en mezcla con ASM, mostraron un control de la enfermedad estadísticamente igual al obtenido con el control convencional, lo cual reveló una reducción de 46 - 100% de la cantidad de fungicidas convencionales usados en el control de la Sigatoka Negra.The effect of resistance elicitors and chitinolytic bacteria was evaluated on Black Sigatoka control in banana plants, in field conditions in Urabá-Colombia. Acibenzolar-s-metil (ASM (20 cm³ · ha- 1 a.i. and salicilyc acid (SA (20 cm³ a.i.ha-1 were used in rotation and mixture with conventional fungicides, and in mixture with chitinolytic bacteria isolated from banana phyllosphere. Biological fungicide Biofun® ( 1,5 L · ha-1 de p.c. was also tested in rotation and mixture with ASM. When fungicides were in rotation

  5. Variable number of tandem repeat markers in the genome sequence of Mycosphaerella fijiensis, the causal agent of black leaf streak disease of banana (Musa spp)

    NARCIS (Netherlands)

    Garcia, S.A.L.; Lee, van der T.A.J.; Ferreira, C.F.; Lintel Hekkert, te B.; Zapater, M.F.; Goodwin, S.B.; Guzmán, M.; Kema, G.H.J.; Souza, M.T.

    2010-01-01

    ABSTRACT. We searched the genome of Mycosphaerella fijiensis for molecular markers that would allow population genetics analysis of this plant pathogen. M. fijiensis, the causal agent of banana leaf streak disease, also known as black Sigatoka, is the most devastating pathogen attacking bananas

  6. Variable Number of Tandem Repeat Markers in the Genome Sequence of Mycosphaerella Fijiensis, the Causal Agent of Black Leaf Streak Disease of Banana (Musa spp.)

    Science.gov (United States)

    Mycosphaerella fijiensis, the causal agent of banana leaf streak disease (commonly known as black Sigatoka), is the most devastating pathogen attacking bananas (Musa spp). Recently the whole genome sequence of M. fijiensis became available. This sequence was screened for the presence of Variable Num...

  7. How to Distinguish Attacks by the Black Turpentine Beetle and Dioryctria Amatella on Southern Pines

    Science.gov (United States)

    Carl W. Fatzinger; Gary L. DeBarr

    1969-01-01

    Trunk attacks by the black turpentine beetle, Dendroctonus terebrans (Oh.), and the larvae of Dioryctria amatella (Hulst) on the southern pines results in a copious flow of pitch. This external pitch mass or pitch tube exhibits characteristics that can be used as symptoms to distinguish between attacks by these two insects.

  8. A COMPREHENSIVE SURVEY ON DETECTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORK (MANET

    Directory of Open Access Journals (Sweden)

    Pascal Maniriho

    2018-01-01

    Full Text Available The infrastructure-less nature and mobility of nodes in mobile ad-hoc network (MANET make it to be very susceptible to various attacks. Besides, owing to its flexibility and simplicity, there is no predefined time or permission set for nodes to leave or join the network and each node can act as a client or server.  Nevertheless, securing communication between nodes has become a challenging problem than in other types of network. Attacks in MANET range into different categories. Black hole attack is one of the attacks that has been addressed by many researchers in the recent years. It does occur when a harmful mobile node called black hole becomes a part of the network and tries to use its malicious behaviors by sending fake route reply packets (RREP for any received route request packets (RREQ. When these faked packets arrive to the source node, it does reply to them by sending data packet via the established route. Once the packets are received by the black hole, it drops them before reaching the destination.  Hence, preventing the source node from reaching the intended destination. In this paper, we present an overview of a wide range of techniques suggested in the literature for detecting and preventing black hole attacks in mobile ad hoc network. Additionally, the effect of each approach on the network performance is also presented.

  9. An efficient collaborative approach for black hole attack discovery and mitigating its impact in manet

    Science.gov (United States)

    Devipriya, K.; Ivy, B. Persis Urbana; Prabha, D.

    2018-04-01

    A mobile ad hoc network (MANET) is an assemblage of nodes composed of mobile devices coupled in various ways wirelessly which do not have any central administration. Each node in MANET cooperates in forwarding packets in the network. This type of collaboration incurs high cost but there exits nodes that declines to cooperate leading to selfish conduct of nodes which effects overall network performance. To discover the attacks caused by such nodes, a renowned mechanism using watchdog can be deployed. In infrastructure less network attack detection and reaction and high false positives, false negatives initiating black hole attack becomes major issue in watchdog. This paper put forward a collaborative approach for identifying such attacks in MANET. Through abstract analysis and extensive simulation of this approach, the detection time of misbehaved nodes is reduced and substantial enhancement in overhead and throughput is witnessed.

  10. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    Science.gov (United States)

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  11. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    Science.gov (United States)

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  12. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT.

    Science.gov (United States)

    Mathur, Avijit; Newe, Thomas; Rao, Muzaffar

    2016-01-19

    Wireless sensor networks (WSNs) are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use): black hole and selective forwarding (SF) attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  13. Defence against Black Hole and Selective Forwarding Attacks for Medical WSNs in the IoT

    Directory of Open Access Journals (Sweden)

    Avijit Mathur

    2016-01-01

    Full Text Available Wireless sensor networks (WSNs are being used to facilitate monitoring of patients in hospital and home environments. These systems consist of a variety of different components/sensors and many processes like clustering, routing, security, and self-organization. Routing is necessary for medical-based WSNs because it allows remote data delivery and it facilitates network scalability in large hospitals. However, routing entails several problems, mainly due to the open nature of wireless networks, and these need to be addressed. This paper looks at two of the problems that arise due to wireless routing between the nodes and access points of a medical WSN (for IoT use: black hole and selective forwarding (SF attacks. A solution to the former can readily be provided through the use of cryptographic hashes, while the latter makes use of a neighbourhood watch and threshold-based analysis to detect and correct SF attacks. The scheme proposed here is capable of detecting a selective forwarding attack with over 96% accuracy and successfully identifying the malicious node with 83% accuracy.

  14. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

    OpenAIRE

    Rosenberg, Ishai; Shabtai, Asaf; Rokach, Lior; Elovici, Yuval

    2017-01-01

    In this paper, we present a black-box attack against API call based machine learning malware classifiers, focusing on generating adversarial sequences combining API calls and static features (e.g., printable strings) that will be misclassified by the classifier without affecting the malware functionality. We show that this attack is effective against many classifiers due to the transferability principle between RNN variants, feed forward DNNs, and traditional machine learning classifiers such...

  15. Developing markers for Sigatoka leaf spot disease (Mycosphaerella ...

    African Journals Online (AJOL)

    Jane

    2011-07-06

    Jul 6, 2011 ... Developing markers for Sigatoka leaf spot disease ... OPERON primer pairs were used to screen genomic DNA from two resistant cultivars: Calcutta 4 ( ..... Blomme G, Eden-Green S, Mustaffa M, Nwauzoma B, Thangavelu R.

  16. Ketahanan Kultivar Pisang Lokal Kalimantan Selatan terhadap Penyakit Bercak Sigatoka (Mycosphaerella sp.)

    OpenAIRE

    Mariana Mariana; Rodinah Rodinah; Ismed Setya Budi

    2017-01-01

    Sigatoka of banana caused by Mycospherella sp. is an important disease, since it causes yield losses. Resistant variety is considered a promising approach for sigatoka disease management. This study was aimed to evaluate the resistance of local banana cultivars from South Kalimantan against sigatoka disease. The fungus was isolated from leaves of Kapas cultivar showing severe symptoms of sigatoka disease, onto potato dextrose agar medium. The isolate was then confirmed as Mycosphaerella sp. f...

  17. Molecular diagnostics for the Sigatoka disease complex of banana

    NARCIS (Netherlands)

    Arzanlou, M.; Abeln, E.C.A.; Kema, G.H.J.; Waalwijk, C.; Carlier, J.; Crous, P.W.

    2007-01-01

    The Sigatoka disease complex of banana involves three related ascomycetous fungi, Mycosphaerella fijiensis, M. musicola, and M. eumusae. The exact distribution of these three species and their disease epidemiology remain unclear, because their symptoms and life cycles are rather similar. Disease

  18. Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

    OpenAIRE

    Sethi, Tegjyot Singh; Kantardzic, Mehmed

    2017-01-01

    While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication of attacks, has prompted the need for a data driven solution, with machine learning forming the core of many cybersecurity systems. Machine learning was not designed with security in mind, and the essential assumption of stationarity, requiri...

  19. Evaluation of fruit and bunch traits in black Sigatoka resistant ...

    African Journals Online (AJOL)

    Studies involving the evaluation of fruit and bunch characteristics of twenty seven cultivars of plantain and banana were undertaken. Results showed that bunch weight of plantain hybrid, 25344-18, differed significantly (P<0.05) from all other genotypes except SH 3362, with an average of 20.8 kg plant. The number of hands ...

  20. Alternativas de manejo en el control de la Sigatoka negra (Mycosphaerella fijiensis Morelet./

    Directory of Open Access Journals (Sweden)

    Yurisandra Sierra Reyes

    2015-09-01

    Full Text Available Resumen Con el objetivo de evaluar alternativas en el control de la Sigatoka negra n se desarrolló esta investigación en la Unidad Empresarial de Base “Atención a Productores” en Siboney, municipio Sibanicú, provincia Camagüey. En el período comprendido entre junio del 2008 a octubre del 2009 a través de un experimento con diseño bloques al azar con el fin de establecer el efecto de varias prácticas de manejo en el control de la Sigatoka negra en el plátano Enano Guantanamero. Se estudiaron combinaciones de prácticas de manejo como el uso de fertilizaciones de fórmula completa y orgánica, el marco de plantación utilizado fue de 1 m ×2 m × 3m, la compra de las semillas se realizó en la Biofábrica de Camagüey, que fueron desinfectadas al momento de la plantación durante una hora con una solución de Mancozeb SC (5 g /1 de agua y se adicionó lixiviado de humus de lombriz (ácido fúlvico (5ml/l de agua. Se realizaron labores agrotécnicas de despunte, aplicación de fertilización óptima y de un químico protectante, en combinación hasta llegar a doce tratamientos. Se evaluaron las hojas más jóvenes enfermas, hojas más joven manchada y el índice de severidad. Las combinación de Fertilización + Despunte + Fungicida + lixiviado de humus de lombriz, mostró las mejores respuestas al reducir el Índice de Severidad de las dos enfermedades, con valores medios que oscilaron entre 39,5 y 43,3, así como una alta respuesta a los indicadores morfológicos y productivos del clon AAB Enano Guantanamero. ABSTRACT In order to evaluate alternatives in the control of black Sigatoka n this research was conducted at the Base Business Unit "Attention to Producers" in Siboney, Sibanicú municipality, Camagüey province. In the period from June 2008 to October 2009 by an experiment with randomized block design in order to establish the effect of various management practices on the control of Black Sigatoka in banana Dwarf Guantanamero

  1. Alien rose-ringed parakeets (Psittacula krameri) attack black rats (Rattus rattus) sometimes resulting in death

    OpenAIRE

    Hernández-Brito, Dailos; Luna, Amparo; Carrete, Martina; Tella, José Luis

    2014-01-01

    The rose-ring parakeet (Psittacula krameri) is one of the most successful invasive birds in its establishment worldwide. Studies addressing its potential impact on native biota mostly focus on birds and little is known about how these and other parakeet species interact with native mammals. Here, we report 21 aggressions of rose-ringed parakeets towards black rats (Rattus rattus) in urban parks in Seville (Southern Spain) and Tenerife (Canary Islands). Either solitary parakeets or, more often...

  2. Diagnostico por PCR del complejo Sigatoka en Colombia.

    Directory of Open Access Journals (Sweden)

    Romero Magally

    1999-06-01

    Full Text Available Las Sigatokas negra y amarilla son enfermedades causadas por Mycosphaerella fijiensis y Mycosphaerella musicola respectivamente. Estas dos especies de hongos estrechamente relacionadas y morfológicamente similares, causan necrosis severa en las hojas de banano y plátano disminuyendo el área de tejido fotosintético y acelerando la maduración del fruto. Las enfermedades producidas por estos hongos afectan la mayoría de las áreas cultivadas de banano y plátano a nivel mundial, generando un gran problema económico y ambiental. Los síntomas que produce cada uno de estos patógenos en el cultivo son similares, por lo que su correcta identificación en campo se hace difícil. Con el fin de hacer una identificación precisa de cada uno de ellos decidimos estandarizar una prueba diagnóstica basada en la reacción en cadena de la polimerasa (PCR utilizando dos oligonucleótidos de 21 bases (MF 137 y MM 137 específicos para cada una de las especies M. fijiensis y M. musicola respectivamente. MF 137 y MM 137 codifican regiones variables identificadas en las secuencias interespaciadoras (ITS del DNA ribosomal.

  3. Molecular diagnostics for the sigatoka disease complex of banana.

    Science.gov (United States)

    Arzanlou, Mahdi; Abeln, Edwin C A; Kema, Gert H J; Waalwijk, Cees; Carlier, Jean; Vries, Ineke de; Guzmán, Mauricio; Crous, Pedro W

    2007-09-01

    ABSTRACT The Sigatoka disease complex of banana involves three related ascomycetous fungi, Mycosphaerella fijiensis, M. musicola, and M. eumusae. The exact distribution of these three species and their disease epidemiology remain unclear, because their symptoms and life cycles are rather similar. Disease diagnosis in the Mycosphaerella complex of banana is based on the presence of host symptoms and fungal fruiting structures, which hamper preventive management strategies. In the present study, we have developed rapid and robust species-specific molecular-based diagnostic tools for detection and quantification of M. fijiensis, M. musicola, and M. eumusae. Conventional species-specific polymerase chain reaction (PCR) primers were developed based on the actin gene that detected DNA at as little as 100, 1, and 10 pg/mul from M. fijiensis, M. musicola, and M. eumusae, respectively. Furthermore, TaqMan real-time quantitative PCR assays were developed based on the beta-tubulin gene and detected quantities of DNA as low as 1 pg/mul for each Mycosphaerella sp. from pure cultures and DNA at 1.6 pg/mul per milligram of dry leaf tissue for M. fijiensis that was validated using naturally infected banana leaves.

  4. Fatal attack on black-tufted-ear marmosets (Callithrix penicillata) by a Boa constrictor: a simultaneous assault on two juvenile monkeys.

    Science.gov (United States)

    Teixeira, Danilo Simonini; dos Santos, Edmilson; Leal, Silvana Gomes; de Jesus, Andrea Karla; Vargas, Waldemir Paixão; Dutra, Irapuan; Barros, Marilia

    2016-01-01

    Here we report the first witnessed attack on a marmoset by a constrictor snake. The incident occurred mid-morning in a gallery forest within an altered landscape of the Cerrado region of central Brazil and refers to a fatal attack by a Boa constrictor on two juvenile black-tufted-ear marmosets (Callithrix penicillata) simultaneously. The snake captured both individuals at a height of ~ 4 m while a group of eight marmosets traveled through the subcanopy. The actual strike was not seen. After 2 min, the boa fell to the ground with both marmosets in its coils and proceeded to kill one animal at a time through constriction. Two adult marmosets immediately descended to where the snake held its victims on the ground and attacked it. The snake showed no apparent reaction, and after ~ 1-2 min, the adults rejoined the remaining group members that were mobbing and vocalizing from 5 to 6 m above. The group left the scene ~ 7 min after the onset of the attack and was not seen again. The snake loosened its coils 10 min after its initial strike, left the two carcasses on the ground and stayed behind a nearby tree. Thus, we are not sure if the victims were in fact ingested. This report confirms that marmosets are vulnerable to boid snakes and capable of highly organized and cooperative antipredation behavior. It also suggests that snakes pose a greater threat to callitrichids than previously thought.

  5. Comparative Genomics of the Sigatoka Disease Complex on Banana Suggests a Link between Parallel Evolutionary Changes in Pseudocercospora fijiensis and Pseudocercospora eumusae and Increased Virulence on the Banana Host.

    Science.gov (United States)

    Chang, Ti-Cheng; Salvucci, Anthony; Crous, Pedro W; Stergiopoulos, Ioannis

    2016-08-01

    The Sigatoka disease complex, caused by the closely-related Dothideomycete fungi Pseudocercospora musae (yellow sigatoka), Pseudocercospora eumusae (eumusae leaf spot), and Pseudocercospora fijiensis (black sigatoka), is currently the most devastating disease on banana worldwide. The three species emerged on bananas from a recent common ancestor and show clear differences in virulence, with P. eumusae and P. fijiensis considered the most aggressive. In order to understand the genomic modifications associated with shifts in the species virulence spectra after speciation, and to identify their pathogenic core that can be exploited in disease management programs, we have sequenced and analyzed the genomes of P. eumusae and P. musae and compared them with the available genome sequence of P. fijiensis. Comparative analysis of genome architectures revealed significant differences in genome size, mainly due to different rates of LTR retrotransposon proliferation. Still, gene counts remained relatively equal and in the range of other Dothideomycetes. Phylogenetic reconstruction based on a set of 46 conserved single-copy genes strongly supported an earlier evolutionary radiation of P. fijiensis from P. musae and P. eumusae. However, pairwise analyses of gene content indicated that the more virulent P. eumusae and P. fijiensis share complementary patterns of expansions and contractions in core gene families related to metabolism and enzymatic degradation of plant cell walls, suggesting that the evolution of virulence in these two pathogens has, to some extent, been facilitated by convergent changes in metabolic pathways associated with nutrient acquisition and assimilation. In spite of their common ancestry and shared host-specificity, the three species retain fairly dissimilar repertoires of effector proteins, suggesting that they likely evolved different strategies for manipulating the host immune system. Finally, 234 gene families, including seven putative effectors, were

  6. Comparative Genomics of the Sigatoka Disease Complex on Banana Suggests a Link between Parallel Evolutionary Changes in Pseudocercospora fijiensis and Pseudocercospora eumusae and Increased Virulence on the Banana Host.

    Directory of Open Access Journals (Sweden)

    Ti-Cheng Chang

    2016-08-01

    Full Text Available The Sigatoka disease complex, caused by the closely-related Dothideomycete fungi Pseudocercospora musae (yellow sigatoka, Pseudocercospora eumusae (eumusae leaf spot, and Pseudocercospora fijiensis (black sigatoka, is currently the most devastating disease on banana worldwide. The three species emerged on bananas from a recent common ancestor and show clear differences in virulence, with P. eumusae and P. fijiensis considered the most aggressive. In order to understand the genomic modifications associated with shifts in the species virulence spectra after speciation, and to identify their pathogenic core that can be exploited in disease management programs, we have sequenced and analyzed the genomes of P. eumusae and P. musae and compared them with the available genome sequence of P. fijiensis. Comparative analysis of genome architectures revealed significant differences in genome size, mainly due to different rates of LTR retrotransposon proliferation. Still, gene counts remained relatively equal and in the range of other Dothideomycetes. Phylogenetic reconstruction based on a set of 46 conserved single-copy genes strongly supported an earlier evolutionary radiation of P. fijiensis from P. musae and P. eumusae. However, pairwise analyses of gene content indicated that the more virulent P. eumusae and P. fijiensis share complementary patterns of expansions and contractions in core gene families related to metabolism and enzymatic degradation of plant cell walls, suggesting that the evolution of virulence in these two pathogens has, to some extent, been facilitated by convergent changes in metabolic pathways associated with nutrient acquisition and assimilation. In spite of their common ancestry and shared host-specificity, the three species retain fairly dissimilar repertoires of effector proteins, suggesting that they likely evolved different strategies for manipulating the host immune system. Finally, 234 gene families, including seven

  7. MANEJO FITOTÉCNICO DA BANANEIRA, CULTIVAR D' ANGOLA (AAB, VISANDO AO CONTROLE DA SIGATOKA-NEGRA

    Directory of Open Access Journals (Sweden)

    MARIA DE JESUS BARBOSA CAVALCANTE

    2014-01-01

    Full Text Available The objective of this work was to evaluate management systems for the control of Black Siga- toka in the cultivation of banana D'Angola cultivar. The experiment was installed and carried out at Embrapa Acre, Rio Branco - AC with the treatments distributed in randomized complete blocks with six replications consisting of different planting densities, corresponding to T1 - (1.111 plants ha-1; T2 - 1.666 plants ha-1; T3 - 2.000 plants ha-1; T4 - 1.333 plants ha-1; T5 - 2.500 plants ha-1 and; T6 - 1.111 plants ha-1 under rubber trees. The evaluations were carried out during two cycles of production. Plants of cv. D'Angola (AAB cultivated in 3.0 x 3.0 m, shaded by the rubber trees, presented higher plant height, higher number of functional leaves at flowering and harvest, higher average bunch weight, greater weight of the bunches, longer cycle production and reduced severity of black sigatoka. Highest yields were obtained when we adopted higher densities. The banana intercropping with rubber trees proved to be a good alternative to permit cultivation of cv. D'Angola (long banana.

  8. Ketahanan Kultivar Pisang Lokal Kalimantan Selatan terhadap Penyakit Bercak Sigatoka (Mycosphaerella sp.

    Directory of Open Access Journals (Sweden)

    Mariana Mariana

    2017-07-01

    Full Text Available Sigatoka of banana caused by Mycospherella sp. is an important disease, since it causes yield losses. Resistant variety is considered a promising approach for sigatoka disease management. This study was aimed to evaluate the resistance of local banana cultivars from South Kalimantan against sigatoka disease. The fungus was isolated from leaves of Kapas cultivar showing severe symptoms of sigatoka disease, onto potato dextrose agar medium. The isolate was then confirmed as Mycosphaerella sp. following Koch’s postulate. Level of resistance is determined based on symptoms development. Resistance of local banana cultivars can be differentiated into susceptible (‘Awak’, ‘Jaranang’, ‘Kapas’, ‘Mas’, and ‘Paikat’, medium resistant (‘Ambon’, ‘Kepok’, ‘Mas Bantan’, ‘Mauli’, and ‘Talas’, and resistant (‘Tarati’.  In general, the symptom was visible 2 to 8 days after inoculation. The longer incubation period the more resistant response of banana varieties.  Incubation period was negatively correlated to the disease intensity, but it is not correlated with stomatal density.

  9. Perception of Recurrent Stroke Risk among Black, White and Hispanic Ischemic Stroke and Transient Ischemic Attack Survivors: The SWIFT Study

    Science.gov (United States)

    Boden-Albala, Bernadette; Carman, Heather; Moran, Megan; Doyle, Margaret; Paik, Myunghee C.

    2011-01-01

    Objectives Risk modification through behavior change is critical for primary and secondary stroke prevention. Theories of health behavior identify perceived risk as an important component to facilitate behavior change; however, little is known about perceived risk of vascular events among stroke survivors. Methods The SWIFT (Stroke Warning Information and Faster Treatment) study includes a prospective population-based ethnically diverse cohort of ischemic stroke and transient ischemic attack survivors. We investigate the baseline relationship between demographics, health beliefs, and knowledge on risk perception. Regression models examined predictors of inaccurate perception. Results Only 20% accurately estimated risk, 10% of the participants underestimated risk, and 70% of the 817 study participants significantly overestimated their risk for a recurrent stroke. The mean perceived likelihood of recurrent ischemic stroke in the next 10 years was 51 ± 7%. We found no significant differences by race-ethnicity with regard to accurate estimation of risk. Inaccurate estimation of risk was associated with attitudes and beliefs [worry (p risk factors. Conclusion This paper provides a unique perspective on how factors such as belief systems influence risk perception in a diverse population at high stroke risk. There is a need for future research on how risk perception can inform primary and secondary stroke prevention. Copyright © 2011 S. Karger AG, Basel PMID:21894045

  10. Evaluation of banana hybrids for tolerance to black leaf streak (Mycosphaerella fijiensis Morelet) in Puerto Rico

    Science.gov (United States)

    In Puerto Rico, bananas (including plantains) are important agricultural commodities; their combined production totaled 133,500 tons in 2008. Black leaf streak (BLS) and Sigatoka leaf spot diseases, caused by Mycosphaerella fijiensis and M. musicola, respectively, are responsible for significant los...

  11. BLACK HOLE ATTACK IN AODV & FRIEND FEATURES UNIQUE EXTRACTION TO DESIGN DETECTION ENGINE FOR INTRUSION DETECTION SYSTEM IN MOBILE ADHOC NETWORK

    Directory of Open Access Journals (Sweden)

    HUSAIN SHAHNAWAZ

    2012-10-01

    Full Text Available Ad-hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. Since there is no central controller to determine the reliable & secure communication paths in Mobile Adhoc Network, each node in the ad hoc network has to rely on each other in order to forward packets, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. In a mobile ad hoc network (MANET where security is a crucial issue and they are forced to rely on the neighbor node, trust plays an important role that could improve the number of successful data transmission. Larger the number of trusted nodes, higher successful data communication process rates could be expected. In this paper, Black Hole attack is applied in the network, statistics are collected to design intrusion detection engine for MANET Intrusion Detection System (IDS. Feature extraction and rule inductions are applied to find out the accuracy of detection engine by using support vector machine. In this paper True Positive generated by the detection engine is very high and this is a novel approach in the area of Mobile Adhoc Intrusion detection system.

  12. Distribuição e impacto da sigatoka-negra na bananicultura do estado do Acre

    OpenAIRE

    Cavalcante, Maria de Jesus B.; Sá, Claudenor P. de; Gomes, Francisco C. da Rocha; Gondim, Tarcísio M. de Souza; Cordeiro, Zilton J. M.; Hessel, Jorge L.

    2004-01-01

    A sigatoka-negra (Mycosphaerella fijiensis) é a doença de maior severidade que afeta as cultivares de banana (Musa spp.) de importância econômica no mundo. Foi constatada no Brasil em 1998, no Estado do Amazonas, e tem se disseminado pelo Estado do Acre, atacando severamente as cultivares do Subgrupo Terra (AAB). Realizou-se um diagnóstico da sigatoka-negra e dos impactos econômicos causados por esta doença nos municípios do Estado do Acre. Foram visitados plantios em 16 municípios e amostras...

  13. Forewarning system for controlling Yellow Sigatoka in Northern Minas Gerais, Brazil

    Directory of Open Access Journals (Sweden)

    Sara de Almeida Rios

    2013-09-01

    Full Text Available This trial aimed to evaluate the Biological Forewarning System (BFS for controlling Yellow Sigatoka in Northern Minas Gerais, Brazil. It was carried out in the town of Nova Porteirinha. One tested 7 treatments, using 6 gross sum (GS values (1,000; 1,300; 1,600; 1,900; 2,200, and 2,500 and the systematic disease control every 15 days. The treatments were distributed into 7 plots (120 plants/plot with ‘Prata-Anã’ and 10 plants from each plot were weekly evaluated with regard to leaf emission rate and disease incidence on the leaves 2, 3 and 4. The more advanced lesion stages and their intensity were used to calculate the gross sum, which aided in decision-making for chemical control. One collected data on production and firmness, pH, and acidity analysis of fruits. For the GS 2,500 treatment, taking into account 2-year evaluation, there was a reduction from 12 to 3 applications, i.e. 75% less fungicide was applied, without loss in productivity. Therefore, one suggests, taking into account the conditions of Nova Porteirinha, the application of BFS for chemical control of Yellow Sigatoka, using the GS value of 2,500 as an indicator of the correct time to perform pulverization.

  14. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  15. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  16. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  17. Variable number of tandem repeat markers in the genome sequence of Mycosphaerella fijiensis, the causal agent of black leaf streak disease of banana (Musa spp).

    Science.gov (United States)

    Garcia, S A L; Van der Lee, T A J; Ferreira, C F; Te Lintel Hekkert, B; Zapater, M-F; Goodwin, S B; Guzmán, M; Kema, G H J; Souza, M T

    2010-11-09

    We searched the genome of Mycosphaerella fijiensis for molecular markers that would allow population genetics analysis of this plant pathogen. M. fijiensis, the causal agent of banana leaf streak disease, also known as black Sigatoka, is the most devastating pathogen attacking bananas (Musa spp). Recently, the entire genome sequence of M. fijiensis became available. We screened this database for VNTR markers. Forty-two primer pairs were selected for validation, based on repeat type and length and the number of repeat units. Five VNTR markers showing multiple alleles were validated with a reference set of isolates from different parts of the world and a population from a banana plantation in Costa Rica. Polymorphism information content values varied from 0.6414 to 0.7544 for the reference set and from 0.0400 and 0.7373 for the population set. Eighty percent of the polymorphism information content values were above 0.60, indicating that the markers are highly informative. These markers allowed robust scoring of agarose gels and proved to be useful for variability and population genetics studies. In conclusion, the strategy we developed to identify and validate VNTR markers is an efficient means to incorporate markers that can be used for fungicide resistance management and to develop breeding strategies to control banana black leaf streak disease. This is the first report of VNTR-minisatellites from the M. fijiensis genome sequence.

  18. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  19. Physico-chemical characterization of banana varieties resistant to black leaf streak disease for industrial purposes

    Directory of Open Access Journals (Sweden)

    Rossana Catie Bueno de Godoy

    2016-01-01

    Full Text Available ABSTRACT: Cultivated bananas have very low genetic diversity making them vulnerable to diseases such as black-Sigatoka leaf spot. However, the decision to adopt a new banana variety needs to be based on a robust evaluation of agronomical and physical-chemical characteristics. Here, we characterize new banana varieties resistant to black-Sigatoka leaf spot and compare them to the most widely used traditional variety (Grand Naine. Each variety was evaluated for a range of physic-chemical attributes associated with industrial processing and flavor: pH, TTA, TSS/TTA, total sugars, reducing sugars and non-reducing sugars, humidity, total solids and yield. The Thap Maeo variety had the highest potential as a substitute for the Grand Naine variety, having higher levels of total soluble solids, reducing sugars, total sugars and humidity. The Caipira and FHIA 2 varieties also performed well in comparison with the Grand Naine variety. Cluster analysis indicated that the Grand Naine variety was closely associated with varieties from the Gross Michel subgroup (Bucaneiro, Ambrosia and Calipso and the Caipira variety, all of which come from the same AAA genomic group. It was concluded that several of the new resistant varieties could potentially substitute the traditional variety in areas affected by black-Sigatoka leaf spot disease.

  20. Identificación de genes candidatos de resistencia a sigatoka negra en variedades de banano y plátano

    OpenAIRE

    Saavedra, C.; Santos, E.

    2013-01-01

    El control químico y la selección de plantas resistentes continúan siendo las estrategias mayormente usadas para combatir la Sigatoka negra en la producción de banano. La ingeniería genética tiene el potencial para la generación de plantas con cierta resistencia/tolerancia al hongo, por lo que la aplicación de fungicidas sería reducida. Este estudio tiene como objetivo identificar genes candidatos de resistencia a la infección del hongo Mycosphaerella fijiensis Morelet causante de la Sigatoka...

  1. Controle biológico de Mycosphaerella fijiensis Morelet agente causal da sigatoka-negra da bananeira (Musa spp.) com Trichoderma spp.

    OpenAIRE

    Cavero, Poholl Adan Sagratzki

    2011-01-01

    O principal problema fitossanitário da cultura da bananeira no Brasil e também em outros países é a sigatoka-negra, causada pelo fungo Micosphaerella fijiensis Morelet, que pode ocasionar perdas de até 100% da produção. A medida mundialmente mais utilizada no controle deste problema em bananais comerciais têm sido pulverizações com fungicidas. Na Amazônia, o uso de fungicidas para o controle da sigatoka-negra torna-se econômica e ecologicamente inviável, face aos custos e aos impactos ambient...

  2. What Can We Learn?--The Algonquin Bear Attack.

    Science.gov (United States)

    Strickland, Dan

    1992-01-01

    Describes a bear attack in Algonquin Park in Lake Opeongo (Canada) in which a man and woman were killed. Hypothesizes that the bear deliberately preyed on its victims and concludes that the bear was physically normal. Despite this isolated attack, the chance of being attacked by a black bear when camping is virtually nonexistent. (KS)

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. Sistema de pré-aviso para o controle da sigatoka-amarela da bananeira no Recôncavo Baiano Forecasting for the control of banana 'yellow sigatoka' in the Recôncavo Baiano region, Brazil

    Directory of Open Access Journals (Sweden)

    Danúzia Maria Vieira Ferreira

    2003-12-01

    Full Text Available Entre os problemas que afetam a bananicultura brasileira, a Sigatoka-amarela (Mycosphaerella musicola Leach destaca-se como um dos mais graves, podendo causar perdas superiores a 50% na produção. O controle químico continua sendo uma das principais alternativas disponíveis. Por isto a utilização de um sistema de monitoramento que possa indicar o momento correto da aplicação dos fungicidas é uma alternativa importante para racionalizar seu uso. O objetivo deste trabalho foi definir o valor de soma bruta no sistema de pré-aviso biológico, que permita reduzir o número de aplicações anuais de defensivos capaz de controlar eficientemente a Sigatoka-amarela na região do Recôncavo Baiano. O ensaio foi conduzido na área experimental do Centro Nacional de Pesquisa de Mandioca e Fruticultura Tropical - Embrapa Mandioca e Fruticultura, da Empresa Brasileira de Pesquisa Agropecuária - EMBRAPA, no município de Cruz das Almas, BA. Testaram-se oito tratamentos, seis utilizando a soma bruta ( 1000; 1300; 1600; 1900; 2200 e 2500, o controle sistemático da doença a cada 21 dias e a testemunha controle. Esses tratamentos foram distribuídos em oito quadras de 48 plantas da cultivar Grande Naine, avaliando-se semanalmente dez plantas por tratamento, quanto à taxa de emissão foliar e incidência da doença nas folhas 2, 3 e 4, indicando a intensidade do estádio mais avançado da lesão presente nas mesmas. Os dados semanais foram usados para o cálculo das respectivas somas brutas, recomendando ou não a aplicação do fungicida (propiconazole 3mL mais 1L de óleo mineral . Na colheita coletaram-se os dados de produção e severidade da doença. Apenas os tratamentos controle sistemático, soma bruta 1300 e soma bruta 1600 apresentaram produções estatisticamente diferentes da testemunha sem controle. Considerando a produtividade obtida e o número de aplicações de fungicidas, requeridas durante o ciclo, foi concluído que, para as condi

  5. Relação entre a temperatura e o molhamento foliar no monocíclo da Sigatoka-negra

    Directory of Open Access Journals (Sweden)

    Cleilson do Nascimento Uchôa

    2012-06-01

    Full Text Available A influência da temperatura (21, 24, 27 e 30 °C e da duração do tempo de molhamento foliar (0, 12, 24, 48 e 72 horas na penetração do agente causal da Sigatoka-negra (Mycosphaerella fijiensis foi quantificada em ambiente controlado. A área abaixo da curva do progresso da doença (AACPD e a incidência foram influenciadas pela temperatura e pela duração do tempo de molhamento foliar. Foram constatadas diferenças significativas (P=0,05 nos valores da AACPD para as diferentes temperaturas, bem como verificada a interação significativa (P=0,05 entre temperaturas e o molhamento foliar. Em todas as temperaturas foi possível a observação de sintomas, entretanto, a maior AACPD foi observada em folhas inoculadas que permaneceram na temperatura de 24 e 27°C, a partir de 48 horas de molhamento foliar. Nas temperaturas de 21ºC e 30°C a incidência de Sigatoka-negra foi menor. O período de molhamento foliar mínimo para o progresso da doença foi de 24 horas. Não foram observados sintomas de Sigatoka-negra em folhas inoculados com o molhamento foliar de 0 hora e 12 horas em todas as temperaturas. As folhas assintomáticas, após 5 dias em câmara úmida apresentavam sintomas característicos de Sigatoka-negra, demonstrando que os conídios inoculados nas folhas permaneceram viáveis por um período na ausência de água livre na folha.

  6. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  7. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  8. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  9. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. Sistema de pré-aviso para controle de Sigatoka-amarela no norte de Minas Gerais

    Directory of Open Access Journals (Sweden)

    Sara de Almeida Rios

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/2175-7925.2013v26n3p109 O objetivo do presente trabalho foi avaliar o Sistema de Pré-Aviso Biológico (SPB para o controle da Sigatoka-amarela no Norte de Minas. O ensaio foi conduzido no município de Nova Porteirinha, MG. Foram testados sete tratamentos, utilizando seis valores de soma bruta (SB (1.000; 1.300; 1.600; 1.900; 2.200 e 2.500 e o controle sistemático da doença a cada 15 dias. Os tratamentos foram distribuídos em sete talhões (120 plantas/talhão com ‘Prata-Anã’ e 10 plantas de cada talhão foram avaliadas semanalmente quanto à taxa de emissão foliar e incidência da doença nas folhas dois, três e quatro. Os estádios mais avançados das lesões e a sua intensidade serviram para cálculo da soma bruta, que auxiliou na tomada de decisão para o controle químico. Foram coletados os dados de produção e análises de firmeza, pH e acidez dos frutos. Para o tratamento SB 2.500, considerando os dois anos de avaliação, houve uma redução de doze para três aplicações, ou seja, 75% menos defensivos aplicados, sem perda na produtividade. Logo, sugere-se, considerando as condições de Nova Porteirinha, a aplicação do SPB para o controle químico da Sigatoka-amarela, utilizando-se o valor de SB de 2.500 como indicador da época correta para a realização da pulverização.

  11. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  12. An assessment of the benefits of yellow Sigatoka (Mycosphaerella musicola control in the Queensland Northern Banana Pest Quarantine Area

    Directory of Open Access Journals (Sweden)

    David Cook

    2013-09-01

    Full Text Available The banana leaf spotting disease yellow Sigatoka is established and actively controlled in Australia through intensive chemical treatments and diseased leaf removal. In the State of Queensland, the State government imposes standards for de-leafing to minimise the risk of the disease spreading in 6 banana pest quarantine areas. Of these, the Northern Banana Pest Quarantine Area is the most significant in terms of banana production. Previous regulations imposed obligations on owners of banana plants within this area to remove leaves from plants with visible spotting on more than 15 per cent of any leaf during the wet season. Recently, this leaf disease threshold has been lowered to 5 per cent. In this paper we examine the likely impact this more-costly regulation will have on the spread of the disease. We estimate that the average net benefit of reducing the diseased leaf threshold is only likely to be $1.4million per year over the next 30 years, expressed as the annualised present value of tightened regulation. This result varies substantially when the timeframe of the analysis is changed, with shorter time frames indicating poorer net returns from the change in protocols. Overall, the benefit of the regulation change is likely to be minor.

  13. EVALUACIÓN DE RESISTENCIA DE GENOTIPOS DE PLÁTANO Y BANANO A LA SIGATOKA NEGRA (MYCOSPHAERELLA FIJIENSIS MORELET. EVALUATION OF RESISTANCE OF PLANTAIN AND BANANA GENOTYPES TO BLACK SIGATOKA (MYSCOSPHAERELLA FIJIENSIS MORELET.

    Directory of Open Access Journals (Sweden)

    Alejandra Cuéllar Quintero

    2011-06-01

    Full Text Available Con el objetivo de evaluar bajo condiciones de invernadero genotipos de plátano y banano frente a poblaciones de Mycosphaerella fijiensis Morelet de diferente virulencia y origen, se estableció una colección de 125 aislamientos monospóricos obtenidos en 10 departamentos de Colombia. Se seleccionaron 50 aislamientos por área geográfica y genotipo hospedante, para la caracterización morfológica y patogénica del hongo en Dominico Hartón. En las pruebas de patogenicidad y resistencia se realizaron inoculaciones de una suspensión acuosa de 5.000 conidias mL-1, la respuesta de las plántulas a la enfermedad se determinó mediante las variables periodo de incubación (PI, tiempo de evolución de los síntomas (TES, área bajo la curva del desarrollo de la enfermedad (ABCDE y tasa de desarrollo de la enfermedad (r. La inoculación de los 50 aislamientos en plántulas de Dominico Hartón, permitió establecer cinco niveles de virulencia (muy alta, alta, media, baja y muy baja. La virulencia de los aislamientos no se relacionó con su origen geográfico ni con el genotipo del cual se obtuvieron; encontrándose en una misma zona y en un mismo genotipo, aislamientos de diferente virulencia. Los genotipos de plátano y banano mostraron un comportamiento diferencial frente a cinco aislamientos de diferente virulencia y origen, resultados que permitieron establecer tres niveles de reacción de los genotipos frente a los aislamientos (resistente, intermedio y susceptible, destacándose los genotipos Topocho, Maqueño, FHIA 20, FHIA 21 de plátano y los genotipos Sedita y FHIA 23 de banano por presentar un mayor nivel de resistencia, expresada como un progreso lento y menos severo de la enfermedad.A study was conducted to evaluate plantain and banana genotypes with Mycosphaerella fijiensis Morelet isolates of different virulence and geographic origin. The pathogenicity test and morphological characterization of the M. fijiensis populations were performed with a group of fifty monosporic isolates representative of the geographic growing areas in Colombia. For the pathogenicity and resistance assays an aqueous spore suspension of 5.000 conidias mL-1 was used to inoculate seedlings of plantain and banana genotypes, disease response of genotypes was rated by measuring the variables incubation period (IP, time of evolution of symptoms (TES, area under disease progress curve (AUDPC and rate of disease development (r.The inoculation of fifty isolates on Dominico Harton cultivar allowed to establish five levels of virulence (very high, high, medium, low and very low, which were not related to their geographic origin nor to genotype of the isolates. Isolates with different virulence level were present in the same zone and in the same genotype. The resistance assay showed that plantain and banana genotypes can present a differential behavior to the M. fijiensis isolates. The disease severity measured in the genotypes allowed to classify the in three disease reactions levels, resistance, intermediate and susceptible genotypes The plantain genotypes Topocho, Maqueno, FHIA 20 and FHIA 21, and the banana genotype Sedita and FHIA 23 were characterized for having a higher level of resistance, that was expressed as a lower disease severity and slower disease progress as compared with the other genotypes.

  14. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  15. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  17. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  18. Manejo de Sigatoka negra (Mycosphaerella Fijiensis var. Difformis Morelet en plátano cv. “Curraré” en San Carlos, Zona Norte

    Directory of Open Access Journals (Sweden)

    Carlos Muñoz Ruiz

    2006-05-01

    Full Text Available Se evaluaron los diferentes productos químicos, utilizados en el control de Sigatoka negra en banano, en el cultivo de plátano, en la zona de Santa Clara de San Carlos. Uno de los principales objetivos fue generar un programa de manejo químico de la enfermedad para la zona de San Carlos, posible de ser transferido a otras zonas plataneras del país; el otro objetivo fue establecer las bases para automatizar las actividades culturales de manejo de plantaciones de musáceas, mediante la creación de un Software para computadora y asequible por internet.

  19. Efecto biofungicida del gel de Aloe vera sobre Mycosphaerella fijiensis, agente causal de la Sigatoka negra en Musa (AAA

    Directory of Open Access Journals (Sweden)

    Edwin Jaramillo Aguilar

    2017-01-01

    Full Text Available El objetivo de este trabajo fue evaluar a nivel in vitro la actividad antifúngica del gel de Aloe vera sobre el crecimiento micelial de Mycosphaerella fijiensis. Se utilizó la técnica de envenenamiento en el medio de cultivo PDA para determinar la actividad antifúngica del gel. El diseño utilizado fue completamente al azar, con siete tratamientos y tres repeticiones. En los tratamientos se utilizó un fungicida químico comercial (propiconazol, a 250 ppm y 500 ppm; un biofungicida comercial (Trichoderma sp. a 500 ppm y 1000 ppm; ambos productos se usaron como testigo químico y biológico, respectivamente; el gel de Aloe vera a 500 ppm y 1000 ppm; y un testigo absoluto. Se determinó diferencias significativas entre los tratamientos (ANOVA, El test de Tukey demostró que todos los tratamientos registraron diferencia significativa (p ≤ 0,05 con respecto al testigo absoluto. El propiconazol presentó el mayor porcentaje de inhibición del micelio (73,10%; el test de Tukey y el porcentaje de inhibición del micelio presentaron valores similares en el control del crecimiento del hongo a los 30 días de inoculación, en los tratamientos gel de Aloe vera y el T6 de Trichoderma sp. Los resultados sugieren que el Aloe vera podría ser un adecuado biofungicida para el control de Mycosphaerella fijiensis, agente causal de la Sigatoka negra.

  20. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  1. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  2. Fighting Through a Logistics Cyber Attack

    Science.gov (United States)

    2015-06-19

    cumulative cost of cyber-attacks was more than the combined global black market cost of cocaine, heroin and marijuana. These alarming figures raised...the country to its knees. The Luftwaffe was uncontested in the Battle of Britain until radar’s ability to detect inbound aircraft provided the...manifest information in IGC and provides inbound passenger manifest data to the aerial port of debarkation (APOD) and other receiving activities for

  3. Black to Black

    DEFF Research Database (Denmark)

    Langkjær, Michael Alexander

    2012-01-01

    Pop musicians performing in black stage costume take advantage of cultural traditions relating to matters black. Stylistically, black is a paradoxical color: although a symbol of melancholy, pessimism, and renunciation, black also expresses minimalist modernity and signifies exclusivity (as is hi...

  4. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  7. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  8. Susceptibility of ponderosa pine, Pinus ponderosa (Dougl. Ex Laws.), to mountain pine beetle, Dendroctonus ponderosae Hopkins, attack in uneven-aged stands in the Black Hills of South Dakota and Wyoming USA

    Science.gov (United States)

    Jose F. Negron; Kurt Allen; Blaine Cook; John R. Withrow

    2008-01-01

    Mountain pine beetle, Dendroctonus ponderosae Hopkins can cause extensive tree mortality in ponderosa pine, Pinus ponderosa Dougl. ex Laws., forests in the Black Hills of South Dakota and Wyoming. Most studies that have examined stand susceptibility to mountain pine beetle have been conducted in even-aged stands. Land managers...

  9. Acibenzolar-S-Metil e silício como indutores de resistência à Sigatoka-negra em bananeira cultivar Grand Naine (AAA

    Directory of Open Access Journals (Sweden)

    Cleilson do Nascimento Uchôa

    2014-03-01

    Full Text Available Uma alternativa ao uso de defensivos agrícolas no controle da Sigatoka-negra, causada pelo agente etiológico Mycosphaerella fijiensis, é a utilização da indução de resistência, que ativa os mecanismos latentes de resistência da planta com o uso de agentes bióticos ou abióticos, como por exemplo, o Acibenzolar-S-Metil (ASM e produtos a base de silício. Objetivou-se com este trabalho estudar a indução de resistência à Sigatoka-negra por ASM e Silicato de potássio. Folhas da bananeira Grand Naine (AAA foram pulverizadas com os tratamentos: T1 - Silicato de potássio a 0,5 %; T2 - 0,2 g.L-1 de ASM + Silicato de potássio a 0,5 %; T3 - 0,5 g.L-1 de ASM + Silicato de potássio a 0,5 %; T4 - 0,2 g.L-1 de ASM; T5 - 0,5 g.L-1 de ASM; T6 - 1g.L-1 de ASM; T7 - 1g.L-1 de ASM + Silicato de potássio a 0,5 %; T8 - Testemunha com inoculação e T9 - Testemunha sem inoculação com aplicação de água destilada esterilizada. Após sete dias as plantas foram inoculadas e mantidas em câmara de crescimento. Os tratamentos T1, T5, T6 e T7 não diferiram significativamente da testemunha inoculada. Os tratamentos T2, T3 e T4 reduziram a severidade da Sigatoka-negra, apresentando os respectivos valores 7,75, 8,75 e 12,75 para área abaixo da curva do progresso da doença e foram capazes de induzir a síntese conjunta de lignina e de fenóis.

  10. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  11. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  12. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  13. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  14. Efecto del uso predominante de fungicidas sistémicos para el control de Sigatoka negra (Mycosphaerella Fijiensis Morelet en el área foliar del banano

    Directory of Open Access Journals (Sweden)

    MSc. José Quevedo Guerrero

    2018-04-01

    Full Text Available Sigatoka negra (Mycosphaerellafijiensis Morelet,enfermedad que afecta la capacidad fotosintética de la planta de banano en zonas donde la humedad relativa es alta, y favorece sudesarrollo, hacendel sur del Guayas y del norte de la provincia de El Oro, sus hábitats favoritos, han llevado a los productores al uso indiscriminado de los fungicidas existentes en el mercado. Actualmente existen estrategias de control con el uso de fungicidas protectantes y sistémicos que contribuyen a disminuir los daños ocasionados por este hongo. Este trabajo plantea analizar la eficiencia de los fungicidas más usados comúnmente por los productores en cuatro fincas bananeras para estimar su eficiencia mediante el preaviso biológico en plantas prontas a la floración, utilizando un diseño experimental de bloques al azar con pruebas de Tukey al 0.05 de confiabilidad. Los resultados indicaron que las fincas San Andrés 1-2 y San Andrés 3 ubicadas en la zona Balao, y que usaron en sus programas de control de Sigatoka negra fungicidas protectantes y sistémicos en rotación y mezcla, además de aplicaciones de abonos foliares, presentaron valores estadísticamente diferentes a las otras fincas que aplicaron una mayor cantidad de ciclos con fungicidas sistémicos. Las fincas Elizabeth 2 y La Italia presentaron estados evolutivos más altos en las hojas más jóvenes y una emisión foliar más lenta. Se puede concluir que las fincas San Andrés 1-2 y San Andrés 3 mostraron diferencias significativas en el número de hojas sanas a la cosecha, estados evolutivos y emisión foliar, con un mejor estado fitosanitario.

  15. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  16. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  17. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  18. Suscetibilidade de oito cultivares de bananeira à sigatoka-amarela na região de Marília (SP Susceptibility to sigatoka of eight banana cultivars in the region of Marília, State of São Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Luiz Antonio Junqueira Teixeira

    1996-01-01

    Full Text Available A suscetibilidade de oito cultivares de bananeira à sigatoka-amarela (Mycosphaerella musicola foi avaliada em um experimento de campo, na região de Marília (SP. Três cultivares pertenciam ao Grupo AAA ('Nanicão', 'Nanicão Jangada' e 'Grande Naine' e cinco, ao AAB ('Prata', 'Enxerto', 'Maçã', 'Mysore' e 'Prata Zulu'. O experimento foi implantado em fevereiro de 1992 e, durante os três primeiros anos, não foi feito controle de sigatoka. A suscetibilidade dos materiais foi estimada mediante avaliações em três épocas: março de 93, abril e julho de 94. Na primeira avaliação, foi contado o número de manchas na segunda folha e, nas outras, foram atribuídas notas de acordo com a intensidade dos sintomas. Os cultivares foram agrupados em três classes: altamente suscetível (AS, suscetível (S ou parcialmente resistente (PR. Nenhum dos cultivares pôde ser considerado imune, pois todos apresentaram lesões foliares. Os cultivares mais suscetíveis foram os do Grupo AAA, Subgrupo Cavendish ('Nanicão', 'Grande Naine' e 'Nanicão Jangada' e 'Enxerto' (AAB. 'Mysore' (AAB e 'Prata Zulu' (AAB foram classificados como parcialmente resistentes. 'Prata' (AAB e 'Maçã' (AAB mostraram-se medianamente suscetíveis.Susceptibility of eight banana cultivars to sigatoka caused by Mycosphaerella musicola was assessed in a field experiment in the region of Marília, State of São Paulo. Three cultivars were members of AAA Group ('Nanicão', 'Nanicão Jangada' and 'Grande Naine' and five belonged to AAB Group ('Prata', 'Enxerto', 'Maçã', 'Mysore' and 'Prata Zulu'. The experiment was established in February, 1992, and during the first three years, sigatoka disease was not controlled. Susceptibility was assessed in three occasions: March, 1993, April and July, 1994. In the first, it was counted the number of spots on the second leaf, and in the others, the plants were graded according to the amount of leaf scorch due to sigatoka. The cultivars were

  19. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  20. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  1. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  2. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  3. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  4. Black America: Looking Inward or Outward?

    Science.gov (United States)

    Jordan, Vernon E.

    1996-01-01

    Presents some observations on what the recent attacks on affirmative action, the O. J. Simpson trial, and the Million Man March say about racism in America. In particular, the author assesses the Million Man March in terms of black leadership and its influence in helping black men to become more involved in constructive community service. (GR)

  5. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  6. Impact of Poultry Manure on Growth Behaviour, Black Sigatoka Disease Response and Yield Attributes of Two Plantain (Musa spp. AAB Genotypes

    Directory of Open Access Journals (Sweden)

    Aba, SC.

    2011-01-01

    Full Text Available La baisse de rendement en culture de plantain est un phénomène fréquent après quelques cycles de production; elle est due à de faibles niveaux de matière organique du sol et à une sensibilité accrue à des stress biotiques. L'utilisation de variétés améliorées est une option bon marché et respectueuse de l'environnement pour lutter contre les maladies des plantes, mais le maintien du rendement d'un nouveau cultivar en bananeraie nécessite une bonne gestion de la fertilité des sols qui pourrait être obtenue par une utilisation judicieuse de fumier de volaille. Les effets des trois doses [(0, 10 et 20 t.ha-1] de fumier de volaille décomposé sur la croissance, la réponse à la cercosporiose noire et le rendement de PITA 24' (un hybride de plantain et de son grand-parent maternel 'Mbi-Egome' (une banane plantain locale ont été évalués à Onne (Nigeria dans une station à fortes précipitations de l'IITA. L'expérience a été menée selon un dispositif split plot en blocs aléatoires complets. Les résultats ont montré que les deux clones étudiés avaient des variables de croissance similaires, sauf pour la surface foliaire et la teneur en chlorophylle. Malgré la sensibilité du génotype hybride à la cercosporiose foliaire d'origine atmosphérique, les données sur les composantes du rendement ont montré que 'PITA 24' produisait significativement plus de mains et de doigts par régime, un meilleur rendement du régime et un meilleur rendement végétatif global, toutefois, les deux génotypes ont présenté un schéma similaire pour la répartition de la biomasse. Les plants fumés ont eu un rendement significativement amélioré par rapport aux plants témoins, mais il y a eu un rendement moindre pour la dose de 20 t.ha-1. L'augmentation des doses d'engrais a réduit de plus de 30 jours le temps de récolte; de même, la taille des plants, le drageonnage, la teneur en chlorophylle des feuilles, l'indice des feuilles non contaminées, le cycle de production et la biomasse totale ont augmenté avec la dose de fumier appliquée. Notre étude a montré que l'application de 10 t.ha-1 de fumier de volaille par hectare et par an permettait d'obtenir les meilleures caractéristiques de rendement.

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  8. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  9. Black rings

    International Nuclear Information System (INIS)

    Emparan, Roberto; Reall, Harvey S

    2006-01-01

    A black ring is a five-dimensional black hole with an event horizon of topology S 1 x S 2 . We provide an introduction to the description of black rings in general relativity and string theory. Novel aspects of the presentation include a new approach to constructing black ring coordinates and a critical review of black ring microscopics. (topical review)

  10. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  11. Mitigating Drive-By Download Attacks: Challenges and Open Problems

    Science.gov (United States)

    Egele, Manuel; Kirda, Engin; Kruegel, Christopher

    Malicious web sites perform drive-by download attacks to infect their visitors with malware. Current protection approaches rely on black- or white-listing techniques that are difficult to keep up-to-date. As todays drive-by attacks already employ encryption to evade network level detection we propose a series of techniques that can be implemented in web browsers to protect the user from such threats. In addition, we discuss challenges and open problems that these mechanisms face in order to be effective and efficient.

  12. Black holes

    International Nuclear Information System (INIS)

    Feast, M.W.

    1981-01-01

    This article deals with two questions, namely whether it is possible for black holes to exist, and if the answer is yes, whether we have found any yet. In deciding whether black holes can exist or not the central role in the shaping of our universe played by the forse of gravity is discussed, and in deciding whether we are likely to find black holes in the universe the author looks at the way stars evolve, as well as white dwarfs and neutron stars. He also discusses the problem how to detect a black hole, possible black holes, a southern black hole, massive black holes, as well as why black holes are studied

  13. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  14. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  15. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  16. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  17. Black Alcoholism.

    Science.gov (United States)

    Watts, Thomas D.; Wright, Roosevelt

    1988-01-01

    Examines some aspects of the problem of alcoholism among Blacks, asserting that Black alcoholism can best be considered in an ecological, environmental, sociocultural, and public health context. Notes need for further research on alcoholism among Blacks and for action to reduce the problem of Black alcoholism. (NB)

  18. Black holes

    OpenAIRE

    Brügmann, B.; Ghez, A. M.; Greiner, J.

    2001-01-01

    Recent progress in black hole research is illustrated by three examples. We discuss the observational challenges that were met to show that a supermassive black hole exists at the center of our galaxy. Stellar-size black holes have been studied in x-ray binaries and microquasars. Finally, numerical simulations have become possible for the merger of black hole binaries.

  19. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  20. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  1. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  2. Manejo de Sigatoka negra (Mycosphaerella Fijiensis var. Difformis Morelet en plátano cv. “Curraré” en San Carlos, Zona Norte

    Directory of Open Access Journals (Sweden)

    Carlos Muñoz Ruiz

    2005-05-01

    Full Text Available Se evaluaron los diferentes productos químicos, utilizados en el control de Sigatoka negra en banano, en el cultivo de plátano, en la zona de Santa Clara de San Carlos. Uno de los principales objetivos fue generar un programa de manejo químico de la enfermedad para la zona de San Carlos, posible de ser transferido a otras zonas plataneras del país; el otro objetivo fue establecer las bases para automatizar las actividades culturales de manejo de plantaciones de musáceas, mediante la creación de un Software para computadora y asequible por internet. Para el primer objetivo, se logró establecer que genéticamente el plátano es más resistente a la enfermedad y, por ser un cultivo donde hasta el momento, no se ha sobrepasado el uso de funguicidas como sucede en el banano, se pueden utilizar sin problema los productos protectantes mas comunes, como el Vondozeb y el Ridodur, tanto en aceite como en agua, así como el aceite puro a 7 litros/ha, presentando un efecto aceptable en el control de la infección de Mycospharella. Los productos sistémicos utilizados mostraron su eficiencia aunque, por su costo, no se sugiere su uso en plátano, solo para casos de emergencia. La mezcla de protectantes con sistémicos y aceite (cocteles, se consideran muy efectivos pero innecesarios para ser utilizados en plátano en forma comercial. Para esta evaluación se hicieron 35 aplicaciones o semanas de evaluación, en dos periodos climatológicos (verano e invierno de enero a septiembre del 2001, combinadas con las prácticas culturales tradicionales de deshoja, deshija, fertilización, y el monitoreo, utilizando la escala de signos visuales de 6 puntos de Stover y el método francés. Se evaluaron las variables: Hojas por planta (H/P, Hoja mas joven enferma (HMJE y Porcentaje ponderado de infecci��n (PPI, para cada tipo de grupo químico evaluado. La variable H/P, en la mayoría de los grupos se inició con un mínimo de 3 hojas hasta un máximo de 14

  3. Black leaf streak disease affects starch metabolism in banana fruit.

    Science.gov (United States)

    Saraiva, Lorenzo de Amorim; Castelan, Florence Polegato; Shitakubo, Renata; Hassimotto, Neuza Mariko Aymoto; Purgatto, Eduardo; Chillet, Marc; Cordenunsi, Beatriz Rosana

    2013-06-12

    Black leaf streak disease (BLSD), also known as black sigatoka, represents the main foliar disease in Brazilian banana plantations. In addition to photosynthetic leaf area losses and yield losses, this disease causes an alteration in the pre- and postharvest behavior of the fruit. The aim of this work was to investigate the starch metabolism of fruits during fruit ripening from plants infected with BLSD by evaluating carbohydrate content (i.e., starch, soluble sugars, oligosaccharides, amylose), phenolic compound content, phytohormones, enzymatic activities (i.e., starch phosphorylases, α- and β-amylase), and starch granules. The results indicated that the starch metabolism in banana fruit ripening is affected by BLSD infection. Fruit from infested plots contained unusual amounts of soluble sugars in the green stage and smaller starch granules and showed a different pattern of superficial degradation. Enzymatic activities linked to starch degradation were also altered by the disease. Moreover, the levels of indole-acetic acid and phenolic compounds indicated an advanced fruit physiological age for fruits from infested plots.

  4. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  5. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  6. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  7. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  8. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  9. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  10. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  11. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  12. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  13. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  14. Black Tea

    Science.gov (United States)

    ... mental alertness as well as learning, memory, and information processing skills. It is also used for treating headache; ... of carbamazepine. Since black tea contains caffeine, in theory taking black tea with carbamazepine might decrease the ...

  15. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  16. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  17. Black Holes

    OpenAIRE

    Townsend, P. K.

    1997-01-01

    This paper is concerned with several not-quantum aspects of black holes, with emphasis on theoretical and mathematical issues related to numerical modeling of black hole space-times. Part of the material has a review character, but some new results or proposals are also presented. We review the experimental evidence for existence of black holes. We propose a definition of black hole region for any theory governed by a symmetric hyperbolic system of equations. Our definition reproduces the usu...

  18. Black Holes

    OpenAIRE

    Horowitz, Gary T.; Teukolsky, Saul A.

    1998-01-01

    Black holes are among the most intriguing objects in modern physics. Their influence ranges from powering quasars and other active galactic nuclei, to providing key insights into quantum gravity. We review the observational evidence for black holes, and briefly discuss some of their properties. We also describe some recent developments involving cosmic censorship and the statistical origin of black hole entropy.

  19. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  20. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  1. Efecto de la sigatoka negra (Mycosphaerella fijiensis sobre la fotosíntesis y transpiración foliar del banano (Musa sp. AAA, cv. Valery

    Directory of Open Access Journals (Sweden)

    Martín Hidalgo

    2006-01-01

    Full Text Available Con el propósito de relacionar el ataque de la Sigatoka negra (Mycosphaerella fijiensis con las tasas fotosintética y de transpiración foliares, se sembraron rebrotes del tercer ciclo de producción de una plantación del cv. Valery en potes plásticos de 4 litros. Las plantas se mantuvieron dentro de un invernadero a humedad relativa y temperatura del 90% y 27°C, respectivamente. Al emitir 6 hojas, las 4 más jóvenes fueron inoculadas con conidios de M. fijiensis a partir de cultivos monospóricos de aislamientos silvestres. Dos riegos diarios por aspersión mantuvieron una película de agua sobre las hojas. Se aplicó una suspensión de 150000 conidios ml-1 sobre el envés de las hojas utilizando un aerógrafo, en 2 fechas con un intervalo de 30 días entre ellas, para obtener diferentes grados de severidad y estadios de la enfermedad en hojas de diferentes edades. Tanto la determinación visual del porcentaje de severidad como la del estadio de desarrollo de la enfermedad, fueron llevadas a cabo en los 6,25 cm2 del área foliar cubierta por la cubeta del medidor infrarrojo de gases, utilizado para determinar las tasas fotosintéticas y transpiratorias foliares. La tasa fotosintética neta foliar (Fn; μmoles de CO2 reducidos por m2 s-1 decayó con el incremento del porcentaje de severidad (Fn=-0,1517 x+6,845; R2=0,72 y el estadio de la enfermedad (Fn=-1,62 x+8,36; R2=0,60. El impacto del patógeno sobre la tasa transpiratoria foliar (E; mmoles de agua m-2 s-1 fue relativamente menor, como lo mostró la regresión de E contra el porcentaje de severidad (E=-0,0122 x+2,429; R2=0,11

  2. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  3. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  4. Black Holes and the Large Hadron Collider

    Science.gov (United States)

    Roy, Arunava

    2011-01-01

    The European Center for Nuclear Research or CERN's Large Hadron Collider (LHC) has caught our attention partly due to the film "Angels and Demons." In the movie, an antimatter bomb attack on the Vatican is foiled by the protagonist. Perhaps just as controversial is the formation of mini black holes (BHs). Recently, the American Physical Society…

  5. From the Back of the Foxhole: Black Correspondents in World War II. Journalism Monographs, No. 27.

    Science.gov (United States)

    Stevens, John D.

    Black newspapers, like the "Chicago Defender,""The Pittsburgh Courier," and the "Baltimore Afro-American," opened the eyes of Americans to the injustices suffered at home as well as in the armed services. The black press attacked the Navy for its Jim Crowism because when World War II began, the only black sailors were…

  6. Black Culture

    Directory of Open Access Journals (Sweden)

    Angela Khristin Brown

    2013-07-01

    Full Text Available The migration of blacks in North America through slavery became united.  The population of blacks past downs a tradition of artist through art to native born citizens. The art tradition involved telling stories to each generation in black families. The black culture elevated by tradition created hope to determine their personal freedom to escape from poverty of enslavement and to establish a way of life through tradition. A way of personal freedoms was through getting a good education that lead to a better foundation and a better way of life.

  7. Desenvolvimento e produção da bananeira 'grande naine' sob diferentes densidades de plantio em região com ocorrência natural de sigatoka-negra

    Directory of Open Access Journals (Sweden)

    Edson Shigueaki Nomura

    2013-06-01

    Full Text Available A alta densidade de plantio de algumas cultivares de bananeira é uma prática utilizável para aumentar a produtividade, sobretudo em regiões afetadas pela Sigatoka. Este trabalho objetivou avaliar o desenvolvimento e a produção de bananeiras 'Grande Naine' cultivadas em diferentes densidades de plantio para a convivência com a Sigatoka-Negra no Vale do Ribeira-SP. Para isso, foi instalado pomar de bananeiras produzidas in vitro da 'Grande Naine', em delineamento inteiramente ao acaso, em esquema fatorial 5 x 2, sendo cinco densidades (2.500; 2.222; 2.000; 1.667 e 1.111 plantas.ha-1 e dois ciclos de produção. A severidade da Sigatoka-Negra foi monitorada semanalmente, utilizando o método de Estado da Evolução (EE e para o seu controle foram definidas pela segunda progressão consecutiva da severidade e/ou aumento superior a 200 pontos de uma semana para a outra. De cada parcela, oito plantas foram avaliadas quanto à altura, diâmetro do pseudocaule, número de folhas ativas no florescimento e na colheita, massa fresca dos frutos comercializáveis, produtividade, número de pencas e frutos no cacho, massa fresca total e por frutos da 2ª penca, comprimento e diâmetro de frutos da 2ª penca. Os dados foram submetidos à análise de variância pelo teste F, e as médias, quando significativas, foram comparadas pelo teste de Tukey (5% de probabilidade. Diante das condições experimentais, conclui-se que o adensamento não influenciou no desenvolvimento em altura da planta e no diâmetro do pseudocaule de bananeira 'Grande Naine'. O adensamento de plantas proporcionou maiores produtividades de bananeira 'Grande Naine' nas condições do Vale do Ribera-SP.

  8. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  9. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  11. DESENVOLVIMENTO E PRODUÇÃO DE BANANEIRA ‘GRANDE NAINE’ EM DIFERENTES SISTEMAS DE MANEJO PARA A CONVIVÊNCIA COM A SIGATOKA-NEGRA NO VALE DO RIBEIRA-SP

    Directory of Open Access Journals (Sweden)

    EDSON SHIGUEAKI NOMURA

    2015-09-01

    Full Text Available RESUMO Objetivou-se avaliar o desenvolvimento e a produção de bananeira da cultivar Grande Naine submetidos a diferentes sistemas de manejo para a convivência com a Sigatoka-negra no Vale do Ribeira-SP (Brasil. Utilizou-se de mudas de ‘Grande Naine’ micropropagadas e conduzidas em delineamento inteiramente casualizado, com cinco tratamentos (sistemas de manejo: plantio intercalado; fungicida; desfolha+plantio intercalado; desfolha+fungicida; testemunha e subdividida no tempo (dois ciclos de produção, com oito repetições, considerando uma planta por repetição. Foram avaliados os seguintes parâmetros: altura da planta, diâmetro do pseudocaule, número de folhas ativas no florescimento e na colheita, massa fresca dos frutos comercializáveis, produtividade, número de pencas, número total de frutos, massa fresca total e por frutos da 2ª penca, comprimento e diâmetro de frutos da 2ª penca. Os dados foram submetidos a análises de variâncias, pelo teste F; e as médias, quando significativas, foram submetidas ao teste de Tukey (5 % de probabilidade. Conclui-se que as aplicações de fungicidas foram eficientes para o controle da Sigatoka-negra, com melhores resultados no desenvolvimento, na produção e na qualidade dos frutos da cultivar Grande Naine, porém sem apresentar diferenças quando associados com a desfolha. O plantio intercalado afetou negativamente em todos os parâmetro de desenvolvimento e produção da cultivar Grande Naine.

  12. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  13. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  14. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  15. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  16. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  17. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  18. Vulnerability Assessment of IPv6 Websites to SQL Injection and Other Application Level Attacks

    Directory of Open Access Journals (Sweden)

    Ying-Chiang Cho

    2013-01-01

    Full Text Available Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  19. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  20. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  1. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  2. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  3. Polar bear attacks on humans: Implications of a changing climate

    Science.gov (United States)

    Wilder, James; Vongraven, Dag; Atwood, Todd C.; Hansen, Bob; Jessen, Amalie; Kochnev, Anatoly A.; York, Geoff; Vallender, Rachel; Hedman, Daryll; Gibbons, Melissa

    2017-01-01

    Understanding causes of polar bear (Ursus maritimus) attacks on humans is critical to ensuring both human safety and polar bear conservation. Although considerable attention has been focused on understanding black (U. americanus) and grizzly (U. arctos) bear conflicts with humans, there have been few attempts to systematically collect, analyze, and interpret available information on human-polar bear conflicts across their range. To help fill this knowledge gap, a database was developed (Polar Bear-Human Information Management System [PBHIMS]) to facilitate the range-wide collection and analysis of human-polar bear conflict data. We populated the PBHIMS with data collected throughout the polar bear range, analyzed polar bear attacks on people, and found that reported attacks have been extremely rare. From 1870–2014, we documented 73 attacks by wild polar bears, distributed among the 5 polar bear Range States (Canada, Greenland, Norway, Russia, and United States), which resulted in 20 human fatalities and 63 human injuries. We found that nutritionally stressed adult male polar bears were the most likely to pose threats to human safety. Attacks by adult females were rare, and most were attributed to defense of cubs. We judged that bears acted as a predator in most attacks, and that nearly all attacks involved ≤2 people. Increased concern for both human and bear safety is warranted in light of predictions of increased numbers of nutritionally stressed bears spending longer amounts of time on land near people because of the loss of their sea ice habitat. Improved conflict investigation is needed to collect accurate and relevant data and communicate accurate bear safety messages and mitigation strategies to the public. With better information, people can take proactive measures in polar bear habitat to ensure their safety and prevent conflicts with polar bears. This work represents an important first step towards improving our understanding of factors influencing

  4. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  5. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  6. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  7. Incidencia y severidad de las sigatokas negra (Mycosphaerella fijiensis Morelet y amarilla (Mycosphaerella musicola Leach et Mulder del plátano según los estados fenológicos

    Directory of Open Access Journals (Sweden)

    Torrado-Jaime Mayary

    2008-12-01

    Full Text Available

    En Colombia las sigatokas negra y amarilla, causadas por Mycosphaerella fijiensisy M. musicola, respectivamente, están entre las principales enfermedades que atacan al plátano. Aunque hay registros de su presencia, se desconoce la época en que aparecen de acuerdo con los estados fenológicos y condiciones ambientales. Esta investigación se realizó en la granja Montelindo (Universidad de Caldas, a 1.050 msnm, temperatura media anual 22,8 °C, precipitación anual 2.200 mm y humedad relativa 76%. Se sembraron cormos de Dominico Hartón, África, FHIA-20 y FHIA-21, en diseño de bloques al azar con cuatro repeticiones y 10 plantas por repetición. Desde siembra hasta cosecha se registraron incidencia, severidad, número de esporas y elementos climáticos. Se definieron cinco estados fenológicos: brotación y emergencia, plántula, prefloración, floración, y llenado del racimo y madurez fisiológica. Las sigatokas se presentaron desde la etapa de plántula hasta madurez fisiológica; fue más agresiva la sigatoka negra en el área de estudio. La mayor población de conidias en D. Hartón y África se presentó en etapas de prefloración y llenado del racimo; en los híbridos FHIA-20 y FHIA-21 coincidió con la etapa de floración. Incrementos graduales de temperatura, precipitación intensa intercalada con periodos secos y aumento en la humedad foliar favorecieron la incidencia y severidad de las sigatokas.

  8. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  9. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  10. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  11. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  12. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  13. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  14. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  15. Black layers on historical architecture.

    Science.gov (United States)

    Toniolo, Lucia; Zerbi, Carlotta M; Bugini, Roberto

    2009-03-01

    separation is particularly evident in 'recent' crust, where the sulphation process is more active. Black compact deposits show a higher porosity than black crusts because gypsum is not coming from the chemical corrosion of the substrate but from outside; actually, in the former case, the substrate is sound. Encrustations show a highly regular crystal organisation of gypsum (close packed tabular crystals) that cannot be traced back to casual atmospheric deposit or to corrosion of the substrate but rather to the crystallisation of a solution coming from an external source. Also in this case, the marble is sound; evidence of the effect of some protection treatment is pointed out. In spite of the apparent similarity of the examined samples, analytical results have evidenced three main types of black crusts: black crust with decayed substrate, compact deposit and black encrustation showing a sound substrate underneath. Experimental evidence of calcite grains sulphation in progress, taking place according to a model recently proposed, has been observed. Sulphation process is prevented where particular conservation treatments had been applied in the past. New experimental studies can be focussed to understand the specific conditions (measurements of micro-climatic and thermodynamic parameters) and mechanisms for black crusts formation in situ. The problem of the kinetic of the sulphation process of marble, the assessment of black layers formation in the case of different carbonate stone materials and the study of acid attack in presence of surface protecting layers deserve further investigation.

  16. The Crisis in Black and Black.

    Science.gov (United States)

    Hutchinson, Earl Ofari

    These essays explore why the historic conflict between blacks and whites in the United States has become a crisis that divides many African Americans. The changing racial dynamic is not marked by conflicts. between the black middle class and the poor, black men and women, the black intellectual elite and rappers, black politicians and the urban…

  17. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  18. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  19. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  20. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  1. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  2. Counseling Blacks

    Science.gov (United States)

    Vontress, Clemmont E.

    1970-01-01

    Blacks have developed unique environmental perceptions, values, and attitudes, making it difficult for counselors to establish and maintain positive rapport. This article examines attitudinal ingredients posited by Carl Rogers for relevance to this problem, and suggests in-service training to help counselors and other professionals relate…

  3. Black Willow

    Science.gov (United States)

    R. M. Krinard

    1980-01-01

    Black willow and other species of Salix together comprise a majority of the stocking. Cottonwood is the chief associate, particularly in the early stages, but green ash, sycamore, pecan, persimmon, waterlocust, American elm, baldcypress, red maple, sugarberry, box-elder, and in some areas, silver maple are invaders preceding the next successional stage.

  4. Black Psyllium

    Science.gov (United States)

    ... by mouth for up to 6 weeks reduces blood sugar in people with type 2 diabetes. Cancer. Diarrhea. Irritable bowel syndrome (IBS). Other conditions. ... with the dose. Diabetes: Black psyllium can lower blood sugar levels ... with type 2 diabetes by slowing down absorption of carbohydrates. Monitor blood ...

  5. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  6. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  7. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  8. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  9. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  10. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. Black hole astrophysics

    International Nuclear Information System (INIS)

    Blandford, R.D.; Thorne, K.S.

    1979-01-01

    Following an introductory section, the subject is discussed under the headings: on the character of research in black hole astrophysics; isolated holes produced by collapse of normal stars; black holes in binary systems; black holes in globular clusters; black holes in quasars and active galactic nuclei; primordial black holes; concluding remarks on the present state of research in black hole astrophysics. (U.K.)

  13. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  14. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  15. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  16. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  17. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  18. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  19. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  20. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  1. Performance analysis and implementation of proposed mechanism for detection and prevention of security attacks in routing protocols of vehicular ad-hoc network (VANET

    Directory of Open Access Journals (Sweden)

    Parul Tyagi

    2017-07-01

    Full Text Available Next-generation communication networks have become widely popular as ad-hoc networks, broadly categorized as the mobile nodes based on mobile ad-hoc networks (MANET and the vehicular nodes based vehicular ad-hoc networks (VANET. VANET is aimed at maintaining safety to vehicle drivers by begin autonomous communication with the nearby vehicles. Each vehicle in the ad-hoc network performs as an intelligent mobile node characterized by high mobility and formation of dynamic networks. The ad-hoc networks are decentralized dynamic networks that need efficient and secure communication requirements due to the vehicles being persistently in motion. These networks are more susceptible to various attacks like Warm Hole attacks, denial of service attacks and Black Hole Attacks. The paper is a novel attempt to examine and investigate the security features of the routing protocols in VANET, applicability of AODV (Ad hoc On Demand protocol to detect and tackle a particular category of network attacks, known as the Black Hole Attacks. A new algorithm is proposed to enhance the security mechanism of AODV protocol and to introduce a mechanism to detect Black Hole Attacks and to prevent the network from such attacks in which source node stores all route replies in a look up table. This table stores the sequences of all route reply, arranged in ascending order using PUSH and POP operations. The priority is calculated based on sequence number and discard the RREP having presumably very high destination sequence number. The result show that proposed algorithm for detection and prevention of Black Hole Attack increases security in Intelligent Transportation System (ITS and reduces the effect of malicious node in the VANET. NCTUNs simulator is used in this research work.

  2. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  3. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  4. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  5. VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity

    Directory of Open Access Journals (Sweden)

    Won Min Kang

    2014-10-01

    Full Text Available Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident prevention and preservation of evidence. Vehicle black boxes have become mandatory because black box images and voice data have served as forensic evidence in courts. However, the data from black boxes can be forged or modified by man-in-the-middle (MITM attacks and message hijacking. In this paper, we propose a vehicle cloud computing-based black box service model that can provide integrity for black box data through digital signatures in vehicle cloud computing (VCC environments. Our proposed model protects against MITM attacks and message hijacking using only a hash value and digital signature. Moreover, a mirroring technique (RAID 1 provides backup and recovery to protect the data from a traffic accident.

  6. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    Science.gov (United States)

    Torralvo, Kelly; Botero-Arias, Robinson; Magnusson, William E

    2017-01-01

    On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger) eggs are jaguars (Panthera onca), tegu lizards (Tupinambis teguixim), capuchin monkeys (Sapajus macrocephalus) and humans (Homo sapiens). In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  7. Temporal variation in black-caiman-nest predation in varzea of central Brazilian amazonia.

    Directory of Open Access Journals (Sweden)

    Kelly Torralvo

    Full Text Available On the Amazon floodplain, the main predators of black caiman (Melanosuchus niger eggs are jaguars (Panthera onca, tegu lizards (Tupinambis teguixim, capuchin monkeys (Sapajus macrocephalus and humans (Homo sapiens. In this study, we investigated the relationship between predator attacks on nests and incubation period, and evaluated the influence of initial predation on subsequent predation in the Mamirauá Sustainable Development Reserve. We also evaluated the influence of presence of females near the nests and manipulation of nests on the occurrence of attacks. We compared results from data obtained with camera traps and vestiges left by predators on estimates of rates of predation by different predators. Egg predation was recorded in 32% of the 658 black caiman nests monitored during two years. Our results suggest that the probability of predation on black caiman eggs is relatively constant throughout the incubation period and that predation on eggs was lower when adults, presumably females, were present. Careful opening of nests and handling of eggs did not increase the number of attacks on black caiman nests. Nest opening by a predator appeared to increase the chances of a subsequent attack because most of the attacks on nests occurred soon after a predator first opened the nest. However, attacks by another species of predator do not appear to be necessary to initiate attacks by any other species of predator. Results based on camera traps and vestiges differed, but use of vestiges was adequate for identifying the principal predators on eggs in black caiman nests and, in many circumstances, the vestiges may be better for estimating predation by humans. In this study, opening nests and handling eggs did not increase the number of attacks on black caiman nests.

  8. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  9. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  10. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  11. Contemporary Black Theatre.

    Science.gov (United States)

    Thomas, Pearl

    The distinguishable black theatre in America, mirroring a distinguishable black experience, is an artistic product which demands audience involvement. Both the Afro-American oral tradition and the art of gesture are integral aspects of black theatre. In addition, the tragedy found black theatre is not tragedy in the classic sense, as blacks feel…

  12. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  13. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  14. Black widow spider

    Science.gov (United States)

    ... medlineplus.gov/ency/article/002858.htm Black widow spider To use the sharing features on this page, please enable JavaScript. The black widow spider (Latrodectus) has a shiny black body with a ...

  15. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  16. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  17. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  18. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  19. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  20. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  1. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  2. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  3. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  4. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  5. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  6. La medición y vigilancias de la enfermedad de la mancha foliar producida por la sigatoka negra (Mycospharella fijiensis var diformis Morelet en la producción de musáceas: un enfoque para lograr la sostenibilidad del desarrollo

    Directory of Open Access Journals (Sweden)

    Edgardo Vargas Jarquín

    2013-05-01

    Full Text Available En el presente trabajo se discute la necesidad de utilizar tecnología, como el procesamiento digital de imágenes para mejorar los procesos de medición y vigilancia de la enfermedad de la mancha de la hoja causada por SIGATOKA NEGRA (Mycospharella fijiensis var diformis Morelet, pero partiendo de un análisis epistemológico que fundamenta al desarrollo sostenible, que es el marco dentro del cual se encuentra sentido a la aplicación de esta tecnología. Así se define que es la gobernabilidad benéfica del ambiente lo que dirige la gestión de los diferentes actores y esta se da en virtud de comprender, mantener, proteger y administrar la complejidad ambiental.  Se señala como uno de los principales inconvenientes de la producción de musáceas la enfermedad de la sigatoka negra, pues produce costos de producción de aproximadamente 1.300 dólares al año costo en uso y aplicación de pesticidas.  Se discute sobre el enfoque de los trabajos de investigación para el desarrollo sostenible en el cultivo de las musáceas.  Se presentan dos experiencias para medir y vigilar la sigatoka negra. En un caso se desarrolla un sistema convencional denominado SiMu, que permite utilizar medios computacionales asistidos para, sobre todo, medir y vigilar la incidencia de la sigatoka. En el otro caso se utiliza tecnología de procesamiento digital de imágenes para realizar ese mismo trabajo pero con un mayor nivel de automatización.  Queda planteada la interrogante de si esta tecnología se puede usar para pequeños y medianos productores, tanto de banano como de plátano, puesto que en ese tipo de unidades no se podría tener una forma económicamente viable para obtener imágenes digitales aéreas.

  7. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  8. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  9. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  10. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  11. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  12. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  13. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  14. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  15. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  16. Black Urine

    Directory of Open Access Journals (Sweden)

    Rahim Vakili

    2016-06-01

    Full Text Available A 2-year-old boy was born at term of healthy, non-consanguineous Iranian parents. His mother attended in the clinic with the history of sometimes discoloration of diapers after passing urine. She noticed that first at the age of one month with intensified in recent months. His Physical examination and growth parameters were normal. His mother denied taking any medication (sorbitol, nitrofurantoin, metronidazole, methocarbamol, sena and methyldopa (5. Qualitative urine examination showed dark black discoloration. By this history, alkaptonuria was the most clinical suspicious. A 24-hour-urine sample was collected and sent for quantitative measurements. The urine sample was highly positive for homogentisic acid and negative for porphyrin metabolites.

  17. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  18. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  19. Situation de la cercosporiose noire des bananiers et plantains Musa spp. sous différents systèmes de culture à Yangambi, Haut-Zaïre

    Directory of Open Access Journals (Sweden)

    Mobambo, KN.

    1993-01-01

    Full Text Available Black sigatoka situation of bananas and plantains Musa spp. under different farming systems at Yangambi, Upper-Zaire. Black sigatoka, a leaf spot disease, caused by Mycosphaerella fijiensis Morelet seems to be one of the major constraints in the banana and plantain production in Upper-Zaire. Indeed, a survey study undertaken at Yangambi on 12 plantain and 4 banana cultivars revealed that all the observed cultivars were attacked with an exception of banana "Yangambikm 5" which was tolerant. In otherhand, significant differences were observed between bananas and plantains cultivated in fields and those planted in backyards. The regular application of organic matter in backyard farms seems to be one of the major reasons of those differences.

  20. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  1. Black Silicon Solar Cells with Black Ribbons

    DEFF Research Database (Denmark)

    Davidsen, Rasmus Schmidt; Tang, Peter Torben; Mizushima, Io

    2016-01-01

    We present the combination of mask-less reactive ion etch (RIE) texturing and blackened interconnecting ribbons as a method for obtaining all-black solar panels, while using conventional, front-contacted solar cells. Black silicon made by mask-less reactive ion etching has total, average...... in the range 15.7-16.3%. The KOH-textured reference cell had an efficiency of 17.9%. The combination of black Si and black interconnecting ribbons may result in aesthetic, all-black panels based on conventional, front-contacted silicon solar cells....... reflectance below 0.5% across a 156x156 mm2 silicon (Si) wafer. Black interconnecting ribbons were realized by oxidizing copper resulting in reflectance below 3% in the visible wavelength range. Screen-printed Si solar cells were realized on 156x156 mm2 black Si substrates with resulting efficiencies...

  2. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  3. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  4. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  5. Black holes. Chapter 6

    International Nuclear Information System (INIS)

    Penrose, R.

    1980-01-01

    Conditions for the formation of a black hole are considered, and the properties of black holes. The possibility of Cygnus X-1 as a black hole is discussed. Einstein's theory of general relativity in relation to the formation of black holes is discussed. (U.K.)

  6. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  7. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  8. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  9. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  10. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  11. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  12. Search for black holes

    International Nuclear Information System (INIS)

    Cherepashchuk, Anatolii M

    2003-01-01

    Methods and results of searching for stellar mass black holes in binary systems and for supermassive black holes in galactic nuclei of different types are described. As of now (June 2002), a total of 100 black hole candidates are known. All the necessary conditions Einstein's General Relativity imposes on the observational properties of black holes are satisfied for candidate objects available, thus further assuring the existence of black holes in the Universe. Prospects for obtaining sufficient criteria for reliably distinguishing candidate black holes from real black holes are discussed. (reviews of topical problems)

  13. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  14. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  15. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  16. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  17. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  18. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  19. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  20. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  1. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  2. Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Khattab M. Ali Alheeti

    2016-07-01

    Full Text Available Vehicular ad hoc networks (VANETs play a vital role in the success of self-driving and semi self-driving vehicles, where they improve safety and comfort. Such vehicles depend heavily on external communication with the surrounding environment via data control and Cooperative Awareness Messages (CAMs exchanges. VANETs are potentially exposed to a number of attacks, such as grey hole, black hole, wormhole and rushing attacks. This work presents an intelligent Intrusion Detection System (IDS that relies on anomaly detection to protect the external communication system from grey hole and rushing attacks. These attacks aim to disrupt the transmission between vehicles and roadside units. The IDS uses features obtained from a trace file generated in a network simulator and consists of a feed-forward neural network and a support vector machine. Additionally, the paper studies the use of a novel systematic response, employed to protect the vehicle when it encounters malicious behaviour. Our simulations of the proposed detection system show that the proposed schemes possess outstanding detection rates with a reduction in false alarms. This safe mode response system has been evaluated using four performance metrics, namely, received packets, packet delivery ratio, dropped packets and the average end to end delay, under both normal and abnormal conditions.

  3. A Dancing Black Hole

    Science.gov (United States)

    Shoemaker, Deirdre; Smith, Kenneth; Schnetter, Erik; Fiske, David; Laguna, Pablo; Pullin, Jorge

    2002-04-01

    Recently, stationary black holes have been successfully simulated for up to times of approximately 600-1000M, where M is the mass of the black hole. Considering that the expected burst of gravitational radiation from a binary black hole merger would last approximately 200-500M, black hole codes are approaching the point where simulations of mergers may be feasible. We will present two types of simulations of single black holes obtained with a code based on the Baumgarte-Shapiro-Shibata-Nakamura formulation of the Einstein evolution equations. One type of simulations addresses the stability properties of stationary black hole evolutions. The second type of simulations demonstrates the ability of our code to move a black hole through the computational domain. This is accomplished by shifting the stationary black hole solution to a coordinate system in which the location of the black hole is time dependent.

  4. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  5. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  6. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  7. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  8. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  9. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  10. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  11. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  12. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  13. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  14. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  15. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  16. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  17. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  18. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  19. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  20. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  1. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  2. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  3. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However......, this contribution is only visible in the attack trees as part of the performed steps; it cannot be mapped back to the model directly since the actions usually involve several elements (attacker and targeted actor or asset). Especially for large attack trees, understanding the relations between several model...

  4. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  5. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered...... the most harmful as they directly affect the available resources and thus the nodes’ energy consumption. The first endeavour of this paper is to model the activities of MAC layer security attacks to understand the flow of activities taking place when mounting the attack and when actually executing it....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure...

  6. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  7. Transforming Graphical System Models to Graphical Attack Models

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2016-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations...... approach to transforming graphical system models to graphical attack models in the form of attack trees. Based on an asset in the model, our transformations result in an attack tree that represents attacks by all possible actors in the model, after which the actor in question has obtained the asset....

  8. New attacks on Wi-Fi Protected Setup

    OpenAIRE

    Hamed Mohtadi; Alireza Rahimi

    2015-01-01

    Wi-Fi Protected Setup (WPS) is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weak...

  9. 1994 Attack Team Workshop: Phase II - Full-Scale Offensive Fog Attack Tests

    National Research Council Canada - National Science Library

    Scheffey, Joseph

    1997-01-01

    .... This report demonstrates the benefits of using a medium angle fog stream to control the overhead fire threat when conducting a direct attack on a growing/steady state fire where the sea of the fire is obstructed...

  10. Black hole critical phenomena without black holes

    Indian Academy of Sciences (India)

    large values of Ф, black holes do form and for small values the scalar field ... on the near side of the ridge ultimately evolve to form black holes while those configu- ... The inset shows a bird's eye view looking down on the saddle point.

  11. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  12. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  13. The Black Studies Boondoggle

    Science.gov (United States)

    Long, Richard A.

    1970-01-01

    Indicates tendencies dangerous to the basic purpose of Black Studies, and identifies four external challeges--imperialism, paternalism, nihilism, and materialism. An internal challenge is considered to be the use of European and Establishment constructs to analyze black reality. (DM)

  14. Black hole hair removal

    International Nuclear Information System (INIS)

    Banerjee, Nabamita; Mandal, Ipsita; Sen, Ashoke

    2009-01-01

    Macroscopic entropy of an extremal black hole is expected to be determined completely by its near horizon geometry. Thus two black holes with identical near horizon geometries should have identical macroscopic entropy, and the expected equality between macroscopic and microscopic entropies will then imply that they have identical degeneracies of microstates. An apparent counterexample is provided by the 4D-5D lift relating BMPV black hole to a four dimensional black hole. The two black holes have identical near horizon geometries but different microscopic spectrum. We suggest that this discrepancy can be accounted for by black hole hair - degrees of freedom living outside the horizon and contributing to the degeneracies. We identify these degrees of freedom for both the four and the five dimensional black holes and show that after their contributions are removed from the microscopic degeneracies of the respective systems, the result for the four and five dimensional black holes match exactly.

  15. Cyber Attacks: A New Threat to the Energy Industry

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2016-01-01

    The Network and Information Security (NIS) Directive has been adopted on July 6, 2016 by the European Parliament, three years after the initial proposal by the European Commission. It paves the way for a much needed common cyber security strategy within the EU. This Edito explains the reasons why the energy industry is particularly vulnerable to cyber- attacks, and what tools this new directive brings about to protect European critical infrastructures. In about two decades, the energy industry has been deeply transformed by the digital revolution, which penetrated companies' commercial, administrative and financial branches, but also their industrial systems. From the optimization of electric grids to the precision of oil drilling, information and communication technologies (ICT) are now essential to every stage of energy production, transport and distribution processes. Data mining and analysis are increasingly considered as the energy sector's new 'black gold', and generate new activities just like the platform Predix, designed by General Electric to help energy companies (among others) collect and analyze industrial data. This silent revolution offers countless economic opportunities and paves the way for a better resource distribution and use. But it also puts physical energy infrastructures at risk

  16. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  17. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  18. Noncommutative black holes

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-DomInguez, J C [Instituto de Fisica de la Universidad de Guanajuato PO Box E-143, 37150 Leoen Gto. (Mexico); Obregon, O [Instituto de Fisica de la Universidad de Guanajuato PO Box E-143, 37150 Leoen Gto. (Mexico); RamIrez, C [Facultad de Ciencias FIsico Matematicas, Universidad Autonoma de Puebla, PO Box 1364, 72000 Puebla (Mexico); Sabido, M [Instituto de Fisica de la Universidad de Guanajuato PO Box E-143, 37150 Leoen Gto. (Mexico)

    2007-11-15

    We study noncommutative black holes, by using a diffeomorphism between the Schwarzschild black hole and the Kantowski-Sachs cosmological model, which is generalized to noncommutative minisuperspace. Through the use of the Feynman-Hibbs procedure we are able to study the thermodynamics of the black hole, in particular, we calculate Hawking's temperature and entropy for the 'noncommutative' Schwarzschild black hole.

  19. Black holes without firewalls

    Science.gov (United States)

    Larjo, Klaus; Lowe, David A.; Thorlacius, Larus

    2013-05-01

    The postulates of black hole complementarity do not imply a firewall for infalling observers at a black hole horizon. The dynamics of the stretched horizon, that scrambles and reemits information, determines whether infalling observers experience anything out of the ordinary when entering a large black hole. In particular, there is no firewall if the stretched horizon degrees of freedom retain information for a time of the order of the black hole scrambling time.

  20. Black holes are hot

    International Nuclear Information System (INIS)

    Gibbons, G.

    1976-01-01

    Recent work, which has been investigating the use of the concept of entropy with respect to gravitating systems, black holes and the universe as a whole, is discussed. The resulting theory of black holes assigns a finite temperature to them -about 10 -7 K for ordinary black holes of stellar mass -which is in complete agreement with thermodynamical concepts. It is also shown that black holes must continuously emit particles just like ordinary bodies which have a certain temperature. (U.K.)

  1. Monopole Black Hole Skyrmions

    OpenAIRE

    Moss, Ian G; Shiiki, N; Winstanley, E

    2000-01-01

    Charged black hole solutions with pion hair are discussed. These can be\\ud used to study monopole black hole catalysis of proton decay.\\ud There also exist\\ud multi-black hole skyrmion solutions with BPS monopole behaviour.

  2. What is black hole?

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. What is black hole? Possible end phase of a star: A star is a massive, luminous ball of plasma having continuous nuclear burning. Star exhausts nuclear fuel →. White Dwarf, Neutron Star, Black Hole. Black hole's gravitational field is so powerful that even ...

  3. Genocide and Black Ecology

    Science.gov (United States)

    Sinnette, Calvin H.

    1972-01-01

    Contends that the survival of black people is in serious jeopardy as is evidenced in contemporary discussions on the worldwide plight of black people, and that an exhaustive study of the problem in its many dimensions is seriously lacking; the moral and ethical issues of genocide require examination from a black perspective. (JW)

  4. Information Warfare: Defining the Legal Response to An Attack

    National Research Council Canada - National Science Library

    Pottorff, James

    1999-01-01

    This paper discusses the difficulty in determining whether an information warfare attack, such as a computer virus, can be treated as an "armed attack" for purposes of national defense under the United Nations charter. As the U.S...

  5. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  6. Calcium Supplements: A Risk Factor for Heart Attack?

    Science.gov (United States)

    ... factor for heart attack? I've read that calcium supplements may increase the risk of heart attack. ... D. Some doctors think it's possible that taking calcium supplements may increase your risk of a heart ...

  7. Cyber Attacks During the War on Terrorism: A Predictive Analysis

    National Research Council Canada - National Science Library

    Vatis, Michael

    2001-01-01

    .... Just as the terrorist attacks of September 11, 2001 defied what many thought possible, cyber attacks could escalate in response to United States and allied retaliatory measures against the terrorists...

  8. Black holes in binary stars

    NARCIS (Netherlands)

    Wijers, R.A.M.J.

    1996-01-01

    Introduction Distinguishing neutron stars and black holes Optical companions and dynamical masses X-ray signatures of the nature of a compact object Structure and evolution of black-hole binaries High-mass black-hole binaries Low-mass black-hole binaries Low-mass black holes Formation of black holes

  9. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  10. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  11. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  12. Marine microalgae attack and feed on metazoans

    DEFF Research Database (Denmark)

    Berge, Terje; Poulsen, Louise K.; Moldrup, Morten

    2012-01-01

    Free-living microalgae from the dinoflagellate genus Karlodinium are known to formmassive blooms in eutrophic coastal waters worldwide and are often associated with fish kills. Natural bloom populations, recently shown to consist of the two mixotrophic and toxic species Karlodinium armiger...... and Karlodinium veneficum have caused fast paralysis and mortality of finfish and copepods in the laboratory, and have been associated with reduced metazooplankton biomass in-situ. Here we show that a strain of K. armiger (K-0688) immobilises the common marine copepod Acartia tonsa in a densitydependent manner...... and collectively ingests the grazer to promote its own growth rate. In contrast, four strains of K. veneficum did not attack or affect the motility and survival of the copepods. Copepod immobilisation by the K. armiger strain was fast (within 15min) and caused by attacks of swarming cells, likely through...

  13. Cascade-based attacks on complex networks

    Science.gov (United States)

    Motter, Adilson E.; Lai, Ying-Cheng

    2002-12-01

    We live in a modern world supported by large, complex networks. Examples range from financial markets to communication and transportation systems. In many realistic situations the flow of physical quantities in the network, as characterized by the loads on nodes, is important. We show that for such networks where loads can redistribute among the nodes, intentional attacks can lead to a cascade of overload failures, which can in turn cause the entire or a substantial part of the network to collapse. This is relevant for real-world networks that possess a highly heterogeneous distribution of loads, such as the Internet and power grids. We demonstrate that the heterogeneity of these networks makes them particularly vulnerable to attacks in that a large-scale cascade may be triggered by disabling a single key node. This brings obvious concerns on the security of such systems.

  14. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  15. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  16. Blind Data Attack on BGP Routers

    Science.gov (United States)

    2017-03-01

    Second Reader Dr. Cynthia Irvine Chair, Cyber Academic Group iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Transport Communication Protocol (TCP...Postgraduate School. The experience of higher learning at this institution was incredible, and I would whole-heartedly recommend it to any of my peers and...data attack packets to the victim device. Scapy is a Python library that is used to craft and send packets [28]. BGP is supported in Python through

  17. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  18. An Explanation of Nakamoto's Analysis of Double-spend Attacks

    OpenAIRE

    Ozisik, A. Pinar; Levine, Brian Neil

    2017-01-01

    The fundamental attack against blockchain systems is the double-spend attack. In this tutorial, we provide a very detailed explanation of just one section of Satoshi Nakamoto's original paper where the attack's probability of success is stated. We show the derivation of the mathematics relied upon by Nakamoto to create a model of the attack. We also validate the model with a Monte Carlo simulation, and we determine which model component is not perfect.

  19. Fuzzy Expert System for Heart Attack Diagnosis

    Science.gov (United States)

    Hassan, Norlida; Arbaiy, Nureize; Shah, Noor Aziyan Ahmad; Afizah Afif@Afip, Zehan

    2017-08-01

    Heart attack is one of the serious illnesses and reported as the main killer disease. Early prevention is significant to reduce the risk of having the disease. The prevention efforts can be strengthen through awareness and education about risk factor and healthy lifestyle. Therefore the knowledge dissemination is needed to play role in order to distribute and educate public in health care management and disease prevention. Since the knowledge dissemination in medical is important, there is a need to develop a knowledge based system that can emulate human intelligence to assist decision making process. Thereby, this study utilized hybrid artificial intelligence (AI) techniques to develop a Fuzzy Expert System for Diagnosing Heart Attack Disease (HAD). This system integrates fuzzy logic with expert system, which helps the medical practitioner and people to predict the risk and as well as diagnosing heart attack based on given symptom. The development of HAD is expected not only providing expert knowledge but potentially become one of learning resources to help citizens to develop awareness about heart-healthy lifestyle.

  20. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  1. Black hole levitron

    International Nuclear Information System (INIS)

    Arsiwalla, Xerxes D.; Verlinde, Erik P.

    2010-01-01

    We study the problem of spatially stabilizing four dimensional extremal black holes in background electric/magnetic fields. Whilst looking for stationary stable solutions describing black holes placed in external fields we find that taking a continuum limit of Denef et al.'s multicenter supersymmetric black hole solutions provides a supergravity description of such backgrounds within which a black hole can be trapped within a confined volume. This construction is realized by solving for a levitating black hole over a magnetic dipole base. We comment on how such a construction is akin to a mechanical levitron.

  2. Quantitative Attack Tree Analysis via Priced Timed Automata

    NARCIS (Netherlands)

    Kumar, Rajesh; Ruijters, Enno Jozef Johannes; Stoelinga, Mariëlle Ida Antoinette; Sankaranarayanan, Sriram; Vicario, Enrico

    The success of a security attack crucially depends on the resources available to an attacker: time, budget, skill level, and risk appetite. Insight in these dependencies and the most vulnerable system parts is key to providing effective counter measures. This paper considers attack trees, one of the

  3. Pareto Efficient Solution of Attack-Defence Trees

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as

  4. Vulnerability Assessment by Learning Attack Specifications in Graphs

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Lopes, Raul H.C.

    This paper presents an evolutionary approach for learning attack specifications that describe attack scenarios. The objective is to find vulnerabilities in computer networks which minimise the cost of an attack with maximum impact. Although we focus on Insider Threat, the proposed approach applies

  5. Attacks on the AJPS Mersenne-based cryptosystem

    NARCIS (Netherlands)

    K. de Boer (Koen); L. Ducas (Léo); S. Jeffery (Stacey); R. M. de Wolf (Ronald)

    2018-01-01

    textabstractAggarwal, Joux, Prakash and Santha recently introduced a new potentially quantum-safe public-key cryptosystem, and suggested that a brute-force attack is essentially optimal against it. They consider but then dismiss both Meet-in-the-Middle attacks and LLL-based attacks. Very soon after

  6. 12 CFR 747.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... INVESTIGATIONS Uniform Rules of Practice and Procedure § 747.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all or any part of an...

  7. 12 CFR 308.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... PRACTICE RULES OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 308.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any...

  8. 12 CFR 19.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... OF PRACTICE AND PROCEDURE Uniform Rules of Practice and Procedure § 19.17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in any court concerning all...

  9. Limit Asthma Attacks Caused by Colds or Flu

    Science.gov (United States)

    Asthma: Limit asthma attacks caused by colds or flu A cold or the flu can trigger an asthma attack. Here's why — and how to keep your sneeze ... plan. If you notice warning signs of an asthma attack — such as coughing, wheezing, chest tightness or shortness ...

  10. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  11. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  12. Regression Nodes: Extending attack trees with data from social sciences

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    In the field of security, attack trees are often used to assess security vulnerabilities probabilistically in relation to multi-step attacks. The nodes are usually connected via AND-gates, where all children must be executed, or via OR-gates, where only one action is necessary for the attack step to

  13. Quantitative Verification and Synthesis of Attack-Defence Scenarios Conference

    NARCIS (Netherlands)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal

  14. Modeling and Analysis of Information Attack in Computer Networks

    National Research Council Canada - National Science Library

    Pepyne, David

    2003-01-01

    ... (as opposed to physical and other forms of attack) . Information based attacks are attacks that can be carried out from anywhere in the world, while sipping cappuccino at an Internet cafe' or while enjoying the comfort of a living room armchair...

  15. Unified communications forensics anatomy of common UC attacks

    CERN Document Server

    Grant, Nicholas Mr

    2013-01-01

    Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures

  16. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack...... which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...

  17. Hybrid attacks on model-based social recommender systems

    Science.gov (United States)

    Yu, Junliang; Gao, Min; Rong, Wenge; Li, Wentao; Xiong, Qingyu; Wen, Junhao

    2017-10-01

    With the growing popularity of the online social platform, the social network based approaches to recommendation emerged. However, because of the open nature of rating systems and social networks, the social recommender systems are susceptible to malicious attacks. In this paper, we present a certain novel attack, which inherits characteristics of the rating attack and the relation attack, and term it hybrid attack. Furtherly, we explore the impact of the hybrid attack on model-based social recommender systems in multiple aspects. The experimental results show that, the hybrid attack is more destructive than the rating attack in most cases. In addition, users and items with fewer ratings will be influenced more when attacked. Last but not the least, the findings suggest that spammers do not depend on the feedback links from normal users to become more powerful, the unilateral links can make the hybrid attack effective enough. Since unilateral links are much cheaper, the hybrid attack will be a great threat to model-based social recommender systems.

  18. Machine Learning Methods for Attack Detection in the Smart Grid.

    Science.gov (United States)

    Ozay, Mete; Esnaola, Inaki; Yarman Vural, Fatos Tunay; Kulkarni, Sanjeev R; Poor, H Vincent

    2016-08-01

    Attack detection problems in the smart grid are posed as statistical learning problems for different attack scenarios in which the measurements are observed in batch or online settings. In this approach, machine learning algorithms are used to classify measurements as being either secure or attacked. An attack detection framework is provided to exploit any available prior knowledge about the system and surmount constraints arising from the sparse structure of the problem in the proposed approach. Well-known batch and online learning algorithms (supervised and semisupervised) are employed with decision- and feature-level fusion to model the attack detection problem. The relationships between statistical and geometric properties of attack vectors employed in the attack scenarios and learning algorithms are analyzed to detect unobservable attacks using statistical learning methods. The proposed algorithms are examined on various IEEE test systems. Experimental analyses show that machine learning algorithms can detect attacks with performances higher than attack detection algorithms that employ state vector estimation methods in the proposed attack detection framework.

  19. False Positive and False Negative Effects on Network Attacks

    Science.gov (United States)

    Shang, Yilun

    2018-01-01

    Robustness against attacks serves as evidence for complex network structures and failure mechanisms that lie behind them. Most often, due to detection capability limitation or good disguises, attacks on networks are subject to false positives and false negatives, meaning that functional nodes may be falsely regarded as compromised by the attacker and vice versa. In this work, we initiate a study of false positive/negative effects on network robustness against three fundamental types of attack strategies, namely, random attacks (RA), localized attacks (LA), and targeted attack (TA). By developing a general mathematical framework based upon the percolation model, we investigate analytically and by numerical simulations of attack robustness with false positive/negative rate (FPR/FNR) on three benchmark models including Erdős-Rényi (ER) networks, random regular (RR) networks, and scale-free (SF) networks. We show that ER networks are equivalently robust against RA and LA only when FPR equals zero or the initial network is intact. We find several interesting crossovers in RR and SF networks when FPR is taken into consideration. By defining the cost of attack, we observe diminishing marginal attack efficiency for RA, LA, and TA. Our finding highlights the potential risk of underestimating or ignoring FPR in understanding attack robustness. The results may provide insights into ways of enhancing robustness of network architecture and improve the level of protection of critical infrastructures.

  20. Primary black holes

    International Nuclear Information System (INIS)

    Novikov, I.; Polnarev, A.

    1981-01-01

    Proves are searched for of the formation of the so-called primary black holes at the very origin of the universe. The black holes would weigh less than 10 13 kg. The formation of a primary black hole is conditional on strong fluctuations of the gravitational field corresponding roughly to a half of the fluctuation maximally permissible by the general relativity theory. Only big fluctuations of the gravitational field can overcome the forces of the hot gas pressure and compress the originally expanding matter into a black hole. Low-mass black holes have a temperature exceeding that of the black holes formed from stars. A quantum process of particle formation, the so-called evaporation takes place in the strong gravitational field of a black hole. The lower the mass of the black hole, the shorter the evaporation time. The analyses of processes taking place during the evaporation of low-mass primary black holes show that only a very small proportion of the total mass of the matter in the universe could turn into primary black holes. (M.D.)

  1. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  2. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  3. Adaptive optimisation-offline cyber attack on remote state estimator

    Science.gov (United States)

    Huang, Xin; Dong, Jiuxiang

    2017-10-01

    Security issues of cyber-physical systems have received increasing attentions in recent years. In this paper, deception attacks on the remote state estimator equipped with the chi-squared failure detector are considered, and it is assumed that the attacker can monitor and modify all the sensor data. A novel adaptive optimisation-offline cyber attack strategy is proposed, where using the current and previous sensor data, the attack can yield the largest estimation error covariance while ensuring to be undetected by the chi-squared monitor. From the attacker's perspective, the attack is better than the existing linear deception attacks to degrade the system performance. Finally, some numerical examples are provided to demonstrate theoretical results.

  4. Neuroradiological study of transient ischemic attack

    Energy Technology Data Exchange (ETDEWEB)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-08-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 -- 30 days in 19 cases, 1 -- 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.).

  5. Neuroradiological study of transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    Fifty-two patients with carotid TIAs and thirteen patients with vertebrobasilar TIAs were investigated by angiography and computed tomography. TIA was diagnosed by clinical symptoms in accordance with the criteria for TIA of the Joint Committee for Stroke Facilities in the U.S.A. (1974). The 65 patients with TIAs included 49 males and 16 females with average age of 63.5 years old at the initial episode of TIA. As for the diseases associated with TIA, hypertension (51 %), diabetes mellitus (15 %) and ischemic heart diseases (11 %) were the major disorders. Atrial fibrillation was observed in 2 cases. Intervals from last TIA attack to angiography were less than 7 days in 22 cases, 8 ∼ 30 days in 19 cases, 1 ∼ 4 monthes in 14 cases and more than 4 monthes in 10 cases, respectively. The cases in which angiography was done earlier after attacks displayed more abnormal findings. In 52 patients with caroted TIAs the artherosclerotic change of extracranial portion of the internal carotid artery was found in 14 cases (27 %), that of intracranial portion of the artery in 11 cases (21 %) and both lesions in 2 cases (4 %). On the other hand, in 13 patients with vertebrobasilar TIAs, this change was observed in 4 cases at the extracranival potion and in 1 case at the intracranial potion (siphon) of the internal carotid artery. Abnormal CT findings were found in 29 of 65 patients, namely 9 had ventricular dilatation and brain atrophy, 6 had cerebral infarction which was not associated with associated with symptoms of TIA. In carotid TIAs, Cerebral infarction was associated with symptoms of TIAs in 15 cases, namely 10 had a small low density area in the basal ganglia near the internal capsule and 5 had a low density area in the cortical or subcortical region. All of these 5 cases had cerebral embolism, which recanalized after attacks. (J.P.N.)

  6. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  7. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  8. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...... and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...

  9. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey

    2015-01-01

    Polynomial hashing as an instantiation of universal hashing is a widely employed method for the construction of MACs and authenticated encryption (AE) schemes, the ubiquitous GCM being a prominent example. It is also used in recent AE proposals within the CAESAR competition which aim at providing...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  10. Competitive Reactions to Advertising and Promotion Attacks

    OpenAIRE

    Jan-Benedict E. M. Steenkamp; Vincent R. Nijs; Dominique M. Hanssens; Marnik G. Dekimpe

    2005-01-01

    How do competitors react to each other's price-promotion and advertising attacks? What are the reasons for the observed reaction behavior? We answer these questions by performing a large-scale empirical study on the short-run and long-run reactions to promotion and advertising shocks in over 400 consumer product categories over a four-year time span. Our results clearly show that the most predominant form of competitive response is passive in nature. When a reaction does occur, it is usually ...

  11. Astrophysical black holes

    CERN Document Server

    Gorini, Vittorio; Moschella, Ugo; Treves, Aldo; Colpi, Monica

    2016-01-01

    Based on graduate school lectures in contemporary relativity and gravitational physics, this book gives a complete and unified picture of the present status of theoretical and observational properties of astrophysical black holes. The chapters are written by internationally recognized specialists. They cover general theoretical aspects of black hole astrophysics, the theory of accretion and ejection of gas and jets, stellar-sized black holes observed in the Milky Way, the formation and evolution of supermassive black holes in galactic centers and quasars as well as their influence on the dynamics in galactic nuclei. The final chapter addresses analytical relativity of black holes supporting theoretical understanding of the coalescence of black holes as well as being of great relevance in identifying gravitational wave signals. With its introductory chapters the book is aimed at advanced graduate and post-graduate students, but it will also be useful for specialists.

  12. Discovery of Peptide-based Inhibitors against Dendrotoxin B from Black Mamba through Phage Display Screening

    DEFF Research Database (Denmark)

    O. Cob, Saioa; Munk, Andreas; Laustsen, Andreas Hougaard

    The black mamba (Dendroaspis polylepis) is Africa’s most feared snake due to its potent, rapidacting venom and its speed of attack. The most abundant toxins in D. polylepis venom are the Kunitz-type proteinase inhibitors, dendrotoxins, which are unique for mamba. Dendrotoxinsare poorly neutralized...

  13. Combating the Sigatoka disease complex on banana

    Science.gov (United States)

    Banana is the fourth most important staple food in the world behind rice, wheat and maize, with more than 100 million tons produced annually. Although the majority of bananas produced are consumed locally, banana export is a multi-billion dollar business. Bananas are grown in more than 100 countri...

  14. Black branes as piezoelectrics.

    Science.gov (United States)

    Armas, Jay; Gath, Jakob; Obers, Niels A

    2012-12-14

    We find a realization of linear electroelasticity theory in gravitational physics by uncovering a new response coefficient of charged black branes, exhibiting their piezoelectric behavior. Taking charged dilatonic black strings as an example and using the blackfold approach we measure their elastic and piezolectric moduli. We also use our results to draw predictions about the equilibrium condition of charged dilatonic black rings in dimensions higher than six.

  15. Accreting Black Holes

    OpenAIRE

    Begelman, Mitchell C.

    2014-01-01

    I outline the theory of accretion onto black holes, and its application to observed phenomena such as X-ray binaries, active galactic nuclei, tidal disruption events, and gamma-ray bursts. The dynamics as well as radiative signatures of black hole accretion depend on interactions between the relatively simple black-hole spacetime and complex radiation, plasma and magnetohydrodynamical processes in the surrounding gas. I will show how transient accretion processes could provide clues to these ...

  16. Nonextremal stringy black hole

    International Nuclear Information System (INIS)

    Suzuki, K.

    1997-01-01

    We construct a four-dimensional BPS saturated heterotic string solution from the Taub-NUT solution. It is a nonextremal black hole solution since its Euler number is nonzero. We evaluate its black hole entropy semiclassically. We discuss the relation between the black hole entropy and the degeneracy of string states. The entropy of our string solution can be understood as the microscopic entropy which counts the elementary string states without any complications. copyright 1997 The American Physical Society

  17. Naked black holes

    International Nuclear Information System (INIS)

    Horowitz, G.T.; Ross, S.F.

    1997-01-01

    It is shown that there are large static black holes for which all curvature invariants are small near the event horizon, yet any object which falls in experiences enormous tidal forces outside the horizon. These black holes are charged and near extremality, and exist in a wide class of theories including string theory. The implications for cosmic censorship and the black hole information puzzle are discussed. copyright 1997 The American Physical Society

  18. The Black Family as Educator.

    Science.gov (United States)

    Wallace, Joan

    The black family is the primary socializing agent of the black child and, thus, the primary educator. The culture of blacks in America, in which the child is steeped, is unique, complex and rich-the result of a convergence and fusion of African, American, and European influences. In its education of the black child, the black family must deal,…

  19. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  20. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  1. Consciousness in non-epileptic attack disorder.

    Science.gov (United States)

    Reuber, Markus; Kurthen, M

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consciousness should not only distinguish between the 'level' and `content' of consciousness but also between 'phenomenal consciousness' (consciousness of states it somehow "feels to be like") and 'access consciousness' (having certain 'higher' cognitive processes at one's disposal). The existing evidence shows that there is a great intra- and interindividual variability of NEA experience. However, in most NEAs phenomenal experience - and, as a precondition for that experience, vigilance or wakefulness - is reduced to a lesser degree than in those epileptic seizures involving impairment of consciousness. In fact, complete loss of "consciousness" is the exception rather than the rule in NEAs. Patients, as well as external observers, may have a tendency to overestimate impairments of consciousness during the seizures.

  2. Command Disaggregation Attack and Mitigation in Industrial Internet of Things

    Directory of Open Access Journals (Sweden)

    Peng Xun

    2017-10-01

    Full Text Available A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1 the command sequence is disordered and (2 disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  3. Command Disaggregation Attack and Mitigation in Industrial Internet of Things.

    Science.gov (United States)

    Xun, Peng; Zhu, Pei-Dong; Hu, Yi-Fan; Cui, Peng-Shuai; Zhang, Yan

    2017-10-21

    A cyber-physical attack in the industrial Internet of Things can cause severe damage to physical system. In this paper, we focus on the command disaggregation attack, wherein attackers modify disaggregated commands by intruding command aggregators like programmable logic controllers, and then maliciously manipulate the physical process. It is necessary to investigate these attacks, analyze their impact on the physical process, and seek effective detection mechanisms. We depict two different types of command disaggregation attack modes: (1) the command sequence is disordered and (2) disaggregated sub-commands are allocated to wrong actuators. We describe three attack models to implement these modes with going undetected by existing detection methods. A novel and effective framework is provided to detect command disaggregation attacks. The framework utilizes the correlations among two-tier command sequences, including commands from the output of central controller and sub-commands from the input of actuators, to detect attacks before disruptions occur. We have designed components of the framework and explain how to mine and use these correlations to detect attacks. We present two case studies to validate different levels of impact from various attack models and the effectiveness of the detection framework. Finally, we discuss how to enhance the detection framework.

  4. Simulation of Attacks for Security in Wireless Sensor Network.

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-11-18

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node's software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work.

  5. Simulation of Attacks for Security in Wireless Sensor Network

    Science.gov (United States)

    Diaz, Alvaro; Sanchez, Pablo

    2016-01-01

    The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attack-aware embedded software/firmware or attack countermeasures to provide security in WSNs. The proposed methodology includes attacker modeling and attack simulation with performance analysis (node’s software execution time and power consumption estimation). After an analysis of different WSN attack types, an attacker model is proposed. This model defines three different types of attackers that can emulate most WSN attacks. In addition, this paper presents a virtual platform that is able to model the node hardware, embedded software and basic wireless channel features. This virtual simulation analyzes the embedded software behavior and node power consumption while it takes into account the network deployment and topology. Additionally, this simulator integrates the previously mentioned attacker model. Thus, the impact of attacks on power consumption and software behavior/execution-time can be analyzed. This provides developers with essential information about the effects that one or multiple attacks could have on the network, helping them to develop more secure WSN systems. This WSN attack simulator is an essential element of the attack-aware embedded software development methodology that is also introduced in this work. PMID:27869710

  6. Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); D. Shumow

    2017-01-01

    textabstractCounter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was introduced by Stevens at CRYPTO 2013 [22] with a hash collision detection algorithm. That is, an algorithm that detects whether a given single message is part of a colliding message

  7. Distribution of mating-type alleles and M13 PCR markers in the black leaf spot fungus Mycosphaerella fijiensis of bananas in Brazil.

    Science.gov (United States)

    Queiroz, C B; Miranda, E C; Hanada, R E; Sousa, N R; Gasparotto, L; Soares, M A; Silva, G F

    2013-02-08

    The fungus Mycosphaerella fijiensis is the causative agent of black sigatoka, which is one of the most destructive diseases of banana plants. Infection with this pathogen results in underdeveloped fruit, with no commercial value. We analyzed the distribution of the M. fijiensis mating-type system and its genetic variability using M13 phage DNA markers. We found a 1:1 distribution of mating-type alleles, indicating MAT1-1 and MAT1-2 idiomorphs. A polymorphism analysis using three different primers for M13 markers showed that only the M13 minisatellite primers generated polymorphic products. We then utilized this polymorphism to characterize 40 isolates from various Brazilian states. The largest genetic distances were found between isolates from the same location and between isolates from different parts of the country. Therefore, there was no correlation between the genetic similarity and the geographic origin of the isolates. The M13 marker was used to generate genetic fingerprints for five isolates; these fingerprints were compared with the band profiles obtained from inter-simple sequence repeat (UBC861) and inter-retrotransposon amplified polymorphism analyses. We found that the M13 marker was more effective than the other two markers for differentiating these isolates.

  8. Managing burn victims of suicide bombing attacks: outcomes, lessons learnt, and changes made from three attacks in Indonesia.

    Science.gov (United States)

    Chim, Harvey; Yew, Woon Si; Song, Colin

    2007-01-01

    Terror attacks in Southeast Asia were almost nonexistent until the 2002 Bali bomb blast, considered the deadliest attack in Indonesian history. Further attacks in 2003 (Jakarta), 2004 (Jakarta), and 2005 (Bali) have turned terrorist attacks into an ever-present reality. The authors reviewed medical charts of victims evacuated to the Singapore General Hospital (SGH) Burns Centre during three suicide attacks involving Bali (2002 and 2005) and the Jakarta Marriott hotel (2003). Problems faced, lessons learnt, and costs incurred are discussed. A burns disaster plan drawing on lessons learnt from these attacks is presented. Thirty-one patients were treated at the SGH Burns Centre in three attacks (2002 Bali attack [n = 15], 2003 Jakarta attack [n = 14], and 2005 Bali attack [n = 2]). For the 2002 Bali attack, median age was 29 years (range 20 to 50 years), median percentage of total burn surface area (TBSA) was 29% (range 5% to 55%), and median abbreviated burn severity index (ABSI) was 6 (range 3 to 10). Eight of 15 patients were admitted to the intensive care unit. For the 2003 Jakarta attack, median age was 35 years (range 24 to 56 years), median percentage of TBSA was 10% (range 2% to 46%), and median ABSI was 4 (range 3 to 9). A large number of patients had other injuries. Problems faced included manpower issues, lack of bed space, shortage of blood products, and lack of cadaver skin. The changing nature of terror attacks mandates continued vigilance and disaster preparedness. The multidimensional burns patient, complicated by other injuries, is likely to become increasingly common. A burns disaster plan with emphasis on effective command, control, and communication as well as organisation of health care personnel following a 'team concept' will do much to ensure that the sudden onset of a crisis situation at an unexpected time does not overwhelm hospital manpower and resources.

  9. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency

    Directory of Open Access Journals (Sweden)

    Lou Wei

    2010-01-01

    Full Text Available Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the network and tunnels them through a wired or wireless link to another point, and the other relays them within its vicinity. In this paper, we investigate the impact of the wormhole attack on the localization and propose a novel distance-consistency-based secure localization scheme against wormhole attacks, which includes three phases of wormhole attack detection, valid locators identification and self-localization. The theoretical model is further formulated to analyze the proposed secure localization scheme. The simulation results validate the theoretical results and also demonstrate the effectiveness of our proposed scheme.

  10. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  11. Attack and Vulnerability Penetration Testing: FreeBSD

    Directory of Open Access Journals (Sweden)

    Abdul Hanan Abdullah

    2013-07-01

    Full Text Available Computer system security has become a major concern over the past few years. Attacks, threasts or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.

  12. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  13. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  14. Black hole Berry phase

    NARCIS (Netherlands)

    de Boer, J.; Papadodimas, K.; Verlinde, E.

    2009-01-01

    Supersymmetric black holes are characterized by a large number of degenerate ground states. We argue that these black holes, like other quantum mechanical systems with such a degeneracy, are subject to a phenomenon which is called the geometric or Berry’s phase: under adiabatic variations of the

  15. Black holes are warm

    International Nuclear Information System (INIS)

    Ravndal, F.

    1978-01-01

    Applying Einstein's theory of gravitation to black holes and their interactions with their surroundings leads to the conclusion that the sum of the surface areas of several black holes can never become less. This is shown to be analogous to entropy in thermodynamics, and the term entropy is also thus applied to black holes. Continuing, expressions are found for the temperature of a black hole and its luminosity. Thermal radiation is shown to lead to explosion of the black hole. Numerical examples are discussed involving the temperature, the mass, the luminosity and the lifetime of black mini-holes. It is pointed out that no explosions corresponding to the prediction have been observed. It is also shown that the principle of conservation of leptons and baryons is broken by hot black holes, but that this need not be a problem. The related concept of instantons is cited. It is thought that understanding of thermal radiation from black holes may be important for the development of a quantified gravitation theory. (JIW)

  16. on black ironbark (Eucalyptus

    African Journals Online (AJOL)

    (Apis meOifera) on black ironbark. (Eucalyptus sideroxylon). B. Buys. Plant Protection Research Institute, Private Bag X5017,. Stellenbosch, 7600 Republic of South Africa. Received May /984; accepted 28 November /986. Black ironbark trees secrete nectar during the night. Argentine ants collected 42% of the nectar before ...

  17. Black holes matter

    DEFF Research Database (Denmark)

    Kragh, Helge Stjernholm

    2016-01-01

    Review essay, Marcia Bartusiak, Black Hole: How an Idea Abandoned by Newtonians, Hated by Einstein, and Gambled On by Hawking Became Loved (New Haven: Yale University Press, 2015).......Review essay, Marcia Bartusiak, Black Hole: How an Idea Abandoned by Newtonians, Hated by Einstein, and Gambled On by Hawking Became Loved (New Haven: Yale University Press, 2015)....

  18. Quantum black holes

    OpenAIRE

    Hooft, G. 't

    1987-01-01

    This article is divided into three parts. First, a systematic derivation of the Hawking radiation is given in three different ways. The information loss problem is then discussed in great detail. The last part contains a concise discussion of black hole thermodynamics. This article was published as chapter $6$ of the IOP book "Lectures on General Relativity, Cosmology and Quantum Black Holes" (July $2017$).

  19. Protecting Black Girls

    Science.gov (United States)

    Morris, Monique W.

    2016-01-01

    Statistics show that black girls in U.S. K-12 public schools are overrepresented among students who face disciplinary approaches (such as suspensions) that exclude or even criminalize them. Morris explains how black girls face conditions that make them vulnerable to a phenomenon she calls "school to confinement pathways"--conditions like…

  20. Black hole levitron

    NARCIS (Netherlands)

    Arsiwalla, X.D.; Verlinde, E.P.

    2010-01-01

    We study the problem of spatially stabilizing four dimensional extremal black holes in background electric/magnetic fields. Whilst looking for stationary stable solutions describing black holes placed in external fields we find that taking a continuum limit of Denef et al.’s multicenter

  1. The Black Woman's Burden

    Science.gov (United States)

    Hayes, Dianne

    2012-01-01

    Not even the first lady of the most powerful nation in the world is immune to stereotypes that have plagued Black women since first setting foot on American soil. Stereotypes of being the "angry Black woman" and curiosity about differences in appearance still persist from the academy to 1600 Pennsylvania Ave. As African-American women rise in…

  2. Black Boycott: Gainsville, Florida

    Science.gov (United States)

    White, Arthur O.

    1975-01-01

    A case study of the events precipitating a black student boycott in 1969 in Gainesville, Flordia, when school board manuevering to avoid school integration led to the threatened closing of Lincoln High School, a reputable black community school. Also described are the subsequent transformations of Lincoln into a vocational-technical school and…

  3. Sleep Deprivation Attack Detection in Wireless Sensor Network

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maxi...

  4. Countermeasures for unintentional and intentional video watermarking attacks

    Science.gov (United States)

    Deguillaume, Frederic; Csurka, Gabriela; Pun, Thierry

    2000-05-01

    These last years, the rapidly growing digital multimedia market has revealed an urgent need for effective copyright protection mechanisms. Therefore, digital audio, image and video watermarking has recently become a very active area of research, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. This paper studies some attacks and proposes countermeasures applied to videos. General attacks are lossy copying/transcoding such as MPEG compression and digital/analog (D/A) conversion, changes of frame-rate, changes of display format, and geometrical distortions. More specific attacks are sequence edition, and statistical attacks such as averaging or collusion. Averaging attack consists of averaging locally consecutive frames to cancel the watermark. This attack works well for schemes which embed random independent marks into frames. In the collusion attack the watermark is estimated from single frames (based on image denoising), and averaged over different scenes for better accuracy. The estimated watermark is then subtracted from each frame. Collusion requires that the same mark is embedded into all frames. The proposed countermeasures first ensures robustness to general attacks by spread spectrum encoding in the frequency domain and by the use of an additional template. Secondly, a Bayesian criterion, evaluating the probability of a correctly decoded watermark, is used for rejection of outliers, and to implement an algorithm against statistical attacks. The idea is to embed randomly chosen marks among a finite set of marks, into subsequences of videos which are long enough to resist averaging attacks, but short enough to avoid collusion attacks. The Bayesian criterion is needed to select the correct mark at the decoding step. Finally, the paper presents experimental results showing the robustness of the proposed method.

  5. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  6. Robustness analysis of interdependent networks under multiple-attacking strategies

    Science.gov (United States)

    Gao, Yan-Li; Chen, Shi-Ming; Nie, Sen; Ma, Fei; Guan, Jun-Jie

    2018-04-01

    The robustness of complex networks under attacks largely depends on the structure of a network and the nature of the attacks. Previous research on interdependent networks has focused on two types of initial attack: random attack and degree-based targeted attack. In this paper, a deliberate attack function is proposed, where six kinds of deliberate attacking strategies can be derived by adjusting the tunable parameters. Moreover, the robustness of four types of interdependent networks (BA-BA, ER-ER, BA-ER and ER-BA) with different coupling modes (random, positive and negative correlation) is evaluated under different attacking strategies. Interesting conclusions could be obtained. It can be found that the positive coupling mode can make the vulnerability of the interdependent network to be absolutely dependent on the most vulnerable sub-network under deliberate attacks, whereas random and negative coupling modes make the vulnerability of interdependent network to be mainly dependent on the being attacked sub-network. The robustness of interdependent network will be enhanced with the degree-degree correlation coefficient varying from positive to negative. Therefore, The negative coupling mode is relatively more optimal than others, which can substantially improve the robustness of the ER-ER network and ER-BA network. In terms of the attacking strategies on interdependent networks, the degree information of node is more valuable than the betweenness. In addition, we found a more efficient attacking strategy for each coupled interdependent network and proposed the corresponding protection strategy for suppressing cascading failure. Our results can be very useful for safety design and protection of interdependent networks.

  7. Lifshitz topological black holes

    International Nuclear Information System (INIS)

    Mann, R.B.

    2009-01-01

    I find a class of black hole solutions to a (3+1) dimensional theory gravity coupled to abelian gauge fields with negative cosmological constant that has been proposed as the dual theory to a Lifshitz theory describing critical phenomena in (2+1) dimensions. These black holes are all asymptotic to a Lifshitz fixed point geometry and depend on a single parameter that determines both their area (or size) and their charge. Most of the solutions are obtained numerically, but an exact solution is also obtained for a particular value of this parameter. The thermodynamic behaviour of large black holes is almost the same regardless of genus, but differs considerably for small black holes. Screening behaviour is exhibited in the dual theory for any genus, but the critical length at which it sets in is genus-dependent for small black holes.

  8. Legitimizing Blacks in Philosophy

    Directory of Open Access Journals (Sweden)

    Jameliah Shorter-Bourhanou

    2017-12-01

    Full Text Available In its efforts toward improving diversity, the discipline of philosophy has tended to focus on increasing the number of black philosophers. One crucial issue that has received less attention is the extent to which black philosophers are delegitimized in the discipline because their philosophical contributions challenge the status quo. A systematic problem that bars black philosophers from equal and full participation, this delegitimization precludes the emergence of genuine diversity and reveals the importance of interrogating broader attitudes toward black philosophical contributions. In this essay, I argue for radical systematic changes to disciplinary hallmarks of professionalization such as pedagogy, mentoring, publishing, and hiring practices with the aim of legitimizing black philosophers and their contributions.

  9. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  10. Detecting Cyber Attacks On Nuclear Power Plants

    Science.gov (United States)

    Rrushi, Julian; Campbell, Roy

    This paper proposes an unconventional anomaly detection approach that provides digital instrumentation and control (I&C) systems in a nuclear power plant (NPP) with the capability to probabilistically discern between legitimate protocol frames and attack frames. The stochastic activity network (SAN) formalism is used to model the fusion of protocol activity in each digital I&C system and the operation of physical components of an NPP. SAN models are employed to analyze links between protocol frames as streams of bytes, their semantics in terms of NPP operations, control data as stored in the memory of I&C systems, the operations of I&C systems on NPP components, and NPP processes. Reward rates and impulse rewards are defined in the SAN models based on the activity-marking reward structure to estimate NPP operation profiles. These profiles are then used to probabilistically estimate the legitimacy of the semantics and payloads of protocol frames received by I&C systems.

  11. Entanglement generation secure against general attacks

    Science.gov (United States)

    Pirker, Alexander; Dunjko, Vedran; Dür, Wolfgang; Briegel, Hans J.

    2017-11-01

    We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g. perform distributed quantum computation in a secure manner. While our results are not fully device independent (which we argue to be unachievable in settings with quantum outputs), our proof holds for arbitrary channel noise and noisy local operations, and even in the case where the eavesdropper learns the noise. Our approach relies on non-trivial properties of distillation protocols which are used in conjunction with de-Finetti and post-selection-type techniques to reduce a general quantum attack in a non-asymptotic scenario to an i.i.d. setting. As a side result, we also provide entanglement distillation protocols for non-i.i.d. input states.

  12. Suicide bomb attack causing penetrating craniocerebral injury

    Directory of Open Access Journals (Sweden)

    Hussain Manzar

    2013-02-01

    Full Text Available 【Abstract】Penetrating cerebral injuries caused by foreign bodies are rare in civilian neurosurgical trauma, al-though there are various reports of blast or gunshot inju-ries in warfare due to multiple foreign bodies like pellets and nails. In our case, a 30-year-old man presented to neurosur-gery clinic with signs and symptoms of right-sided weak-ness after suicide bomb attack. The skull X-ray showed a single intracranial nail. Small craniotomy was done and the nail was removed with caution to avoid injury to surround-ing normal brain tissue. At 6 months’ follow-up his right-sided power improved to against gravity. Key words: Head injury, penetrating; Bombs; Nails

  13. Neural network classifier of attacks in IP telephony

    Science.gov (United States)

    Safarik, Jakub; Voznak, Miroslav; Mehic, Miralem; Partila, Pavol; Mikulec, Martin

    2014-05-01

    Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on these honeypots is collected on a centralized server and then classified. This classification is based on different mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of used neural network and also information about implementation of this network. The learning set for this neural network is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a different part of networks, which are logically or geographically divided and use the information from one network to harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.

  14. Further attacks on Yeung-Mintzer fragile watermarking scheme

    Science.gov (United States)

    Fridrich, Jessica; Goljan, Miroslav; Memon, Nasir D.

    2000-05-01

    In this paper, we describe new and improved attacks on the authentication scheme previously proposed by Yeung and Mintzer. Previous attacks assumed that the binary watermark logo inserted in an image for the purposes of authentication was known. Here we remove that assumption and show how the scheme is still vulnerable, even if the binary logo is not known but the attacker has access to multiple images that have been watermarked with the same secret key and contain the same (but unknown) logo. We present two attacks. The first attack infers the secret watermark insertion function and the binary logo, given multiple images authenticated with the same key and containing the same logo. We show that a very good approximation to the logo and watermark insertion function can be constructed using as few as two images. With color images, one needs many more images, nevertheless the attack is still feasible. The second attack we present, which we call the 'collage-attack' is a variation of the Holliman-Memon counterfeiting attack. The proposed variation does not require knowledge of the watermark logo and produces counterfeits of superior quality by means of a suitable dithering process that we develop.

  15. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  16. Train-the-Trainer Video on the Deliberate Night Attack

    National Research Council Canada - National Science Library

    Dyer, Jean

    1998-01-01

    .... Night and day photography illustrate the training sequence needed to master the individual and buddy team skills, battle drills, and situational training exercises that support the night attack...

  17. The Need for Situational Awareness in a CBRNE Attack

    Directory of Open Access Journals (Sweden)

    Jordan Nelms

    2011-02-01

    Full Text Available Six years before the terrorist attacks on the World Trade Center and the Pentagon, and eight years before the United States went to war with Saddam Hussein for his alleged concealment of chemical and biological weapons caches, Japan's Tokyo subway was struck by one of the most vicious terror attacks in modern history.  The 1995 Sarin terrorist attack represents an important case study for post-9/11 emergency managers because it highlights the key issues first responders and public health officials face when confronted with a CBRNE ('C'hemical, 'B'iological, 'R'adiological, 'N'uclear, 'E'xplosive mass-casualty attack.

  18. Privacy Leaks through Data Hijacking Attack on Mobile Systems

    Directory of Open Access Journals (Sweden)

    Zhang Daojuan

    2017-01-01

    Full Text Available To persistently eavesdrop on the mobile devices, attackers may obtain the elevated privilege and inject malicious modules into the user devices. Unfortunately, the attackers may not be able to obtain the privilege for a long period of time since the exploitable vulnerabilities may be fixed or the malware may be removed. In this paper, we propose a new data hijacking attack for the mobile apps. By employing the proposed method, the attackers are only required to obtain the root privilege of the user devices once, and they can persistently eavesdrop without any change to the original device. Specifically, we design a new approach to construct a shadow system by hijacking user data files. In the shadow system, attackers possess the identical abilities to the victims. For instance, if a victim has logged into the email app, the attacker can also access the email server in the shadow system without authentication in a long period of time. Without reauthentication of the app, it is difficult for victims to notice the intrusion since the whole eavesdropping is performed on other devices (rather than the user devices. In our experiments, we evaluate the effectiveness of the proposed attack and the result demonstrates that even the Android apps released by the top developers cannot resist this attack. Finally, we discuss some approaches to defend the proposed attack.

  19. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  20. Optimal Patrol to Detect Attacks at Dispersed Heterogeneous Locations

    Science.gov (United States)

    2013-12-01

    solution RALP Random-attacker linear program SALP Strategic-attacker linear program SMDP Semi-Markov decision process SP Shortest path SPR1 Shortest...average cost per attack among all vertices, which we refer to as the strategic-attacker linear program ( SALP ): min x zOPT (3.1a) subject to ∑ (k,l)∈A c...the SALP is indicated by zOPT. The lower bound that is obtained from using the LBLP is indicated by zLB. Solutions obtained from using a heuristic

  1. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    . In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...... in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed....

  2. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  3. Cyber-physical attacks a growing invisible threat

    CERN Document Server

    Loukas, George

    2015-01-01

    Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral

  4. A Review Of Recent Cyber-Attacks In Fiji

    Directory of Open Access Journals (Sweden)

    Neeraj A. Sharma

    2015-08-01

    Full Text Available Computing technology has evolved in such dramatic ways that a child can use such technology and their features. Internet is one such technology which allows peripheral devices to be connected to each other creating a network to share information. In the same way information can be attacked. In this paper we will be discussing the different types of cyber-attack that recently took place in Fiji. Common attacks discussed in this review paper are phishing email scams website defacement and skimming. Apart from common preventative methods some novel recommendations have been made. We believe the Fiji experiences and recommendations will assist technology users prepare better against such attacks.

  5. Software test attacks to break mobile and embedded devices

    CERN Document Server

    Hagar, Jon Duncan

    2013-01-01

    Address Errors before Users Find Them Using a mix-and-match approach, Software Test Attacks to Break Mobile and Embedded Devices presents an attack basis for testing mobile and embedded systems. Designed for testers working in the ever-expanding world of ""smart"" devices driven by software, the book focuses on attack-based testing that can be used by individuals and teams. The numerous test attacks show you when a software product does not work (i.e., has bugs) and provide you with information about the software product under test. The book guides you step by step starting with the basics. It

  6. Application distribution model and related security attacks in VANET

    Science.gov (United States)

    Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian

    2013-03-01

    In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.

  7. Computer Network Attacks and Modern International Law

    Directory of Open Access Journals (Sweden)

    Andrey L. Kozik

    2014-01-01

    Full Text Available Computer network attacks (CNA is a no doubt actual theoretical and practical topic today. Espionage, public and private computer-systems disruptions committed by states have been a real life. States execute CNA's involving its agents or hiring private hacker groups. However, the application of lex lata remains unclear in practice and still undeveloped in doctrine. Nevertheless the international obligations, which states have accepted under the UN Charter and other treaties as well as customs - with any related exemptions and reservations - are still in force and create a legal framework, which one cannot ignore. Taking into account the intensity level or the consequences of a CNA the later could be considered as an unfriendly, but legal doing, or, as a use of force (prohibited under the article 2(4 of the UN Charter, or - in the case the proper threshold is taken - as an armed attack (which gives the victim-state the right to use force in self-defence under the customs and the article 51 of the UN Charter. Researches in the field of lex lata applicability to the CNAs could highlight gaps and week points of the nowadays legal regime. The subject is on agenda in western doctrine, and it is a pity - not in Russian one - the number of publication here is still unsatisfied. The article formulates issues related to CNAs and the modern international legal regime. The author explores the definition, legal volume of the term CNA, highlights main issues, which have to be analyzed from the point of the contemporary law.

  8. ULTRAMASSIVE BLACK HOLE COALESCENCE

    International Nuclear Information System (INIS)

    Khan, Fazeel Mahmood; Holley-Bockelmann, Kelly; Berczik, Peter

    2015-01-01

    Although supermassive black holes (SMBHs) correlate well with their host galaxies, there is an emerging view that outliers exist. Henize 2-10, NGC 4889, and NGC 1277 are examples of SMBHs at least an order of magnitude more massive than their host galaxy suggests. The dynamical effects of such ultramassive central black holes is unclear. Here, we perform direct N-body simulations of mergers of galactic nuclei where one black hole is ultramassive to study the evolution of the remnant and the black hole dynamics in this extreme regime. We find that the merger remnant is axisymmetric near the center, while near the large SMBH influence radius, the galaxy is triaxial. The SMBH separation shrinks rapidly due to dynamical friction, and quickly forms a binary black hole; if we scale our model to the most massive estimate for the NGC 1277 black hole, for example, the timescale for the SMBH separation to shrink from nearly a kiloparsec to less than a parsec is roughly 10 Myr. By the time the SMBHs form a hard binary, gravitational wave emission dominates, and the black holes coalesce in a mere few Myr. Curiously, these extremely massive binaries appear to nearly bypass the three-body scattering evolutionary phase. Our study suggests that in this extreme case, SMBH coalescence is governed by dynamical friction followed nearly directly by gravitational wave emission, resulting in a rapid and efficient SMBH coalescence timescale. We discuss the implications for gravitational wave event rates and hypervelocity star production

  9. On the Charter Question: Black Marxism and Black Nationalism

    Science.gov (United States)

    Stern, Mark; Hussain, Khuram

    2015-01-01

    This article brings two black intellectual traditions to bear on the question of charter schools: black Marxism and black nationalism. The authors examine the theoretical and rhetorical devices used to talk about charters schools by focusing on how notions of "black liberation" are deployed by the charter movement, and to what end. The…

  10. "Black Like Me": Reframing Blackness for Decolonial Politics

    Science.gov (United States)

    Dei, George J. Sefa

    2018-01-01

    From a particular vantage point, as an African-born scholar with a politics to affirm my Black subjectivity and Indigeneity in a diasporic context, my article engages a (re)theorization of Blackness for decolonial politics. Building on existing works of how Black scholars, themselves, have theorized Blackness, and recognizing the fluid,…

  11. Black holes new horizons

    CERN Document Server

    Hayward, Sean Alan

    2013-01-01

    Black holes, once just fascinating theoretical predictions of how gravity warps space-time according to Einstein's theory, are now generally accepted as astrophysical realities, formed by post-supernova collapse, or as supermassive black holes mysteriously found at the cores of most galaxies, powering active galactic nuclei, the most powerful objects in the universe. Theoretical understanding has progressed in recent decades with a wider realization that local concepts should characterize black holes, rather than the global concepts found in textbooks. In particular, notions such as trapping h

  12. Treatment of HAE Attacks in the Icatibant Outcome Survey

    DEFF Research Database (Denmark)

    Hernández Fernandez de Rojas, Dolores; Ibañez, Ethel; Longhurst, Hilary

    2015-01-01

    BACKGROUND: Icatibant, a selective bradykinin B2 receptor antagonist for the treatment of acute hereditary angio-oedema (HAE) attacks in adults, can be administered by health care professionals (HCPs) or self-administered. This analysis compared characteristics and outcomes of acute HAE attacks t...

  13. Transforming Graphical System Models To Graphical Attack Models

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Mauw, S.; Kordy, B.

    2015-01-01

    Manually identifying possible attacks on an organisation is a complex undertaking; many different factors must be considered, and the resulting attack scenarios can be complex and hard to maintain as the organisation changes. System models provide a systematic representation of organisations that

  14. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  15. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes......, such as probability or cost of attacks and defences. In case of multiple parameters most analytical methods optimise one parameter at a time, e.g., minimise cost or maximise probability of an attack. Such methods may lead to sub-optimal solutions when optimising conflicting parameters, e.g., minimising cost while...... maximising probability. In order to tackle this challenge, we devise automated techniques that optimise all parameters at once. Moreover, in the case of conflicting parameters our techniques compute the set of all optimal solutions, defined in terms of Pareto efficiency. The developments are carried out...

  16. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  17. 12 CFR 1780.16 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Rules § 1780.16 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral... subpart shall be excused based on the pendency before any court of any interlocutory appeal or collateral...

  18. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  19. Practical Attacks on AES-like Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Kölbl, Stefan; Rechberger, Christian

    2015-01-01

    to drastically reduce the complexity of attacks to very practical values for reduced-round versions. Furthermore, we describe new and practical attacks on Whirlpool and the recently proposed GOST R hash function with one or more of the following properties: more rounds, less time/memory complexity, and more...

  20. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  1. "Dateline NBC"'s Persuasive Attack on Wal-Mart.

    Science.gov (United States)

    Benoit, William L.; Dorries, Bruce

    1996-01-01

    Develops a typology of persuasive attack strategies. Identifies two key components of persuasive attack: responsibility and offensiveness. Describes several strategies for intensifying each of these elements. Applies this analysis to "Dateline NBC"'s allegations that Wal-Mart's "Buy American" campaign was deceptive. Concludes…

  2. Detecting Distributed SQL Injection Attacks in a Eucalyptus Cloud Environment

    Science.gov (United States)

    Kebert, Alan; Barnejee, Bikramjit; Solano, Juan; Solano, Wanda

    2013-01-01

    The cloud computing environment offers malicious users the ability to spawn multiple instances of cloud nodes that are similar to virtual machines, except that they can have separate external IP addresses. In this paper we demonstrate how this ability can be exploited by an attacker to distribute his/her attack, in particular SQL injection attacks, in such a way that an intrusion detection system (IDS) could fail to identify this attack. To demonstrate this, we set up a small private cloud, established a vulnerable website in one instance, and placed an IDS within the cloud to monitor the network traffic. We found that an attacker could quite easily defeat the IDS by periodically altering its IP address. To detect such an attacker, we propose to use multi-agent plan recognition, where the multiple source IPs are considered as different agents who are mounting a collaborative attack. We show that such a formulation of this problem yields a more sophisticated approach to detecting SQL injection attacks within a cloud computing environment.

  3. Understanding Bifurcation of Slow Versus Fast Cyber-Attackers

    NARCIS (Netherlands)

    van Wieren, Maarten; Doerr, Christian; Jacobs, Vivian; Pieters, Wolter; Livraga, Giovanni; Torra, Vicenç; Aldini, Alessandro; Martinelli, Fabio; Suri, Neeraj

    2016-01-01

    Anecdotally, the distinction between fast “Smash-and-Grab‿ cyber-attacks on the one hand and slow attacks or “Advanced Persistent Threats‿ on the other hand is well known. In this article, we provide an explanation for this phenomenon as the outcome of an optimization from the perspective of the

  4. Quantitative security and safety analysis with attack-fault trees

    NARCIS (Netherlands)

    Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette

    2017-01-01

    Cyber physical systems, like power plants, medical devices and data centers have to meet high standards, both in terms of safety (i.e. absence of unintentional failures) and security (i.e. no disruptions due to malicious attacks). This paper presents attack fault trees (AFTs), a formalism that

  5. Internet Attack Traceback: Cross-Validation and Pebble-Trace

    Science.gov (United States)

    2013-02-28

    stolen-cyber-attack. [3] Hacked: Data breach costly for Ohio State, victims of compromised info http://www.thelantern.com/campus/hacked- data ... breach -costly-for-ohio-state-victims-of-compromised-info-1.1831311. [4] S. C. Lee and C. Shields, “Tracing the Source of Network Attack: A Technical

  6. Measuring the effectiveness of SDN mitigations against cyber attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; Meijer, R.; de Laat, C.; Grosso, P.

    2017-01-01

    To address increasing problems caused by cyber attacks, we leverage Software Defined networks and Network Function Virtualisation governed by a SARNET-agent to enable autonomous response and attack mitigation. A Secure Autonomous Response Network (SARNET) uses a control loop to constantly assess the

  7. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based...

  8. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

    DEFF Research Database (Denmark)

    Lamberger, Mario; Mendel, Florian; Schläffer, Martin

    2015-01-01

    We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compression function. Our results are collisions for 5...

  9. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  10. Attacks on Mobile Phones that Use the Automatic Configuration Mechanism

    Directory of Open Access Journals (Sweden)

    A. G. Beltov

    2012-09-01

    Full Text Available The authors analyze the attacks on mobile devices that use the mechanism of an automatic configuration OMA/OTA, whose aim is listening to the Internet traffic of subscribers and the intrusion of malicious software on the user’s device, and suggest ways to protect mobile phones against such attacks.

  11. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    The paper assumes that some people, at least, are liable to attack in war. In a number of ways, this is an ambiguous statement, so before proceeding, I need to clarify the specific senses in which I shall generally be using the terms "liable" and "attack." When I write that "S is liable to milita...

  12. Fault attacks, injection techniques and tools for simulation

    NARCIS (Netherlands)

    Piscitelli, R.; Bhasin, S.; Regazzoni, F.

    2015-01-01

    Faults attacks are a serious threat to secure devices, because they are powerful and they can be performed with extremely cheap equipment. Resistance against fault attacks is often evaluated directly on the manufactured devices, as commercial tools supporting fault evaluation do not usually provide

  13. Python Source Code Plagiarism Attacks on Introductory Programming Course Assignments

    Science.gov (United States)

    Karnalim, Oscar

    2017-01-01

    This paper empirically enlists Python plagiarism attacks that have been found on Introductory Programming course assignments for undergraduate students. According to our observation toward 400 plagiarism-suspected cases, there are 35 plagiarism attacks that have been conducted by students. It starts with comment & whitespace modification as…

  14. Optimizing power system investments and resilience against attacks

    International Nuclear Information System (INIS)

    Fang, Yiping; Sansavini, Giovanni

    2017-01-01

    This paper studies the combination of capacity expansion and switch installation in electric systems that ensures optimum performance under nominal operations and attacks. The planner–attacker–defender model is adopted to develop decisions that minimize investment and operating costs, and functionality loss after attacks. The model bridges long-term system planning for transmission expansion and short-term switching operations in reaction to attacks. The mixed-integer optimization is solved by decomposition via two-layer cutting plane algorithm. Numerical results on an IEEE system shows that small investments in transmission line switching enhance resilience by responding to disruptions via system reconfiguration. Sensitivity analyses show that transmission planning under the assumption of small-scale attacks provides the most robust strategy, i.e. the minimum-regret planning, if many constraints and limited investment budget affect the planning. On the other hand, the assumption of large-scale attacks provides the most robust strategy if the planning process involves large flexibility and budget. - Highlights: • Investment optimization in power systems under attacks is presented. • Capacity expansion and switch installation for system reconfiguration are combined. • The problem is solved by decomposition via two-layer cutting plane algorithm. • Small investments in switch installation enhance resilience by response to attacks. • Sensitivity analyses identify robust planning against different attack scenarios.

  15. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    The objective of this research study was to investigate various issues pertaining to the mechanism, testing methods, and modeling of sulfate attack in concrete. The study was divided into the following segments: (1) effect of gypsum formation on the expansion of mortars, (2) attack by the magnesium ion, (3) sulfate attack in the presence of chloride ions---differentiating seawater and groundwater attack, (4) use of admixtures to mitigate sulfate attack---entrained air, sodium citrate, silica fume, and metakaolin, (5) effects of temperature and concentration of the attack solution, (6) development of new test methods using concrete specimens, and (7) modeling of the sulfate attack phenomenon. Mortar specimens using portland cement (PC) and tricalcium silicate (C 3S), with or without mineral admixtures, were prepared and immersed in different sulfate solutions. In addition to this, portland cement concrete specimens were also prepared and subjected to complete and partial immersion in sulfate solutions. Physical measurements, chemical analyses and microstructural studies were performed periodically on the specimens. Gypsum formation was seen to cause expansion of the C3S mortar specimens. Statistical analyses of the data also indicated that the quantity of gypsum was the most significant factor controlling the expansion of mortar bars. The attack by magnesium ion was found to drive the reaction towards the formation of brucite. Decalcification of the C-S-H and its subsequent conversion to the non-cementitious M-S-H was identified as the mechanism of destruction in magnesium sulfate attack. Mineral admixtures were beneficial in combating sodium sulfate attack, while reducing the resistance to magnesium sulfate attack. Air entrainment did not change the measured physical properties, but reduced the visible distress of the mortars. Sodium citrate caused a substantial reduction in the rate of damage of the mortars due to its retarding effect. Temperature and

  16. Understanding the Black Aesthetic Experience.

    Science.gov (United States)

    Curtis, Marvin V.

    1988-01-01

    Discussing the importance of the Black aesthetic experience, Curtis examines Black cultural heritage and participatory style, the spiritual, and the creation and recreation of Black music. Advocating multicultural music education in teacher training, he suggests that Black music be studied for its value and contribution to society. Lists five ways…

  17. New Directions for Black Women?

    Science.gov (United States)

    McGuigan, Dorothy, Ed.

    1978-01-01

    This collection of papers deals with various aspects of the black female experience in America. "The Black Woman in Transition" discusses the effects of sexism and racism on black women with particular reference to employment and education; it is noted that black women, in comparison with other groups in society, suffer a proportionately higher…

  18. Black Writers' Views of America.

    Science.gov (United States)

    Hairston, Loyle

    1979-01-01

    This article argues that the stagnation, pessimism, and self-pity evident in recent Black writing results in part from the alienation of Black writers from the mainstream of Black life, and in part from the illusions that they share with other Blacks who have embraced the American value system. (Author/EB)

  19. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  20. Matrix metalloproteinases during and outside of migraine attacks without aura

    DEFF Research Database (Denmark)

    Ashina, M.; Tvedskov, J.F.; Thiesen, Kerstin Lipka

    2010-01-01

    Ashina M, Tvedskov JF, Lipka K, Bilello J, Penkowa M & Olesen J. Matrix metalloproteinases during and outside of migraine attacks without aura. Cephalalgia 2009. London. ISSN 0333-1024To test the hypothesis that permeability of the blood-brain barrier (BBB) is altered during migraine attack due...... to enhanced activation of matrix metalloproteinases (MMPs), we investigated MMP-3, MMP-9 and tissue inhibitor of metalloproteases (TIMP)-1 in the external jugular vein during and outside of migraine attacks in 21 patients with migraine without aura. In addition, we measured plasma levels of several other...... of MMP-3 in the external jugular (P = 0.002) and cubital (P = 0.008) vein during attacks compared with outside of attacks. We found no correlation of ictal or interictal MMP-3, MMP-9 and TIMP-1 to migraine duration and frequency analysed in 21 patients (P > 0.05). There was no difference between ictal...

  1. THE REPRISAL ATTACKS BY AL-SHABAAB AGAINST KENYA

    Directory of Open Access Journals (Sweden)

    E.O.S.ODHIAMBO

    2013-10-01

    Full Text Available The incursion of Kenya Defence Forces (KDF into Somalia was met by a series of threats from the Al-Shabaab that it would increase the attacks against Kenya if the troops were not withdrawn. The capture of Kismayu by KDF has weakened the nerve of Al-Shabaab but has not eliminated the imminent danger of a substantive terror attack. Since the incursion by KDF, Kenya has succumbed to a sequence of grenade and Improvised Explosive Devices attacks, roadside bombs, landmines and raids by fighters using small arms and light weapons and Rocket Propelled Grenades against Kenyans mostly in North Eastern, Coastal and Nairobi counties, marking the resurgence of terrorism in the country. We argue that Kenya is more vulnerable to Al-Shabaab terrorists attack than before the KDF incursion by citing the frequencies of reprisal attacks from October 2011 to January 2013. Hence, our troops should be withdrawn and deployed within our boundary.

  2. Variability of clinical features in attacks of migraine with aura

    DEFF Research Database (Denmark)

    Hansen, Jakob M; Goadsby, Peter J; Charles, Andrew C

    2016-01-01

    . CONCLUSION: These findings are consistent with variable involvement of different brain regions during a migraine attack. The variable occurrence of nausea, and phonophobia in conjunction with photophobia, both defining features of migraine, may be an important consideration in designing clinical studies......BACKGROUND: There is significant variability in the clinical presentation of migraine, both among patients, and between attacks in an individual patient. We examined clinical features of migraine with aura in a large group of patients enrolled in a clinical trial, and compared retrospective...... a detailed retrospective description of the clinical features of their attacks of migraine. During the trial, clinical symptoms in migraine attacks starting with aura were recorded prospectively in 861 attacks. RESULTS: Retrospectively reported visual aura symptoms were variable and often overlapping...

  3. Anti-discrimination Analysis Using Privacy Attack Strategies

    KAUST Repository

    Ruggieri, Salvatore

    2014-09-15

    Social discrimination discovery from data is an important task to identify illegal and unethical discriminatory patterns towards protected-by-law groups, e.g., ethnic minorities. We deploy privacy attack strategies as tools for discrimination discovery under hard assumptions which have rarely tackled in the literature: indirect discrimination discovery, privacy-aware discrimination discovery, and discrimination data recovery. The intuition comes from the intriguing parallel between the role of the anti-discrimination authority in the three scenarios above and the role of an attacker in private data publishing. We design strategies and algorithms inspired/based on Frèchet bounds attacks, attribute inference attacks, and minimality attacks to the purpose of unveiling hidden discriminatory practices. Experimental results show that they can be effective tools in the hands of anti-discrimination authorities.

  4. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  5. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  6. SDN-Based Double Hopping Communication against Sniffer Attack

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2016-01-01

    Full Text Available Sniffer attack has been a severe threat to network communication security. Traditional network usually uses static network configuration, which provides convenience to sniffer attack. In this paper, an SDN-based double hopping communication (DHC approach is proposed to solve this problem. In DHC, ends in communication packets as well as the routing paths are changed dynamically. Therefore, the traffic will be distributed to multiple flows and transmitted along different paths. Moreover, the data from multiple users will be mixed, bringing difficulty for attackers in obtaining and recovering the communication data, so that sniffer attack will be prevented effectively. It is concluded that DHC is able to increase the overhead of sniffer attack, as well as the difficulty of communication data recovery.

  7. Improved Impossible Differential Attacks on Large-Block Rijndael

    DEFF Research Database (Denmark)

    Wang, Qingju; Gu, Dawu; Rijmen, Vincent

    2012-01-01

    . The improvement can lead to 10-round attack on Rijndael-256 as well. With 2198.1 chosen plaintexts, an attack is demonstrated on 9-round Rijndael-224 with 2 195.2 encryptions and 2140.4 bytes memory. Increasing the data complexity to 2216 plaintexts, the time complexity can be reduced to 2130 encryptions...... and the memory requirements to 2 93.6 bytes. For 9-round Rijndael-256, we provide an attack requiring 2229.3 chosen plaintexts, 2194 encryptions, and 2 139.6 bytes memory. Alternatively, with 2245.3 plaintexts, an attack with a reduced time of 2127.1 encryptions and a memory complexity of 290.9 bytes can...... be mounted. With 2244.2 chosen plaintexts, we can attack 10-round Rijndael-256 with 2253.9 encryptions and 2186.8 bytes of memory....

  8. Detecting peripheral-based attacks on the host memory

    CERN Document Server

    Stewin, Patrick

    2015-01-01

    This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit.  Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host’s main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only me...

  9. Black holes with halos

    Science.gov (United States)

    Monten, Ruben; Toldo, Chiara

    2018-02-01

    We present new AdS4 black hole solutions in N =2 gauged supergravity coupled to vector and hypermultiplets. We focus on a particular consistent truncation of M-theory on the homogeneous Sasaki–Einstein seven-manifold M 111, characterized by the presence of one Betti vector multiplet. We numerically construct static and spherically symmetric black holes with electric and magnetic charges, corresponding to M2 and M5 branes wrapping non-contractible cycles of the internal manifold. The novel feature characterizing these nonzero temperature configurations is the presence of a massive vector field halo. Moreover, we verify the first law of black hole mechanics and we study the thermodynamics in the canonical ensemble. We analyze the behavior of the massive vector field condensate across the small-large black hole phase transition and we interpret the process in the dual field theory.

  10. Tuberculosis in Blacks

    Science.gov (United States)

    ... are reported in blacks received training to enhance skills for engaging communities, develop strategies, and sustain partnerships for reducing TB rates. Other CDC activities include a study to identify the socio-cultural, racial, and health ...

  11. Introducing the Black Hole

    Science.gov (United States)

    Ruffini, Remo; Wheeler, John A.

    1971-01-01

    discusses the cosmology theory of a black hole, a region where an object loses its identity, but mass, charge, and momentum are conserved. Include are three possible formation processes, theorized properties, and three way they might eventually be detected. (DS)

  12. Colliding black hole solution

    International Nuclear Information System (INIS)

    Ahmed, Mainuddin

    2005-01-01

    A new solution of Einstein equation in general relativity is found. This solution solves an outstanding problem of thermodynamics and black hole physics. Also this work appears to conclude the interpretation of NUT spacetime. (author)

  13. Black Sea aerosols

    International Nuclear Information System (INIS)

    Hacisalihoglu, G.; Eliyakut, F.; Anwari, M.A.; Ataman, O.Y.; Balkas, T.I.; Tuncel, G.; Olmez, I.

    1991-01-01

    Shipboard, high volume air particulate samples were collected from the Black Sea atmosphere and analyzed by instrumental neutron activation analysis, atomic absorption spectrophotometry and ion chromatography for about 40 elements and ions. Concentrations of elements in the eastern and western parts of the Black Sea are different at the 95% confidence level, with lower concentrations in the eastern Black Sea. Back-trajectories and concentrations of elements in trajectory groups show that Europe accounts for more than 70% of the anthropogenic elements in the atmosphere. The average sulfate concentration was 7 μg/m 3 , which is comparable with rural sulfate levels in western Europe. Fluxes of elements from the atmosphere to the Black Sea are in good agreement with the results of similar flux calculations for other regions

  14. Black Teenage Pregnancy

    Directory of Open Access Journals (Sweden)

    Loretta I. Winters

    2012-01-01

    Full Text Available This article examines the relative importance of race and socioeconomic status (SES in determining whether Black and White teenagers report having ever been pregnant. Data gathered from 1999 to 2006 by the National Center for Health Statistics of the Center for Disease Control and Prevention included 1,580 Black and White females aged 15 to 19 years. Results supported the effects of race and SES, with SES having the stronger effect. However, the effects of race and SES differ when controlling for the state of the economy. No difference between Blacks and Whites was found during better economic times. During 2003-2004, the period of greatest economic stress, race was determined to be the only predictor of teenage pregnancy. In particular, during 2005-2006, the reduction in pregnancy rates for Black minors (15-17 fell below those for White minors within their respective SES categories. Policy implications are discussed in light of these findings.

  15. Black-hole thermodynamics

    International Nuclear Information System (INIS)

    Bekenstein, J.D.

    1980-01-01

    Including black holes in the scheme of thermodynamics has disclosed a deep-seated connection between gravitation, heat and the quantum that may lead us to a synthesis of the corresponding branches of physics

  16. Crohn's Disease Transvaal Blacks

    African Journals Online (AJOL)

    lation of North America.",l3. Regional ... younger patients, and the colon in the older age group. ... pain, suffering from frequent severe attacks of central .... A diagnosis of carcinoma of the .... survival and there is an impression that even with ob-.

  17. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  18. White dwarfs - black holes

    International Nuclear Information System (INIS)

    Sexl, R.; Sexl, H.

    1975-01-01

    The physical arguments and problems of relativistic astrophysics are presented in a correct way, but without any higher mathematics. The book is addressed to teachers, experimental physicists, and others with a basic knowledge covering an introductory lecture in physics. The issues dealt with are: fundamentals of general relativity, classical tests of general relativity, curved space-time, stars and planets, pulsars, gravitational collapse and black holes, the search for black holes, gravitational waves, cosmology, cosmogony, and the early universe. (BJ/AK) [de

  19. Supersymmetric black holes

    OpenAIRE

    de Wit, Bernard

    2005-01-01

    The effective action of $N=2$, $d=4$ supergravity is shown to acquire no quantum corrections in background metrics admitting super-covariantly constant spinors. In particular, these metrics include the Robinson-Bertotti metric (product of two 2-dimensional spaces of constant curvature) with all 8 supersymmetries unbroken. Another example is a set of arbitrary number of extreme Reissner-Nordstr\\"om black holes. These black holes break 4 of 8 supersymmetries, leaving the other 4 unbroken. We ha...

  20. Bumpy black holes

    OpenAIRE

    Emparan, Roberto; Figueras, Pau; Martinez, Marina

    2014-01-01

    We study six-dimensional rotating black holes with bumpy horizons: these are topologically spherical, but the sizes of symmetric cycles on the horizon vary non-monotonically with the polar angle. We construct them numerically for the first three bumpy families, and follow them in solution space until they approach critical solutions with localized singularities on the horizon. We find strong evidence of the conical structures that have been conjectured to mediate the transitions to black ring...

  1. British Dance: Black Routes

    OpenAIRE

    Adair, C.; Burt, Ramsay, 1953-

    2016-01-01

    British Dance: Black Routes re-examines the distinctive contributions made to British dance by dancers who are Black. Covering the period 1946 to the present, it presents a radical re-reading of dancers and their companies, placing their achievements within a broader historical, cultural and artistic context. The result of a two year research project, British Dance and the African Diaspora, led by editors Christy Adair and Ramsay Burt, the collection looks at artists working with contempor...

  2. Black Holes and Thermodynamics

    OpenAIRE

    Wald, Robert M.

    1997-01-01

    We review the remarkable relationship between the laws of black hole mechanics and the ordinary laws of thermodynamics. It is emphasized that - in analogy with the laws of thermodynamics - the validity the laws of black hole mechanics does not appear to depend upon the details of the underlying dynamical theory (i.e., upon the particular field equations of general relativity). It also is emphasized that a number of unresolved issues arise in ``ordinary thermodynamics'' in the context of gener...

  3. Clinical study on transient ischemic attack

    International Nuclear Information System (INIS)

    Takusagawa, Yoshihiko; Fujiwara, Yasuhiro; Ichiki, Ken; Suga, Takeshi; Nishigaki, Shinichi

    1986-01-01

    The purpose of this study was to neuroradiologically elucidate the mechanism by which transient ischemic attack (TIA) occurs. A total of 65 patients with TIA, including 52 with TIA in the internal carotid artery (Group I) and 13 with TIA in the vertebrobasilar artery (Group II), underwent computed tomography (CT) and cerebral angiography (CAG). In Group I, CAG revealed normal findings in 25 patients, extracranial lesions in 14, intracranial lesions in 11, and mixed extra- and intra-cranial lesions in 2; and the corresponding figures for Group II were 8, 4, 1 and 0, respectively. CT findings in Groups I and II included: normal findings in 27 and 9 patients, atrophied cerebrum and dilated cerebral ventricle in 7 and 2, TIA-unrelated infarction in 5 and one, and TIA-related infarction in 15 and one, respectively. In the 15 patients with TIA-related infarction in Group I, 10 had infarction in the basal cell nucleolus and the other 5 had widespread infarction extending to the area under the cortex. The latter 5 patients had cerebral infarction, and showed recanalization of the vessels. This finding may support the theory of ''microembolus'' as a possible cause of TIA. (Namekawa, K.)

  4. Current therapy for chronic cerebrovascular attack

    Directory of Open Access Journals (Sweden)

    A. A. Shmonin

    2015-01-01

    Full Text Available Chronic cerebrovascular attack (CCVA is a brain lesion caused by vascular factors. CCVA appears as cognitive impairments (CIs, affective (emotional disorders and focal syndromes. Treatment for CCVA requires a comprehensive approach. Effective combination therapy for CCVA involves secondary prevention of stroke and CIs; treatment of CIs; treatment of depression and other affective disorders; and neuroprotective therapy. Basic therapy for CCVA includes modification of risk factors, antihypertensive, hypolipidemic, and antithrombotic therapies. Central acetylcholinesterase inhibitors (galantamine, rivastigmine, donepezil and a reversible NMDA receptor blocker (memantine are symptomatically used at a stage of vascular and mixed dementia. There are no unique guidelines for the therapy of mild and moderate vascular nondementia-related CIs. Drug use, based on the neurochemical mechanisms underlying the development of vascular CIs, is substantiated. When choosing psychotropic agents, it is necessary to take into account the causes and clinical manifestations of neuromediator deficiency. Antidepressants are used as essential drugs. Neuroleptics and tranquilizers are additionally administered in complex-pattern syndromes, such as depression with marked anxiety. Prescription of neuroprotectors may be effective in treating both stroke and CCVA. These medicaments are most effective when a damaging factor acts, i.e. neuroprotectors should be given in a risk situation and to reduce damage. Citicoline is one of the most test drugs in a group of neuroprotectors. 

  5. Intergranular attack evaluation from hideout return

    International Nuclear Information System (INIS)

    Nordmann, F.; Dupin, M.; Menet, O.; Fiquet, J.-M.

    1989-01-01

    Intergranular Attack (IGA) is the secondary side corrosion mechanism on PWR steam generator tubing, which can occur most frequently even with a good waterchemistry. It has moderately developed in a few French units. Consequently, several remedies have been implemented, such as sodium content decrease in makeup water and application of more stringent chemistry specifications. In order to evaluate the local chemistry in restricted areas where IGA may occur, a large hideout return programme has been carried out on many units. It shows that free alkalinity returning during shutdown is usually ranging from 0.5 to 5 g of sodium per steam generator, and that the required time to let it return is about 40 hours. However, high temperature pH calculations indicate that such an amount of alkalinity can correspond to a potentially corrosive solution in restricted areas, where a concentration factor of 10 5 to 10 7 can be reached, inducing a pH of 10 at 300 o C. Studies are still in progress in order to define when a shutdown should be required to allow hideout return and help to prevent IGA. (author)

  6. Attacks on South African monuments: Mediating heritage in post-conflict society

    Directory of Open Access Journals (Sweden)

    Ntsikelelo B. Breakfast

    2018-05-01

    Full Text Available The controversy surrounding the notion of national heritage and what constitutes a proper heritage in post-apartheid South Africa intersects with issues of identity and identity formation in a post-conflict society. That it impinges powerfully on social cohesion has been thrust into the spotlight in view of recent protest action related to colonial and apartheid era monuments. We have made the point elsewhere that conflict resolution in South Africa through negotiations, the National Peace Accord and the Truth and Reconciliation Commission has, at best, been partial, that it has not always been taken sufficiently seriously to engage with the fault-lines of protracted social conflict in the country. This article has employed a qualitative methodology because it is both descriptive and explorative in nature. The main aim of this article is to provide a critique on how issues of intersectionality (race, class and gender coincide with the attacks of the monuments by university students in South Africa. This article utilises two theoretical frameworks, namely, classical Marxism and Black Consciousness, simply because both the psychological and class analysis were invoked by the student bodies to diagnose and prognose the challenges of black South Africans within the context of higher education in South Africa. The central thesis of this article is that the attacks on monuments in South African universities were instigated by a group of young people who claim to be revolutionary in thinking and are calling for transformation, free education, dismantling gender oppression and doing away with institutionalisation of racism.

  7. Black holes, quantum theory and cosmology

    International Nuclear Information System (INIS)

    Penrose, Roger

    2009-01-01

    Some reasons are given for believing that the rules of quantum (field) theory must be changed when general relativity becomes seriously involved. If full quantum mechanical respect is paid to the principle of equivalence, we find that a superposition of gravitational fields leads to an illegal superposition of different vacua, giving support to a proposal for spontaneous quantum state reduction made earlier by Diosi, and then independently by the author. A different line of attack involves the over-riding role of black holes in the total entropy content of the universe, and in the operation of the 2nd Law of thermodynamics. The author's proposal of conformal cyclic cosmology is reviewed in order to highlight a seeming paradox, according to which the entropy of the universe of the remote future seems to return to the small kind of value that it had at the big bang. The paradox is resolved when we take into account the information loss that, from this perspective, necessarily occurs in Hawking's black-hole evaporation, with the accompanying loss of unitarity.

  8. Black holes, quantum theory and cosmology

    Science.gov (United States)

    Penrose, Roger

    2009-06-01

    Some reasons are given for believing that the rules of quantum (field) theory must be changed when general relativity becomes seriously involved. If full quantum mechanical respect is paid to the principle of equivalence, we find that a superposition of gravitational fields leads to an illegal superposition of different vacua, giving support to a proposal for spontaneous quantum state reduction made earlier by Diósi, and then independently by the author. A different line of attack involves the over-riding role of black holes in the total entropy content of the universe, and in the operation of the 2nd Law of thermodynamics. The author's proposal of conformal cyclic cosmology is reviewed in order to highlight a seeming paradox, according to which the entropy of the universe of the remote future seems to return to the small kind of value that it had at the big bang. The paradox is resolved when we take into account the information loss that, from this perspective, necessarily occurs in Hawking's black-hole evaporation, with the accompanying loss of unitarity.

  9. Black holes, quantum theory and cosmology

    Energy Technology Data Exchange (ETDEWEB)

    Penrose, Roger, E-mail: rouse@maths.ox.ac.u [Mathematical Institute, 24-29 St Giles, Oxford OX1 3LB (United Kingdom)

    2009-06-01

    Some reasons are given for believing that the rules of quantum (field) theory must be changed when general relativity becomes seriously involved. If full quantum mechanical respect is paid to the principle of equivalence, we find that a superposition of gravitational fields leads to an illegal superposition of different vacua, giving support to a proposal for spontaneous quantum state reduction made earlier by Diosi, and then independently by the author. A different line of attack involves the over-riding role of black holes in the total entropy content of the universe, and in the operation of the 2nd Law of thermodynamics. The author's proposal of conformal cyclic cosmology is reviewed in order to highlight a seeming paradox, according to which the entropy of the universe of the remote future seems to return to the small kind of value that it had at the big bang. The paradox is resolved when we take into account the information loss that, from this perspective, necessarily occurs in Hawking's black-hole evaporation, with the accompanying loss of unitarity.

  10. Black holes and beyond

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-02-01

    Belief in the existence of black holes is the ultimate act of faith for a physicist. First suggested by the English clergyman John Michell in the year 1784, the gravitational pull of a black hole is so strong that nothing - not even light - can escape. Gravity might be the weakest of the fundamental forces but black-hole physics is not for the faint-hearted. Black holes present obvious problems for would-be observers because they cannot, by definition, be seen with conventional telescopes - although before the end of the decade gravitational-wave detectors should be able to study collisions between black holes. Until then astronomers can only infer the existence of a black hole from its gravitational influence on other matter, or from the X-rays emitted by gas and dust as they are dragged into the black hole. However, once this material passes through the 'event horizon' that surrounds the black hole, we will never see it again - not even with X-ray specs. Despite these observational problems, most physicists and astronomers believe that black holes do exist. Small black holes a few kilometres across are thought to form when stars weighing more than about two solar masses collapse under the weight of their own gravity, while supermassive black holes weighing millions of solar masses appear to be present at the centre of most galaxies. Moreover, some brave physicists have proposed ways to make black holes - or at least event horizons - in the laboratory. The basic idea behind these 'artificial black holes' is not to compress a large amount of mass into a small volume, but to reduce the speed of light in a moving medium to less than the speed of the medium and so create an event horizon. The parallels with real black holes are not exact but the experiments could shed new light on a variety of phenomena. The first challenge, however, is to get money for the research. One year on from a high-profile meeting on artificial black holes in London, for

  11. Inflammation and neuropathic attacks in hereditary brachial plexus neuropathy

    Science.gov (United States)

    Klein, C; Dyck, P; Friedenberg, S; Burns, T; Windebank, A; Dyck, P

    2002-01-01

    Objective: To study the role of mechanical, infectious, and inflammatory factors inducing neuropathic attacks in hereditary brachial plexus neuropathy (HBPN), an autosomal dominant disorder characterised by attacks of pain and weakness, atrophy, and sensory alterations of the shoulder girdle and upper limb muscles. Methods: Four patients from separate kindreds with HBPN were evaluated. Upper extremity nerve biopsies were obtained during attacks from a person of each kindred. In situ hybridisation for common viruses in nerve tissue and genetic testing for a hereditary tendency to pressure palsies (HNPP; tomaculous neuropathy) were undertaken. Two patients treated with intravenous methyl prednisolone had serial clinical and electrophysiological examinations. One patient was followed prospectively through pregnancy and during the development of a stereotypic attack after elective caesarean delivery. Results: Upper extremity nerve biopsies in two patients showed prominent perivascular inflammatory infiltrates with vessel wall disruption. Nerve in situ hybridisation for viruses was negative. There were no tomaculous nerve changes. In two patients intravenous methyl prednisolone ameliorated symptoms (largely pain), but with tapering of steroid dose, signs and symptoms worsened. Elective caesarean delivery did not prevent a typical postpartum attack. Conclusions: Inflammation, probably immune, appears pathogenic for some if not all attacks of HBPN. Immune modulation may be useful in preventing or reducing the neuropathic attacks, although controlled trials are needed to establish efficacy, as correction of the mutant gene is still not possible. The genes involved in immune regulation may be candidates for causing HBPN disorders. PMID:12082044

  12. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  13. Fatal injection: a survey of modern code injection attack countermeasures

    Directory of Open Access Journals (Sweden)

    Dimitris Mitropoulos

    2017-11-01

    Full Text Available With a code injection attack (CIA an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures developed to detect the various attack forms. In particular, we identify two distinct categories. The first incorporates static program analysis tools used to eliminate flaws that can lead to such attacks during the development of the system. The second involves the use of dynamic detection safeguards that prevent code injection attacks while the system is in production mode. Our analysis is based on nonfunctional characteristics that are considered critical when creating security mechanisms. Such characteristics involve usability, overhead, implementation dependencies, false positives and false negatives. Our categorization and analysis can help both researchers and practitioners either to develop novel approaches, or use the appropriate mechanisms according to their needs.

  14. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  15. Changes in vestibular evoked myogenic potentials after Meniere attacks.

    Science.gov (United States)

    Kuo, Shih-Wei; Yang, Ting-Hua; Young, Yi-Ho

    2005-09-01

    The aim of this study was to apply videonystagmography (VNG) and vestibular evoked myogenic potential (VEMP) tests to patients with Meniere attacks, to explore the mechanics of where saccular disorders may affect the semicircular canals. From January 2001 to December 2003, 12 consecutive patients with unilateral definite Meniere's disease with vertiginous attacks underwent VNG for recording spontaneous nystagmus, as well as VEMP tests. At the very beginning of the Meniere attack, the spontaneous nystagmus beat toward the lesion side in 5 patients (42%) and toward the healthy side in 7 patients (58%). Twenty-four hours later, only 6 patients (50%) showed spontaneous nystagmus beating toward the healthy side. Nevertheless, spontaneous nystagmus subsided in all patients within 48 hours. The VEMP test was performed within 24 hours of a Meniere attack; the VEMPs were normal in 4 patients and abnormal in 8 patients (67%). After 48 hours, 4 patients with initially abnormal VEMPs had resolution and return to normal VEMPs, and the other 4 patients still had absent VEMPs. Most patients (67%) with Meniere attacks revealed abnormal VEMPs, indicating that the saccule participates in a Meniere attack. This is an important idea that stimulates consideration of the mechanism of Meniere attacks.

  16. Robotic exoskeleton assessment of transient ischemic attack.

    Directory of Open Access Journals (Sweden)

    Leif Simmatis

    Full Text Available We used a robotic exoskeleton to quantify specific patterns of abnormal upper limb motor behaviour in people who have had transient ischemic attack (TIA. A cohort of people with TIA was recruited within two weeks of symptom onset. All individuals completed a robotic-based assessment of 8 behavioural tasks related to upper limb motor and proprioceptive function, as well as cognitive function. Robotic task performance was compared to a large cohort of controls without neurological impairments corrected for the influence of age. Impairment in people with TIA was defined as performance below the 5th percentile of controls. Participants with TIA were also assessed with the National Institutes of Health Stroke Scale (NIHSS score, Chedoke-McMaster Stroke Assessment (CMSA of the arm, the Behavioural Inattention Test (BIT, the Purdue pegboard test (PPB, and the Montreal Cognitive Assessment (MoCA. Age-related white matter change (ARWMC, prior infarction and cella-media index (CMI were assessed from baseline CT scan that was performed within 24 hours of TIA. Acute infarction was assessed from diffusion-weighted imaging in a subset of people with TIA. Twenty-two people with TIA were assessed. Robotic assessment showed impaired upper limb motor function in 7/22 people with TIA patients and upper limb sensory impairment in 4/22 individuals. Cognitive tasks involving robotic assessment of the upper limb were completed in 13 participants, of whom 8 (61.5% showed significant impairment. Abnormal performance in the CMSA arm inventory was present in 12/22 (54.5% participants. ARWMC was 11.8 ± 6.4 and CMI was 5.4 ± 1.5. DWI was positive in 0 participants. Quantitative robotic assessment showed that people who have had a TIA display a spectrum of upper limb motor and sensory performance deficits as well as cognitive function deficits despite resolution of symptoms and no evidence of tissue infarction.

  17. Robotic exoskeleton assessment of transient ischemic attack.

    Science.gov (United States)

    Simmatis, Leif; Krett, Jonathan; Scott, Stephen H; Jin, Albert Y

    2017-01-01

    We used a robotic exoskeleton to quantify specific patterns of abnormal upper limb motor behaviour in people who have had transient ischemic attack (TIA). A cohort of people with TIA was recruited within two weeks of symptom onset. All individuals completed a robotic-based assessment of 8 behavioural tasks related to upper limb motor and proprioceptive function, as well as cognitive function. Robotic task performance was compared to a large cohort of controls without neurological impairments corrected for the influence of age. Impairment in people with TIA was defined as performance below the 5th percentile of controls. Participants with TIA were also assessed with the National Institutes of Health Stroke Scale (NIHSS) score, Chedoke-McMaster Stroke Assessment (CMSA) of the arm, the Behavioural Inattention Test (BIT), the Purdue pegboard test (PPB), and the Montreal Cognitive Assessment (MoCA). Age-related white matter change (ARWMC), prior infarction and cella-media index (CMI) were assessed from baseline CT scan that was performed within 24 hours of TIA. Acute infarction was assessed from diffusion-weighted imaging in a subset of people with TIA. Twenty-two people with TIA were assessed. Robotic assessment showed impaired upper limb motor function in 7/22 people with TIA patients and upper limb sensory impairment in 4/22 individuals. Cognitive tasks involving robotic assessment of the upper limb were completed in 13 participants, of whom 8 (61.5%) showed significant impairment. Abnormal performance in the CMSA arm inventory was present in 12/22 (54.5%) participants. ARWMC was 11.8 ± 6.4 and CMI was 5.4 ± 1.5. DWI was positive in 0 participants. Quantitative robotic assessment showed that people who have had a TIA display a spectrum of upper limb motor and sensory performance deficits as well as cognitive function deficits despite resolution of symptoms and no evidence of tissue infarction.

  18. TCPL: A Defense against wormhole attacks in wireless sensor networks

    International Nuclear Information System (INIS)

    Kumar, K. E. Naresh; Waheed, Mohd. Abdul; Basappa, K. Kari

    2010-01-01

    Do In this paper presents recent advances in technology have made low-cost, low-power wireless sensors with efficient energy consumption. A network of such nodes can coordinate among themselves for distributed sensing and processing of certain data. For which, we propose an architecture to provide a stateless solution in sensor networks for efficient routing in wireless sensor networks. This type of architecture is known as Tree Cast. We propose a unique method of address allocation, building up multiple disjoint trees which are geographically inter-twined and rooted at the data sink. Using these trees, routing messages to and from the sink node without maintaining any routing state in the sensor nodes is possible. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many sensor network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. We present a new, general mechanism, called packet leashes, for detecting and thus defending against wormhole attacks, and we present a specific protocol, called TIK, that implements leashes.

  19. Surface geometry of 5D black holes and black rings

    International Nuclear Information System (INIS)

    Frolov, Valeri P.; Goswami, Rituparno

    2007-01-01

    We discuss geometrical properties of the horizon surface of five-dimensional rotating black holes and black rings. Geometrical invariants characterizing these 3D geometries are calculated. We obtain a global embedding of the 5D rotating black horizon surface into a flat space. We also describe the Kaluza-Klein reduction of the black ring solution (along the direction of its rotation) which, though it is nakedly singular, relates this solution to the 4D metric of a static black hole distorted by the presence of external scalar (dilaton) and vector ('electromagnetic') fields. The properties of the reduced black hole horizon and its embedding in E 3 are briefly discussed

  20. A Cyber-Attack Detection Model Based on Multivariate Analyses

    Science.gov (United States)

    Sakai, Yuto; Rinsaka, Koichiro; Dohi, Tadashi

    In the present paper, we propose a novel cyber-attack detection model based on two multivariate-analysis methods to the audit data observed on a host machine. The statistical techniques used here are the well-known Hayashi's quantification method IV and cluster analysis method. We quantify the observed qualitative audit event sequence via the quantification method IV, and collect similar audit event sequence in the same groups based on the cluster analysis. It is shown in simulation experiments that our model can improve the cyber-attack detection accuracy in some realistic cases where both normal and attack activities are intermingled.