WorldWideScience

Sample records for ddos distributed denial

  1. Improving Distributed Denial of Service (DDOS Detection using Entropy Method in Software Defined Network (SDN

    Directory of Open Access Journals (Sweden)

    Maman Abdurohman

    2017-12-01

    Full Text Available This research proposed a new method to enhance Distributed Denial of Service (DDoS detection attack on Software Defined Network (SDN environment. This research utilized the OpenFlow controller of SDN for DDoS attack detection using modified method and regarding entropy value. The new method would check whether the traffic was a normal traffic or DDoS attack by measuring the randomness of the packets. This method consisted of two steps, detecting attack and checking the entropy. The result shows that the new method can reduce false positive when there is a temporary and sudden increase in normal traffic. The new method succeeds in not detecting this as a DDoS attack. Compared to previous methods, this proposed method can enhance DDoS attack detection on SDN environment.

  2. A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS on Software Defined Network (SDN

    Directory of Open Access Journals (Sweden)

    M. H. H. Khairi

    2018-04-01

    Full Text Available Software defined network (SDN is a network architecture in which the network traffic may be operated and managed dynamically according to user requirements and demands. Issue of security is one of the big challenges of SDN because different attacks may affect performance and these attacks can be classified into different types. One of the famous attacks is distributed denial of service (DDoS. SDN is a new networking approach that is introduced with the goal to simplify the network management by separating the data and control planes. However, the separation leads to the emergence of new types of distributed denial-of-service (DDOS attacks on SDN networks. The centralized role of the controller in SDN makes it a perfect target for the attackers. Such attacks can easily bring down the entire network by bringing down the controller. This research explains DDoS attacks and the anomaly detection as one of the famous detection techniques for intelligent networks.

  3. A statistical and distributed packet filter against DDoS attacks in ...

    Indian Academy of Sciences (India)

    VIKASH C PANDEY

    2018-03-14

    Mar 14, 2018 ... Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks ... packet filtering model is proposed against DDoS attacks in Cloud. The key idea of this .... generates alerts or logs. If a deviation from ...

  4. PENGEMBANGAN PENCEGAHAN SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDOS PADA SUMBER DAYA JARINGAN DENGAN INTEGRASI NETWORK BEHAVIOR ANALYSIS DAN CLIENT PUZZLE

    Directory of Open Access Journals (Sweden)

    Septian Geges

    2015-01-01

    Full Text Available Denial of Service (DoS merupakan permasalahan keamanan jaringan yang sampai saat ini terus berkembang secara dinamis. Semakin tinggi kemampuan komputasi suatu komputer penyerang, serangan DoS yang dapat dihasilkan juga semakin membahayakan. Serangan ini dapat mengakibatkan ketidakmampuan server untuk melayani service request yang sah. Karena itu serangan DoS sangat merugikan dan perlu diberikan pencegahan yang efektif. Ancaman berikutnya yang juga sangat membahayakan adalah Distributed Denial of Service (DDoS, dimana serangan ini memanfaatkan sejumlah besar komputer untuk menjalankan serangan DoS kepada server, web service, atau sumber daya jaringan lain. Mengingat resiko besar yang diakibatkan serangan DDoS ini, banyak peneliti yang terdorong untuk merancang mekanisme penga-manan sumber daya jaringan. Pada penelitian ini, penulis mengkhususkan pokok permasalahan pada pengamanan web service. Penulis mengemuka-kan sebuah mekanisme untuk mengamankan web service dengan cara melakukan filtrasi dan validasi permintaan yang diterima untuk mengakses sumber daya jaringan. Filtrasi dan validasi ini dilakukan dengan gabungan metode Network Behavior Analysis (NBA dan Client Puzzle (CP. Metode NBA menjadi lapisan pertahanan pertama untuk mendeteksi apakah sedang terjadi serangan DDoS dengan mengukur tingkat kepadatan jaringan/Network density. Dari metode NBA, didapatkan IP Address yang perlu divalidasi dengan metode CP sebagai lapisan pertahanan kedua. Apabila suatu service request sudah berhasil melewati proses filtrasi dan validasi ini, maka service request ini baru akan dilayani. Dari hasil percobaan, terbukti metode ini dapat mendeteksi serangan DDoS sekaligus menjamin bahwa service request yang sah mendapat pelayanan yang seharusnya sehingga server dapat melayani service request dengan baik.

  5. "LUDO" - Kids playing Distributed Denial of Service

    NARCIS (Netherlands)

    Steinberger, Jessica; Cardoso de Santanna, José Jair; Spatharas, E.; Amler, H.; Breuer, N.; Graul, K.; Kuhnert, B.; Piontek, U.; Sperotto, Anna; Baier, H.; Pras, Aiko; Bergström, Johan; Hórvath, Gyöngyi; Schofield, Brook

    2016-01-01

    Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The reason is that DDoS attacks are getting larger, more

  6. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  7. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  8. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  9. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  10. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

    NARCIS (Netherlands)

    Moreira Moura, Giovane; de Oliveira Schmidt, R.; Heidemann, John; de Vries, Wouter Bastiaan; Müller, Moritz; Wei, Lan; Hesselman, C.E.W.

    2016-01-01

    Distributed Denial-of-Service (DDoS) attacks continue to be a major threat on the Internet today. DDoS attacks overwhelm target services with requests or other traffic, causing requests from legitimate users to be shut out. A common defense against DDoS is to replicate a service in multiple physical

  11. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event

    NARCIS (Netherlands)

    Moreira Moura, Giovane; de Oliveira Schmidt, R.; Heidemann, John; de Vries, Wouter Bastiaan; Müller, Moritz; Wei, Lan; Hesselman, C.E.W.

    Distributed Denial-of-Service (DDoS) attacks continue to be a major threat in the Internet today. DDoS attacks over- whelm target services with requests or other traffic, causing requests from legitimate users to be shut out. A common defense against DDoS is to replicate the service in multiple

  12. Measuring the Adoption of DDoS Protection Services

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna; van Rijswijk, Roland M.; Sadre, R.; Pras, Aiko

    2016-01-01

    Distributed Denial-of-Service (DDoS) attacks have steadily gained in popularity over the last decade, their intensity ranging from mere nuisance to severe. The increased number of attacks, combined with the loss of revenue for the targets, has given rise to a market for DDoS Protection Service (DPS)

  13. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  14. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  15. Cryptographic Puzzles and Game Theory against DoS and DDoS attacks in Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2008-01-01

    In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In the _rst part, we describe client puzzle techniques that are based on the idea of computationally exhausting a malicious user when he attempts to launch an attack. In the ......In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In the _rst part, we describe client puzzle techniques that are based on the idea of computationally exhausting a malicious user when he attempts to launch an attack....... In the second part we are introducing some basic principles of game theory and we discuss how game theoretical frameworks can protect computer networks. Finally, we show techniques that combine client puzzles with game theory in order to provide DoS and DDoS resilience....

  16. Real-time DDoS defense: a collaborative approach at internet scale

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Pras, Aiko; Baier, Harald

    2014-01-01

    In the last years, Distributed Denial of Service attacks (DDoS) evolved to one of the major causes responsible for network infrastructure and service outages. Often the amount of traffic generated by DDoS attacks is such that, although traditional security solutions as firewalls and Intrusion

  17. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  18. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  19. Scalable DDoS Mitigation System for Data Centers

    Directory of Open Access Journals (Sweden)

    Zdenek Martinasek

    2015-01-01

    Full Text Available Distributed Denial of Service attacks (DDoS have been used by attackers for over two decades because of their effectiveness. This type of the cyber-attack is one of the most destructive attacks in the Internet. In recent years, the intensity of DDoS attacks has been rapidly increasing and the attackers combine more often different techniques of DDoS to bypass the protection. Therefore, the main goal of our research is to propose a DDoS solution that allows to increase the filtering capacity linearly and allows to protect against the combination of attacks. The main idea is to develop the DDoS defense system in the form of a portable software image that can be installed on the reserve hardware capacities. During a DDoS attack, these servers will be used as filters of this DDoS attack. Our solution is suitable for data centers and eliminates some lacks of commercial solutions. The system employs modular DDoS filters in the form of special grids containing specific protocol parameters and conditions.

  20. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Adrien Bonguet

    2017-08-01

    Full Text Available Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services. Denial-of-Service (DoS and Distributed Denial-of-Service (DDoS attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.

  1. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    OpenAIRE

    Han, Biao; Yang, Xiangrui; Sun, Zhigang; Huang, Jinfeng; Su, Jinshu

    2018-01-01

    Distributed Denial of Service (DDoS) attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN), it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS a...

  2. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud A.M.G.; Nieuwenhuis, Lambertus Johannes Maria

    2017-01-01

    DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS)

  3. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  4. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  5. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  6. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  7. Investigation Model for DDoS Attack Detection in Real-Time

    Directory of Open Access Journals (Sweden)

    Abdulghani Ali Ahmed

    2015-02-01

    Full Text Available Investigating traffic of distributed denial of services (DDoS attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

  8. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions

    OpenAIRE

    Somani, Gaurav; Gaur, Manoj Singh; Sanghi, Dheeraj; Conti, Mauro; Buyya, Rajkumar

    2015-01-01

    Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions i...

  9. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  10. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  11. Model for Detection and Classification of DDoS Traffic Based on Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    D. Peraković

    2017-06-01

    Full Text Available Detection of DDoS (Distributed Denial of Service traffic is of great importance for the availability protection of services and other information and communication resources. The research presented in this paper shows the application of artificial neural networks in the development of detection and classification model for three types of DDoS attacks and legitimate network traffic. Simulation results of developed model showed accuracy of 95.6% in classification of pre-defined classes of traffic.

  12. Multiplayer Game for DDoS Attacks Resilience in Ad Hoc Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of malicious nodes to cooperate...... with one another in order to effectively make a DDoS attack. Finally, through our experiments we have shown that the total overhead of the multiplayer game as well as the the total time that each node needs to be served is affordable for devices that have limited resources and for environments like ad hoc...

  13. Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna; Latré, Steven; Charalambides, Marinos; François, Jérôme; Schmitt, Corinna; Stiller, Burkhard

    Over the last years, Distributed Denial-of-Service (DDoS) attacks have become an increasing threat on the Internet, with recent attacks reaching traffic volumes of up to 500 Gbps. To make matters worse, web-based facilities that offer “DDoS-as-a-service‿ (i.e., Booters) allow for the layman to

  14. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  15. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  16. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  17. Entropy-Based Application Layer DDoS Attack Detection Using Artificial Neural Networks

    Directory of Open Access Journals (Sweden)

    Khundrakpam Johnson Singh

    2016-10-01

    Full Text Available Distributed denial-of-service (DDoS attack is one of the major threats to the web server. The rapid increase of DDoS attacks on the Internet has clearly pointed out the limitations in current intrusion detection systems or intrusion prevention systems (IDS/IPS, mostly caused by application-layer DDoS attacks. Within this context, the objective of the paper is to detect a DDoS attack using a multilayer perceptron (MLP classification algorithm with genetic algorithm (GA as learning algorithm. In this work, we analyzed the standard EPA-HTTP (environmental protection agency-hypertext transfer protocol dataset and selected the parameters that will be used as input to the classifier model for differentiating the attack from normal profile. The parameters selected are the HTTP GET request count, entropy, and variance for every connection. The proposed model can provide a better accuracy of 98.31%, sensitivity of 0.9962, and specificity of 0.0561 when compared to other traditional classification models.

  18. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  19. Note on Studying Change Point of LRD Traffic Based on Li's Detection of DDoS Flood Attacking

    Directory of Open Access Journals (Sweden)

    Zhengmin Xia

    2010-01-01

    Full Text Available Distributed denial-of-service (DDoS flood attacks remain great threats to the Internet. To ensure network usability and reliability, accurate detection of these attacks is critical. Based on Li's work on DDoS flood attack detection, we propose a DDoS detection method by monitoring the Hurst variation of long-range dependant traffic. Specifically, we use an autoregressive system to estimate the Hurst parameter of normal traffic. If the actual Hurst parameter varies significantly from the estimation, we assume that DDoS attack happens. Meanwhile, we propose two methods to determine the change point of Hurst parameter that indicates the occurrence of DDoS attacks. The detection rate associated with one method and false alarm rate for the other method are also derived. The test results on DARPA intrusion detection evaluation data show that the proposed approaches can achieve better detection performance than some well-known self-similarity-based detection methods.

  20. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  1. Measuring exposure in DDoS protection services

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna

    2017-01-01

    Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in frequency, size, and complexity of attacks has made DDoS Protection Services (DPS) an attractive mitigation solution to which the protection of services can be outsourced. Despite a thriving market and

  2. SDN Based Collaborative Scheme for Mitigation of DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Sufian Hameed

    2018-02-01

    Full Text Available Software Defined Networking (SDN has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to program and monitor our networks but it also helps in mitigating some key network problems. Distributed denial of service (DDoS attack is among them. In this paper we propose a collaborative DDoS attack mitigation scheme using SDN. We design a secure controller-to-controller (C-to-C protocol that allows SDN-controllers lying in different autonomous systems (AS to securely communicate and transfer attack information with each other. This enables efficient notification along the path of an ongoing attack and effective filtering of traffic near the source of attack, thus saving valuable time and network resources. We also introduced three different deployment approaches i.e., linear, central and mesh in our testbed. Based on the experimental results we demonstrate that our SDN based collaborative scheme is fast and reliable in efficiently mitigating DDoS attacks in real time with very small computational footprints.

  3. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    Directory of Open Access Journals (Sweden)

    Biao Han

    2018-01-01

    Full Text Available Distributed Denial of Service (DDoS attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN, it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS attack defense framework in SDN, called OverWatch, which exploits collaborative intelligence between data plane and control plane with high defense efficiency. Attack detection and reaction are two key procedures of the proposed framework. We develop a collaborative DDoS attack detection mechanism, which consists of a coarse-grained flow monitoring algorithm on the data plane and a fine-grained machine learning based attack classification algorithm on the control plane. We propose a novel defense strategy offloading mechanism to dynamically deploy defense applications across the controller and switches, by which rapid attack reaction and accurate botnet location can be achieved. We conduct extensive experiments on a real-world SDN network. Experimental results validate the efficiency of our proposed OverWatch framework with high detection accuracy and real-time DDoS attack reaction, as well as reduced communication overhead on SDN southbound interface.

  4. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  5. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  6. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  7. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  8. A Multivariant Stream Analysis Approach to Detect and Mitigate DDoS Attacks in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Raenu Kolandaisamy

    2018-01-01

    Full Text Available Vehicular Ad Hoc Networks (VANETs are rapidly gaining attention due to the diversity of services that they can potentially offer. However, VANET communication is vulnerable to numerous security threats such as Distributed Denial of Service (DDoS attacks. Dealing with these attacks in VANET is a challenging problem. Most of the existing DDoS detection techniques suffer from poor accuracy and high computational overhead. To cope with these problems, we present a novel Multivariant Stream Analysis (MVSA approach. The proposed MVSA approach maintains the multiple stages for detection DDoS attack in network. The Multivariant Stream Analysis gives unique result based on the Vehicle-to-Vehicle communication through Road Side Unit. The approach observes the traffic in different situations and time frames and maintains different rules for various traffic classes in various time windows. The performance of the MVSA is evaluated using an NS2 simulator. Simulation results demonstrate the effectiveness and efficiency of the MVSA regarding detection accuracy and reducing the impact on VANET communication.

  9. A Review on Hot-IP Finding Methods and Its Application in Early DDoS Target Detection

    Directory of Open Access Journals (Sweden)

    Xuan Dau Hoang

    2016-10-01

    Full Text Available On the high-speed connections of the Internet or computer networks, the IP (Internet Protocol packet traffic passing through the network is extremely high, and that makes it difficult for network monitoring and attack detection applications. This paper reviews methods to find the high-occurrence-frequency elements in the data stream and applies the most efficient methods to find Hot-IPs that are high-frequency IP addresses of IP packets passing through the network. Fast finding of Hot-IPs in the IP packet stream can be effectively used in early detection of DDoS (Distributed Denial of Service attack targets and spreading sources of network worms. Research results show that the Count-Min method gives the best overall performance for Hot-IP detection thanks to its low computational complexity, low space requirement and fast processing speed. We also propose an early detection model of DDoS attack targets based on Hot-IP finding, which can be deployed on the target network routers.

  10. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  11. Anycast and its potential for DDoS mitigation

    NARCIS (Netherlands)

    de Vries, Wouter Bastiaan; de Oliveira Schmidt, R.; Pras, Aiko

    IP anycast is widely being used to distribute essential Internet services, such as DNS, across the globe. One of the main reasons for doing so is to increase the redundancy of the service and reduce the impacts of the growing threat of DDoS attacks. IP anycast can be further used to mitigate DDoS

  12. Impact of the increase in broadband access on South African national security and the average citizen

    CSIR Research Space (South Africa)

    Jansen van Vuuren, JC

    2010-04-01

    Full Text Available distributed denial of service (DDOS) attack, flooding Web sites or Internet Service Providers. DDOS attacks are often launched from numerous computers that have been hacked to obey commands of the perpetrator. Network Sabotage: Modification... sector. Cyber attacks with political connotation were seen in Estonia, Georgia and South Korea in the last few years. South Korea, a country with advanced IT developments experienced a distributed denial of service (DDOS) attack in July 2009...

  13. Entropy-Based Economic Denial of Sustainability Detection

    Directory of Open Access Journals (Sweden)

    Marco Antonio Sotelo Monge

    2017-11-01

    Full Text Available In recent years, an important increase in the amount and impact of Distributed Denial of Service (DDoS threats has been reported by the different information security organizations. They typically target the depletion of the computational resources of the victims, hence drastically harming their operational capabilities. Inspired by these methods, Economic Denial of Sustainability (EDoS attacks pose a similar motivation, but adapted to Cloud computing environments, where the denial is achieved by damaging the economy of both suppliers and customers. Therefore, the most common EDoS approach is making the offered services unsustainable by exploiting their auto-scaling algorithms. In order to contribute to their mitigation, this paper introduces a novel EDoS detection method based on the study of entropy variations related with metrics taken into account when deciding auto-scaling actuations. Through the prediction and definition of adaptive thresholds, unexpected behaviors capable of fraudulently demand new resource hiring are distinguished. With the purpose of demonstrate the effectiveness of the proposal, an experimental scenario adapted to the singularities of the EDoS threats and the assumptions driven by their original definition is described in depth. The preliminary results proved high accuracy.

  14. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.

  15. Multi-level anomaly detection: Relevance of big data analytics in ...

    Indian Academy of Sciences (India)

    The Internet has become a vital source of information; internal and exter- .... (iii) DDos detection: Distributed Denial of Service (DDoS) is a common malicious ...... Guirguis M, Bestavros A, Matta I and Zhang Y 2005a Reduction of quality (roq) ...

  16. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  17. Klasifikasi Paket Jaringan Berbasis Analisis Statistik dan Neural Network

    Directory of Open Access Journals (Sweden)

    Harsono Harsono

    2018-01-01

    Full Text Available Distributed Denial-of-Service (DDoS is one of network attack technique which increased every year, especially in both of intensity and volume. DDoS attacks are still one of the world's major Internet threats and become a major problem of cyber-world security. Research in this paper aims to establish a new approach on network packets classification, which can be a basis for framework development on Distributed Denial-of-Service (DDoS attack detection systems. The proposed approach to solving the problem on network packet classification is by combining statistical data quantification methods with neural network methods. Based on the test, it is found that the average percentage of neural network classification accuracy against network data packet is 92.99%.

  18. Distributed Denial of Service Detection with IPFIX Protocol

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-03-01

    Full Text Available In this article the existing methods of detecting Distributed Denial of Service attacks based on the analysis of network traffic or Netflow data is examined. Advantages and disadvantages of anomaly detection methods are listed. Authors suggest to use a method of maximum entropy estimation for the analysis of IPFIX data and propose an approach for detecting Distributed Denial of Service attacks.

  19. Booter websites characterization: Towards a list of threats

    NARCIS (Netherlands)

    Chromik, Justyna Joanna; Cardoso de Santanna, José Jair; Sperotto, Anna; Pras, Aiko

    Distributed Denial of Service (DDoS) attacks mean millions in revenue losses to many industries, such e-commerce and online financial services. The amount of reported DDoS attacks has increased with 47% compared to 2013. One of the reasons for this increase is the availability and ease of

  20. A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2018-01-01

    Full Text Available The application-layer distributed denial of service (AL-DDoS attack makes a great threat against cyberspace security. The attack detection is an important part of the security protection, which provides effective support for defense system through the rapid and accurate identification of attacks. According to the attacker’s different URL of the Web service, the AL-DDoS attack is divided into three categories, including a random URL attack and a fixed and a traverse one. In order to realize identification of attacks, a mapping matrix of the joint entropy vector is constructed. By defining and computing the value of EUPI and jEIPU, a visual coordinate discrimination diagram of entropy vector is proposed, which also realizes data dimension reduction from N to two. In terms of boundary discrimination and the region where the entropy vectors fall in, the class of AL-DDoS attack can be distinguished. Through the study of training data set and classification, the results show that the novel algorithm can effectively distinguish the web server DDoS attack from normal burst traffic.

  1. DDoS-as-a-Service : Investigating Booter Websites

    NARCIS (Netherlands)

    Cardoso de Santanna, José Jair

    2017-01-01

    Why should you care about Distributed Denial of Service (DDoS) attacks? If your Internet home connection would be the target of a DDoS attack, then not only your connectivity is gone, but also your telephone and TV programs. This is because many homes have triple-play-service (a package offered by

  2. A survey of Attacks on VoIP networks and Countermeasures

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-06-01

    Jun 1, 2015 ... integrity and availability of the services rendered on VoIP networks. In this paper, the various ... described in [2] and [5], denial of service in [1], eavesdropping ..... distributed denial of service (DDoS) [9],. [2]. •. Session initiation ...

  3. Analysis of DDoS-capable IoT malwares

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2017-01-01

    to the top Distributed Denial of Service (DDoS) attacks, making them more powerful and easier to achieve than ever. This paper aims at provide an up-to-date picture of DDoS attacks in the specific subject of the IoT, studying how these attacks work and considering the most common families in the IoT context...

  4. Multiple-Features-Based Semisupervised Clustering DDoS Detection Method

    Directory of Open Access Journals (Sweden)

    Yonghao Gu

    2017-01-01

    Full Text Available DDoS attack stream from different agent host converged at victim host will become very large, which will lead to system halt or network congestion. Therefore, it is necessary to propose an effective method to detect the DDoS attack behavior from the massive data stream. In order to solve the problem that large numbers of labeled data are not provided in supervised learning method, and the relatively low detection accuracy and convergence speed of unsupervised k-means algorithm, this paper presents a semisupervised clustering detection method using multiple features. In this detection method, we firstly select three features according to the characteristics of DDoS attacks to form detection feature vector. Then, Multiple-Features-Based Constrained-K-Means (MF-CKM algorithm is proposed based on semisupervised clustering. Finally, using MIT Laboratory Scenario (DDoS 1.0 data set, we verify that the proposed method can improve the convergence speed and accuracy of the algorithm under the condition of using a small amount of labeled data sets.

  5. Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks

    National Research Council Canada - National Science Library

    Huu, Tee

    2003-01-01

    DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach Most of the simulations are performed at the attack phase of the DDoS attack...

  6. Evaluation of current state of amplification-based DDoS attacks

    NARCIS (Netherlands)

    Bohte, Edgar; Stamatogiannakis, Manolis; Bos, Herbert

    2018-01-01

    Amplification-based DDoS attacks are still a big threat to the availability of the internet. In quite some time there is no new paper published that gave an update on the current state of amplification DDoS attacks, taken into consideration it was a huge problem a few years ago. We performed

  7. Using the cumulative sum algorithm against distributed denial of service attacks in Internet of Things

    CSIR Research Space (South Africa)

    Machaka, Pheeha

    2015-11-01

    Full Text Available The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack...

  8. TRAP: A Three-Way Handshake Server for TCP Connection Establishment

    Directory of Open Access Journals (Sweden)

    Fu-Hau Hsu

    2016-11-01

    Full Text Available Distributed denial of service attacks have become more and more frequent nowadays. In 2013, a massive distributed denial of service (DDoS attack was launched against Spamhaus causing the service to shut down. In this paper, we present a three-way handshaking server for Transmission Control Protocol (TCP connection redirection utilizing TCP header options. When a legitimate client attempted to connect to a server undergoing an SYN-flood DDoS attack, it will try to initiate a three-way handshake. After it has successfully established a connection, the server will reply with a reset (RST packet, in which a new server address and a secret is embedded. The client can, thus, connect to the new server that only accepts SYN packets with the corrected secret using the supplied secret.

  9. A Model to Partly but Reliably Distinguish DDOS Flood Traffic from Aggregated One

    Directory of Open Access Journals (Sweden)

    Ming Li

    2012-01-01

    Full Text Available Reliable distinguishing DDOS flood traffic from aggregated traffic is desperately desired by reliable prevention of DDOS attacks. By reliable distinguishing, we mean that flood traffic can be distinguished from aggregated one for a predetermined probability. The basis to reliably distinguish flood traffic from aggregated one is reliable detection of signs of DDOS flood attacks. As is known, reliably distinguishing DDOS flood traffic from aggregated traffic becomes a tough task mainly due to the effects of flash-crowd traffic. For this reason, this paper studies reliable detection in the underlying DiffServ network to use static-priority schedulers. In this network environment, we present a method for reliable detection of signs of DDOS flood attacks for a given class with a given priority. There are two assumptions introduced in this study. One is that flash-crowd traffic does not have all priorities but some. The other is that attack traffic has all priorities in all classes, otherwise an attacker cannot completely achieve its DDOS goal. Further, we suppose that the protected site is equipped with a sensor that has a signature library of the legitimate traffic with the priorities flash-crowd traffic does not have. Based on those, we are able to reliably distinguish attack traffic from aggregated traffic with the priorities that flash-crowd traffic does not have according to a given detection probability.

  10. An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2016-01-01

    Full Text Available DDoS attacks can prevent legitimate users from accessing the service by consuming resource of the target nodes, whose availability of network and service is exposed to a significant threat. Therefore, DDoS traffic perception is the premise and foundation of the whole system security. In this paper the method of DDoS traffic perception for SOA network based on time united conditional entropy was proposed. According to many-to-one relationship mapping between the source IP address and destination IP addresses of DDoS attacks, traffic characteristics of services are analyzed based on conditional entropy. The algorithm is provided with perception ability of DDoS attacks on SOA services by introducing time dimension. Simulation results show that the novel method can realize DDoS traffic perception with analyzing abrupt variation of conditional entropy in time dimension.

  11. Real-time DDoS attack detection for Cisco IOS using NetFlow

    NARCIS (Netherlands)

    van der Steeg, Daniël; Hofstede, R.J.; Sperotto, Anna; Pras, Aiko

    Flow-based DDoS attack detection is typically performed by analysis applications that are installed on or close to a flow collector. Although this approach allows for easy deployment, it makes detection far from real-time and susceptible to DDoS attacks for the following reasons. First, the fact

  12. Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

    OpenAIRE

    Vivian Ogochukwu Nwaocha; Inyiama H.C.

    2011-01-01

    As organisations continue to incorporate the Internet as a key component of their operations, the global cyber-threat level is increasing. One of the most common types of cyber-threats is known as the Distributed Denial of Service (DDoS) attack – an attack preventing users from accessing a system for a period of time. Recent DDoS attacks have left large corporate and government networks inaccessible to customers, partners and users for hours or days, resulting in significant financial, reputa...

  13. (Distributed) Denial-of-Service : deel 1

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2013-01-01

    De afgelopen maanden zijn denial-of-service aanvallen op de Nederlandse bancaire sector, de KLM, dagblad de Telegraaf, de overheid (belastindienst, DigiD) en andere organisaties prominent in het nieuws. Wat is denial-of-service? Wie doet dat en waarom? Hoe sterk zijn de aanvallen? Wat kunnen of

  14. Inferring the Presence of Reverse Proxies Through Timing Analysis

    Science.gov (United States)

    2015-06-01

    primary platforms from which Internet attacks are launched today. Attacks such as Distributed Denial of Service (DDoS), spam, phishing , and identity...7,272,642. [23] Google Maps. (2014, August). Planetlabs. [24] vmware. (2015, May). [Online]. Available: http://kb.vmware.com/selfservice/ microsites

  15. Economic Levers for Mitigating Interest Flooding Attack in Named Data Networking

    Directory of Open Access Journals (Sweden)

    Licheng Wang

    2017-01-01

    Full Text Available As a kind of unwelcome, unavoidable, and malicious behavior, distributed denial of service (DDoS is an ongoing issue in today’s Internet as well as in some newly conceived future Internet architectures. Recently, a first step was made towards assessing DDoS attacks in Named Data Networking (NDN—one of the promising Internet architectures in the upcoming big data era. Among them, interest flooding attack (IFA becomes one of the main serious problems. Enlightened by the extensive study on the possibility of mitigating DDoS in today’s Internet by employing micropayments, in this paper we address the possibility of introducing economic levers, say, dynamic pricing mechanism, and so forth, for regulating IFA in NDN.

  16. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  17. Wat gaan we doen tegen de cyberaanvallen?

    NARCIS (Netherlands)

    Hartel, Pieter H.; Berg, J.; Junger, Marianne

    2013-01-01

    Een aantal bedrijven, zoals ING, de Telegraaf, en de NS hebben de afgelopen maand last gehad van Distributed Denial of Service (DDoS) aanvallen. Enigszins gesimplificeerd zijn hierin de volgende stappen te onderscheiden: 1) de PC van een gebruiker loopt een computervirus op, bijvoorbeeld omdat de

  18. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  19. A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

    Science.gov (United States)

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

  20. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS) attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline...... the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware...

  1. Cybersecurity (hoofdstuk 13)

    NARCIS (Netherlands)

    van der Meulen, N.S.; Lodder, A.R.; van der Hof, S.; Lodder, A.R.; Zwenne, G.J.

    2014-01-01

    Mede naar aanleiding van incidenten, zoals de hack op DigiNotar in de zomer van 2011, de honderdduizenden patiëntgegevens van het Groene Hart ziekenhuis die in het najaar 2012 benaderbaar bleken en de serie Distributed Denial of Service (DDoS) aanvallen op banken in het voorjaar van 2013, is het

  2. Bound Maxima as a Traffic Feature under DDOS Flood Attacks

    Directory of Open Access Journals (Sweden)

    Jie Xue

    2012-01-01

    Full Text Available This paper gives a novel traffic feature for identifying abnormal variation of traffic under DDOS flood attacks. It is the histogram of the maxima of the bounded traffic rate on an interval-by-interval basis. We use it to experiment on the traffic data provided by MIT Lincoln Laboratory under Defense Advanced Research Projects Agency (DARPA in 1999. The experimental results profitably enhance the evidences that traffic rate under DDOS attacks is statistically higher than that of normal traffic considerably. They show that the pattern of the histogram of the maxima of bounded rate of attack-contained traffic greatly differs from that of attack-free traffic. Besides, the present traffic feature is simple in mathematics and easy to use in practice.

  3. A DDoS Attack Detection Method Based on SVM in Software Defined Network

    Directory of Open Access Journals (Sweden)

    Jin Ye

    2018-01-01

    Full Text Available The detection of DDoS attacks is an important topic in the field of network security. The occurrence of software defined network (SDN (Zhang et al., 2018 brings up some novel methods to this topic in which some deep learning algorithm is adopted to model the attack behavior based on collecting from the SDN controller. However, the existing methods such as neural network algorithm are not practical enough to be applied. In this paper, the SDN environment by mininet and floodlight (Ning et al., 2014 simulation platform is constructed, 6-tuple characteristic values of the switch flow table is extracted, and then DDoS attack model is built by combining the SVM classification algorithms. The experiments show that average accuracy rate of our method is 95.24% with a small amount of flow collecting. Our work is of good value for the detection of DDoS attack in SDN.

  4. A DDoS Attack Detection Method Based on Hybrid Heterogeneous Multiclassifier Ensemble Learning

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2017-01-01

    Full Text Available The explosive growth of network traffic and its multitype on Internet have brought new and severe challenges to DDoS attack detection. To get the higher True Negative Rate (TNR, accuracy, and precision and to guarantee the robustness, stability, and universality of detection system, in this paper, we propose a DDoS attack detection method based on hybrid heterogeneous multiclassifier ensemble learning and design a heuristic detection algorithm based on Singular Value Decomposition (SVD to construct our detection system. Experimental results show that our detection method is excellent in TNR, accuracy, and precision. Therefore, our algorithm has good detective performance for DDoS attack. Through the comparisons with Random Forest, k-Nearest Neighbor (k-NN, and Bagging comprising the component classifiers when the three algorithms are used alone by SVD and by un-SVD, it is shown that our model is superior to the state-of-the-art attack detection techniques in system generalization ability, detection stability, and overall detection performance.

  5. Rootkits, Trojans, backdoors and new developments

    CSIR Research Space (South Africa)

    Decloedt, HE

    2010-10-01

    Full Text Available . Pg 9 Proceedings of the Workshop on ICT Uses in Warfare and the Safeguarding of Peace 4.2.2 DoS Trojans This type of Trojan gives the attacker the power to start a distributed denial of service (DDoS) attack if there are enough victims. Win... in Warfare and the Safeguarding of Peace to achieve the final goal of the attack. This may be to steal information, disseminate spam or to launch a denial of service (DoS) attack on another computer system over a network. Eventually the compromise...

  6. Applying IPFIX Protocol for Detection of Distributed Denial of Service Attacks against Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-12-01

    Full Text Available The way of monitoring deviations in network traffic behavior inside “Cloud Infrastructure” using IPFIX protocol is suggested in the paper. The proposed algorithm is applied for registration of “Distributed Denial of Service” attacks against “Cloud Infrastructure”.

  7. Modeling the Effects of Cyber Operations on Kinetic Battles

    Science.gov (United States)

    2014-06-01

    Nakashima, 2013). Equally dangerous are attacks targeting the national economy . In 2012, distributed denial of service (DDoS) attacks were carried out...enable our freedom of action in cyberspace. (USCYBERCOM Concept of Operations, v 1.0, 21 Sep 2010) Global Information Grid ( GIG ): The globally...managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing

  8. (Distributed) Denial-of-Service : deel 2

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2013-01-01

    Het geblokkeerd raken van een dienstverlening wordt in het Engels vaak aangeduid met de term Denial-of-Service (afkort: DoS). Al wordt de term veelal gebruikt in de cyberspace-omgeving, is deze feitelijk generieker, DoS kan zowel een technische oorzaak hebben, als bewust worden veroorzaakt door

  9. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-11-04

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  10. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Directory of Open Access Journals (Sweden)

    João José Costa Gondim

    2016-11-01

    Full Text Available Concerns about security on Internet of Things (IoT cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests. After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.

  11. A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things

    Science.gov (United States)

    Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon

    2016-01-01

    Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931

  12. Using exponentially weighted moving average algorithm to defend against DDoS attacks

    CSIR Research Space (South Africa)

    Machaka, P

    2016-11-01

    Full Text Available This paper seeks to investigate the performance of the Exponentially Weighted Moving Average (EWMA) for mining big data and detection of DDoS attacks in Internet of Things (IoT) infrastructure. The paper will investigate the tradeoff between...

  13. Detection System of HTTP DDoS Attacks in a Cloud Environment Based on Information Theoretic Entropy and Random Forest

    Directory of Open Access Journals (Sweden)

    Mohamed Idhammad

    2018-01-01

    Full Text Available Cloud Computing services are often delivered through HTTP protocol. This facilitates access to services and reduces costs for both providers and end-users. However, this increases the vulnerabilities of the Cloud services face to HTTP DDoS attacks. HTTP request methods are often used to address web servers’ vulnerabilities and create multiple scenarios of HTTP DDoS attack such as Low and Slow or Flooding attacks. Existing HTTP DDoS detection systems are challenged by the big amounts of network traffic generated by these attacks, low detection accuracy, and high false positive rates. In this paper we present a detection system of HTTP DDoS attacks in a Cloud environment based on Information Theoretic Entropy and Random Forest ensemble learning algorithm. A time-based sliding window algorithm is used to estimate the entropy of the network header features of the incoming network traffic. When the estimated entropy exceeds its normal range the preprocessing and the classification tasks are triggered. To assess the proposed approach various experiments were performed on the CIDDS-001 public dataset. The proposed approach achieves satisfactory results with an accuracy of 99.54%, a FPR of 0.4%, and a running time of 18.5s.

  14. The effects of DDoS attacks on flow monitoring applications

    NARCIS (Netherlands)

    Sadre, R.; Sperotto, Anna; Pras, Aiko

    Flow-based monitoring has become a popular approach in many areas of network management. However, flow monitoring is, by design, susceptible to anomalies that generate a large number of flows, such as Distributed Denial-Of-Service attacks. This paper aims at getting a better understanding on how a

  15. Avoiding the internet of insecure industrial things

    OpenAIRE

    Urquhart, Lachlan; McAuley, Derek

    2018-01-01

    Security incidents such as targeted distributed denial of service (DDoS) attacks on power grids and hacking of factory industrial control systems (ICS) are on the increase. This paper unpacks where emerging security risks lie for the industrial internet of things, drawing on both technical and regulatory perspectives. Legal changes are being ushered by the European Union (EU) Network and Information Security (NIS) Directive 2016 and the General Data Protection Regulation 2016 (GDPR) (both to ...

  16. Entropy Based Analysis of DNS Query Traffic in the Campus Network

    Directory of Open Access Journals (Sweden)

    Dennis Arturo Ludeña Romaña

    2008-10-01

    Full Text Available We carried out the entropy based study on the DNS query traffic from the campus network in a university through January 1st, 2006 to March 31st, 2007. The results are summarized, as follows: (1 The source IP addresses- and query keyword-based entropies change symmetrically in the DNS query traffic from the outside of the campus network when detecting the spam bot activity on the campus network. On the other hand (2, the source IP addresses- and query keywordbased entropies change similarly each other when detecting big DNS query traffic caused by prescanning or distributed denial of service (DDoS attack from the campus network. Therefore, we can detect the spam bot and/or DDoS attack bot by only watching DNS query access traffic.

  17. Resistance against brute-force attacks on stateless forwarding in information centric networking

    OpenAIRE

    Alzahrani, Bander A.; Reed, Martin J.; Vassilakis, Vassilios G.

    2015-01-01

    Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a new forwarding approach that maintains the advantages of Bloom filter based forwarding while allow...

  18. EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Rabia Latif

    2015-01-01

    Full Text Available Due to the scattered nature of DDoS attacks and advancement of new technologies such as cloud-assisted WBAN, it becomes challenging to detect malicious activities by relying on conventional security mechanisms. The detection of such attacks demands an adaptive and incremental learning classifier capable of accurate decision making with less computation. Hence, the DDoS attack detection using existing machine learning techniques requires full data set to be stored in the memory and are not appropriate for real-time network traffic. To overcome these shortcomings, Very Fast Decision Tree (VFDT algorithm has been proposed in the past that can handle high speed streaming data efficiently. Whilst considering the data generated by WBAN sensors, noise is an obvious aspect that severely affects the accuracy and increases false alarms. In this paper, an enhanced VFDT (EVFDT is proposed to efficiently detect the occurrence of DDoS attack in cloud-assisted WBAN. EVFDT uses an adaptive tie-breaking threshold for node splitting. To resolve the tree size expansion under extreme noise, a lightweight iterative pruning technique is proposed. To analyze the performance of EVFDT, four metrics are evaluated: classification accuracy, tree size, time, and memory. Simulation results show that EVFDT attains significantly high detection accuracy with fewer false alarms.

  19. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey

    CSIR Research Space (South Africa)

    Machaka, P

    2016-08-01

    Full Text Available This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks...

  20. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  1. Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

    Directory of Open Access Journals (Sweden)

    Abdulaziz Aborujilah

    2017-01-01

    Full Text Available In this era of technology, cloud computing technology has become essential part of the IT services used the daily life. In this regard, website hosting services are gradually moving to the cloud. This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. The results were encouraging, according to confusion matrix and ROC descriptors.

  2. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  3. DDoS-Capable IoT Malwares: Comparative Analysis and Mirai Investigation

    Directory of Open Access Journals (Sweden)

    Michele De Donno

    2018-01-01

    Full Text Available The Internet of Things (IoT revolution has not only carried the astonishing promise to interconnect a whole generation of traditionally “dumb” devices, but also brought to the Internet the menace of billions of badly protected and easily hackable objects. Not surprisingly, this sudden flooding of fresh and insecure devices fueled older threats, such as Distributed Denial of Service (DDoS attacks. In this paper, we first propose an updated and comprehensive taxonomy of DDoS attacks, together with a number of examples on how this classification maps to real-world attacks. Then, we outline the current situation of DDoS-enabled malwares in IoT networks, highlighting how recent data support our concerns about the growing in popularity of these malwares. Finally, we give a detailed analysis of the general framework and the operating principles of Mirai, the most disruptive DDoS-capable IoT malware seen so far.

  4. Organizational crisis-denial strategy: the effect of denial on public framing

    NARCIS (Netherlands)

    van der Meer, T.G.L.A.

    2014-01-01

    By applying a framing perspective, this study explores the effect of a crisis-denial strategy on public response. The online public framing of a specific crisis is compared with the crisis-denial frame provided by the organization. An automated semantic-network analysis is used to identify frames

  5. 78 FR 70551 - Federal Advisory Committee Act; Communications Security, Reliability, and Interoperability Council

    Science.gov (United States)

    2013-11-26

    ... denial-of-service (DDoS), and cybersecurity best practices. DATES: December 4, 2013. ADDRESSES: Federal... members have made business and travel plans in accordance with this schedule, and there is no date within...://transition.fcc.gov/Daily_Releases/Daily_Business/2013/db1120/DA-13-2225A1.pdf . Additional information...

  6. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  7. Denial: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    Denial was a mechanism that Sigmund Freud worked with in his clinical practice and in his formulation of personality. He considered denial, e.g., in his papers on Repression (1915) and on Fetishism (1927) in Collected Papers, Volumes IV and V respectively (London: Hogarth and The Institute of Psycho-Analysis, 1925 and 1950 respectively). It would…

  8. Illness denial questionnaire for patients and caregivers.

    Science.gov (United States)

    Rossi Ferrario, Silvia; Giorgi, Ines; Baiardi, Paola; Giuntoli, Laura; Balestroni, Gianluigi; Cerutti, Paola; Manera, Marina; Gabanelli, Paola; Solara, Valentina; Fornara, Roberta; Luisetti, Michela; Omarini, Pierangela; Omarini, Giovanna; Vidotto, Giulio

    2017-01-01

    Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ) assessing patients' and caregivers' denial in relation to their illness/disturbance. After a preliminary study, a final version of 24 dichotomous items (true/false) was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers) together with the Anxiety-Depression Questionnaire - Reduced form (AD-R), in order to assess concurrent validity. Confirmatory factor analysis (CFA), internal consistency indices (Cronbach's α and McDonald's ω), and test-retest analysis were performed. CFA and internal consistency indices (Cronbach's α: 0.87-0.96) indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and avoidance positively associated with anxiety and depression. The IDQ also showed a good stability ( r from 0.71 to 0.87). The IDQ demonstrated good psychometric properties. Denial of negative emotions and resistance to change seem to contribute to a real expression of denial, and conscious avoidance seems to constitute a further step in the process of cognitive-affective elaboration of the illness.

  9. Holocaust Denial among Slovenian Secondary School Pupils

    Directory of Open Access Journals (Sweden)

    Maša Pavlič

    2015-06-01

    Full Text Available The article presents tendencies of Holocaust denial among secondary school pupils in Slovenia. It focuses on research implemented in January 2012, in which 400 Slovenian secondary school pupils were included. In spite of the assumption that Holocaust denial amongst the youth in Slovenia already exists, we also assumed that a degree of Holocaust denial amongs Slovenian pupils is lower that amongst their peers in other EU countries. Research also inquired about the level of anti-Semitism in conjunction with Holocaust denial. The research project confirmed that students on lower levels of high school education and with less history and sociology lessons in curriculum are more receptive for the Holocaust denial and anti-Semitism is more present in this demographic. The level of Holocaust denial amongst secondary school pupils is not negligible; it suggests that this topic should be more thoroughly discussed in secondary schools.

  10. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    Directory of Open Access Journals (Sweden)

    Feng Tao

    2017-01-01

    Full Text Available Tor (The Second Onion Router is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks. The integrated security of Tor system was enhanced in our scheme. In addition we have proved the scheme.

  11. Contrast as denial in multi-dimensional semantics

    NARCIS (Netherlands)

    Spenader, Jennifer; Maier, Emar

    We argue that contrastive statements have the same underlying semantics and affect the context in the same way as denials. We substantiate this claim by giving a unified account of the two phenomena that treats contrast as a subtype of denial. We argue that earlier work on contrast-denial obscured

  12. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  13. Illness denial questionnaire for patients and caregivers

    Directory of Open Access Journals (Sweden)

    Rossi Ferrario S

    2017-03-01

    Full Text Available Silvia Rossi Ferrario,1 Ines Giorgi,2 Paola Baiardi,3 Laura Giuntoli,4 Gianluigi Balestroni,1 Paola Cerutti,1 Marina Manera,2 Paola Gabanelli,2 Valentina Solara,5 Roberta Fornara,6 Michela Luisetti,1 Pierangela Omarini,1 Giovanna Omarini,1 Giulio Vidotto4 1Psychology Unit, Istituti Clinici Scientifici Maugeri SpA SB, Veruno, NO, Italy; 2Psychology Unit, 3Scientific Direction, Istituti Clinici Scientifici Maugeri SpA SB, Pavia, Italy; 4Department of General Psychology, University of Padova, Padova, Italy; 5Department of Neurology, ALS Centre, “Maggiore della Carita`” University Hospital, Novara, Italy; 6Psychology Unit, SS Trinità Hospital, Borgomanero, NO, Italy Purpose: Interest in assessing denial is still present, despite the criticisms concerning its definition and measurement. We tried to develop a questionnaire (Illness Denial Questionnaire, IDQ assessing patients’ and caregivers’ denial in relation to their illness/disturbance. Patients and methods: After a preliminary study, a final version of 24 dichotomous items (true/false was selected. We hypothesized a theoretical model with three dimensions: denial of negative emotions, resistance to change, and conscious avoidance, the first two composing the actual Denial and the last representing an independent component of the illness denial behavior. The IDQ was administered to 400 subjects (219 patients and 181 caregivers together with the Anxiety–Depression Questionnaire – Reduced form (AD-R, in order to assess concurrent validity. Confirmatory factor analysis (CFA, internal consistency indices (Cronbach’s α and McDonald’s ω, and test–retest analysis were performed. Results: CFA and internal consistency indices (Cronbach’s α: 0.87–0.96 indicated a clear and meaningful three-factor structure of IDQ, for both patients and caregivers. Further analyses showed good concurrent validity, with Denial and its subscale negatively associated with anxiety and depression and

  14. Young Children's Understanding of Denial

    Science.gov (United States)

    Austin, Keith; Theakston, Anna; Lieven, Elena; Tomasello, Michael

    2014-01-01

    Although a fair amount is known about young children's production of negation, little is known about their comprehension. Here, we focus on arguably the most complex basic form, denial, and how young children understand denial, when it is expressed in response to a question with gesture, single word, or sentence. One hundred twenty-six children in…

  15. Treatment of Holocaust Denial Literature in Association of Research Libraries

    Science.gov (United States)

    Spidal, Debra F.

    2012-01-01

    Holocaust denial literature has been treated inconsistently in library collections. At one time Holocaust denial literature was classed and subject headings assigned with Holocaust literature. After specific Library of Congress classification numbers and subject headings for Holocaust denial and Holocaust denial literature became available in the…

  16. Administrative and clinical denials by a large dental insurance provider

    Directory of Open Access Journals (Sweden)

    Geraldo Elias MIRANDA

    2015-01-01

    Full Text Available The objective of this study was to assess the prevalence and the type of claim denials (administrative, clinical or both made by a large dental insurance plan. This was a cross-sectional, observational study, which retrospectively collected data from the claims and denial reports of a dental insurance company. The sample consisted of the payment claims submitted by network dentists, based on their procedure reports, reviewed in the third trimester of 2012. The denials were classified and grouped into ‘administrative’, ‘clinical’ or ‘both’. The data were tabulated and submitted to uni- and bivariate analyses. The confidence intervals were 95% and the level of significance was set at 5%. The overall frequency of denials was 8.2% of the total number of procedures performed. The frequency of administrative denials was 72.88%, whereas that of technical denials was 25.95% and that of both, 1.17% (p < 0.05. It was concluded that the overall prevalence of denials in the studied sample was low. Administrative denials were the most prevalent. This type of denial could be reduced if all dental insurance providers had unified clinical and administrative protocols, and if dentists submitted all of the required documentation in accordance with these protocols.

  17. 44 CFR 6.55 - Appeal of denial of request to amend a record.

    Science.gov (United States)

    2010-10-01

    ... an employee of FEMA and the denial to amend involves a record maintained in the employee's Official... right to file a Statement of Disagreement for distribution in accordance with § 6.56. (4) Notice of the...

  18. Collateral Damage: Interlibrary Loan Lending Denials

    Science.gov (United States)

    Leykam, Andrew

    2009-01-01

    The intent of this paper is to explore the potential of utilizing interlibrary loan (ILL) data relating to lending denials to improve ILL services while highlighting institutional policies that have a negative impact on lending fulfillment rates. Reasons for denial as well as the types of requests being denied are reviewed. In addition, the author…

  19. Climate Change Denial Books and Conservative Think Tanks

    Science.gov (United States)

    Jacques, Peter J.

    2013-01-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites. PMID:24098056

  20. Coding for effective denial management.

    Science.gov (United States)

    Miller, Jackie; Lineberry, Joe

    2004-01-01

    Nearly everyone will agree that accurate and consistent coding of diagnoses and procedures is the cornerstone for operating a compliant practice. The CPT or HCPCS procedure code tells the payor what service was performed and also (in most cases) determines the amount of payment. The ICD-9-CM diagnosis code, on the other hand, tells the payor why the service was performed. If the diagnosis code does not meet the payor's criteria for medical necessity, all payment for the service will be denied. Implementation of an effective denial management program can help "stop the bleeding." Denial management is a comprehensive process that works in two ways. First, it evaluates the cause of denials and takes steps to prevent them. Second, denial management creates specific procedures for refiling or appealing claims that are initially denied. Accurate, consistent and compliant coding is key to both of these functions. The process of proactively managing claim denials also reveals a practice's administrative strengths and weaknesses, enabling radiology business managers to streamline processes, eliminate duplicated efforts and shift a larger proportion of the staff's focus from paperwork to servicing patients--all of which are sure to enhance operations and improve practice management and office morale. Accurate coding requires a program of ongoing training and education in both CPT and ICD-9-CM coding. Radiology business managers must make education a top priority for their coding staff. Front office staff, technologists and radiologists should also be familiar with the types of information needed for accurate coding. A good staff training program will also cover the proper use of Advance Beneficiary Notices (ABNs). Registration and coding staff should understand how to determine whether the patient's clinical history meets criteria for Medicare coverage, and how to administer an ABN if the exam is likely to be denied. Staff should also understand the restrictions on use of

  1. 7 CFR 205.405 - Denial of certification.

    Science.gov (United States)

    2010-01-01

    ... PROVISIONS NATIONAL ORGANIC PROGRAM Certification § 205.405 Denial of certification. (a) When the certifying... organic program. (e) An applicant for certification who has received a written notification of... 7 Agriculture 3 2010-01-01 2010-01-01 false Denial of certification. 205.405 Section 205.405...

  2. Denial of impending death: a discourse analysis of the palliative care literature.

    Science.gov (United States)

    Zimmermann, Camilla

    2004-10-01

    Terminally ill patients and their families are often referred to as being "in denial" of impending death. This study uses the qualitative method of discourse analysis to investigate the usage of the term "denial" in the contemporary hospice and palliative care literature. A Medline search (1970-2001) was performed combining the text words "deny" and "denial" with the subject headings "terminal care", "palliative care" and "hospice care," and restricted to English articles discussing death denial in adults. The 30 articles were analysed using a constant comparison technique and emerging themes regarding the meaning and usage of the words "deny" and "denial" identified. This paper focusses on the theme of denial as an individual psychological process. Three dominant subthemes were distinguished: denial as an unconscious "defence mechanism", denial as "healthy" and denial as temporary. The analysis focusses on the intertextuality of these themes with each other and with previous texts on the denial of death. Elements of the psychoanalytic definition of denial as an unconscious defence mechanism are retained in the literature but are interwoven with new themes on patient choice. The result is an overall discourse that is conflictual and at times self-contradictory but overall consistent with the biomedical model of illness. I suggest that the representation of death denial elaborated in these articles may be related to a larger discourse on dying in contemporary Western society, which both invites patients to participate in the planning of their death and labels those who do not comply.

  3. Testing Situation Awareness Network for the Electrical Power Infrastructure

    Directory of Open Access Journals (Sweden)

    Rafał Leszczyna

    2016-09-01

    Full Text Available The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and communication Technologies (ICT in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent Threats (APT or Distributed-Denial-ofService (DDoS attacks. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. To counter evolved and highly sophisticated threats such as the APT or DDoS, state-of-the-art technologies including Security Incident and Event Management (SIEM systems, extended Intrusion Detection/Prevention Systems (IDS/IPS and Trusted Platform Modules (TPM are required. Developing and deploying extensive ICT infrastructure that supports wide situational awareness and allows precise command and control is also necessary. In this paper the results of testing the Situational Awareness Network (SAN designed for the energy sector are presented. The purpose of the tests was to validate the selection of SAN components and check their operational capability in a complex test environment. During the tests’ execution appropriate interaction between the components was verified.

  4. Defending Science Denial in Cyberspace

    Science.gov (United States)

    Rosenau, J.

    2013-12-01

    Blogs, Facebook, Twitter, and other social media have proven themselves powerful vectors for science denial. Left unchecked, these attacks on foundational sciences like evolution and climate change undermine public confidence in science and spawn attacks on science-based policy and science education. Scientists can blunt such attacks by being vigorous advocates for their own research and their discipline's core findings, by seeking wide and unexpected audiences for discussions of their science, and by understanding and addressing the social, political, and cultural roots of science denial.

  5. Global Warming Denial: The Human Brain on Extremes

    Science.gov (United States)

    Marrouch, N.; Johnson, B. T.; Slawinska, J. M.

    2016-12-01

    Future assessments of climate change rely on multi-model intercomparisons, and projections of the extreme events frequency are of particular interest as associated with significant economic costs and social threats. Notably, systematically simulated increases in the number of extreme weather events agree well with observational data over the last decade. At the same time, as the climate grows more volatile, widespread denial of climate change and its anthropocentric causes continues to proliferate (based on nationally representative U.S. polls). Simultaneous increases in both high-impact exposure and its denial is in stark contrast with our knowledge of socio-natural dynamics and its models. Disentangling this paradox requires an understanding of the origins of global warming denial at an individual level, and how subsequently it propagates across social networks of many scales, shaping global policies. However, as the real world and its dynamical models are complex (high-dimensional and coupled), separating the particular feedback of interest remains a challenge. Here, we demonstrate this feedback in a controlled experiment, where increasing unpredictability using helplessness-training paradigms induces changes in global warming denial, and the endorsement of conservative ideology. We explain these results in the context of evolutionary theory framing self-deception and denial as remnants of evolutionary processes that shaped and facilitated the survival of the human species. Further we link these findings to changes in neural and higher-level cognitive processes in response to unpredictable stimuli. We argue that climate change denial is an example of an extreme belief system that carries the potential to threaten the wellbeing of both humans and other species alike. It is therefore crucial to better quantify climate denial using social informatics tools that provide the means to improve its representations in coupled socio-geophysical models to mitigate its

  6. 45 CFR 5.34 - Appeal of denials.

    Science.gov (United States)

    2010-10-01

    ... Release and Denial of Records § 5.34 Appeal of denials. (a) Right of appeal. You have the right to appeal... reasons why you believe that the FOIA exemption(s) we cited do not apply to the records that you requested... designated review official will consult with the General Counsel to ensure that the rights and interests of...

  7. Science and the Public: Debate, Denial, and Skepticism

    Directory of Open Access Journals (Sweden)

    Stephan Lewandowsky

    2016-08-01

    Full Text Available When the scientific method yields discoveries that imperil people’s lifestyle or worldviews or impinge on corporate vested interests, the public and political response can be anything but favorable. Sometimes the response slides into overt denial of scientific facts, although this denial is often claimed to involve “skepticism”. We outline the distinction between true skepticism and denial with several case studies. We propose some guidelines to enable researchers to differentiate legitimate critical engagement from bad-faith harassment, and to enable members of the public to pursue their skeptical engagement and critique without such engagement being mistaken for harassment.

  8. Denials of Racism in Canadian English Language Textbooks

    Science.gov (United States)

    Gulliver, Trevor; Thurrell, Kristy

    2016-01-01

    This critical discourse analysis examines denials of racism in descriptions of Canada and Canadians from English language textbooks. Denials of racism often accompany racist and nationalist discourse, preempting observations of racism. The study finds that in representations of Canada or Canadians, English language texts minimize and downplay…

  9. Limited Denial of Participation

    Data.gov (United States)

    Department of Housing and Urban Development — A Limited Denial of Participation (LDP) is an action taken by a HUD Field Office or the Deputy Assistant Secretary for Single Family (DASSF) or Multifamily (DASMF)...

  10. Denials and Delays of Radioactive Material Shipments

    International Nuclear Information System (INIS)

    El-Shinawy, R.M.K.

    2011-01-01

    delays of shipments of radioactive materials forms an important issue today. Radioactive materials need to be transported using all modes of transport for use in different applications such as public health, industry, research and production of nuclear power. The transport of radioactive materials is governed by national and international regulations, which are based on the International Atomic Energy Agency (IAEA) regulations for safe transport of radioactive materials (TS-R-1). These regulations ensure high standards of safety. Recently there were increasing numbers of instances of denials and delays of shipments of radioactive materials even when complying with the regulations. The denials and delays can result in difficulties to patients and others who rely on products sterilized by radiation. Therefore there is an urgent need for a universally accepted approach to solve this problem. In response, the IAEA has formed an International Steering Committee (ISC) on denials and delays of radioactive materials. Also, it designate the National Focal Points (NFP) representative to help the ISC members and the IAEA by informing about denial operations and how they can help. The Steering Committee developed and adopted an action plan which includes the action to be taken. This plan is based on: Awareness, Training, Communication, Lobbying for marketing, Economic and Harmonization among member states. It is important to work within the mandate of the ISC and in the line of action plan on denials and delays. It identified the following network members such as: National Focal Points, Regional Coordinators, National Committee, National Representative for different modes of transport and similar bodies, Carriers, Producers and Suppliers, Different civil societies, NGO's, Ministry of transport and others.

  11. Skepticism and Denial: Drawing a line

    Science.gov (United States)

    Byrne, J. M.; Brown, M. B.; Peacock, K.

    2016-12-01

    Climate denialism is distinct from a merely skeptical attitude towards generally accepted views in climate science. But drawing the line between them takes care—there are similarities between skepticism and denial, including a shared reluctance to accept conclusions that nearly all qualified scientists take to be well-justified. Here we will explore both how to draw the line, and how to effectively communicate the differences between denial and skepticism. Identifying which of these two terms best describes someone's attitude turns on whether they reject a generally accepted view based on a `high threshold' for acceptance of conclusions in general, or from a preference that the conclusion in question be false. In most cases, denialism manifests in disregard and mistreatment of evidence, including selective quotation, credulous endorsement of bad sources and incredulous rejection of good sources. Historically, current accepted views became dominant as alternatives were excluded and arguments supporting current views accumulated. The accumulated record of evidence and successful application of those views sets a high bar for proposed alternatives to them. Pure skeptics may refuse to endorse generally accepted views without rejecting or distorting the strong evidence for those views, and typically support policy responses based on the implications of that evidence. But deniers who reject scientific conclusions reject the evidence for those views while endorsing views that a true skeptic would regard as less plausible and well-supported than the accepted views. Thus motivated cognition is the key to defining denial. Pascal's famous argument for belief in God illustrates the problem: even assuming God's existence to be extremely improbable, the expected value of believing is far higher than the expected value of disbelieving. But Pascal's argument undermines its own methodology: without reasons to rely on beliefs as reliable guides to successful action, cost

  12. Denials of Shipments for Radioactive Material - Indian Perspective

    International Nuclear Information System (INIS)

    Singh, Khaidem Ranjankumar; Hussain, S.A; Panda, G.K.; Singh, T. Dewan; Dinakaran, M.C.

    2016-01-01

    Radioactive material (RAM) needs to be transported for use in public health and industry and for production of nuclear power. In India, transport of RAM is governed by national and international regulations which are based on the IAEA Regulations for the safe transport of RAM. However, recently there were increasing numbers of instances of denials and delays of shipment of RAM, reported by many countries worldwide including India, despite compliance with regulations. In Indian experience, the reasons for denials of shipment of RAM by the carriers are varied in nature. From the feedback received from the participants (airport operators, airlines, courier and cargo service providers, cargo forwarding agents, port authorities and sea carriers) of awareness programmes on safe transport of RAM conducted from year 2008 onwards by Atomic Energy Regulatory Board (AERB) it became clear that the denials of shipments in India are mainly due to (1) perception of unnecessary fear for transport of RAM (2) lack of confidence and awareness on the procedures for acceptance of shipment of RAM (3) fear of risk during accidents with packages containing RAM (4) policy of the carriers not to accept consignment of dangerous goods (5) poor infrastructure at the major/transit ports (6) problems of transshipments and (7) shippers not having undergone dangerous goods training. In this paper, the Indian experience in dealing with the problems of denial/delay of shipments containing radioactive material and identified possible consequences of such denials including economical impact are discussed in detail. (author)

  13. Proactive Routing Mutation Against Stealthy Distributed Denial of Service Attacks – Metrics, Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat; Halappanavar, Mahantesh; Oehmen, Christopher S.

    2018-04-01

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility on enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.

  14. Data denial experiments for extratropical transition

    Directory of Open Access Journals (Sweden)

    Doris Anwender

    2012-11-01

    Full Text Available Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF model are designed to investigate the value of targeted observations for historical extratropical transition (ET cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC environment is, on average, as important as denying data in mid-latitude sensitive regions determined using extratropical singular vectors (SV. The impact of data denial over TC regions propagates downstream from the Atlantic towards Europe, with a maximum degradation at day 4. This degradation is mainly attributed to the data denial at the TC stage, i.e. before ET is completed. When data are denied on mid-latitude sensitive regions, the largest degradation is found around day 2 and also after the day 4 forecast. In general, the loss of information content is larger when data are denied in mid-latitude sensitive areas because these identify dynamically active regions. In both denial experiments, aircraft and satellite radiance data are the most influential observations. For the selected case of Hurricane Irene, the largest degradations are found for forecasts initialised while Irene reached its peak intensity. If observations are denied in the near storm environment, the TC mostly disappears from the analysis and the subsequent forecast. This allows the impact of Irene on the formation of the downstream cut-off low to be investigated.

  15. 2 CFR 2424.1125 - How does a limited denial of participation start?

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false How does a limited denial of participation start? 2424.1125 Section 2424.1125 Grants and Agreements Federal Agency Regulations for Grants and... of Participation § 2424.1125 How does a limited denial of participation start? A limited denial of...

  16. 22 CFR 51.61 - Denial of passports to certain convicted drug traffickers.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Denial of passports to certain convicted drug... Denial, Revocation, and Restriction of Passports § 51.61 Denial of passports to certain convicted drug... felony conviction for a Federal or state drug offense, if the individual used a U.S. passport or...

  17. Climate Change Denial Books and Conservative Think Tanks: Exploring the Connection.

    Science.gov (United States)

    Dunlap, Riley E; Jacques, Peter J

    2013-06-01

    The conservative movement and especially its think tanks play a critical role in denying the reality and significance of anthropogenic global warming (AGW), especially by manufacturing uncertainty over climate science. Books denying AGW are a crucial means of attacking climate science and scientists, and we examine the links between conservative think tanks (CTTs) and 108 climate change denial books published through 2010. We find a strong link, albeit noticeably weaker for the growing number of self-published denial books. We also examine the national origins of the books and the academic backgrounds of their authors or editors, finding that with the help of American CTTs climate change denial has spread to several other nations and that an increasing portion of denial books are produced by individuals with no scientific training. It appears that at least 90% of denial books do not undergo peer review, allowing authors or editors to recycle scientifically unfounded claims that are then amplified by the conservative movement, media, and political elites.

  18. 17 CFR 9.12 - Effective date of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.12 Effective date of disciplinary or access denial action. (a) Effective date. Any disciplinary or access denial action taken by an... cause a disciplinary action to become effective prior to that time if: (1) As authorized by § 8.25 of...

  19. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

    Directory of Open Access Journals (Sweden)

    Mahalakshmi Gunasekaran

    2017-01-01

    Full Text Available Denial-of-sleep (DoSL attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA based denial-of-sleep attack detection (GA-DoSLD algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA algorithm in the base station (BS for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

  20. Denial of shipments - myth or reality

    International Nuclear Information System (INIS)

    Charrette, M.A.; McInnes, D.

    2004-01-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care

  1. Denial of shipments - myth or reality

    Energy Technology Data Exchange (ETDEWEB)

    Charrette, M.A.; McInnes, D. [MDS Nordion, Ottawa, ON (Canada)

    2004-07-01

    The global healthcare community depends on shipments of radioisotopes. MDS Nordion manufactures and distributes radioisotopes used in the medical, research and sterilization industries throughout the world. With a growing demand for radiation and radiation technology to prevent, diagnose and treat disease, it is important that the global health care industry have a secure and reliable supply of such important materials. Despite this ever increasing need, shipments of radioisotopes are being increasingly delayed and outright denied. This paper outlines the importance of radioisotopes to global healthcare. It also details examples of shipment denials and how this evolving situation has impeded the efficient transport of radioactive material which risks preventing the delivery of essential radioisotopes to many member states. Denial of shipments was identified as a key issue at the 2003 International Conference on the Safety of Transport of Radioactive Material, the 2003 International Atomic Energy Agency (IAEA) General Conference and at an IAEA Technical Meeting in January 2004. The outcome is that the IAEA is focused on better documenting the problem and is starting to develop ideas to address it. Moreover, governments, associations and modal organizations are becoming more aware of the matter. As a responsible partner in a unique industry, MDS Nordion encourages all IAEA Member States, commercial carriers, airports and ports to be engaged in this matter and accept the transport of radioactive material without additional requirements. In this respect, the collaboration of all organizations involved in this highly interactive global system of transport is vital to assure the effective transport of radioactive material for global health care.

  2. 12 CFR 404.17 - Appeal of denials of access.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Appeal of denials of access. 404.17 Section 404.17 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.17 Appeal of denials of access. (a) Appeals to the Assistant General...

  3. The denial of death thesis: sociological critique and implications for palliative care.

    Science.gov (United States)

    Zimmermann, Camilla; Rodin, Gary

    2004-03-01

    It has become commonplace to say that contemporary western society is 'death-denying'. This characterization, which sociologists have termed the 'denial of death thesis', first arose in the social science, psychological and clinical medical literature in the period between 1955 and 1985. During the same time period, the hospice and palliative care movements were developing and in part directed themselves against the perceived cultural denial of death in western society. While the denial of death has been taken for granted by the lay public as well as by clinicians, in the sociological literature it has been increasingly questioned. In this paper we use sociological critiques of the denial of death thesis to raise critical questions about the theory and practice of contemporary palliative care. In particular, we argue that the emphasis of palliative care should not be on extinguishing the denial of death but on the relief of suffering.

  4. Insurance denials for cancer clinical trial participation after the Affordable Care Act mandate.

    Science.gov (United States)

    Mackay, Christine B; Antonelli, Kaitlyn R; Bruinooge, Suanna S; Saint Onge, Jarron M; Ellis, Shellie D

    2017-08-01

    The Affordable Care Act (ACA) includes a mandate requiring most private health insurers to cover routine patient care costs for cancer clinical trial participation; however, the impact of this provision on cancer centers' efforts to accrue patients to clinical trials has not been well described. First, members of cancer research centers and community-based institutions (n = 252) were surveyed to assess the status of insurance denials, and then, a focused survey (n = 77) collected denial details. Univariate and multivariate analyses were used to examine associations between the receipt of denials and site characteristics. Overall, 62.7% of the initial survey respondents reported at least 1 insurance denial during 2014. Sites using a precertification process were 3.04 times more likely to experience denials (95% confidence interval, 1.55-5.99; P ≤ .001), and similar rates of denials were reported from sites located in states with preexisting clinical trial coverage laws versus states without them (82.3% vs 85.1%; χ = 50.7; P ≤ .001). Among the focused survey sites, academic centers reported denials more often than community sites (71.4% vs 46.4%). The failure of plans to cover trial participation was cited as the most common reason provided for denials (n = 33 [80.5%]), with nearly 80% of sites (n = 61) not receiving a coverage response from the insurer within 72 hours. Despite the ACA's mandate for most insurers to cover routine care costs for cancer clinical trial participation, denials and delays continue. Denials may continue because some insurers remain exempt from the law, or they may signal an implementation failure. Delays in coverage may affect patient participation in trials. Additional efforts to eliminate this barrier will be needed to achieve federal initiatives to double the pace of cancer research over the next 5 years. Future work should assess the law's effectiveness at the patient level to inform these efforts

  5. Postmodernism, historical denial, and history education:

    Directory of Open Access Journals (Sweden)

    Robert John Parkes

    2015-12-01

    Full Text Available History educators frequently ignore, or engage only reluctantly and cautiously with postmodernism. This is arguably because postmodernism is frequently accused of assaulting the epistemological foundations of history as an academic discipline, fostering a climate of cultural relativism, encouraging the proliferation of revisionist histories, and providing fertile ground for historical denial. In the Philosophy of History discipline, Frank Ankersmit has become one of those scholars most closely associated with ‘postmodern history’. This paper explores Ankersmit’s ‘postmodern’ philosophy of history, particularly his key notion of ‘narrative substances’; what it might do for our approach to a problem such as historical denial; and what possibilities it presents for history didactics.

  6. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  7. A study for the review of export license through the NSG denial notification

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Sun Do; Yang, Seung Hyo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2012-10-15

    All NSG participating members that have rejected applications of export licenses for nuclear export control items within their respective countries must give notice of this to the point of contact at NSG. This is referred to as the Denial Notification, and each of the participating members must respect the denial notifications of the other member nations. When participating members seek to obtain approval for an export license that is essentially identical to the denial notification of other member nations, they must necessarily go through the process of prior discussion with the nation that gave the denial notification. Also, it is regulated that the export license must not be approved without the sufficient exchange of information. Thus, these records of denial notifications must be constantly checked and maintained as the latest updated information and these records must be utilized in related approval examinations. This study analyzes the denial notifications that have been recorded in the past 20 years and it describes the areas that must be mainly examined at the export and import licensing.

  8. The denial of cancer interview: development and first assessment of psychometric properties in lung cancer patients

    NARCIS (Netherlands)

    Vos, Martina S.; Putter, Hein; Leurs, Amber; Rooijmans, Harry G. M.; de Haes, Hanneke C. J. M.; van Houwelingen, Hans C.

    2007-01-01

    Based on Weissman and Hackett's comprehensive definition of denial, a semi-structured interview was developed to measure denial in cancer patients. The denial in cancer interview (DCI) covers both the patients' recount of their illness experience and the expert's impression of the level of denial in

  9. 12 CFR 303.223 - Applicant's right to hearing following denial.

    Science.gov (United States)

    2010-01-01

    ... Criminal Offenses) § 303.223 Applicant's right to hearing following denial. An applicant may request a... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Applicant's right to hearing following denial. 303.223 Section 303.223 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION PROCEDURE AND RULES OF...

  10. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  11. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

    Directory of Open Access Journals (Sweden)

    Roberto Alonso

    2016-08-01

    Full Text Available The Domain Name System (DNS is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS. The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  12. Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers.

    Science.gov (United States)

    Alonso, Roberto; Monroy, Raúl; Trejo, Luis A

    2016-08-17

    The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.

  13. Protecting Dynamic Mobile Agent against Denial of Service Attacks

    Science.gov (United States)

    Aggarwal, Mayank; Nipur, Pallavi

    2010-11-01

    Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.

  14. 36 CFR 1202.80 - How do I appeal the denial of a request to amend a record?

    Science.gov (United States)

    2010-07-01

    ...) For current NARA employees if the denial to amend concerns a record maintained in the employee's... agency, NARA will provide the employee with name and address of the appropriate appeal official in that...) Notice of your right to file a Statement of Disagreement for distribution in accordance with § 1202.82...

  15. 22 CFR 212.36 - Denial of request for access to records.

    Science.gov (United States)

    2010-04-01

    ... Section 212.36 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT PUBLIC INFORMATION Access to Agency... responsible for the denial, and the right of the person to appeal the adverse determination. (b) The denial of... Administrative Services, Bureau for Management, Room 803, SA-2, Agency for International Development, 21st and...

  16. Detecting A Botnet By Reverse Engineering

    Directory of Open Access Journals (Sweden)

    Oesman Hendra Kelana

    2013-06-01

    Full Text Available Abstract— Botnet malware is a malicious program. Botnet that infects computers, called bots, will be controlled by a botmaster to do various things such as: spamming, phishing, keylogging Distributed Denial of Service (DDoS and other activities that are generally profitable to the owner of the bot (botmaster or those who use botnet services. The problem is that many computers have been controlled by botnets without the knowledge of the computer owner.  There are many ways to examine botnets, for example by studying the traffic from the botnet network, studying how botnets communicate to each, studying how each robot receives orders to do something, and so forth. Of the many methods, the most frequently and commonly used is the reverse engineering, where researchers study how a botnet works by botnet debugging. In this study the author tries to understand or research botnets by taking a type of botnet, namely Agobot, using reverse engineering.  One of the result of the research is that malware program files in general and in particular botnet has a technique to obscure the way that research using reverse engineering. Another result also shows that the botnet Agobot runs on computers by using the Windows service, and by changing the Windows registry so that every time the computer starts, Agobot always actively works in the computer memory. Keywords— Malware, Bot, Botnet, Botmaster, Agobot, Spam, Distributed Denial of Services, Identity Theft, Computer Security, Reverse Engineering, Debug, Windows Service, the Registry.

  17. "But I didn't do it!": ethical treatment of sex offenders in denial.

    Science.gov (United States)

    Levenson, Jill S

    2011-09-01

    This article addresses ethical questions and issues related to the treatment of sex offenders in denial, using the empirical research literature and the ethical codes of American Psychological Association (APA) and National Association of Social Workers (NASW) to guide the ethical decision-making process. The empirical literature does not provide an unequivocal link between denial and recidivism, though some studies suggest that decreased denial and increased accountability appear to be associated with greater therapeutic engagement and reduced recidivism for some offenders. The ethical codes of APA and NASW value the client's self-determination and autonomy, and psychologists and social workers have a duty to empower individual well-being while doing no harm to clients or others. Clinicians should view denial not as a categorical construct but as a continuum of distorted cognitions requiring clinical attention. Denial might also be considered as a responsivity factor that can interfere with treatment progress. Offering a reasonable time period for therapeutic engagement might provide a better alternative than automatically refusing treatment to categorical deniers.

  18. Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

    Directory of Open Access Journals (Sweden)

    Jian Kang

    2015-01-01

    Full Text Available We propose using multiple observed features of network traffic to identify new high-distributed low-rate quality of services (QoS violation so that detection accuracy may be further improved. For the multiple observed features, we choose F feature in TCP packet header as a microscopic feature and, P feature and D feature of network traffic as macroscopic features. Based on these features, we establish multistream fused hidden Markov model (MF-HMM to detect stealthy low-rate denial of service (LDoS attacks hidden in legitimate network background traffic. In addition, the threshold value is dynamically adjusted by using Kaufman algorithm. Our experiments show that the additive effect of combining multiple features effectively reduces the false-positive rate. The average detection rate of MF-HMM results in a significant 23.39% and 44.64% improvement over typical power spectrum density (PSD algorithm and nonparametric cumulative sum (CUSUM algorithm.

  19. Silence and Denial in Everyday Life—The Case of Animal Suffering

    Directory of Open Access Journals (Sweden)

    Deidre Wicks

    2011-02-01

    Full Text Available How can we make sense of the fact that we live in a world where good people co-exist in silence about widespread animal suffering. How is it that sites of suffering such as laboratories, factory farms, abattoirs and animal transportation are all around us and yet we ‘do not, in a certain sense, know about them’ [1]. This ‘not knowing’ is one of the most difficult barriers for animal activists who must constantly develop new strategies in an attempt to catch public attention and translate it into action. Recent contributions from the ‘sociology of denial’ have elucidated many of the mechanisms involved in ‘not knowing’ in relation to human atrocities and genocide. In this context, ‘denial’ refers to the maintenance of social worlds in which an undesirable situation is unrecognized, ignored or made to seem normal [2]. These include different types of denial: personal, official and cultural, as well as the process of normalization whereby suffering becomes invisible through routinization, tolerance, accommodation, collusion and cover up. Denial and normalization reflect both personal and collective states where suffering is not acknowledged [3]. In this paper, I will examine insights from the sociology of denial and apply them to human denial and normalization of animal suffering. This will include an examination of denial which is both individual and social and the implications of these insights for theory and practice in the human/animal relationship.

  20. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  1. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network

    Directory of Open Access Journals (Sweden)

    Jun Li

    2017-03-01

    Full Text Available With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

  2. 17 CFR 9.11 - Form, contents and delivery of notice of disciplinary or access denial action.

    Science.gov (United States)

    2010-04-01

    ... notice of disciplinary or access denial action. 9.11 Section 9.11 Commodity and Securities Exchanges... OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.11 Form, contents and delivery of notice of disciplinary or access denial action. (a) When required...

  3. Anomalous Traffic Detection and Self-Similarity Analysis in the Environment of ATMSim

    Directory of Open Access Journals (Sweden)

    Hae-Duck J. Jeong

    2017-12-01

    Full Text Available Internet utilisation has steadily increased, predominantly due to the rapid recent development of information and communication networks and the widespread distribution of smartphones. As a result of this increase in Internet consumption, various types of services, including web services, social networking services (SNS, Internet banking, and remote processing systems have been created. These services have significantly enhanced global quality of life. However, as a negative side-effect of this rapid development, serious information security problems have also surfaced, which has led to serious to Internet privacy invasions and network attacks. In an attempt to contribute to the process of addressing these problems, this paper proposes a process to detect anomalous traffic using self-similarity analysis in the Anomaly Teletraffic detection Measurement analysis Simulator (ATMSim environment as a research method. Simulations were performed to measure normal and anomalous traffic. First, normal traffic for each attack, including the Address Resolution Protocol (ARP and distributed denial-of-service (DDoS was measured for 48 h over 10 iterations. Hadoop was used to facilitate processing of the large amount of collected data, after which MapReduce was utilised after storing the data in the Hadoop Distributed File System (HDFS. A new platform on Hadoop, the detection system ATMSim, was used to identify anomalous traffic after which a comparative analysis of the normal and anomalous traffic was performed through a self-similarity analysis. There were four categories of collected traffic that were divided according to the attack methods used: normal local area network (LAN traffic, DDoS attack, and ARP spoofing, as well as DDoS and ARP attack. ATMSim, the anomaly traffic detection system, was used to determine if real attacks could be identified effectively. To achieve this, the ATMSim was used in simulations for each scenario to test its ability to

  4. Climate change denial, freedom of speech and global justice

    Directory of Open Access Journals (Sweden)

    Trygve Lavik

    2016-10-01

    Full Text Available In this paper I claim that there are moral reasons for making climate denialism illegal . First I define climate denialism, and then I discuss its impact on society and its reception in the media.  I build my philosophical arguments mainly on John Stuart Mill and Thomas M. Scanlon.  According to Mill’s utilitarian justification of free speech, even untrue opinions are valuable in society’s pursuit of more truth. Consequently one might think that Mill’s philosophy would justify climate denialists’ right to free speech.  A major section of the paper argues against that view. The main arguments are: Climate denialism is not beneficial because its main goal is to produce doubt, and not truth. Climate denialism is not sincerely meant, which is a necessary condition for Mill to accept utterances. Climate denialists bring harm, by blocking necessary action on climate change.  Primarily they harm future generations and people in developing countries. Hence the case can be made in terms of global justice: Would future generations and people in developing countries support my claim? I think so, or so I argue. My argument from global justice is built on Scanlon’s distinction between the interests of participants, the interests of audiences, and the interests of bystanders.  The climate denialists have participant interests ‘in being able to call something to the attention of a wide audience’. Audience interests consist in ‘having access to expressions that we wish to hear or read, and even in being exposed to some degree to expressions we have not chosen’. Future generations and people in poor countries are bystanders to the climate debate. If the debate postpones necessary actions, it is the bystanders who must pay the price. I argue that bystanders’ costs outweigh participants’ and audiences’ interests, and that this is an argument for a statutory ban on climate denialism.Article first published online: 21 DEC 2015 

  5. 22 CFR 214.51 - Administrative review of denial for public access to records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Administrative review of denial for public access to records. 214.51 Section 214.51 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADVISORY COMMITTEE MANAGEMENT Administrative Remedies § 214.51 Administrative review of denial for public access to...

  6. 40 CFR 86.1850-01 - Denial, suspension or revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 19 2010-07-01 2010-07-01 false Denial, suspension or revocation of... AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) CONTROL OF EMISSIONS FROM NEW AND IN-USE HIGHWAY VEHICLES AND...-Duty Vehicles, Light-Duty Trucks, and Complete Otto-Cycle Heavy-Duty Vehicles § 86.1850-01 Denial...

  7. ‘Not My Child’: Parents’ Denial About Adolescent Sexuality in Harare, Zimbabwe

    Directory of Open Access Journals (Sweden)

    Manase Kudzai Chiweshe

    2018-03-01

    Full Text Available Objective: To find out adult views on adolescent sexualities in Zimbabwe and how adults construct sexual cultures that deny adolescence access to sex.Materials and methods: The paper uses qualitative methodologies, with purposively selected parents and key informants. A total of ten in depth interviews, four focus groups and six key informant interviews with purposively sampled male and female respondents were conducted. Key informants included a headmaster, teacher, social worker, nurses and a member of traditional healers association.Results: Parents that were interviewed denied that their adolescent children were sexually active. This denial of adolescent sexuality was seen throughout the interviews. The denial of adolescent sexuality was linked to the other themes that emerged including sexual surveillance and sexual communication, school pregnancy, STIs and sexual education, and adult anxiety on adolescent sex.Conclusion: The denial of youth sexuality has serious impacts on youths’ access to information and ability to protect themselves from sexually transmitted diseases and HIV. We argue that government policies and lack of comprehensive sex education in schools are based on this denial of adolescent sexuality and should be addressed.

  8. Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Abdelali Saidi

    2017-03-01

    Full Text Available Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.

  9. Semantics and pragmatics of social influence: how affirmations and denials affect beliefs in referent propositions.

    Science.gov (United States)

    Gruenfeld, D H; Wyer, R S

    1992-01-01

    Ss read either affirmations or denials of target propositions that ostensibly came from either newspapers or reference volumes. Denials of the validity of a proposition that was already assumed to be false increased Ss' beliefs in this proposition. The effect generalized to beliefs in related propositions that could be used to support the target's validity. When denials came from a newspaper, their "boomerang effect" was nearly equal in magnitude to the direct effect of affirming the target proposition's validity. When Ss were asked explicitly to consider the implications of the assertions, however, the impact of denials was eliminated. Affirmations of a target proposition that was already assumed to be true also had a boomerang effect. Results have implications for the effects of both semantic and pragmatic processing of assertions on belief change.

  10. 26 CFR 1.585-5 - Denial of bad debt reserves for large banks.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Denial of bad debt reserves for large banks. 1...) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions § 1.585-5 Denial of bad debt... other section for an addition to a reserve for bad debts. However, for these years, except as provided...

  11. 78 FR 71030 - Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ...-0005; Notice 2] Ford Motor Company, Denial of Petition for Decision of Inconsequential Noncompliance...). ACTION: Denial of Petition. SUMMARY: Ford Motor Company (Ford) has determined that certain model year 2011 Ford E-150, E-250, E-350 and E-450 motor vehicles manufactured [[Page 71031

  12. Inferring Internet Denial-of-Service Activity

    National Research Council Canada - National Science Library

    Moore, David

    2001-01-01

    .... During this period, we observe more than 2,000 attacks against more than 5,000 distinct targets, ranging from well known e-commerce companies such as Amazon and Hotmail to small foreign ISPs and dial-up connections. We believe that our work is the only publically available data quantifying denial-of-service activity in the Internet.

  13. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  14. Fluctuating confidence: the dynamic consequences of true/false affirmatives and denials on how a listener appraises their personal past.

    Science.gov (United States)

    Davis, Jolee; Bayantemur, Sharon Y; Seecharan, Sasha; Unger, Leslie D; Hellgren, Johanna; Stone, Charles B

    2018-08-01

    The present study examined the mnemonic consequences of true/false denials and affirmatives on how a listener appraises their personal past. To this end, participants (listeners) rated the extent to which they were confident certain events occurred during their childhood. They rated these events both before and after a confederate (speaker) denied or affirmed the occurrence of four different childhood events each, for a total of eight "rehearsed" events. For each set (denials and affirmatives) of events, half were true and half were false. In turn, this created four types of events (two each): true denials, true affirmatives, false denials, and false affirmatives. Additionally, half of the participants were told that the speaker was provided independent information about the veracity of the event's occurrence ("expert" condition). Overall, listeners were less confident in the occurrence of false denial events, but more so when they believed the speaker to be more knowledgeable of the listeners memories, more confident in false affirmative events and, counter intuitively, more confident in the occurrence of true denial events. These results underscore the importance of a nuanced approach to the mnemonic consequences of true and false denials and affirmations in the course of social interactions.

  15. 78 FR 71032 - Foreign Tire Sales, Inc., Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2013-11-27

    ...-0063; Notice 2] Foreign Tire Sales, Inc., Denial of Petition for Decision of Inconsequential...). ACTION: Denial of Petition. SUMMARY: Foreign Tire Sales, Inc. (FTS), as importer for ProMeter brand medium truck radial replacement tires manufactured by Shandlong Linglong Rubber Company Limited, has...

  16. 24 CFR 2002.21 - Authority to deny requests for records and form of denial.

    Science.gov (United States)

    2010-04-01

    ... of a record or information compiled by a criminal law enforcement authority in the course of a...) Be in writing; (2) State simply the reasons for the denial; (3) State that review of the denial by the Inspector General of HUD may be requested; (4) Set forth the steps for obtaining review consistent...

  17. 33 CFR 135.223 - Certificates, denial or revocation.

    Science.gov (United States)

    2010-07-01

    ... SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Financial Responsibility for Offshore Facilities § 135.223 Certificates, denial or revocation... false statement to the Fund Administrator in connection with establishing or maintaining evidence of...

  18. Denial of illness in schizophrenia as a disturbance of self-reflection, self-perception and insight.

    Science.gov (United States)

    Bedford, Nicholas J; David, Anthony S

    2014-01-01

    A substantial proportion of schizophrenia patients deny aspects of their illness to others, which may indicate a deeper disturbance of 'insight' and a self-reflection deficit. The present study used a 'levels-of-processing' mnemonic paradigm to examine whether such patients engage in particularly brief and shallow self-reflection during mental illness-related self-evaluation. 26 schizophrenia patients with either an overall acceptance or denial of their illness and 25 healthy controls made timed decisions about the self-descriptiveness, other-person-descriptiveness and phonological properties of mental illness traits, negative traits and positive traits, before completing surprise tests of retrieval for these traits. The acceptance patients and denial patients were particularly slow in their mental illness-related self-evaluation, indicating that they both found this exercise particularly difficult. Both patient groups displayed intact recognition but particularly reduced recall for self-evaluated traits in general, possibly indicating poor organisational processing during self-reflection. Lower recall for self-evaluated mental illness traits significantly correlated with higher denial of illness and higher illness-severity. Whilst explicit and implicit measures of self-perception corresponded in the healthy controls (who displayed an intact positive>negative 'self-positivity bias') and acceptance patients (who displayed a reduced self-positivity bias), the denial patients' self-positivity bias was explicitly intact but implicitly reduced. Schizophrenia patients, regardless of their illness-attitudes, have a particular deficit in recalling new self-related information that worsens with increasing denial of illness. This deficit may contribute towards rigid self-perception and disturbed self-awareness and insight in patients with denial of illness. © 2013.

  19. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fengli [Univ. of Arkansas, Fayetteville, AR (United States); Li, QInghua [Univ. of Arkansas, Fayetteville, AR (United States); Mantooth, Homer Alan [Univ. of Arkansas, Fayetteville, AR (United States); Ross, Chase [Univ. of Arkansas, Fayetteville, AR (United States); Yang, Jing [Univ. of Arkansas, Fayetteville, AR (United States); Di, Jia [Univ. of Arkansas, Fayetteville, AR (United States); Balda, Juan Carlos [Univ. of Arkansas, Fayetteville, AR (United States)

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  20. 11 CFR 4.8 - Appeal of denial.

    Science.gov (United States)

    2010-01-01

    ... been received by the Commission, may appeal the adverse determination or the failure to respond by... writing, shall clearly and prominently state on the envelope or other cover and at the top of the first... will not entertain any appeal from an alleged denial or failure to comply with an oral request. Any...

  1. Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    Directory of Open Access Journals (Sweden)

    Yang Dan

    2008-12-01

    Full Text Available Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation. The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of distributed traffic anomaly on many links, this paper proposes a network-wide detection method by performing anomalous correlation analysis of traffic signals' instantaneous parameters. In our method, traffic signals' instantaneous parameters are firstly computed, and their network-wide anomalous space is then extracted via traffic prediction. Finally, an anomaly is detected by a global correlation coefficient of anomalous space. Our evaluation using Abilene traffic traces demonstrates the excellent performance of this approach for distributed traffic anomaly detection.

  2. Using "Making Sense of Climate Science Denial" MOOC videos in a college course

    Science.gov (United States)

    Schuenemann, K. C.; Cook, J.

    2015-12-01

    The Massive Open Online Course (MOOC) "Denial101x: Making Sense of Climate Science Denial" teaches students to make sense of the science and respond to climate change denial. The course is made up of a series of short, myth-debunking lecture videos that can be strategically used in college courses. The videos and the visuals within have proven a great resource for an introductory college level climate change course. Methods for using the videos in both online and in-classroom courses will be presented, as well as student reactions and learning from the videos. The videos introduce and explain a climate science topic, then paraphrase a common climate change myth, explain why the myth is wrong by identifying the characteristic of climate denial used, and concludes by reinforcing the correct science. By focusing on common myths, the MOOC has made an archive of videos that can be used by anyone in need of a 5-minute response to debunk a myth. By also highlighting five characteristics of climate denial: fake experts, logical fallacies, impossible expectations, cherry picking, and conspiracy theories (FLICC), the videos also teach the viewer the skills they need to critically examine myths they may encounter in the real world on a variety of topics. The videos also include a series of expert scientist interviews that can be used to drive home points, as well as put some faces to the science. These videos are freely available outside of the MOOC and can be found under the relevant "Most used climate myths" section on the skepticalscience.com webpage, as well as directly on YouTube. Discover ideas for using videos in future courses, regardless of discipline.

  3. Avoidable Technical and Clinical Denial Write-Off Management in Hospitals, Physician Offices, and Clinics.

    Science.gov (United States)

    Terra, Sandra Marlene; Byrne, Amanda

    2016-01-01

    This article reviews the various types of technical and clinical denials that are usually "written off" and proposes strategies to prevent this loss. For purposes of this writing, avoidable technical and clinical denial write-offs are defined as revenue lost from "first-pass" denials rejections. For example, a procedure that requires an authorization is performed without having had an authorization obtained. After appeals and attempts to recoup the revenue, often unsuccessful, the organization ultimately "writes off" the revenue as not collectable. The question to ask is: Are these claims really not collectable or can actionable steps be taken to conserve these dollars and improve the bottom line? Acute care hospitals, physician offices, and clinics. In today's environment, the need to manage costs is ubiquitous. Cost management is on the priority list of all savvy health care executives, even if margins are healthy, revenue is under pressure, and the magnitude of cost reduction needed is greater than what past efforts have achieved. As hospitals and physician clinics prioritize areas for improvement, reduction in lost revenue-especially avoidable lost revenue-should be at the top of the list. Attentively managing claim denial write-offs will significantly reduce lost revenue. There is significant interface between case management and the revenue cycle. Developing core competencies for reducing clinical and technical denials should be a critical imperative in overall cost management strategy. Case managers are well placed to prevent these unnecessary losses through accurate status determination and clinical documentation review. These clinical professionals can also provide insight into work flow and other processes inherent in the preauthorization process.

  4. Transport of radioactive materials by air: a national approach to cope with denials and delays

    International Nuclear Information System (INIS)

    Perez Pijuan, Saul; Izquierdo Perez, Jorge; Rodriguez Martinez, Mercedes; Guillen Campos, Alba

    2008-01-01

    Full text: Around 300 nuclear medicine services in the Greater Caribbean depend, almost exclusively, on the airlines to receive radiopharmaceuticals. Less than 20 % of the regional airlines accept radioactive materials in addition to delays and denials, altogether, result in hardships to patients undergoing diagnosis and treatment, despite compliance with regulations. In the international framework leaded by the IAEA to alleviate the difficulties encountered, national approaches are needed to support this effort. The paper presents the Cuban experience regarding statistics of denials and delays by air, generic examples and classification of causes. The role of a Facilitation Working Group and actions taken in communication, awareness, harmonization of regulations, education and training are discussed. The results show a sensitive improvement in the reported instances of denials and delays at domestic level, strongly influenced by the corporative social responsibility of the main national airline and the actions underway. On the other hand, the increasing number of reported denials by international airlines in the last two years, demonstrate how much work must be done at regional and international level. (author)

  5. Resilient control under Denial-of-Service: Robust design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  6. Resilient Control under Denial-of-Service:Robust Design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  7. 24 CFR 960.204 - Denial of admission for criminal activity or drug abuse by household members.

    Science.gov (United States)

    2010-04-01

    ... activity or drug abuse by household members. 960.204 Section 960.204 Housing and Urban Development... HOUSING Admission § 960.204 Denial of admission for criminal activity or drug abuse by household members. (a) Required denial of admission—(1) Persons evicted for drug-related criminal activity. The PHA...

  8. 7 CFR 97.105 - Denial of an application.

    Science.gov (United States)

    2010-01-01

    ... certificates or rights are cited, as a reason for denial, their nationality or country, numbers and dates, and... to enable the applicant to identify the cited certificates or rights. (d) If printed publications are... shall be denied. (b) In denying an application, the examiner shall cite the reasons the application was...

  9. Data denial experiments for extratropical transition

    OpenAIRE

    Anwender, Doris; Cardinali, Carla; Jones, Sarah C.

    2012-01-01

    Data denial experiments using the European Centre for Medium-Range Weather Forecasts (ECMWF) model are designed to investigate the value of targeted observations for historical extratropical transition (ET) cases over the Atlantic. The impact of removing data from specified locations linked to the ET development is therefore examined. It is shown that the impact of denying data in the near tropical cyclone (TC) environment is, on average, as important as denying data in mid-latitude sensitive...

  10. 78 FR 22876 - Rodenticides; Notice of Intent To Cancel Registrations of, and Notice of Denial of Applications...

    Science.gov (United States)

    2013-04-17

    ... ENVIRONMENTAL PROTECTION AGENCY [FIFRA Docket No. 661; FRL-9804-2] Rodenticides; Notice of Intent To Cancel Registrations of, and Notice of Denial of Applications for, Certain Rodenticide Bait... to the Notice of Intent to Cancel Registration of, and Notice of Denial of Application for, Certain...

  11. 75 FR 8193 - Jeri Hassman, M.D.; Denial of Application

    Science.gov (United States)

    2010-02-23

    ... is buying drugs on the street. Id. at 1006. With respect to requests for early refills, Dr. Hare... Part II Department of Justice Drug Enforcement Administration Jeri Hassman, M.D.; Denial of...; [[Page 8194

  12. 7 CFR 330.204 - Denial or cancellation of permits; reconsiderations.

    Science.gov (United States)

    2010-01-01

    ...; PLANT PESTS; SOIL, STONE, AND QUARRY PRODUCTS; GARBAGE Movement of Plant Pests § 330.204 Denial or... ground it will involve a danger of dissemination of the plant pest into the State, Territory or...

  13. On-Line Detection of Distributed Attacks from Space-Time Network Flow Patterns

    National Research Council Canada - National Science Library

    Baras, J. S; Cardenas, A. A; Ramezani, V

    2003-01-01

    .... The directionality of the change in a network flow is assumed to have an objective or target. The particular problem of detecting distributed denial of service attacks from distributed observations is presented as a working framework...

  14. Environmental Denial

    Directory of Open Access Journals (Sweden)

    Tomaž Grušovnik

    2013-03-01

    Full Text Available Even though today reliable information about the negative impact of humans on the environment is only two clicks away, a considerable number of people still deny it. Why? Research shows that what we might call 'environmental denial' is a consequence of specific social and psychological factors: if we were to admit the negative impact of our lifestyles on the environment, we would have to change our way of life founded on consumerism. However, consumerism is not simply a way of exchanging goods; it is also something around which we organize the meaning of our lives, as consumer research clearly shows. Therefore we deny the information on the negattive impact of human activity on the environment because admitting it would lead to a conflict between cognition (attitudes, beliefs and actions (behaviour around which we organize the meaning of our lives. Such an exposition points to wider sociopolitical effects. Firstly, it raises questions about education that have to take into account the non-rational nature of human beings, and secondly it raises questions about the directions and possible outcomes of social action.

  15. Denial of shipments of radioactive materials in Paraguay

    International Nuclear Information System (INIS)

    More Torres, Luis E.; Romero de Gonzalez, V.; Lopez Caceres, S.M.

    2008-01-01

    The Denials, Delays and Abandonment of the Radioactive Materials is a problem at world level that has been increased in the last times with more emphasis starting from the attack of September 11 the 2001 in the USA. From then radioactive materials have been denial or delayed and until abandoned. The materials of short periods used mainly in nuclear medicine as the 99m Tc or the 131 I, when they are rejected, delayed it usually causes the lost of the material because it has surpassed their useful life and in many cases they are abandoned. The rejections, delays and later abandonment of the materials in special of Medical use have originated serious damages for the nuclear medicine patients as much of diagnoses as of treatments, in Teleterapia for many patients of cancer who could not be treated. In the petroliferous prospecting and Industry has originated numerous economic damages due to the delays since most of the used sources they are of long period but the delay causes an important increase in the cost. (author)

  16. System justification, the denial of global warming, and the possibility of "system-sanctioned change".

    Science.gov (United States)

    Feygina, Irina; Jost, John T; Goldsmith, Rachel E

    2010-03-01

    Despite extensive evidence of climate change and environmental destruction, polls continue to reveal widespread denial and resistance to helping the environment. It is posited here that these responses are linked to the motivational tendency to defend and justify the societal status quo in the face of the threat posed by environmental problems. The present research finds that system justification tendencies are associated with greater denial of environmental realities and less commitment to pro-environmental action. Moreover, the effects of political conservatism, national identification, and gender on denial of environmental problems are explained by variability in system justification tendencies. However, this research finds that it is possible to eliminate the negative effect of system justification on environmentalism by encouraging people to regard pro-environmental change as patriotic and consistent with protecting the status quo (i.e., as a case of "system-sanctioned change"). Theoretical and practical implications of these findings are discussed.

  17. 78 FR 49411 - Denial of Petitions for Reconsideration of Regulation of Fuels and Fuel Additives: 2013 Biomass...

    Science.gov (United States)

    2013-08-14

    ...-AR55 Denial of Petitions for Reconsideration of Regulation of Fuels and Fuel Additives: 2013 Biomass... Fuel Additives: 2013 Biomass-Based Diesel Renewable Fuel Volume. DATES: EPA's denials of the petitions... requires that EPA determine the applicable volume of biomass-based diesel to be used in setting annual...

  18. Input-to-State Stabilizing Control Under Denial-of-Service

    NARCIS (Netherlands)

    De Persis, Claudio; Tesi, Pietro

    2015-01-01

    The issue of cyber-security has become ever more prevalent in the analysis and design of networked systems. In this paper, we analyze networked control systems in the presence of denial-of-service (DoS) attacks, namely attacks that prevent transmissions over the network. We characterize frequency

  19. 44 CFR 73.3 - Denial of flood insurance coverage.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Denial of flood insurance coverage. 73.3 Section 73.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... sufficient to confirm its identity and location; (2) A clear and unequivocal declaration that the property is...

  20. A Novel Real-Time DDoS Attack Detection Mechanism Based on MDRA Algorithm in Big Data

    Directory of Open Access Journals (Sweden)

    Bin Jia

    2016-01-01

    Full Text Available In the wake of the rapid development and wide application of information technology and Internet, our society has come into the information explosion era. Meanwhile, it brings in new and severe challenges to the field of network attack behavior detection due to the explosive growth and high complexity of network traffic. Therefore, an effective and efficient detection mechanism that can detect attack behavior from large scale of network traffic plays an important role. In this paper, we focus on how to distinguish the attack traffic from normal data flows in Big Data and propose a novel real-time DDoS attack detection mechanism based on Multivariate Dimensionality Reduction Analysis (MDRA. In this mechanism, we first reduce the dimensionality of multiple characteristic variables in a network traffic record by Principal Component Analysis (PCA. Then, we analyze the correlation of the lower dimensional variables. Finally, the attack traffic can be differentiated from the normal traffic by MDRA and Mahalanobis distance (MD. Compared with previous research methods, our experimental results show that higher precision rate is achieved and it approximates to 100% in True Negative Rate (TNR for detection; CPU computing time is one-eightieth and memory resource consumption is one-third of the previous detection method based on Multivariate Correlation Analysis (MCA; computing complexity is constant.

  1. The making of a civic discourse on controversial historical past: from denial to parrhesia

    Directory of Open Access Journals (Sweden)

    Giovanna LEONE

    2017-07-01

    Full Text Available This contribution discusses the pragmatic effects of different rhetoric strategies conveying evidence of past ingroup violence after a long lasting social denial (Cohen, 2001. In particular, a case study is presented on the making of a civic discourse on controversial historical past: war crimes committed by the Italian Army during the colonial invasion of Ethiopia (1935-36. Although very well proved (Del Boca, 2005, these facts were only recently inserted in Italian history textbooks (Leone & Mastrovito, 2010; Cajani, 2013. In this same period, evidence of these crimes was officially presented during discussions of the Italian Parliament. In spite of these recent acknowledgments of the Italian responsibilities for these crimes, a social myth is still widely shared by the public opinion, representing Italians as good fellows (Italiani, brava gente: cfr. Del Boca, 2005, unable to be cruel both in everyday life and in wartimes (Volpato et al., 2012. This specific situation, denying even the reality of facts happened, has been defined literal social denial, i.e. the deepest among the three possible states of denial (literal, interpretive, implicative: cfr. Cohen, 2001. The issue of literal social denial of past ingroup violence is at the intersection among theories on narratives on national past (László, 2003, social representations of history (Liu et al., 2014, conflict ethos (Bar-Tal et al., 2012; Kelman, 2008, group-based emotions (Allpress et al., 2010; Leone, 2000 and intergroup reconciliation processes (Nadler et al., 2008. Namely, understanding how a social denial could break down implies the theorization of human mind’s reflexivity as grounded on historical awareness (Ortega y Gasset, 1930, and the notion of social change as primarily rooted in natality, i.e. the fact that each birth represents a new beginning (Arendt, 1958. Drawing on this theoretical background, we will present an ongoing research program (Leone, in press on the

  2. 9 CFR 2.11 - Denial of initial license application.

    Science.gov (United States)

    2010-01-01

    ... have violated any Federal, State, or local laws or regulations pertaining to animal cruelty within 1... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Denial of initial license application. 2.11 Section 2.11 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT...

  3. 9 CFR 362.4 - Denial or withdrawal of service.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Denial or withdrawal of service. 362.4 Section 362.4 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE..., assaults, abuse, or any other improper means; (iv) has knowingly falsely made, issued, altered, forged, or...

  4. Inferring Passenger Denial Behavior of Taxi Drivers from Large-Scale Taxi Traces.

    Directory of Open Access Journals (Sweden)

    Sihai Zhang

    Full Text Available How to understand individual human actions is a fundamental question to modern science, which drives and incurs many social, technological, racial, religious and economic phenomena. Human dynamics tries to reveal the temporal pattern and internal mechanism of human actions in letter or electronic communications, from the perspective of continuous interactions among friends or acquaintances. For interactions between stranger to stranger, taxi industry provide fruitful phenomina and evidence to investigate the action decisions. In fact, one striking disturbing events commonly reported in taxi industry is passenger refusing or denial, whose reasons vary, including skin color, blind passenger, being a foreigner or too close destination, religion reasons and anti specific nationality, so that complaints about taxi passenger refusing have to be concerned and processed carefully by local governments. But more universal factors for this phenomena are of great significance, which might be fulfilled by big data research to obtain novel insights in this question. In this paper, we demonstrate the big data analytics application in revealing novel insights from massive taxi trace data, which, for the first time, validates the passengers denial in taxi industry and estimates the denial ratio in Beijing city. We first quantify the income differentiation facts among taxi drivers. Then we find out that choosing the drop-off places also contributes to the high income for taxi drivers, compared to the previous explanation of mobility intelligence. Moreover, we propose the pick-up, drop-off and grid diversity concepts and related diversity analysis suggest that, high income taxi drivers will deny passengers in some situations, so as to choose the passengers' destination they prefer. Finally we design an estimation method for denial ratio and infer that high income taxi drivers will deny passengers with 8.52% likelihood in Beijing. Our work exhibits the power of big

  5. 7 CFR 54.1023 - Denial or withdrawal of appeal service.

    Science.gov (United States)

    2010-01-01

    ... MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) REGULATIONS AND STANDARDS UNDER THE AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS INSPECTION ACT..., Processing, and Packaging of Livestock and Poultry Products § 54.1023 Denial or withdrawal of appeal service...

  6. 78 FR 58519 - Denial of Export Privileges; Sixing Liu

    Science.gov (United States)

    2013-09-24

    ... Powers Act (50 U.S.C. 1701, et seq. (2006 & Supp. IV 2010)). I have received notice of Liu's conviction... DEPARTMENT OF COMMERCE Bureau of Industry and Security Denial of Export Privileges; Sixing Liu In the Matter of: Sixing Liu, a/k/a Steve Liu, Inmate 43102-424, FCI Oxford, Federal Correctional...

  7. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  8. 40 CFR 89.126 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 89.126 Section 89.126 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Standards and Certification Provisions § 89.126 Denial, revocation of certificate of conformity. (a) If... issued certificate of conformity if the Administrator finds any one of the following infractions to be...

  9. 40 CFR 90.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 90.123 Section 90.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Emission Standards and Certification Provisions § 90.123 Denial, revocation of certificate of conformity... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The engine...

  10. Review on Malware and Malware Detection ‎Using Data Mining Techniques

    Directory of Open Access Journals (Sweden)

    Wesam S Bhaya

    2017-11-01

    Full Text Available Malicious software is any type of software or codes which hooks some: private information, data from the computer system, computer operations or(and merely just to do malicious goals of the author on the computer system, without permission of the computer users. (The short abbreviation of malicious software is Malware. However, the detection of malware has become one of biggest issues in the computer security field because of the current communication infrastructures are vulnerable to penetration from many types of malware infection strategies and attacks.  Moreover, malwares are variant and diverse in volume and types and that strictly explode the effectiveness of traditional defense methods like signature approach, which is unable to detect a new malware. However, this vulnerability will lead to a successful computer system penetration (and attack as well as success of more advanced attacks like distributed denial of service (DDoS attack. Data mining methods can be used to overcome limitation of signature-based techniques to detect the zero-day malware. This paper provides an overview of malware and malware detection system using modern techniques such as techniques of data mining approach to detect known and unknown malware samples.

  11. The Marley hypothesis: denial of racism reflects ignorance of history.

    Science.gov (United States)

    Nelson, Jessica C; Adams, Glenn; Salter, Phia S

    2013-02-01

    This study used a signal detection paradigm to explore the Marley hypothesis--that group differences in perception of racism reflect dominant-group denial of and ignorance about the extent of past racism. White American students from a midwestern university and Black American students from two historically Black universities completed surveys about their historical knowledge and perception of racism. Relative to Black participants, White participants perceived less racism in both isolated incidents and systemic manifestations of racism. They also performed worse on a measure of historical knowledge (i.e., they did not discriminate historical fact from fiction), and this group difference in historical knowledge mediated the differences in perception of racism. Racial identity relevance moderated group differences in perception of systemic manifestations of racism (but not isolated incidents), such that group differences were stronger among participants who scored higher on a measure of racial identity relevance. The results help illuminate the importance of epistemologies of ignorance: cultural-psychological tools that afford denial of and inaction about injustice.

  12. 40 CFR 91.123 - Denial, revocation of certificate of conformity.

    Science.gov (United States)

    2010-07-01

    ... conformity. 91.123 Section 91.123 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR... Certification Provisions § 91.123 Denial, revocation of certificate of conformity. (a) If, after review of the... conformity if the Administrator finds any one of the following infractions to be substantial: (1) The engine...

  13. An autonomic security monitor for distributed operating systems

    OpenAIRE

    Arenas, A.; Aziz, Benjamin; Maj, S.; Matthews, B.

    2011-01-01

    This paper presents an autonomic system for the monitoring of security-relevant information in a Grid-based operating system. The system implements rule-based policies using Java Drools. Policies are capable of controlling the system environment based on changes in levels of CPU/memory usage, accesses to system resources, detection of abnormal behaviour such as DDos attacks.

  14. 9 CFR 352.6 - Denial or withdrawal of inspection service.

    Science.gov (United States)

    2010-01-01

    ... improper means; (4) has knowingly represented that any exotic animal carcass, or exotic animal product, has... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Denial or withdrawal of inspection service. 352.6 Section 352.6 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF...

  15. 42 CFR 476.85 - Conclusive effect of QIO initial denial determinations and changes as a result of DRG validations.

    Science.gov (United States)

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.85 Section 476.85 Public Health CENTERS FOR... denial determinations and changes as a result of DRG validations. A QIO initial denial determination or change as a result of DRG validation is final and binding unless, in accordance with the procedures in...

  16. 42 CFR 476.96 - Review period and reopening of initial denial determinations and changes as a result of DRG...

    Science.gov (United States)

    2010-10-01

    ... determinations and changes as a result of DRG validations. 476.96 Section 476.96 Public Health CENTERS FOR... initial denial determinations and changes as a result of DRG validations. (a) General timeframe. A QIO or... initial denial determination or a change as a result of a DRG validation. (b) Extended timeframes. (1) An...

  17. Model for the reduction of denials of expeditions of radioactive material in the region of the America

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Bruno, Natanael

    2013-01-01

    The denials, restraints and delays of shipments of radioactive material likely to have occurred and continue to occur. Reducing them to acceptable levels can be a tangible goal that senders and recipients can anticipate and get. The basis for resolving cases of denials and delays should consider not only the participation of the competent national nuclear authorities but also other government authorities. Carriers, shippers, transport companies and recipients should consider in their queries all the wide range of authorities apparently have no involvement but they really have. This paper describes the experience gained in the country of Brazil and provides the basis of a model that could prove useful to other countries and regions, including America, if we adopt and adapt, to reduce the incidence of denials and delays of shipments of radioactive material, according to its own conditions and characteristics

  18. Denial of Service Prevention for 5G

    DEFF Research Database (Denmark)

    Li, Yao; Kaur, Bipjeet; Andersen, Birger

    2011-01-01

    5G wireless mobile communication is expected to include a large number of advanced technologies in order to further increase bandwidth, Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Software Defined Radio (SDR) will be the platform for advanced...... terminals. Our focus is security and especially prevention of Denial of Service (DoS) attacks which we believe will become more common in commercial networks through increasing availability of easy programmable SDRs. We propose a secret version of Adaptive Frequency Hopping, as a possible 5G technology...

  19. 42 CFR 476.93 - Opportunity to discuss proposed initial denial determination and changes as a result of a DRG...

    Science.gov (United States)

    2010-10-01

    ... determination and changes as a result of a DRG validation. 476.93 Section 476.93 Public Health CENTERS FOR... initial denial determination and changes as a result of a DRG validation. Before a QIO reaches an initial denial determination or makes a change as a result of a DRG validation, it must— (a) Promptly notify the...

  20. 40 CFR 164.21 - Contents of a denial of registration, notice of intent to cancel a registration, or notice of...

    Science.gov (United States)

    2010-07-01

    ..., notice of intent to cancel a registration, or notice of intent to change a classification. 164.21 Section... denial of registration, notice of intent to cancel a registration, or notice of intent to change a classification. (a) Contents. The denial of registration or a notice of intent to cancel a registration or to...

  1. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.

    Directory of Open Access Journals (Sweden)

    Ahmad Karim

    Full Text Available Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS, disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks' back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps' detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies.

  2. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications.

    Science.gov (United States)

    Karim, Ahmad; Salleh, Rosli; Khan, Muhammad Khurram

    2016-01-01

    Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks' back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps' detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies.

  3. SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications

    Science.gov (United States)

    Karim, Ahmad; Salleh, Rosli; Khan, Muhammad Khurram

    2016-01-01

    Botnet phenomenon in smartphones is evolving with the proliferation in mobile phone technologies after leaving imperative impact on personal computers. It refers to the network of computers, laptops, mobile devices or tablets which is remotely controlled by the cybercriminals to initiate various distributed coordinated attacks including spam emails, ad-click fraud, Bitcoin mining, Distributed Denial of Service (DDoS), disseminating other malwares and much more. Likewise traditional PC based botnet, Mobile botnets have the same operational impact except the target audience is particular to smartphone users. Therefore, it is import to uncover this security issue prior to its widespread adaptation. We propose SMARTbot, a novel dynamic analysis framework augmented with machine learning techniques to automatically detect botnet binaries from malicious corpus. SMARTbot is a component based off-device behavioral analysis framework which can generate mobile botnet learning model by inducing Artificial Neural Networks’ back-propagation method. Moreover, this framework can detect mobile botnet binaries with remarkable accuracy even in case of obfuscated program code. The results conclude that, a classifier model based on simple logistic regression outperform other machine learning classifier for botnet apps’ detection, i.e 99.49% accuracy is achieved. Further, from manual inspection of botnet dataset we have extracted interesting trends in those applications. As an outcome of this research, a mobile botnet dataset is devised which will become the benchmark for future studies. PMID:26978523

  4. 11 CFR 9405.8 - Appeals of denials of requests for records.

    Science.gov (United States)

    2010-01-01

    ... received by the Commission, may appeal the adverse determination or the failure to respond by requesting... occur. (b) The appeal request shall be in writing, shall clearly and prominently state on the envelope... not entertain any appeal from an alleged denial or failure to comply with an oral request. Any person...

  5. 15 CFR 285.13 - Denial, suspension, revocation, or termination of accreditation.

    Science.gov (United States)

    2010-01-01

    ... advertising during the suspension period in the area(s) affected by the suspension. (2) NVLAP will not require... reasons for the proposed denial or revocation and the procedure for appealing such a decision. (1) The... appeal the decision to the Director of NIST. If the laboratory appeals the decision to the Director of...

  6. 2 CFR 801.1105 - Cause for a limited denial of participation.

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false Cause for a limited denial of participation. 801.1105 Section 801.1105 Grants and Agreements Federal Agency Regulations for Grants and Agreements... (Department of Veterans Affairs Optional Subpart for OMB Guidance at 2 CFR Part 180). § 801.1105 Cause for a...

  7. 20 CFR 404.981 - Effect of Appeals Council's decision or denial of review.

    Science.gov (United States)

    2010-04-01

    ... decision or denial of review. The Appeals Council may deny a party's request for review or it may decide to... law judge if the request for review is denied, is binding unless you or another party file an action...

  8. 17 CFR 8.15 - Denial of charges and right to hearing.

    Science.gov (United States)

    2010-04-01

    ... EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.15... a charge which is denied, or on a penalty set by the disciplinary committee under § 8.14(a)(2), he... denied and/or penalties set by the disciplinary committee under § 8.14(a)(2) for which a hearing has been...

  9. Techniques to maintain functionality during degraded performance

    Science.gov (United States)

    McCoy, Joseph R.; White, Joshua S.

    2010-04-01

    In technology the notion of beyond state-of-the-art often begins when a paradigm is shifted. In this paper the authors present their work which has fundamentally enabled an enterprise to insure operational viability under the very real cyber facts: "we are under constant attack, it is a hostile space and we can control the point of contact." That point of contact is the optical bit stream which is currently beyond the scope of the standard cyber toolset. EverisTM, in working with our customers, has developed the tools to capture, view, analyze, and control the correlative (interdependent network, metadata, data and users) information as it traverses the core, regional, and global fiber optic networks. This capability to visualize below the operational picture afforded by current network intrusion detection systems can be combined with real-time intervention at the network core yielding prioritization, identification, and authentication of authentication. This directly translates into sophisticated end user interaction across the interdependencies often viewed as the "cloud". Everis has demonstrated unique applications based on this capability that includes mitigation of DDOS (Distributed Denial of Service), identification of "forged" IP (Internet Protocol) addresses, malicious executable destruction, WAN (Wide Area Network) IPS (Intrusion Prevention System) and connectionless routing vs. connection based switching.

  10. 40 CFR 123.30 - Judicial review of approval or denial of permits.

    Science.gov (United States)

    2010-07-01

    ... permitting process. A State will meet this standard if State law allows an opportunity for judicial review... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Judicial review of approval or denial... (CONTINUED) WATER PROGRAMS STATE PROGRAM REQUIREMENTS State Program Submissions § 123.30 Judicial review of...

  11. Transforming Pre-Service Teacher Education in Bolivia: From Indigenous Denial to Decolonisation?

    Science.gov (United States)

    Lopes Cardozo, Mieke T. A.

    2012-01-01

    In line with a broader Latin American turn to the left, since 2006 Bolivia's "politics of change" of president Evo Morales includes a new "decolonising" education reform called "Avelino Sinani Elizardo Perez" (ASEP). With the aim to break down deep historical processes of indigenous denial and exclusion in education,…

  12. Deference, Denial, and Beyond: A Repertoire Approach to Mass Media and Schooling

    Science.gov (United States)

    Rymes, Betsy

    2011-01-01

    In this article, the author outlines two general research approaches, within the education world, to these mass-mediated formations: "Deference" and "Denial." Researchers who recognize the social practices that give local meaning to mass media formations and ways of speaking do not attempt to recontextualize youth media in their own social…

  13. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  14. 76 FR 15985 - Hartech Corporation; Denial Without Prejudice of Food Additive Petition

    Science.gov (United States)

    2011-03-22

    ...] (Formerly Docket No. 91F-0111) Hartech Corporation; Denial Without Prejudice of Food Additive Petition...) is denying a food additive petition (FAP 1M4246) proposing that the food additive regulations be... of April 16, 1991 (56 FR 15373), FDA announced that a food additive petition (FAP 1M4246) had been...

  15. 36 CFR 1270.42 - Denial of access to public; right to appeal.

    Science.gov (United States)

    2010-07-01

    ...; right to appeal. 1270.42 Section 1270.42 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Denial of access to public; right to appeal. (a) Any person denied access to a Presidential record... library director at the address cited in part 1253 of this chapter. (b) All appeals must be received by...

  16. 24 CFR 982.552 - PHA denial or termination of assistance for family.

    Science.gov (United States)

    2010-04-01

    ... family has committed fraud, bribery, or any other corrupt or criminal act in connection with any Federal... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false PHA denial or termination of... terminate assistance for a participant under the programs because of the family's action or failure to act...

  17. A netFlow scoring framework for incident detection

    CSIR Research Space (South Africa)

    Sweeney, M

    2017-09-01

    Full Text Available ,” Tech. Rep., 2015. [19] R. Dobbins, “Mirai IoT Botnet Description and DDoS Attack Mitigation,” https://www.arbornetworks.com/blog/asert/mirai-iot-botnet- description-ddos-attack-mitigation/, 2016, [Accessed:2016-12-10]. [20] B. Herzberg, D. Bekerman..., and I. Zeifman, “Breaking Down Mirai: An IoT DDoS Botnet Analysis,” https://www.incapsula.com/blog/malware- analysis-mirai-ddos-botnet.html, 2016, [Accessed:2016-12-10]. Michael Sweeny is completing his Masters at Rhodes University in the field...

  18. ECONOMIC DENIAL OF SUSTAINABILITY (EDOS ATTACK ON CLOUD – A SURVEY

    Directory of Open Access Journals (Sweden)

    A. Somasundaram

    2016-12-01

    Full Text Available Cloud computing is a promising technology aims to provide reliable, customized and quality of service computation environments for cloud users in terms of Software as a Service-SaaS , Plat- form as a Service-PaaS and Infrastructure as Service-IaaS, which is provided on the pay per use basis. Cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA of customer. However, due to elasticity of resources, cloud systems are facing severe security problems. One of the most serious threats to cloud computing is EDoS (economic Distributed Denial of Service aims to consume the cloud resource by attacker and impose financial burden to the legitimate user, where integrity, availability and confidentiality of the cloud services are never compromised but affects the accountability which leads to inaccurate billing. Since the billing models of cloud services may not be mature enough to properly account for an EDoS attack. These paper surveys, the different techniques that generate, detect and mitigate the EDoS Attack on Cloud.

  19. 13 CFR 120.1824 - How will an SISMBD receive notice of an approval or denial of a loan or request for an advance...

    Science.gov (United States)

    2010-01-01

    ... advance under an SISMBD Loan? (a) Applicants will receive notice of approval or denial of an SISMBD Loan... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false How will an SISMBD receive notice of an approval or denial of a loan or request for an advance under an SISMBD Loan? 120.1824 Section...

  20. 16 CFR 1014.8 - Appeal of initial denial of access, correction or amendment.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Appeal of initial denial of access, correction or amendment. 1014.8 Section 1014.8 Commercial Practices CONSUMER PRODUCT SAFETY COMMISSION... Federal District Court for judicial review of the decision; and (3) The right of the requester to file...

  1. Third-person Diagnostic Interview on the Cognitive Insight Level of Psychotic Patients with an Insight at the Denial Level.

    Science.gov (United States)

    Mehdizadeh, Mahsa; Rezaei, Omid

    2016-01-01

    According to the previous findings, the third-person technique improved the clinical insight of psychotic patients, therefore the present study aims to examine the effect of a third-person interview compared to a first-person interview on the level of cognitive insight of psychotic patients with an insight at the denial level. In this study, using interviews and questionnaires, a total number of 44 patients of Razi Psychiatric Educational and Treatment Center with an insight at the denial level being assessed using diagnostic interviews were divided randomly into two groups. Then, the two groups of patients' cognitive insights were evaluated using Beck Cognitive Insight Scale. The findings indicated that in psychotic patients with an insight at the denial level, the third-person technique of interview compared to the first-person had little effect on the improvement of overall cognitive insight and its components, including self-reflection and self-assurance; however, this effect was not strong enough to make a significant difference between the two groups of patients. According to the study findings, we can conclude that the third-person interview compared to the first-person interview has no effect on the improvement of the cognitive insight of psychotic patients with an insight at the denial level. This finding is consistent with the previous studies indicating that although the theory of mind has some correlations with the clinical insight of patients, it has no effect on their cognitive insight.

  2. AntBot: Anti-pollution peer-to-peer botnets

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Ha, Duc T [UNIV. AT BUFFALO

    2009-01-01

    Botnets, which are responsible for many email sparnming and DDoS (Distributed Denial of Service) attacks in the current Internet, have emerged as one of most severe cyber-threats in recent years. To evade detection and improve resistance against countermeasures, botnets have evolved from the first generation that relies on IRC chat channels to deliver commands to the current generation that uses highly resilient P2P (Peer-to-Peer) protocols to spread their C&C (Command and Control) information. It is, however, revealed that P2P botnets, although relieved from the single point of failure that IRC botnets suffer, can be easily disrupted using pollution-based mitigation schemes [15]. In this paper, we play the devil's advocate and propose a new type of hypothetical botnets called AntBot, which aim to propagate their C&C information to individual bots even though there exists an adversary that persistently pollutes keys used by seized bots to search the command information. The key idea of AntBot is a tree-like structure that bots use to deliver the command so that captured bots reveal only limited information. To evaluate effectiveness of AntBot against pollution-based mitigation in a virtual environment, we develop a distributed P2P botnet simulator. Using extensive experiments, we demonstrate that AntBot operates resiliently against pollution-based mitigation. We further present a few potential defense schemes that could effectively disrupt AntBot operations.

  3. 77 FR 11189 - Yokohama Tire Corporation, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2012-02-24

    ...-0056; Notice 2] Yokohama Tire Corporation, Denial of Petition for Decision of Inconsequential... Inconsequential Noncompliance. SUMMARY: Yokohama Tire Corporation, (YTC),\\1\\ replacement tires for passenger cars... Federal Motor Vehicle Safety Standard (FMVSS) No. 139, New Pneumatic Radial Tires for Light Vehicles. YTC...

  4. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  5. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  6. How to Achieve Early Botnet Detection at the Provider Level?

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Dreo, G.; Pras, Aiko

    Botnets are an enabler for many cyber-criminal activities and often responsible for DDoS attacks, banking fraud, cyber-espionage and extortion. Botnets are controlled by a botmaster that uses various advanced techniques to create, maintain and hide their complex and distributed C&C infrastructures.

  7. 77 FR 43216 - Denial of Motor Vehicle Defect Petition and Petition for a Hearing

    Science.gov (United States)

    2012-07-24

    ... hearing to address whether Ford Motor Company (Ford) and Mazda North American Operations (Mazda) met their... Denial of Motor Vehicle Defect Petition and Petition for a Hearing AGENCY: National Highway Traffic... petitioned NHTSA to open defect investigations on Model Year (MY) 2002-2004 Ford Escape and 2001-2004 Mazda...

  8. Alcohol and cancer: risk perception and risk denial beliefs among the French general population.

    Science.gov (United States)

    Bocquier, Aurélie; Fressard, Lisa; Verger, Pierre; Legleye, Stéphane; Peretti-Watel, Patrick

    2017-08-01

    Worldwide, millions of deaths each year are attributed to alcohol. We sought to examine French people's beliefs about the risks of alcohol, their correlates, and their associations with alcohol use. Data came from the 2010 Baromètre Cancer survey, a random cross-sectional telephone survey of the French general population (n = 3359 individuals aged 15-75 years). Using principal component analysis of seven beliefs about alcohol risks, we built two scores (one assessing risk denial based on self-confidence and the other risk relativization). Two multiple linear regressions explored these scores' socio-demographic and perceived information level correlates. Multiple logistic regressions tested the associations of these scores with daily drinking and with heavy episodic drinking (HED). About 60% of the respondents acknowledged that alcohol increases the risk of cancer, and 89% felt well-informed about the risks of alcohol. Beliefs that may promote risk denial were frequent (e.g. 72% agreed that soda and hamburgers are as bad as alcohol for your health). Both risk denial and risk relativization scores were higher among men, older respondents and those of low socioeconomic status. The probability of daily drinking increased with the risk relativization score and that of HED with both scores. Beliefs that can help people to deny the cancer risks due to alcohol use are common in France and may exist in many other countries where alcoholic beverages have been an integral part of the culture. These results can be used to redesign public information campaigns about the risks of alcohol. © The Author 2017. Published by Oxford University Press on behalf of the European Public Health Association. All rights reserved.

  9. 77 FR 11190 - Yokohama Tire Company, Denial of Petition for Decision of Inconsequential Noncompliance

    Science.gov (United States)

    2012-02-24

    ..., endurance and low inflation pressure performance. The tires also meet all of the physical dimension...-0115; Notice 2] Yokohama Tire Company, Denial of Petition for Decision of Inconsequential Noncompliance...: Yokohama Tire Company (YTC),\\1\\ has determined that certain P215/60R15 93H AVID H4S passenger car...

  10. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Science.gov (United States)

    N Ahmed, Malik; Abdullah, Abdul Hanan; Kaiwartya, Omprakash

    2016-01-01

    Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs) significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS) and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM) for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV) protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  11. Distributed Sensing and Processing Adaptive Collaboration Environment (D-SPACE)

    Science.gov (United States)

    2014-07-01

    RISC 525 Brooks Road Rome NY 13441-4505 10. SPONSOR/MONITOR’S ACRONYM(S) AFRL/RI 11. SPONSOR/MONITOR’S REPORT NUMBER AFRL-RI-RS-TR-2014-195 12...cloud” technologies are not appropriate for situation understanding in areas of denial, where computation resources are limited, data not easily...graph matching process. D-SPACE distributes graph exploitation among a network of autonomous computational resources, designs the collaboration policy

  12. Transplant recipients are vulnerable to coverage denial under Medicare Part D.

    Science.gov (United States)

    Potter, Lisa M; Maldonado, Angela Q; Lentine, Krista L; Schnitzler, Mark A; Zhang, Zidong; Hess, Gregory P; Garrity, Edward; Kasiske, Bertram L; Axelrod, David A

    2018-02-15

    Transplant immunosuppressants are often used off-label because of insufficient randomized prospective trial data to achieve organ-specific US Food and Drug Administration (FDA) approval. Transplant recipients who rely on Medicare Part D for immunosuppressant drug coverage are vulnerable to coverage denial for off-label prescriptions, unless use is supported by Centers for Medicare & Medicaid Services (CMS)-approved compendia. An integrated dataset including national transplant registry data and 3 years of dispensed pharmacy records was used to identify the prevalence of immunosuppression use that is both off-label and not supported by CMS-approved compendia. Numbers of potentially vulnerable transplant recipients were identified. Off-label and off-compendia immunosuppression regimens are frequently prescribed (3-year mean: lung 66.5%, intestine 34.2%, pancreas 33.4%, heart 21.8%, liver 16.5%, kidney 0%). The annual retail cost of these at-risk medications exceeds $30 million. This population-based study of transplant immunosuppressants vulnerable to claim denials under Medicare Part D coverage demonstrates a substantial gap between clinical practice, current FDA approval processes, and policy mandates for pharmaceutical coverage. This coverage barrier reduces access to life-saving medications for patients without alternative resources and may increase the risk of graft loss and death from medication nonadherence. © 2018 The American Society of Transplantation and the American Society of Transplant Surgeons.

  13. 76 FR 15986 - Alpha Omega Technology, Inc.; Denial Without Prejudice of Food Additive Petition

    Science.gov (United States)

    2011-03-22

    ...] (Formerly Docket No. 90F-0074) Alpha Omega Technology, Inc.; Denial Without Prejudice of Food Additive... Administration (FDA) is denying a food additive petition (FAP 0M4181) proposing that the food additive... 15, 1990 (55 FR 9772), FDA announced that a food additive petition (FAP 0M4181) had been filed by...

  14. Offense-Defense Balance in Cyberspace: A Proposed Model

    Science.gov (United States)

    2012-12-01

    enable faster multitasking , the more computations per second can be accomplished. Increased processing speed will allow an attacker to send attacks...depend on what spam or DDoS needs to be accomplished with prices ranging from $30-$70 a day for DDoS to $10 for 1 million spam emails . 21 For...In addition to DDoS attacks on webservers, there were web defacements (using various tools such as SQL injections) and email flooding. The attacks

  15. FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.

    Directory of Open Access Journals (Sweden)

    Malik N Ahmed

    Full Text Available Due to the continuous advancements in wireless communication in terms of quality of communication and affordability of the technology, the application area of Mobile Adhoc Networks (MANETs significantly growing particularly in military and disaster management. Considering the sensitivity of the application areas, security in terms of detection of Denial of Service (DoS and intrusion has become prime concern in research and development in the area. The security systems suggested in the past has state recognition problem where the system is not able to accurately identify the actual state of the network nodes due to the absence of clear definition of states of the nodes. In this context, this paper proposes a framework based on Finite State Machine (FSM for denial of service and intrusion detection in MANETs. In particular, an Interruption Detection system for Adhoc On-demand Distance Vector (ID-AODV protocol is presented based on finite state machine. The packet dropping and sequence number attacks are closely investigated and detection systems for both types of attacks are designed. The major functional modules of ID-AODV includes network monitoring system, finite state machine and attack detection model. Simulations are carried out in network simulator NS-2 to evaluate the performance of the proposed framework. A comparative evaluation of the performance is also performed with the state-of-the-art techniques: RIDAN and AODV. The performance evaluations attest the benefits of proposed framework in terms of providing better security for denial of service and intrusion detection attacks.

  16. The Consent Solution to Punishment and the Explicit Denial Objection

    Directory of Open Access Journals (Sweden)

    Miroslav Imbrisevic

    2010-06-01

    Full Text Available Recently, David Boonin has put forward several objections to Carlos S. Nino's 'Consensual Theory of Punishment'. In this paper I will defend Nino against the 'explicit denial objection'. I will discuss whether Boonin's interpretation of Nino as a tacit consent theorist is right. I will argue that the offender's consent is neither tacit nor express, but a special category of implicit consent. Further, for Nino the legal-normative consequences of an act (of crime are 'irrevocable', i.e. one cannot (expressly and successfully deny liability to them. I will suggest an explanation for Nino's irrevocability claim.

  17. A Mechanism Denial Study on the Madden-Julian Oscillation

    Directory of Open Access Journals (Sweden)

    In-Sik Kang

    2011-12-01

    Full Text Available A series of Madden-Julian oscillation (MJO mechanism-denial experiments is performed using an atmospheric general circulation model (AGCM. Daily climatological seasonal cycles of i surface latent heat flux, ii net radiative heating rate, and iii surface wind stress are obtained from a control simulation and prescribed in place of the normal interactive computations of these fields in order to turn off the i wind-induced surface heat exchange (WISHE, ii cloud-radiation interaction (CRI, and iii frictional wave-CISK (FWC mechanisms, respectively. Dual and triple mechanism denial experiments are also conducted by switching off multiple mechanisms together. The influence of each mechanism is assessed by comparing experiments with that mechanism turned off to those in which it is not. CRI and WISHE are both found to be important to the simulated MJO amplitude and propagation speed, while FWC has weaker and less systematic effects. The MJO is weakened when CRI is turned off, but strengthened when WISHE is turned off, indicating that CRI amplifies the MJO in the control simulation while WISHE weakens it. The negative influence of WISHE is shown to result from simulated phase relationships between surface winds, surface fluxes and convection which differ significantly from those found in observations, and thus is not interpreted as evidence against a positive role for WISHE in the development and maintenance of the observed MJO. The positive influence of CRI in the model is consistent with a strong simulated relationship between daily grid-point column-integrated radiative and convective heating; the mean ratio of the latter to the former exceeds 0.2 for rain rates less than 14 mm d-1. CRI is also shown to suppress an excessive excitation of the convectively coupled Kelvin wave so that the amplitude and frequency of the MJO is maintained.

  18. Conceptualizing Sex Offender Denial from a Multifaceted Framework: Investigating the Psychometric Qualities of a New Instrument

    Science.gov (United States)

    Jung, Sandy; Daniels, Melissa

    2012-01-01

    The authors examined the psychometric properties of a clinician-rated measure of sex offender denial. Convergent and discriminant validity for the measure was supported, and given its relationship to treatment attitudes, the measure demonstrated utility for assessing treatment change and readiness. (Contains 3 tables.)

  19. Software defined wireless sensor networks security challenges

    CSIR Research Space (South Africa)

    Kgogo, T

    2017-09-01

    Full Text Available party development [28]. Moreover, there is a new attack that fingerprints SDN network and launches more efficient resource consumption attacks like DDoS. In general, SDN security vulnerabilities comes from the absence of integration with existing... resilience in NOX that uses its component organization. Moreover, a Primary-Backup method was introduced to enhanve the resilience of the SDN. “SDN-based DDoS blocking scheme” [38] DoS/DDoS attack specifically on the controller DDoS Blocking...

  20. Nihilism: a benign denial.

    Science.gov (United States)

    Skandalakis, John E; Mirilas, Petros

    2003-06-01

    Nihilism is the belief that all possible knowledge on a given topic has been amassed and codified. Ranging from benign denial to deliberate attempts at excommunication, nihilism is often encountered in the history of medicine. Eustachius, Columbus, and Sylvius strongly criticized Vesalius and defended the authority of Galen. Riolan fervently rejected Harvey's monumental work on the circulation of blood. Gross stated that no honest and sensible surgeon would ever sanction thyroidectomy. Sandstrom's discovery of the parathyroids was met with silence. Transplantation of parathyroids by Mandl was not appreciated when announced. Aristotle's dictum that the heart cannot withstand serious injury led to Paget's statement that cardiac surgery had reached the limits set by nature, which no new techniques could overcome. The first Billroth I operation was welcomed as, "Hopefully, also the last." Pancreatic surgery was opposed because the organ was of no clinical interest and was impossible for surgeons to reach. Pancreatic transplantation was rejected for many years, despite good results. When Blundell used blood transfusion for postpartum hemorrhage, critics averred that his next exploit would be radical removal of the spleen. Bassini stated that it could be risky to publish more about radical treatment of inguinal hernias. Carcinomas of the lower sigmoid and upper rectum were deemed untreatable because of their inaccessibility. Colostomy during pediatric surgery was rejected many times. Although it is difficult for the human mind to move from a familiar point of view, this propensity should not infect science, thereby impeding advancement.

  1. Engineering Issues for an Adaptive Defense Network

    National Research Council Canada - National Science Library

    Piszcz, Alan; Orlans, Nicholas; Eyler-Walker, Zachary; Moore, David

    2001-01-01

    .... The primary issue was the capability to detect and defend against DDoS. Experimentation was performed with a packet filtering firewall, a network Quality of Service manager, multiple DDoS tools, and traffic generation tools...

  2. 24 CFR 982.553 - Denial of admission and termination of assistance for criminals and alcohol abusers.

    Science.gov (United States)

    2010-04-01

    ... ASSISTANCE: HOUSING CHOICE VOUCHER PROGRAM Family Obligations; Denial and Termination of Assistance § 982.553... responsibility on behalf of the PHA (including a PHA employee or a PHA contractor, subcontractor or agent). (B... supporting information from such sources as a probation officer, a landlord, neighbors, social service agency...

  3. 75 FR 31285 - Decision-Making Authority Regarding the Denial, Suspension, or Revocation of a Federal Firearms...

    Science.gov (United States)

    2010-06-03

    ... No. ATF 17F; AG Order No. 3160-2010 (2008R-10P)] Decision-Making Authority Regarding the Denial... decision-making and to address any case backlogs that may occur. DATES: This rule is effective August 2... Assistant Director (Enforcement Programs and Services). These changes to the decision-making and related...

  4. Happiness: When Does It Lead to Self-Indulgence and When Does It Lead to Self-Denial?

    Science.gov (United States)

    Perry, Louise C.; And Others

    1985-01-01

    Confirmed the hypothesis that happiness leads to self-indulgence when children have no reason to believe that excessive self-gratification is morally wrong but that happiness promotes self-denial when children fear that excessive self-gratification violates a moral rule. Results with 112 White, middle-class, Australian children ages four to five…

  5. Silence speaks volumes: the effectiveness of reticence in comparison to apology and denial for responding to integrity- and competence-based trust violations.

    Science.gov (United States)

    Ferrin, Donald L; Kim, Peter H; Cooper, Cecily D; Dirks, Kurt T

    2007-07-01

    Prior research on responses to trust violations has focused primarily on the effects of apology and denial. The authors extended this research by studying another type of verbal response that is often used to respond to trust violations but has not been considered in the trust literature: reticence. An accused party may use reticence in a sincere and even legitimate attempt to persuade a trustor to withhold judgment. Yet, by considering information diagnosticity and belief formation mechanisms through which verbal responses influence trust, the authors argue that reticence is a suboptimal response because it combines the least effective elements of apology and denial. Specifically, reticence is a suboptimal response to an integrity violation because, like apology, it fails to address guilt. And reticence is a suboptimal response to a competence violation because, like denial, it fails to signal redemption. Results from 2 laboratory studies, simulating different contexts and using research participants from 2 different countries, provide support for the prediction. The results offer important implications for those who might use reticence to respond to a perceived trust violation and also for those who must judge another's reticence.

  6. The cerebral neurobiology of anxiety, anxiety displacement, and anxiety denial.

    Science.gov (United States)

    Gottschalk, L A; Fronczek, J; Abel, L; Buchsbaum, M S; Fallon, J H

    2001-01-01

    Previous studies examining the relationship of anxiety scores, derived from the content analysis of speech of normal individuals, have revealed that the anxiety scores occurring in the dreams associated with rapid eye movement (REM) sleep are significantly correlated with localized cerebral glucose metabolic rates assessed by positron emission tomography (PET) scanning. These significant intercorrelations occur in different cerebral areas when the anxiety scores are obtained from mental experiences reported during non-REM sleep or during wakeful silent mentation. The purpose of the present study was to examine the intercorrelations found between anxiety attributed to the self, anxiety-displacement, and anxiety denial measured from computerized content analysis of 5-min verbal reports of subjective thoughts and feelings obtained from wakeful normal subjects and localized cerebral glucose metabolic rates during PET scanning. The subjects were 10 wakeful young males. Their anxiety scores were derived from computerized content analysis of 5-min reports they gave of their subjective thoughts, feelings and fantasies during a 30-min period following an intravenous injection of F D-deoxyglucose (FDG). The subjects were moved 32--45 min after this injection to obtain a PET scan, which records all of the localized cerebral glucose metabolic rates during the 30 min following the FDG injection. Significant intercorrelations of localized cerebral glucose metabolic rates with the scores of self-anxiety, anxiety displacement, and anxiety-denial were found in dissimilar cerebral locations depending on the type of anxiety involved. The significant correlations occurred in brain regions known to be associated with the functions of emotions, cognition, memory, and vision. Specific combinations of cerebral areas, based on glucose metabolic rates, appear to distinguish and be associated with different verbal expressions of anxiety. Replication of this preliminary research will be

  7. Denials and delays of shipments in the transport of radioactive materials in Brazil

    International Nuclear Information System (INIS)

    Sobreira, Ana Celia F.; Bemelmans, Denise

    2007-01-01

    REM Industria e Comercio is a Brazilian private company which has been performing transport of radioactive material in Brazil for more than 15 years and is also experiencing this situation. In Brazil, over 50,000 shipments of radioactive materials are carried out every year, mostly for medical purposes. There are 4 airlines companies operating the domestic routes and only is currently accepting material of Class 7 (radioactive) for transport. When transporting by road, REM uses its own vehicles or hires associated cargo companies. For the sea transport, there is not a certified vessel for this kind of material in Brazil which increases the prices and makes the transport by this mode very expensive and more difficult. Reasons for denials have been identified as misinterpretation of the regulations, lack of harmonization between regulations, fear of indemnity costs for accidents, restrictive rules at ports not allowing storage of radioactive material in transit, frequent changes in modal regulations, lack of education and training of cargo handlers and the misconception of public perception concerning radiation risks. Seeking for local solutions, REM has organized meetings involving medical societies, competent authorities and carriers and has taken part on commissions for revising standards and regulations and trained cargo handling personnel as well. This paper addresses causes for delays and denials and reports identified domestic solutions. (author)

  8. Cyber 4.0.

    CSIR Research Space (South Africa)

    Naidoo, K

    2017-10-01

    Full Text Available SURFACE COMPLEXITY MEDICAL FILLING STATIONS DDOS & IOT DDOS & IOT 20 THERE IS HOPE… FOG OF WAR FOCUS AND A CHANGE IN THINKING • 80 / 20 / Reality • Bias • Advocatus Diaboli • 4ThIR Building blocks • Security as enabler 23 THANK YOU...

  9. Coping with stereotype threat: denial as an impression management strategy.

    Science.gov (United States)

    von Hippel, William; von Hippel, Courtney; Conway, Leanne; Preacher, Kristopher J; Schooler, Jonathan W; Radvansky, Gabriel A

    2005-07-01

    Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype of incompetence (Study 1) and hostel-dwelling older adults (Study 2) were more likely to deny incompetence if they were high in impression management. African Americans (Study 3) showed a similar pattern of denying cognitive incompetence, which emerged primarily when they were interviewed by a White experimenter and had attended a predominantly Black high school. In Study 4, White students who expected to take an IQ test and were threatened by a stereotype of being less intelligent than Asians were more likely to deny that intelligence is important if they were high in impression management.

  10. Court finds ambiguity in denial of off-label AIDS drug.

    Science.gov (United States)

    1998-03-06

    A home intravenous drug therapy provider and an insurance company operated by the American Consulting Engineers Council have gone to court over disputed medical claims. An AIDS patient being treated with ganciclovir for CMV retinitis had a decrease in his white blood cell count, neutropenia, that endangered his life. The physicians prescribed neupogen, approved by the Food and Drug Administration (FDA) for cancer treatment, to counteract the neutropenia. The health care provider, I.V. Services of America, continued the neupogen treatment; the treatments were covered as an inpatient but denied after discharge. I.V. Services sued, alleging that the cause of the neutropenia should not bar coverage. The New York judge found in favor of the health care provider, calling the insurance company's position self serving and the denial of the claim arbitrary.

  11. 42 CFR 476.94 - Notice of QIO initial denial determination and changes as a result of a DRG validation.

    Science.gov (United States)

    2010-10-01

    ... changes as a result of a DRG validation. 476.94 Section 476.94 Public Health CENTERS FOR MEDICARE... changes as a result of a DRG validation. (a) Notice of initial denial determination—(1) Parties to be... retrospective review, (excluding DRG validation and post procedure review), within 3 working days of the initial...

  12. Exorcising the demons of collectivism in art history’: Branko Mitrović, Rage and Denials. Collectivist Philosophy, Politics, and Art Historiography, 1890-1947, University Park, Pennsylvania University Press 2015

    Directory of Open Access Journals (Sweden)

    Ladislav Kesner

    2016-12-01

    Full Text Available Branko Mitrović´s Rage and Denials. Collectivist Philosophy, Politics, and Art Historiography, 1890-1947 traces the history of collectivist approaches in (art historiography and debates between the individualist and collectivist positions, with the dominant focus on German-speaking scholarship. Author further suggests that denials and false appropriations and other forms of bizzare and irrational claims inherent in many of these collectivist historiographies originated in the failures of self-esteem regulation of their authors. The review then critically examines some problematic claims and assumptions which constitute the theoretical and conceptual backbone of the historical survey.

  13. Is human society in denial regarding the tough questions about sustainability?

    Directory of Open Access Journals (Sweden)

    John Cairns, Jr.

    2004-07-01

    Full Text Available The news media report daily on unsustainable practices and events that impede progress toward sustainable use of the planet - production of greenhouse gases, biotic impoverishment, depletion of fossil waters (aquifers, human population growth, production of persistent toxic substances, loss of agricultural topsoil and land, rapid loss of old growth forests, and so on. Exponential economic growth both depletes natural capital more rapidly than it is regenerated and also gives an illusion of sustainable prosperity. Failure to act more expeditiously is almost certainly due to a number of factors; however, denial that a problem exists is, arguably, one of the most likely reasons. Just as an alcoholic or drug addict must first acknowledge that a problem exists before successful treatment is possible, so must those addicted to exponential growth on a finite planet.

  14. The role of revenge, denial, and terrorism distress in restoring just world beliefs: the impact of the 2008 Mumbai attacks on British and Indian students.

    Science.gov (United States)

    Ferguson, Neil; Kamble, Shanmukh V

    2012-01-01

    Just world beliefs for students (N = 413) from India and the United Kingdom were measured. The participants then read a scenario about the 2008 terrorist attacks on Mumbai. The participants were then assessed for terrorism distress and offered multiple strategies (revenge and denial) to restore their just world beliefs. The findings indicate that students resident in India along with those who hold strong just world beliefs felt more distress, held a greater desire for revenge, and demonstrated more denial than the British students and those who had weak beliefs in a just world. These results indicate the important role just world beliefs play in responding to the threat created by mass casualty terrorist attacks. The implications for just world theory are also discussed.

  15. Ultrafast wavelength multiplexed broad bandwidth digital diffuse optical spectroscopy for in vivo extraction of tissue optical properties

    Science.gov (United States)

    Torjesen, Alyssa; Istfan, Raeef; Roblyer, Darren

    2017-03-01

    Frequency-domain diffuse optical spectroscopy (FD-DOS) utilizes intensity-modulated light to characterize optical scattering and absorption in thick tissue. Previous FD-DOS systems have been limited by large device footprints, complex electronics, high costs, and limited acquisition speeds, all of which complicate access to patients in the clinical setting. We have developed a new digital DOS (dDOS) system, which is relatively compact and inexpensive, allowing for simplified clinical use, while providing unprecedented measurement speeds. The dDOS system utilizes hardware-integrated custom board-level direct digital synthesizers and an analog-to-digital converter to generate frequency sweeps and directly measure signals utilizing undersampling at six wavelengths modulated at discrete frequencies from 50 to 400 MHz. Wavelength multiplexing is utilized to achieve broadband frequency sweep measurements acquired at over 97 Hz. When compared to a gold-standard DOS system, the accuracy of optical properties recovered with the dDOS system was within 5.3% and 5.5% for absorption and reduced scattering coefficient extractions, respectively. When tested in vivo, the dDOS system was able to detect physiological changes throughout the cardiac cycle. The new FD-dDOS system is fast, inexpensive, and compact without compromising measurement quality.

  16. 34 CFR Appendix A to Part 106 - Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color...

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color, National Origin, Sex, and Handicap in Vocational Education Programs A... RIGHTS, DEPARTMENT OF EDUCATION NONDISCRIMINATION ON THE BASIS OF SEX IN EDUCATION PROGRAMS OR ACTIVITIES...

  17. 34 CFR Appendix B to Part 100 - Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color...

    Science.gov (United States)

    2010-07-01

    ... vocational education programs or courses because of architectural or equipment barriers, or because of the... 34 Education 1 2010-07-01 2010-07-01 false Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color, National Origin, Sex, and Handicap in Vocational Education Programs B...

  18. Model for the reduction of denials of expeditions of radioactive material in the region of the America; Modelo para reducir los casos de rechazos de expediciones de material radiactivo en la region de America

    Energy Technology Data Exchange (ETDEWEB)

    Mallaupoma, Mario, E-mail: mmallaupoma@ipen.gob.pe, E-mail: mmallaupomag@yahoo.es [Instituto Peruano de Energia Nuclear (IPEN), Lima (Peru); Bruno, Natanael, E-mail: nbruno@cnen.gov.br [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil)

    2013-07-01

    The denials, restraints and delays of shipments of radioactive material likely to have occurred and continue to occur. Reducing them to acceptable levels can be a tangible goal that senders and recipients can anticipate and get. The basis for resolving cases of denials and delays should consider not only the participation of the competent national nuclear authorities but also other government authorities. Carriers, shippers, transport companies and recipients should consider in their queries all the wide range of authorities apparently have no involvement but they really have. This paper describes the experience gained in the country of Brazil and provides the basis of a model that could prove useful to other countries and regions, including America, if we adopt and adapt, to reduce the incidence of denials and delays of shipments of radioactive material, according to its own conditions and characteristics.

  19. Procedural Anathema: The Criminal Prosecution of Money Laundering as a Denial of the Right of Defense

    Directory of Open Access Journals (Sweden)

    Antonio Eduardo Ramires Santoro

    2016-10-01

    Full Text Available The idea of independence between money laundering and the original offense, became common the practice of prosecutors use of the evidence submitted by the defense to support criminal proceedings for laundering. The question is: would it not be a denial of the right of defense, since it requires the magistrate to accept the the criminal prosecution to anticipate an evaluative judgment on the evidence before the systematically appropriate procedural time? Therefore we conducted a literature qualitative research.

  20. 34 CFR Appendix B to Part 104 - Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color...

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Guidelines for Eliminating Discrimination and Denial of Services on the Basis of Race, Color, National Origin, Sex, and Handicap in Vocational Education Programs B Appendix B to Part 104 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL...

  1. From denial to awareness: a conceptual model for obtaining equity in healthcare.

    Science.gov (United States)

    Höglund, Anna T; Carlsson, Marianne; Holmström, Inger K; Lännerström, Linda; Kaminsky, Elenor

    2018-01-22

    Although Swedish legislation prescribes equity in healthcare, studies have reported inequalities, both in face-to-face encounters and in telephone nursing. Research has suggested that telephone nursing has the capability to increase equity in healthcare, as it is open to all and not limited by long distances. However, this requires an increased awareness of equity in healthcare among telephone nurses. The aim of this study was to explore and describe perceptions of equity in healthcare among Swedish telephone nurses who had participated in an educational intervention on equity in health, including which of the power constructs gender, ethnicity and age they commented upon most frequently. Further, the aim was to develop a conceptual model for obtaining equity in healthcare, based on the results of the empirical investigation. A qualitative method was used. Free text comments from questionnaires filled out by 133 telephone nurses before and after an educational intervention on equity in health, as well as individual interviews with five participants, were analyzed qualitatively. The number of comments related to inequity based on gender, ethnicity or age in the free text comments was counted descriptively. Gender was the factor commented upon the least and ethnicity the most. Four concepts were found through the qualitative analysis: Denial, Defense, Openness, and Awareness. Some informants denied inequity in healthcare in general, and in telephone nursing in particular. Others acknowledged it, but argued that they had workplace routines that protected against it. There were also examples of an openness to the fact that inequity existed and a willingness to learn and prevent it, as well as an already high awareness of inequity in healthcare. A conceptual model was developed in which the four concepts were divided into two qualitatively different blocks, with Denial and Defense on one side of a continuum and Openness and Awareness on the other. In order to reach

  2. The Impossible Trinity of Denial. European Economic Governance in a Conceptual Framework

    Directory of Open Access Journals (Sweden)

    István BENCZES

    2013-06-01

    Full Text Available The first ten years of the Economic and Monetary Union were a remarkable success story. Nevertheless, the European financial-cum-sovereign- debt-crisis made it clear that the original design of European economic governance is not feasible any longer. The crisis compelled Europeans to admit that the implicit consent of Maastricht on a triple denial with regard to the single currency area, i.e., (1 no exit, (2 no bail-out, and (3 no default, is no longer tenable. By introducing the concept of the ‘impossible trinity of denial’, the current paper argues that pursuing these three goals simultaneously is not attainable, and that one of these should be sacrificed in order for the single currency to survive the current crisis. Also, supranational institutions should enjoy more control over crisis resolution in the future.

  3. The Errors of Individualistic Public Health Interventions: Denial of Treatment to Obese Persons; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Daniel S. Goldberg

    2013-01-01

    Full Text Available I agree entirely with Nir Eyal’s perspective that denying treatment to obese patients is morally wrong. However, the reasons for this belief differ in some ways from Eyal’s analysis. In this commentary, I will try to explain the similarities and differences in our perspectives. My primary claim is that the denial of treatment to obese patients is wrong principally because (i it eschews a whole-population approach to the problem of poor nutrition and is therefore likely to be ineffective; (ii it is likely to expand obesity-related health inequities; and (iii it is likely to intensify stigma against already-marginalized social groups. I shall consider each in turn, and explore the extent to which Eyal would be likely to agree with my claims.

  4. Words as masks: About the importance of denial in management

    Directory of Open Access Journals (Sweden)

    Agnès Vandevelde-Rougale

    2017-03-01

    Full Text Available This article draws on a socio-anthropological research, which questions the effects of managerial discourse on the individual by considering experiences of workplace bullying. It studies the observation that despite the gap between what management says and what management does, words of managerial discourse are still widely used, by managers and employees alike. French philosopher, ethnologist and psychoanalyst Octave Mannoni (1899-1989, reworking Freud’s concept of fetishism, showed in an article entitled “I know very well, but nonetheless…” that a belief can survive the denial (disavowal of reality. Recognizing fantasy as a fantasy is not sufficient to reduce its power over the individual. Based on a case study, the present article demonstrates that the paradoxical logic phrased by Octave Mannoni can help us understand how managerial discourse can exercise its influence on individuals, despite discrepancies between what is said and what is implemented in the organisations. It presents the hypothesis that words can work as “masks” do in some traditional tribes, thus being the means supporting a belief that sustains management authority.

  5. AFRREV IJAH, Vol.1 (3) July, 2012

    African Journals Online (AJOL)

    Dr Abimbola

    denial of sacraments extends to denial of funeral Mass. Again, ... The Roman Catholics generously distributed medicines thereby upsetting the. CMS by ... names to attract membership as we hear today of cross over night service, anointing ...

  6. Asbestos exposure and health hazards: a global emergency, Epidemiological evidence and denial theories

    Directory of Open Access Journals (Sweden)

    Francesca Zazzara

    2013-11-01

    Full Text Available On June 3rd 2013, in Turin, Italy, the Swiss industrialist Schmidheiny has been sentenced to 18 years imprisonment for intentional disaster for 3,000 asbestos-linked tumours in Italian workers at cement multinational Eternit. The indiscriminate use of asbestos, however, continues worldwide. Although many studies have shown that asbestos is associated with an increased risk of mortality and morbidity, denial theories were spread over time, showing how the logic of profit governs the production of asbestos. We examined the history of the epidemiological evidence of asbestos related risks and, second, the main sources of exposure in Italy and in the world, occupational, non-occupational, and post-disaster exposure (as occurred after L’Aquila earthquake in April 2009. The theme of inequality and social justice is ever so alarming in the fight against asbestos and its lobbies.

  7. On the Impact of Wireless Jamming on the Distributed Secondary Microgrid Control

    DEFF Research Database (Denmark)

    Danzi, Pietro; Stefanovic, Cedomir; Meng, Lexuan

    2017-01-01

    The secondary control in direct current microgrids (MGs) is used to restore the voltage deviations caused by the primary droop control, where the latter is implemented locally in each distributed generator and reacts to load variations. Numerous recent works propose to implement the secondary con...... the secondary MG control. Compared to other denial-of-service attacks that are oriented against the tertiary control, such as economic dispatch, the attack on the secondary control presented here can be more severe, as it disrupts the basic functionality of the MG.......The secondary control in direct current microgrids (MGs) is used to restore the voltage deviations caused by the primary droop control, where the latter is implemented locally in each distributed generator and reacts to load variations. Numerous recent works propose to implement the secondary...... control in a distributed fashion, relying on a communication system to achieve consensus among MG units. This paper shows that, if the system is not designed to cope with adversary communication impairments, then a malicious attacker can apply a simple jamming of a few units of the MG and thus compromise...

  8. Trigocherrierin A, a Potent Inhibitor of Chikungunya Virus Replication

    Directory of Open Access Journals (Sweden)

    Mélanie Bourjot

    2014-03-01

    Full Text Available Trigocherrierin A (1 and trigocherriolide E (2, two new daphnane diterpenoid orthoesters (DDOs, and six chlorinated analogues, trigocherrins A, B, F and trigocherriolides A–C, were isolated from the leaves of Trigonostemon cherrieri. Their structures were identified by mass spectrometry, extensive one- and two-dimensional NMR spectroscopy and through comparison with data reported in the literature. These compounds are potent and selective inhibitors of chikungunya virus (CHIKV replication. Among the DDOs isolated, compound 1 exhibited the strongest anti-CHIKV activity (EC50 = 0.6 ± 0.1 µM, SI = 71.7.

  9. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  10. DNS in Computer Forensics

    Directory of Open Access Journals (Sweden)

    Neil Fowler Wright

    2012-06-01

    Full Text Available The Domain Name Service (DNS is a critical core component of the global Internet and integral to the majority of corporate intranets. It provides resolution services between the human-readable name-based system addresses and the machine operable Internet Protocol (IP based addresses required for creating network level connections. Whilst structured as a globally dispersed resilient tree data structure, from the Global and Country Code Top Level Domains (gTLD/ccTLD down to the individual site and system leaf nodes, it is highly resilient although vulnerable to various attacks, exploits and systematic failures. This paper examines the history along with the rapid growth of DNS up to its current critical status. It then explores the often overlooked value of DNS query data; from packet traces, DNS cache data, and DNS logs, with its use in System Forensics and more frequently in Network Forensics, extrapolating examples and experiments that enhance knowledge.Continuing on, it details the common attacks that can be used directly against the DNS systems and services, before following on with the malicious uses of DNS in direct system attacks, Distributed Denial of Service (DDoS, traditional Denial of Service (DOS attacks and malware. It explores both cyber-criminal activities and cyber-warfare based attacks, and also extrapolates from a number of more recent attacks the possible methods for data exfiltration. It explores some of the potential analytical methodologies including; common uses in Intrusion Detection Systems (IDS, as well as infection and activity tracking in malware traffic analysis, and covers some of the associated methods around technology designed to defend against, mitigate, and/or manage these and other risks, plus the effect that ISP and nation states can have by direct manipulation of DNS queries and return traffic.This paper also investigates potential behavioural analysis and time-lining, which can then be used for the

  11. My mother painted my father in white: affections and race denial in interracial families

    Directory of Open Access Journals (Sweden)

    Lia Vainer Schucman

    2017-12-01

    Full Text Available This article, a piece of a bigger research about interracial families, aims to describe the ways in which black, black history and black ancestry have been denied in the discourse of interracial families. For this understanding we present the case study of two families with the intention of thinking about the place of the race in these dynamics. The results obtained in the bigger research pointed out that family is a privilegedinstitution for the development of strategiesagainst racial violence expriencied in society on a larger scale, but also the place where it is possible to legitimate racist experiences and race violence. And, within these experiences, it was possible to realize that the psychosocial mechanism of denial is one of several ways of negotiating the conflicts and racial tensions that are enunciated within these families.

  12. Teenage sexuality and rights in Chile: from denial to punishment.

    Science.gov (United States)

    Casas, Lidia; Ahumada, Claudia

    2009-11-01

    While Chile sees itself as a country that has fully restored human rights since its return to democratic rule in 1990, the rights of teenagers to comprehensive sexuality education are still not being met. This paper reviews the recent history of sexuality education in Chile and related legislation, policies and programmes. It also reports a 2008 review of the bylaws of 189 randomly selected Chilean schools, which found that although such bylaws are mandatory, the absence of bylaws to prevent discrimination on grounds of pregnancy, HIV and sexuality was common. In relation to how sexual behaviour and discipline were addressed, bylaws that were non-compliant with the law were very common. Opposition to sexuality education in schools in Chile is predicated on the denial of teenage sexuality, and many schools punish sexual behaviour where transgression is perceived to have taken place. While the wider Chilean society has been moving towards greater recognition of individual autonomy and sexual diversity, this cultural shift has yet to be reflected in the government's political agenda, in spite of good intentions. Given this state of affairs, the Chilean polity needs to recognise its youth as having human rights, or will continue to fail in its commitment to them.

  13. An Intelligent Improvement of Internet-Wide Scan Engine for Fast Discovery of Vulnerable IoT Devices

    Directory of Open Access Journals (Sweden)

    Hwankuk Kim

    2018-05-01

    Full Text Available Since 2016, Mirai and Persirai malware have infected hundreds of thousands of Internet of Things (IoT devices and created a massive IoT botnet, which caused distributed denial of service (DDoS attacks. IoT malware targets vulnerable IoT devices, which are vulnerable to security risks. Techniques are needed to prevent IoT devices from being exploited by attackers. However, unlike high-performance PCs, IoT devices are lightweight, low-power, and low-cost, having performance limitations regarding processing and memory, which makes it difficult to install security and anti-malware programs. Recently, several studies have been attempted to quickly search for vulnerable internet-connected devices to solve this real issue. Issues yet to be studied still exist regarding these types of internet-wide scan technologies, such as filtering by security devices and a shortage of collected operating system (OS information. This paper proposes an intelligent internet-wide scan model that improves IP state scanning with advanced internet protocol (IP randomization, reactive protocol (port scanning, and OS fingerprinting scanning, applying k* algorithm in order to find vulnerable IoT devices. Additionally, we describe the experiment’s results compared to the existing internet-wide scan technologies, such as ZMap and Shodan. As a result, the proposed model experimentally shows improved performance. Although we improved the ZMap, the throughput per minute (TPM performance is similar to ZMap without degrading the IP scan throughput and the performance of generating a single IP address is about 118% better than ZMap. In the protocol scan performance experiments, it is about 129% better than the Censys based ZMap, and the performance of OS fingerprinting is better than ZMap, with about 50% accuracy.

  14. Research on a Denial of Service (DoS Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    Seoksoo Kim

    2010-11-01

    Full Text Available This research suggests a Denial of Service (DoS detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed.

  15. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials

    International Nuclear Information System (INIS)

    Mallaupoma, Mario; Schwela, Ulric

    2013-01-01

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed

  16. State-Sponsored Homophobia and the Denial of the Right of Assembly in Central and Eastern Europe : The "Boomerang" and the "Ricochet" between European Organizations and Civil Society to Uphold Human Rights

    NARCIS (Netherlands)

    Holzhacker, Ronald

    2013-01-01

    State-sponsored homophobia emerged in certain Central and Eastern European states in the past decade, with the denial of the right of assembly for gay pride marches. However, more recently there has been progress in the recognition of the fundamental democratic right of assembly. What accounts for

  17. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  18. Workplace Suicide and States of Denial: The France Telecom and Foxconn Cases Compared

    Directory of Open Access Journals (Sweden)

    Sarah Waters

    2017-03-01

    Full Text Available Workplace suicides are sharply on the rise and reflect a generalised deterioration in working conditions across the globalised economy. Despite their growing prevalence, workplace suicides are subject to specific modes of repression that tend to keep them hidden from public view. Suicides and their social recognition threaten the vested interests of corporate and political elites by giving material embodiment to relations of production in the form of extreme human suffering. This article focuses on 'suicide waves' at two distant corporations in the information and communications sector: in France, the telecoms provider, France Télécom (rebranded Orange in 2013 and in China, electronics supplier, Foxconn. Drawing on Stanley Cohen's notion of 'states of denial', the article examines the tactics used by corporate and political elites in an effort to keep the suicides concealed. These include discourses that denied the suicides, individualised their causes and repressive tactics intended to control information and impede investigations. Recognising workplace suicides and the forms of repression that seek to occlude them, is crucial if we are to confront the profound human costs of a new international division of digital labour on lived experiences of work.

  19. Patient-reported denials, appeals, and complaints: associations with overall plan ratings.

    Science.gov (United States)

    Quigley, Denise D; Haviland, Amelia M; Dembosky, Jacob W; Klein, David J; Elliott, Marc N

    2018-03-01

    To assess whether Medicare patients' reports of denied care, appeals/complaints, and satisfactory resolution were associated with ratings of their health plan or care. Retrospective analysis of 2010 Medicare Advantage Consumer Assessment of Healthcare Providers and Systems (CAHPS) survey data. Multivariate linear regression of data from 154,766 respondents (61.1% response rate) tested the association of beneficiary ratings of plan and care with beneficiary reports of denied care, appeals, complaints, and complaint resolution, adjusting for beneficiary demographics. Beneficiaries who reported being denied needed care rated their plans and care significantly less positively, by 17.2 points (on a 100-point scale) and 9.1 points, respectively. Filing an appeal was not statistically significantly associated with further lower ratings. Beneficiaries who filed a complaint that was satisfactorily resolved gave slightly lower ratings of plans (-3.4 points) and care (-2.5 points) than those not filing a complaint (P plans. Our results suggest that beneficiaries may attribute the actions that lead to complaints or denials to plans more than to the care they received. Successful complaint resolution and utilization management review might eliminate most deficits associated with complaints and denied care, consistent with the service recovery paradox. High rates of complaints and denied care might identify areas that need improved utilization management review, customer service, and quality improvement. Among those reporting being denied care, filing an appeal was not associated with lower patient ratings of plan or care.

  20. Use of Data Denial Experiments to Evaluate ESA Forecast Sensitivity Patterns

    Energy Technology Data Exchange (ETDEWEB)

    Zack, J; Natenberg, E J; Knowe, G V; Manobianco, J; Waight, K; Hanley, D; Kamath, C

    2011-09-13

    wind speed and vertical temperature difference. Ideally, the data assimilation scheme used in the experiments would have been based upon an ensemble Kalman filter (EnKF) that was similar to the ESA method used to diagnose the Mid-Colombia Basin sensitivity patterns in the previous studies. However, the use of an EnKF system at high resolution is impractical because of the very high computational cost. Thus, it was decided to use the three-dimensional variational analysis data assimilation that is less computationally intensive and more economically practical for generating operational forecasts. There are two tasks in the current project effort designed to validate the ESA observational system deployment approach in order to move closer to the overall goal: (1) Perform an Observing System Experiment (OSE) using a data denial approach which is the focus of this task and report; and (2) Conduct a set of Observing System Simulation Experiments (OSSE) for the Mid-Colombia basin region. The results of this task are presented in a separate report. The objective of the OSE task involves validating the ESA-MOOA results from the previous sensitivity studies for the Mid-Columbia Basin by testing the impact of existing meteorological tower measurements on the 0- to 6-hour ahead 80-m wind forecasts at the target locations. The testing of the ESA-MOOA method used a combination of data assimilation techniques and data denial experiments to accomplish the task objective.

  1. A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2010-04-01

    Full Text Available Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses' normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs' packet statistics so as to create their normal packet distribution. Once some IPs' current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

  2. P2P-based botnets: structural analysis, monitoring, and mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Yan, Guanhua [Los Alamos National Laboratory; Eidenbenz, Stephan [Los Alamos National Laboratory; Ha, Duc T [UNIV AT BUFFALO; Ngo, Hung Q [UNIV AT BUFFALO

    2008-01-01

    Botnets, which are networks of compromised machines that are controlled by one or a group of attackers, have emerged as one of the most serious security threats on the Internet. With an army of bots at the scale of tens of thousands of hosts or even as large as 1.5 million PCs, the computational power of botnets can be leveraged to launch large-scale DDoS (Distributed Denial of Service) attacks, sending spamming emails, stealing identities and financial information, etc. As detection and mitigation techniques against botnets have been stepped up in recent years, attackers are also constantly improving their strategies to operate these botnets. The first generation of botnets typically employ IRC (Internet Relay Chat) channels as their command and control (C&C) centers. Though simple and easy to deploy, the centralized C&C mechanism of such botnets has made them prone to being detected and disabled. Against this backdrop, peer-to-peer (P2P) based botnets have emerged as a new generation of botnets which can conceal their C&C communication. Recently, P2P networks have emerged as a covert communication platform for malicious programs known as bots. As popular distributed systems, they allow bots to communicate easily while protecting the botmaster from being discovered. Existing work on P2P-based hotnets mainly focuses on measurement of botnet sizes. In this work, through simulation, we study extensively the structure of P2P networks running Kademlia, one of a few widely used P2P protocols in practice. Our simulation testbed incorporates the actual code of a real Kademlia client software to achieve great realism, and distributed event-driven simulation techniques to achieve high scalability. Using this testbed, we analyze the scaling, reachability, clustering, and centrality properties of P2P-based botnets from a graph-theoretical perspective. We further demonstrate experimentally and theoretically that monitoring bot activities in a P2P network is difficult

  3. 06 Brett van Niekerk and Manoj S. Maharajx

    African Journals Online (AJOL)

    abel

    (now Zimbabwe, and colonial Mozambique were involved in a border war against insurgents ... supply routes and the protocols to gain entry to the bases. .... gateway by government, possibly with foreign assistance, and DDoS attacks against.

  4. The old lady says "no": the language of denial in Brian Friel's The Loves of Cass McGuireDOI:10.5007/2175-8026.2010n58p53

    Directory of Open Access Journals (Sweden)

    Giovanna Tallone

    2010-01-01

    Full Text Available In Brian Friel's The Loves of Cass McGuire the presence of negative expressions both in stage directions and dialogue acts as a structuring principle and emphasizes the metadramatic construction of the play. Negative forms underlie Cass's growing awareness of disappointment and hopelessness, denying the "loves" ironically mentioned in the title. Only the alternative imaginary recreation of her own life - her "rhapsody" - is significantly marked by the absence of negative forms. The language of denial is thus both subject and object in the play.

  5. The exclusion of the body in Sein und Zeit and the denial of a phenomenology of the body in Heidegger’s thought

    Directory of Open Access Journals (Sweden)

    Felipe Johnson

    2016-05-01

    Full Text Available Through a reflection on the lack of a detailed thematization of the human body in Sein und Zeit and, considering the denial of a «phenomenology of the body» in Zollikoner Seminare, this paper aims to develop the methodical advice behind Heidegger’s treatment of human corporality. In this context, we will emphasize the incompatibility between the kind of being of Dasein and the kind of being that make up the traditional interpretation of the body: the body as a thing. Based on the foregoing, this study will discuss on the necessity to concentrate the attention on the ontological belonging of the body to the being of human being by the attempt to deploy an existential consideration of human corporality.

  6. Personal Denial Of Service (PDOS Attacks: A Discussion and Exploration of a New Category of Cyber Crime

    Directory of Open Access Journals (Sweden)

    Michael Raymond Bartolacci

    2014-03-01

    Full Text Available The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial of Service attack (PDOS. A PDOS is a cyber crime in which an individual deliberately prevents the access of an individual or small group to online services such as email or banking. Due to the nature of a PDOS, these acts can be overlooked by law enforcement and organizations that operate Internet infrastructure such as universities. We analyze a PDOS attack in the context of the Routine Activities Theory of criminal justice. We also surveyed university students to ascertain their attitudes towards online account breaches as related to a PDOS attack.  Our motivation for this work is twofold: to stress the need for cyber ethics education at the university level, and to illustrate how a previously uncategorized type of cyber crime is easily perpetrated in such an environment.

  7. Sadhana | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    2018-03-14

    Mar 14, 2018 ... Cloud security; network security; anomaly detection; network traffic analysis; DDoS attack detection. ... Department of Computer Science and Engineering, Indian Institute of Technology Roorkee, Roorkee 247667, India; Department of Applied Science and Engineering, Indian Institute of Technology ...

  8. Inter-domain networking innovation on steroids: empowering ixps with SDN capabilities

    KAUST Repository

    Chiesa, Marco; Dietzel, Christoph; Antichi, Gianni; Bruyé re, Marc; Castro, Ignacio; Gusat, Mitch; King, Thomas; Moore, Andrew W.; Nguyen, Thanh Dang; Owezarski, Philippe; Uhlig, Steve; Canini, Marco

    2016-01-01

    comprehensive overview of use cases for SDN at IXPs, which leverage the superior vantage point of an IXP to introduce advanced features like load balancing and DDoS mitigation. We discuss the benefits of SDN solutions by analyzing real-world data from one

  9. Article 21 June 2012 Vol_16_ 2 Edition

    African Journals Online (AJOL)

    AJRH Managing Editor

    2012-06-21

    Jun 21, 2012 ... in Soweto, South Africa and examined service availability through facility assessments. Most HCWs ..... specific information are distributed during in- service training. .... also talked about young women's denial that they.

  10. Family planning dialogue: Identifying the key determinants of young ...

    African Journals Online (AJOL)

    ANBR

    planning information and services for sexually active young women – in ... towards ensuring the equitable distribution of resources and accessible basic services. 99 ...... denial and disengagement affecting intergenerational dialogue in many ...

  11. Towards the normalization of cybercrime victimization : A routine activities analysis of cybercrime in europe

    NARCIS (Netherlands)

    Junger, Marianne; Montoya, L.; Hartel, Pieter H.; Heydari, Maliheh

    2017-01-01

    This study investigates the relationships between users' routine activities and socio-economic characteristics and three forms of cybercrime victimization of 1) online shopping fraud, 2) online banking fraud and 3) cyber-attacks (i.e. DDoS attacks). Data from the Eurobarometer, containing a sample

  12. Towards real-time intrusion detection for NetFlow and IPFIX

    NARCIS (Netherlands)

    Hofstede, R.J.; Bartos, Vaclav; Sperotto, Anna; Pras, Aiko

    2013-01-01

    DDoS attacks bring serious economic and technical damage to networks and enterprises. Timely detection and mitigation are therefore of great importance. However, when flow monitoring systems are used for intrusion detection, as it is often the case in campus, enterprise and backbone networks, timely

  13. The Life Esidimeni tragedy: A human-rights perspective

    African Journals Online (AJOL)

    2017-12-01

    Dec 1, 2017 ... This open-access article is distributed under. Creative Commons ... Accessibility refers to healthcare facilities, goods and services that are accessible to ... reduction rationale represented serious forms of neglect and denial.

  14. Disturbing Information and Denial in the Classroom and Beyond: Climate Change, Emotions and Everyday Life

    Science.gov (United States)

    Norgaard, K. M.

    2015-12-01

    Global warming is the most significant environmental issue of our time, yet public response in Western nations has been meager. Why have so few taken any action? Most studies of public response to climate change have focused on information deficit approaches. Many in the general public and environmental community have presumed that the public's failure to engage is a function of lack of concern about climate change. Instead, using interviews and ethnographic research on how knowledge of climate change is experienced in everyday life I describe "the social organization of climate denial" and discuss how it impacts classroom learning and the broader social understanding of climate change. Disturbing emotions of guilt, helplessness and fear of the future arose when people were confronted with the idea of climate change. People then normalized these disturbing emotions by changing the subject of conversations, shifting their attention elsewhere, telling jokes, and drawing on stock social discourses that deflected responsibility to others. The difficulty people have in making sense of climate change is in direct relation to the social world around them. This research suggests that educational strategies in the classroom and for the general public that consider and target the social, cultural and political aspects of the meaning of climate change will be most effective (in addition to factors that affect individual cognition).

  15. Penetrating Internet Information Services (IIS).

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-12-01

    Dec 1, 2013 ... Information Services (IIS) packages have been presented. Note that while some of ... encompasses a variety of services including FTP, SMTP ..... for Web-based Distributed Authoring ... denial-of-service vulnerabilities we have.

  16. Internet of things: emerging and future scenarios from an information security perspective

    CSIR Research Space (South Africa)

    Dlamini, MT

    2009-08-01

    Full Text Available of stoves can bring down a power grid, future life threatening health systems and how a distributed denial of service can be used to beat competition and increase revenues of Telcos....

  17. Abstract Résumé

    African Journals Online (AJOL)

    job duties, and denial of employment and benefits (Reidpath,. Brijnath & Chan ... and services, as they are afraid of revealing their serostatus. (Horizons, 2002). .... The distribution of socio-demographic characteristics of the respondents is ...

  18. HIV-positive patients in the intensive care unit: A retrospective audit

    African Journals Online (AJOL)

    test in the National Health Laboratory Service electronic records. HIV infection ... Normally distributed data are presented as means (standard deviation. (SD)) or .... denial of ICU care in this patient population and whether physician attitudes ...

  19. Change Detection Algorithms for Information Assurance of Computer Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A

    2002-01-01

    .... In this thesis, the author will focus on the detection of three attack scenarios: the spreading of active worms throughout the Internet, distributed denial of service attacks, and routing attacks to wireless ad hoc networks...

  20. Henok Abebe Gebeyehu The Anti-Terrorism Proclamation of ...

    African Journals Online (AJOL)

    2009-08-28

    Aug 28, 2009 ... National Intelligence and Security Service a power to conduct surveillance or intercept any ..... The government prohibits the distribution and sale of ...... An absolute denial of the privilege will unnecessarily hamper the media.

  1. Consensus on context-specific strategies for reducing the stigma of ...

    African Journals Online (AJOL)

    Abraham Mukolo

    2014-02-17

    Feb 17, 2014 ... accessing maternal and child health services appear to shoulder a disproportionate ... This is an open-access article distributed under the terms of the Creative ...... norm reform and enforcement (breaking silence, denial, fear.

  2. Access Contested: Security, Identity, and Resistance in Asian ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-09-30

    Sep 30, 2011 ... Book cover Access Contested: Security, Identity, and Resistance in Asian ... examines the interplay of national security, social and ethnic identity, and ... Burmese media, and distributed-denial-of-service attacks and other ...

  3. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    National Research Council Canada - National Science Library

    Mankins, David

    2001-01-01

    .... By employing different price and purchase functions, the architecture can provide service quality differentiation and furthermore, select good client behavior and discriminate against adversarial behavior...

  4. Challenges in Access to Urban Land for Business Activities under ...

    African Journals Online (AJOL)

    eliasn

    empowerment and the provision of basic services including health, nutrition, education, shelter ...... than denial of the economic value of land use rights if there is an immovable ..... distributed to retail shops by peddlers carrying plastic bags.

  5. Nutritional status and metabolic risk in HIV-infected university students

    African Journals Online (AJOL)

    L Steenkamp

    Open Access article distributed under the terms of the. Creative Commons ... dCampus Health Service, Nelson Mandela Metropolitan University, Port Elizabeth, South Africa ..... Equally, denial due to fear of the HIV infection lends itself to non-.

  6. Development of a Layered Conditional Random Field Based ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... The recent denial of service attacks on major Internet sites has shown that no open ..... of a single record, which further degrades attack detection accuracy. ... distributed intrusion detection framework based on mobile agents.

  7. Monitoring the DNS Infrastructure for Proactive Botnet Detection

    NARCIS (Netherlands)

    Dietz, Christian; Sperotto, Anna; Dreo, G.; Pras, Aiko

    Botnets enable many cyber-criminal activities, such as DDoS attacks, banking fraud and cyberespionage. Botmasters use various techniques to create, maintain and hide their complex C&C infrastructures. First, they use P2P techniques and domain fast-flux to increase the resilience against take-down

  8. DDoS Attacks as Political Assemblages

    Directory of Open Access Journals (Sweden)

    Robbie Fordyce

    2013-10-01

    Full Text Available This article seeks to unpack the idea of the automaton as a figure of political dissent within technological networks. The idea of the automaton is that of a body where the concepts of life, agency, and subjectivity are in question; these questions have made the automaton into an important element in the projects of Enlightenment humanism and as an unspoken element in posthumanist examination of the cyborg. The figure of the automaton is an expression of Cartesian mind-body dualism that reverses the idea of cogito ergo sum, by questioning the intentionality that lies behind the acts of another body. The body exists, but does it think? This article is not concerned with the idea of the automaton as an object of transcendental dualism, but rather aims to investigate this idea in terms of its immanence within network communication. The automaton is an idea that deliberately complicates the relationship between machines and individuals within a network, without prioritising either perspective. As Alan Turing shows, we cannot predict whether a computer on a network (or other machine is being used by a human agent, or whether the machine is simply programmed to act autonomously. The issue is then, are the actions of political dissent of a single node on a computer network the product of an independent agent working in tandem within a democratic framework? Or, is it the reverse: are these acts of political dissidence the automated actions of a small number of individuals exploiting systems of automation in order to achieve political goals? If we use the automaton to stand in as a figure that is neither entirely human nor entirely cyborgean, then certain concerns of network politics and assumptions about the democratic nature of network communications become destabilised.

  9. Research

    African Journals Online (AJOL)

    raoul

    2011-12-06

    Dec 6, 2011 ... This is an Open Access article distributed under the terms of the Creative. Commons ... services, especially for maternity services, for which it is reputed for, is much cheaper. ... exclusion criterion was denial of consent.

  10. Research Article

    African Journals Online (AJOL)

    2016-06-05

    Jun 5, 2016 ... questionnaires were distributed; the 255 questionnaires were evaluated by ... Since Enriching is at the service of a specific purpose and is a ..... making functional teams and providing exchange views and denial in order to.

  11. 1 Integrating reproductive and child health and HIV services in ...

    African Journals Online (AJOL)

    Abstract: In Tanzania, reproductive health and HIV services are coordinated by the .... and skills that are effectively managed and are equitably distributed to ensure that ..... to access and use PMTCT services and in reducing stigma, denial and.

  12. When the clinic becomes a home. Successful VCT and ART services ...

    African Journals Online (AJOL)

    2016-09-06

    Sep 6, 2016 ... Successful VCT and ART services in a stressful environment, SAHARA-J: Journal of .... This is an Open Access article distributed under the terms of the Creative ..... In other words, stigma enhances secrecy and denial.

  13. A lottery incentive system to facilitate dialogue and social support for ...

    African Journals Online (AJOL)

    Martin Weihs

    2014-07-15

    Jul 15, 2014 ... This is an Open Access article distributed under the terms of the Creative Commons Attribution License ... higher than 45%, due to stigma, denial, fear and ignorance ... performing the non-stigmatised service of blood donation.

  14. Research Article Special Issue

    African Journals Online (AJOL)

    pc

    2018-05-01

    May 1, 2018 ... the control center to optimize the power distribution in return. The increasing ... electric smart meter to record reading of electricity consumption from utility meters ... spoofing, tampering and Denial of Service (DoS) attacks [26].

  15. Enterprise Cloud Adoption: Leveraging on the Business and ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-06-01

    Jun 1, 2013 ... which access these services via the Internet. [9]. In support of .... Denial of Service attack? • What happens .... replicated, distributed file system Cloud providers have ... Usually, the fear of performance degradation and log size.

  16. The Achilles' heel of prevention to mother-to-child transmission of ...

    African Journals Online (AJOL)

    2017-09-19

    Sep 19, 2017 ... This is an Open Access article distributed under the terms of the Creative Commons Attribution License .... ante- and post-natal care services were recruited for each of the. FGDs. ...... Nondisclosure and denial of HIV ser-.

  17. A qualitative analysis of the barriers to antiretroviral therapy initiation ...

    African Journals Online (AJOL)

    Open Access article distributed in terms of the Creative Commons Attribution License .... well as education and counselling services that will facilitate the ART initiation process. .... that denial of one's own HIV status or that of one's child acts.

  18. Experiences of HIV-related stigma among HIV-positive older ...

    African Journals Online (AJOL)

    Monica O. Kuteesa

    2014-07-23

    Jul 23, 2014 ... This is an open-access article distributed under the terms of the Creative Commons Attribution License ..... high because HIV testing services are available at both sites. ..... expressed denial as a means of coping with stigma.

  19. LAW OCRACY ELOPMENT LAW DEMOCRACY & DEVELOPMENT

    African Journals Online (AJOL)

    HP27975994114

    to health care services dovetails with the international law approach to assessing compliance with the ..... with extended opening hours) are well distributed across the city.40 Availability of .... often constitutes a de facto denial of access to care.

  20. A Phenomenological Investigation of Women's Experience of ...

    African Journals Online (AJOL)

    This Open Access article is distributed under the terms of the Creative Commons License [CC BY-NC-ND 4.0]. ... appropriate access to treatment and other services that address their ..... recovery (i.e., using denial as a defence mechanism).

  1. in monitoring slope movements in Nainital, Uttarakhand Lesser

    Indian Academy of Sciences (India)

    Akano Yhokha

    2018-02-14

    Feb 14, 2018 ... Map showing spatial distribution of PSI MLV values in Nainital town, during August 2008–August 2010. The values are given in ... denial to the very fact that the rainfall-induced ... activities, public service utilities, infrastructure.

  2. "Preaching To The Choir" And Empowering The Congregation: Using Facebook And Face Time To Counter Denial

    Science.gov (United States)

    Akuginow, E.; Haines-Stiles, G.; Alley, R. B.

    2012-12-01

    "Earth: The Operators' Manual" (ETOM) is an education and outreach initiative, supported by NSF, which uses stories, metaphors and innovative communications strategies to cut through misinformation about climate change and promote positive action. External evaluation provides both quantitative and qualitative evidence on the success of this approach. This presentation includes short videos illustrating the strategy, and images from live nationwide events and Facebook posts. ETOM includes three PBS specials, a series of on-site presentations by scientists and military officers, a website functioning as portal to its video components, and a lively and growing Facebook community where uninformed statements about climate are often rebutted by 3rd party contributors not formally affiliated with the project. At outreach events at science centers such as the Science Museum of Minnesota, geoscientist Richard Alley, host of the TV programs, presented to large audiences with ample opportunities for follow-up Q&A. Audience surveys reported that Alley offered "the most clear explanation of linking carbon dioxide to climate change" and noted that his physical performance (nodding his head to show his North Pole bald spot to illustrate precession) was memorable. "I'll have that vision in my mind forever." 91% said the information was new to them, and 96% said the performance encouraged them to discuss the issues with friends: "He gave us language that we can use to communicate to other people, and I think that's what we need more than more data." But surveys also requested still more arguments to counter denial. The producers added a set of rebuttals ("But my brother-in-law said…") to the next live performance, at a Science Pub in Portland OR, with positive responses. The live events relied on stories and metaphors that audiences found new and memorable. Emitting CO2 is rather like how we used to dump filthy human waste out our windows, before the sanitation revolution. "You

  3. HIV, trauma and the emergency departments: The CDC opt-out ...

    African Journals Online (AJOL)

    (LMICs).[9,10]. This open-access article is distributed under ... Fear, stigma and embarrassment (19%, 11.7 - 30.4%), rejection. (30% ... Fear and denial of HIV status as a ... amounting to over USD 70 000), start-up, computer services and staff.

  4. Factors associated with the lack of antiretroviral therapy initiation ...

    African Journals Online (AJOL)

    that provide antenatal care (ANC) services also provide PMTCT services. ... This open-access article is distributed under. Creative ..... Karcher H, Omondi A, Odera J, Kunz A, Harms G. Risk factors for treatment denial and loss to follow-up in an ...

  5. Congenital genital abnormalities detected during routine ...

    African Journals Online (AJOL)

    2018-06-02

    Jun 2, 2018 ... out South Africa offer a voluntary free service to boys from the age of ten ... This is an Open Access article distributed under the terms of the Creative commons ... bitions about sexuality, denial, false beliefs and alternative.

  6. Research

    African Journals Online (AJOL)

    raoul

    2012-02-17

    Feb 17, 2012 ... This is an Open Access article distributed under the terms of the Creative Commons ... Maternal and Child Health Services Division (MCH). ... was linked to death in most cases; denial and guilt; as well as the spiritual and.

  7. Environmental Law and Underdevelopment in the Niger Delta ...

    African Journals Online (AJOL)

    User

    feeling of abandonment, denial and frustration among the people of the region. In the light of the ... environment such that it can continue to provide basic needs and services for the present and future ..... Distributed. Life. Expectancy. 0.513- ...

  8. The possible contribution of civil society in the moral edification of ...

    African Journals Online (AJOL)

    2015-03-27

    Mar 27, 2015 ... service delivery and corruption and to influence government policy. Christian ..... 400 000 letters, flyers and brochures were distributed to advertise the ..... on, but with the growth of Mbeki's denial of the true causes of AIDS due ...

  9. Digital forensic framework for a cloud environment

    CSIR Research Space (South Africa)

    Sibiya, G

    2012-05-01

    Full Text Available crimes that can be committed in the cloud include unauthorized access to resources in the cloud, money laundering, distributed denial of services attacks, storage of pirated software, music, movies, etc. In this section, two scenarios of criminal...

  10. Coping with the Green-Eyed Monster: Conceptualizing and Measuring Communicative Responses to Romantic Jealousy.

    Science.gov (United States)

    Guerrero, Laura K.; And Others

    1995-01-01

    Examines communicative responses to romantic jealousy. Finds 12 superordinate categories and 67 tactics in communicative responses to jealousy. Develops measures for six types of interactive responses (integrative communication, distributive communication, active distancing, general avoidance/denial, expression of negative affect, and violent…

  11. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...

  12. Proving the correctness of client/server software

    Indian Academy of Sciences (India)

    ness of an OSEKtime (OSE 2001) like distributed real time operating system and all ... kernel but concentrate on the security-sensitive services running on top of it. This multi- ...... in case of a call to a procedure other than MUL send denial. (16).

  13. Marie Stopes International Child Spacing Clinics in Malawi

    African Journals Online (AJOL)

    distributed > 200,000 condoms, completed programmes in more than 30 ... that men feel that child spacing is also their concern and service providers feel men are .... there is often the denial of the fact that their child is sexually active inspite of ...

  14. Download this PDF file

    African Journals Online (AJOL)

    opperwjj

    medical service to play a more preventive and holistic role in its responses. ..... of the distribution for race,2 gender and qualification (Table 1) (p <= 0.01, ... their own denial of responsibility and represents the first step in acting for the victim in.

  15. A Survey of Clients and Ethical Perspectives of Voluntary Tubal ...

    African Journals Online (AJOL)

    This is an open access article distributed under the terms of the Creative Commons ... maternal and child health services in a district, two were chosen at random using the ... of incentives, denial of rights because of client's refusal to accept a ...

  16. Electronic Commerce -RE-SONANCE---IOct-ob-er

    Indian Academy of Sciences (India)

    and the emergence of a number of Internet Service Providers. (lSPs) who ..... may be a distributed client/server type system with each office being a client and the .... called denial of service in which a large number of frivolous enquiries are ...

  17. FULL LENGTH RESEARCH ARTICLE Agashe & Bodhe(2008) SWJ ...

    African Journals Online (AJOL)

    Dr. Ahmed

    Mobile networks allow users to access services while on the move .... chosen from a random Gaussian distribution with mean equal to zero ... da and. )( db when mobile is at a distance d from A is. ),0(. )6....(. )......... () log(. )( )5.( .... This denial of.

  18. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2015-12-11

    automatically filter cyber discussions from Stack Exchange, Reddit, and Twitter posts written in English. Criminal hackers often use social media...monitoring hackers on Facebook and in private chat rooms. As a result, system administrators were prepared to counter distributed denial-of-service

  19. Element selective X-ray magnetic circular and linear dichroisms in ferrimagnetic yttrium iron garnet films

    Energy Technology Data Exchange (ETDEWEB)

    Rogalev, A. [European Synchrotron Radiation Facility (ESRF), B.P. 220, F-38043 Grenoble Cedex (France); Goulon, J. [European Synchrotron Radiation Facility (ESRF), B.P. 220, F-38043 Grenoble Cedex (France)], E-mail: goulon@esrf.fr; Wilhelm, F. [European Synchrotron Radiation Facility (ESRF), B.P. 220, F-38043 Grenoble Cedex (France); Brouder, Ch. [Institut de Mineralogie et de Physique des Milieux Condenses, UMR-CNRS 7590, Universite Paris VI-VII, 4 place Jussieu, F-75252 Paris Cedex 05 (France); Yaresko, A. [Max Planck Institute for Solid State Research, Heisenbergstrasse 1, 70569 Stuttgart (Germany); Ben Youssef, J.; Indenbom, M.V. [Laboratoire de Magnetisme de Bretagne, CNRS FRE 2697, UFR Sciences et Techniques, F-29328 Brest Cedex (France)

    2009-12-15

    X-ray magnetic circular dichroism (XMCD) was used to probe the existence of induced magnetic moments in yttrium iron garnet (YIG) films in which yttrium is partly substituted with lanthanum, lutetium or bismuth. Spin polarization of the 4d states of yttrium and of the 5d states of lanthanum or lutetium was clearly demonstrated. Angular momentum resolved d-DOS of yttrium and lanthanun was shown to be split by the crystal field, the two resolved substructures having opposite magnetic polarization. The existence of a weak orbital moment involving the 6p states of bismuth was definitely established with the detection of a small XMCD signal at the Bi M{sub 1}-edge. Difference spectra also enhanced the visibility of subtle changes in the Fe K-edge XMCD spectra of YIG and {l_brace}Y, Bi{r_brace}IG films. Weak natural X-ray linear dichroism signatures were systematically observed with all iron garnet films and with a bulk YIG single crystal cut parallel to the (1 1 1) plane: this proved that, at room temperature, the crystal cannot satisfy all requirements of perfect cubic symmetry (space group: Ia3-bar d), crystal distortions preserving at best trigonal symmetry (R3-bar or R3m). For the first time, a very weak X-ray magnetic linear dichroism (XMLD) was also measured in the iron K-edge pre-peak of YIG and revealed the presence of a tiny electric quadrupole moment in the ground-state charge distribution of iron atoms. Band-structure calculations carried out with fully relativistic LMTO-LSDA methods support our interpretation that ferrimagnetically coupled spins at the iron sites induce a spin polarization of the yttrium d-DOS and reproduce the observed crystal field splitting of the XMCD signal.

  20. Element selective X-ray magnetic circular and linear dichroisms in ferrimagnetic yttrium iron garnet films

    International Nuclear Information System (INIS)

    Rogalev, A.; Goulon, J.; Wilhelm, F.; Brouder, Ch.; Yaresko, A.; Ben Youssef, J.; Indenbom, M.V.

    2009-01-01

    X-ray magnetic circular dichroism (XMCD) was used to probe the existence of induced magnetic moments in yttrium iron garnet (YIG) films in which yttrium is partly substituted with lanthanum, lutetium or bismuth. Spin polarization of the 4d states of yttrium and of the 5d states of lanthanum or lutetium was clearly demonstrated. Angular momentum resolved d-DOS of yttrium and lanthanun was shown to be split by the crystal field, the two resolved substructures having opposite magnetic polarization. The existence of a weak orbital moment involving the 6p states of bismuth was definitely established with the detection of a small XMCD signal at the Bi M 1 -edge. Difference spectra also enhanced the visibility of subtle changes in the Fe K-edge XMCD spectra of YIG and {Y, Bi}IG films. Weak natural X-ray linear dichroism signatures were systematically observed with all iron garnet films and with a bulk YIG single crystal cut parallel to the (1 1 1) plane: this proved that, at room temperature, the crystal cannot satisfy all requirements of perfect cubic symmetry (space group: Ia3-bar d), crystal distortions preserving at best trigonal symmetry (R3-bar or R3m). For the first time, a very weak X-ray magnetic linear dichroism (XMLD) was also measured in the iron K-edge pre-peak of YIG and revealed the presence of a tiny electric quadrupole moment in the ground-state charge distribution of iron atoms. Band-structure calculations carried out with fully relativistic LMTO-LSDA methods support our interpretation that ferrimagnetically coupled spins at the iron sites induce a spin polarization of the yttrium d-DOS and reproduce the observed crystal field splitting of the XMCD signal.

  1. Positive tertiary appraisals and posttraumatic stress disorder in U.S. male veterans of the war in Vietnam: the roles of positive affirmation, positive reformulation, and defensive denial.

    Science.gov (United States)

    Dohrenwend, Bruce P; Neria, Yuval; Turner, J Blake; Turse, Nicholas; Marshall, Randall; Lewis-Fernandez, Roberto; Koenen, Karestan C

    2004-06-01

    A 70.9% majority of the U.S. male veterans in a nationwide sample appraised the impact of their service in Vietnam on their present lives as mainly positive. A substantial minority, 41.7%, judged the effects to be highly salient. With controls on level of exposure to war-zone stressors measured with data from military records, the valence and salience of these appraisals are investigated in relation to posttraumatic stress disorder (PTSD) and other indicators of wartime and postwar functioning. The results are consistent with the hypothesis that mainly positive tertiary appraisals are affirmations of successful wartime and postwar adaptation rather than defensive denials related to maladaptive outcomes. The possibility that mainly positive tertiary appraisals also contribute to successful postwar adaptation is discussed. (c) 2004 APA, all rights reserved

  2. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  3. Non-State Actors and their Risks to American Society

    Science.gov (United States)

    2013-03-01

    the music recording industry and Hollywood cinema corporations. The group has elevated its attack targets by a recent distributed denial of service...recruited away from the Mexican Army’s Special Forces. These soldiers were trained at Fort Benning’s School of Americas by US, Israeli and French

  4. Secure or Insure: An Economic Analysis of Security Interdependencies and Investment Types

    Science.gov (United States)

    Grossklags, Jens

    2009-01-01

    Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…

  5. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  6. Denial of pain medication by health care providers predicts in-hospital illicit drug use among individuals who use illicit drugs.

    Science.gov (United States)

    Ti, Lianping; Voon, Pauline; Dobrer, Sabina; Montaner, Julio; Wood, Evan; Kerr, Thomas

    2015-01-01

    Undertreated pain is common among people who use illicit drugs (PWUD), and can often reflect the reluctance of health care providers to provide pain medication to individuals with substance use disorders. To investigate the relationship between having ever been denied pain medication by a health care provider and having ever reported using illicit drugs in hospital. Data were derived from participants enrolled in two Canadian prospective cohort studies between December 2012 and May 2013. Using bivariable and multivariable logistic regression analyses, the relationship between having ever been denied pain medication by a health care provider and having ever reported using illicit drugs in hospital was examined. Among 1053 PWUD who had experienced ≥ 1 hospitalization, 452 (44%) reported having ever used illicit drugs while in hospital and 491(48%) reported having ever been denied pain medication. In a multivariable model adjusted for confounders, having been denied pain medication was positively associated with having used illicit drugs in hospital (adjusted OR 1.46 [95% CI 1.14 to 1.88]). The results of the present study suggest that the denial of pain medication is associated with the use of illicit drugs while hospitalized. These findings raise questions about how to appropriately manage addiction and pain among PWUD and indicate the potential role that harm reduction programs may play in hospital settings.

  7. Interactive analysis of SDN-driven defence against Distributed Denial of Service attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; de Laat, C.; Meijer, R.; Grosso, P.

    2016-01-01

    The Secure Autonomous Response Networks (SARNET) framework introduces a mechanism to respond autonomously to security attacks in Software Defined Networks (SDN). Still the range of responses possible and their effectiveness need to be properly evaluated such that the decision making process and the

  8. Sex, violence and HIV on the inside: cultures of violence, denial, gender inequality and homophobia negatively influence the health outcomes of those in closed settings.

    Science.gov (United States)

    Kelly-Hanku, Angela; Kawage, Thomas; Vallely, Andrew; Mek, Agnes; Mathers, Bradley

    2015-01-01

    To map the context of HIV in closed settings in Papua New Guinea (PNG), semi-structured interviews were undertaken with 56 prisoners and detainees and 60 key stakeholders. The nature of HIV-related risk differs for detained women and men, and reflects important gender-based issues present in PNG society more broadly. Women in detention are vulnerable to sexual violence and exploitation and at greatest risk of HIV while detained in police holding cells, where they are typically supervised by male officers, in contrast to prisons, where they have little contact with male staff. HIV risk for men in prison is associated with consensual and non-consensual sex; this risk is perpetuated by a pervasive culture of denial and institutionalised homophobia. The illegal nature of sodomy and male-to-male sex provides Correctional Services the legal grounds by which to refuse access to condoms for prisoners. Addressing HIV risk among detained men and women in PNG requires the reform of legislation, police and prison practices and an understanding of broader structural problems of gender-based violence and stigma and discrimination.

  9. Balancing the Fair Treatment of Others While Preserving Group Identity and Autonomy.

    Science.gov (United States)

    Killen, Melanie; Elenbaas, Laura; Rutland, Adam

    2016-04-01

    Social exclusion and inclusion from groups, as well as the distribution of resources, are fundamental aspects of social life, and serve as sources of conflicts that bear on issues of fairness and equality, beginning in childhood. For the most part, research on social exclusion and allocation of resources has not focused on the issue of group membership. Yet, social exclusion from groups and the denial of resources reflect societal issues pertaining to social inequality and its counterpoint, fair treatment of others. Social inequality occurs when opportunities and resources are distributed unevenly in society, often through group norms about allocation that reflect socially defined categories of persons. This occurs at multiple levels of societal organization, from experiences of exclusion in childhood such as being left out of a play activity, to being denied access to resources as a member of a group. These situations extend to larger level experiences in the adult world concerning social exclusion from voting, for example, or participation in educational institutions. Thus, most decisions regarding social exclusion and the denial of resources involve considerations of group identity and group membership, implicitly or explicitly, which contribute to prejudice and bias, even though this has rarely been investigated in developmental science. Current research illustrating the role of group identity and autonomy regarding decision-making about social exclusion and the denial of resources is reviewed from the Social Reasoning Developmental model, one that integrates social domain theory and developmental social identity theories to investigate how children use moral, conventional, and psychological judgments to evaluate contexts reflecting group identity, group norms, and intergroup dynamics.

  10. Categories of Botnet: A Survey

    OpenAIRE

    D. Seenivasan; K. Shanthi

    2014-01-01

    Botnets are one of the most serious and widespread cyber threats. Today botnets have been facilitating many cybercrimes, especially financial, top secret thefts. Botnets can be available for lease in the market and are utilized by the cybercriminals to launch massive attacks like DDoS, click fraud, phishing attacks etc., Several large institutions, hospitals, banks, government organizations and many social networks such as twitter, facebook etc., became the target of the ...

  11. Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats

    Science.gov (United States)

    2013-03-01

    is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy

  12. 78 FR 72843 - Freedom of Information

    Science.gov (United States)

    2013-12-04

    ... contained in it, necessary to respond to a FOIA request. Copies can take the form of paper, audiovisual... waiver matters or denials of requests for expedited processing. (d) Content of denial letter. The denial...

  13. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers

    Directory of Open Access Journals (Sweden)

    Dae-Kyo Jeong

    2017-11-01

    Full Text Available In this paper, we model and investigate the random access (RA performance of sensor nodes (SN in a wireless sensor network (WSN. In the WSN, a central head sensor (HS collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.

  14. The need for a greater commitment to america region to prevent denials of shipments of radioactive materials; La necesidad de un mayor compromiso en la region America para prevenir los rechazos de expediciones de material radiactivo

    Energy Technology Data Exchange (ETDEWEB)

    Mallaupoma, Mario, E-mail: mmallaupoma@ipen.gob.pe [Instituto Peruano de Energia Nuclear (IPEN), Lima (Peru); Schwela, Ulric, E-mail: tech@tanb.org [Tantalum-Niobiom International Study Center (TIC), Lasne (Belgium)

    2013-07-01

    Radioactive sources are used worldwide in a wide range of applications in industry health care, industrial applications, manufacturing materials, exploration and technological development, as well as basic scientific research. The ability to use such radioactive material in these sectors depends on both its safe transport within a country and between different countries, for developed and developing countries can have access to this technology, in a timely manner and in conditions economically acceptable. In this paper the issue of denials and restraints of shipment of radioactive material and the need for greater commitment that Member States of the International Atomic Energy Agency (IAEA) must assume to facilitate the transport of radioactive materials for the benefit of society is analyzed.

  15. "That never happened": adults' discernment of children's true and false memory reports.

    Science.gov (United States)

    Block, Stephanie D; Shestowsky, Donna; Segovia, Daisy A; Goodman, Gail S; Schaaf, Jennifer M; Alexander, Kristen Weede

    2012-10-01

    Adults' evaluations of children's reports can determine whether legal proceedings are undertaken and whether they ultimately lead to justice. The current study involved 92 undergraduates and 35 laypersons who viewed and evaluated videotaped interviews of 3- and 5-year-olds providing true or false memory reports. The children's reports fell into the following categories based on a 2 (event type: true vs. false) × 2 (child report: assent vs. denial) factorial design: accurate reports, false reports, accurate denials, and false denials. Results revealed that adults were generally better able to correctly judge accurate reports, accurate denials, and false reports compared with false denials: For false denials, adults were, on average, "confident" that the event had not occurred, even though the event had in fact been experienced. Participant age predicted performance. These findings underscore the greater difficulty adults have in evaluating young children's false denials compared with other types of reports. Implications for law-related situations in which adults are called upon to evaluate children's statements are discussed. PsycINFO Database Record (c) 2012 APA, all rights reserved.

  16. Deploying Crowd-Sourced Formal Verification Systems in a DoD Network

    Science.gov (United States)

    2013-09-01

    which are bad data traffic, exploits about mysql , sql injection, web attacks, DDoS, flash, chat and browser vulnerabilities. The Snort rules on CSFV...3.16-2.el6 @base java -1.5.0-gcj.x86_64 1.5.0.0-29.1.el6 @base...2.7.6-12.el6_4.1 @updates libxml2-python.x86_64 2.7.6-12.el6_4.1 @updates mysql

  17. LESSONS FROM THE FRONT: A CASE STUDY OF RUSSIAN CYBER WARFARE

    Science.gov (United States)

    2015-12-01

    how DDoS was used during the Sony data breach in 2011.60 The idea behind this tactic is that while the defensive efforts are being focused on...online pilfering of intellectual property (IP) from the US government and corporate America constitutes an average loss of over $100 billion dollars...Analysis and Assessment, The MITRE Corporation , Bedford, MA [or M.A.], November 2013, 18. 67 Air Force, “Intelligence Officer Career Field

  18. NATO’s Options for Defensive Cyber Against Non-State Actors

    Science.gov (United States)

    2013-04-01

    services to cyber criminals and hacker patriots.”33 The FSB had maintained an unsavory relationship with hackers since the early 1990s; 9 Oleg...responsibility under international law to stop the DDOS being facilitated by botnet controllers located within its geographic borders, and prosecute the cyber ... criminals involved. “Rule 5” of the Tallinn Manual addresses the cyber responsibility of a nation-state: “A State shall not knowingly allow the

  19. 17 CFR 9.13 - Publication of notice.

    Science.gov (United States)

    2010-04-01

    ... REVIEW OF EXCHANGE DISCIPLINARY, ACCESS DENIAL OR OTHER ADVERSE ACTIONS Notice and Effective Date of Disciplinary Action or Access Denial Action § 9.13 Publication of notice. Whenever an exchange suspends, expels... must make such findings public as soon as the disciplinary action or access denial action becomes...

  20. Development of Less Toxic Treatment Strategies for Metastatic and Drug-Resistant Breast Cancer Using Noninvasive Optical Monitoring

    Science.gov (United States)

    2017-09-01

    Extractions An example of calibrated ( black ) and fit (red) amplitude and phase measured from 50 to 400 MHz in steps of 1 MHz at each wavelength is...with dDOS system at each wavelength. Red lines are calibrated data and black lines are model fits. Journal of Biomedical Optics 036009-4 March 2017...Grad Fellow in 2009 from the Bioengineering Department at Rice University, where he studied under Rebecca Richards-Kortum. Prior to starting his faculty

  1. RECENT TRENDS IN BOTNET RESEARCH

    OpenAIRE

    Sanjeev Kumar Dwivedi*1 and Ankur Singh Bist2

    2017-01-01

    ABSTRACT With the advent of internet technology and the increased dependency on the internet to carry out financial transactions gave rise to a new generation of malware called botnets. A botnet collectively termed for a network of infected computers or bots are used to carry out various attacks on the internet community. These attacks ranges from DDOS attacks performed on an organization, spamming campaigns, to sample key logging attacks performed on general individuals. Botnets thus are...

  2. Cognitive dissonance as an explanation of the genesis, evolution ...

    African Journals Online (AJOL)

    The steady erosion of support for this flagrant HIV denialism, together with the rise of neoliberal thinking in the ANC, would lead to the evolution of this biological denialism into a form of treatment denialism. This ideology argued against the widespread provision and use of antiretroviral treatment. Empirical evidence is ...

  3. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  4. For the Lulz: Anonymous, Aesthetics and Affect

    Directory of Open Access Journals (Sweden)

    Rodrigo Ferrada Stoehrel

    2014-03-01

    Full Text Available The focus of this paper is on different but connected areas of power – relating to things such as economic globalisation, surveillance, censorship/freedom, ‘terrorism’ and/or specific military activity – visually represented through online media, and intentionally produced to inform a wide spectrum of individuals and interest groups about global and local social injustices. Or, more importantly, produced and distributed with the purpose of providing users with possibilities to engage, bodily and emotionally, in diverse ways: may it be through physical antiwar/anti-wall street protests or hacktivist tactics (e.g. DDoS attacks. We examine a sample of videos, photographs and propaganda posters produced, and digitally distributed (2008-2013, by the fragmented body of activists united globally under the generic name of Anonymous. Analytically, we will draw upon Mouffe’s thoughts on ‘antagonism’ and ‘passion,’ Foucault’s ideas on international citizenship and the (ethical ‘right to intervene’ (beyond governmentality, together with Sontag’s notion of institutional political inertia and the Deleuzian/Spinozian perspective on affect as a capacity for action. The goal is to analyse the ways in which Anonymous systematically inspire (not only the radical and social imaginary but also other direct forms of action that have potential societal effects.

  5. The negations of conjunctions, conditionals, and disjunctions.

    Science.gov (United States)

    Khemlani, Sangeet; Orenes, Isabel; Johnson-Laird, P N

    2014-09-01

    How do reasoners understand and formulate denials of compound assertions, such as conjunctions and disjunctions? A theory based on mental models postulates that individuals enumerate models of the various possibilities consistent with the assertions. It therefore predicts a novel interaction: in affirmations, conjunctions, A and B, which refer to one possibility, should be easier to understand than disjunctions, A or B, which refer to more than one possibility; in denials, conjunctions, not(A and B), which refer to more than one possibility, should be harder to understand than disjunctions, not(A or B), which do not. Conditionals are ambiguous and they should be of intermediate difficulty. Experiment 1 corroborated this trend with a task in which the participants selected which possibilities were consistent with assertions, such as: Bob denied that he wore a yellow shirt and he wore blue pants on Tuesday. Experiment 2 likewise showed that participants' own formulations of verbal denials yielded the same trend in which denials of conjunctions were harder than denials of conditionals, which in turn were harder than denials of disjunctions. Published by Elsevier B.V.

  6. When the circus comes to town: Countering campus presentations on climate denial

    Science.gov (United States)

    Corbin, J.

    2012-12-01

    been far better prepared for post-event publicity if we had anticipated that social media tools can effectively nationalize discussions that take place even at small colleges. Even with that knowledge, however, the balance of power in carrying on a debate in the public sphere seems strongly weighted toward the network of climate deniers. I co-authored an EOS Forum paper that described our experiences at Union College and at nearby Rensselaer Polytechnic Institute. The number of blog or Twitter references to EOS pales in comparison to those linking to a reply authored by Monckton and posted online. At this point, communication of climate science seems at a distinct disadvantage compared to communication of climate denial. This is not to say that we should yield the floor to those who attempt to discredit our research and contradict what we teach in our classes - doing so risks giving the impression that scientific literacy and public awareness of climate change are of little importance to us. Instead, when we engage climate science deniers, we make clear that we believe much is at stake.

  7. Towards a cyber secure society

    CSIR Research Space (South Africa)

    Labuschagne, WA

    2012-10-01

    Full Text Available -Besse Nuclear Plant ?Plant safety monitoring system (Shut down) ?2005 ?Daimler Chrysler ?13 U.S manufacturing plants (Shut down) ? CSIR 2012 Slide 6 Is It Possible? ?Estonia (April 2007) ?First cyberwar ?Three-week wave of distributed denial...-of- service attacks ? Crippled country?s information technology infra-structure ? CSIR 2012 Slide 7 Is It Possible? ?Stuxnet ?Discovered in July 2010 ?Target was Iranian nuclear facility ?Cause refinery's centrifuge to malfunction ?Air-gapped from...

  8. Addressing security issues related to virtual institute distributed activities

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  9. Risk Denial and Socio-Economic Factors Related to High HIV Transmission in a Fishing Community in Rakai, Uganda: A Qualitative Study.

    Directory of Open Access Journals (Sweden)

    Muhamadi Lubega

    Full Text Available In Kasensero fishing community, home of the first recorded case of HIV in Uganda, HIV transmission is still very high with an incidence of 4.3 and 3.1 per 100 person-years in women and men, respectively, and an HIV prevalence of 44%, reaching up to 74% among female sex workers. We explored drivers for the high HIV transmission at Kasensero from the perspective of fishermen and other community members to inform future policy and preventive interventions.20 in-depth interviews including both HIV positive and HIV negative respondents, and 12 focus-group discussions involving a total of 92 respondents from the Kasensero fishing community were conducted during April-September 2014. Content analysis was performed to identify recurrent themes.The socio-economic risk factors for high HIV transmission in Kasensero fishing community cited were multiple and cross-cutting and categorized into the following themes: power of money, risk denial, environmental triggers and a predisposing lifestyle and alcoholism and drug abuse. Others were: peer pressure, poor housing and the search for financial support for both the men and women which made them vulnerable to HIV exposure and or risk behavior.There is a need for context specific combination prevention interventions in Kasensero that includes the fisher folk and other influential community leaders. Such groups could be empowered with the knowledge and social mobilization skills to fight the negative and risky behaviors, perceptions, beliefs, misconceptions and submission attitudes to fate that exposes the community to high HIV transmission. There is also need for government/partners to ensure effective policy implementation, life jackets for all fishermen, improve the poor housing at the community so as to reduce overcrowding and other housing related predispositions to high HIV rates at the community. Work place AIDS-competence teams have been successfully used to address high HIV transmission in similar

  10. 76 FR 15236 - Freedom of Information Act Regulations

    Science.gov (United States)

    2011-03-21

    ... for expedited processing. (d) Content of denial letter. The denial letter shall be signed by the head... contained in it, necessary to respond to a FOIA request. Copies can take the form of paper, audiovisual...

  11. Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan

    Directory of Open Access Journals (Sweden)

    Jefree Fahana, Rusydi Umar, Faizin Ridho

    2017-10-01

    Full Text Available Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties. The first step to do is to design and build an attack detection system that is Intrusion Detection System (IDS. The use of snort is useful for recording Distributed Danial of Services (DDoS attacks as well as traffic data stored on the router stored in the log and forwarded to the instant messaging telegram application as a notification to alert the administrator. A telegram can be used not only as a notification but can also be used as a network forensic stage to strengthen evidence of an attack as a process of data collection for the purposes of the trial. The results showed that by utilizing Instant Messaging Telegram by designing wake Application (App notification using PHP programming language able to detect attacks by using existing rules on snort and can serve as the basis of evidence of an attack. Keywords: Telegram, Intrusion Detection System (IDS, Snort, Network Forensics, DDoS. 

  12. Collaborative DDoS Defense using Flow-based Security Event Information

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    Over recent years, network-based attacks evolved to the top concerns responsible for network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). In addition, exchanging threat

  13. Recording of dissimulation and denial in the context of the psychosomatic evaluation at living kidney transplantation using the Minnesota Multiphasic Personality Inventory (MMPI)

    Science.gov (United States)

    Wutzler, Uwe; Venner, Margit; Villmann, Thomas; Decker, Oliver; Ott, Undine; Steiner, Thomas; Gumz, Antje

    2009-01-01

    Objective: Living organ donation involves interference with a healthy organism. Therefore, most transplantation centres ascertain the voluntariness of the donation as well as its motivation by means of a psychosomatic evaluation. The circumstance that the evaluation is compulsory and not a primary concern of the donor-recipient pair may occasion respondents to present only what they consider innocuous and socially adequate. Thus, the information value of the results can be considerably affected. Methods: In the context of a psychosomatic evaluation prior to living kidney transplantation, 71 donor-recipient pairs were screened at the transplantation centre of Friedrich Schiller University, Jena. Using the validity scales of the Minnesota Multiphasic Personality Inventory (MMPI) (“infrequency” (F), “lie” (L) and “correction-scales” (K)) and the Dissimulation Index according to Gough (“F-K”), we tried to find traits of dissimulation and denial. Results: About 50% of the participants showed an infrequency raw score of zero. This means that at least half of the sample is apprehensive which may cause a cautious and controlled attitude towards the examination. The K-value (T≥59) and the Dissimulation Index (F-K≤–15) indicated dissimulation in 29% and 26% of the overall sample. Moreover, it affects the score of 11 respondents (8%) so profoundly that any significance regarding the personality traits is lost. Conclusion: In the setup of the examination situation as well as in the interpretation of test-psychological findings, the occurrence and possible influence of dissimulation should be considered. The validity scale of the MMPI can help to obtain an objective clinical impression of dissimulation in problem cases. PMID:19911073

  14. Non-Lethal Weapons Program

    Science.gov (United States)

    Sheets Frequently Asked Questions Non-Lethal Weapons FAQs Active Denial System FAQs Human Electro -Muscular Incapacitation FAQs Related Links Business Opportunities Contact JNLWD Congressional Engagement , Wednesday, Sept 20, 2017. The Active Denial System, blunt-impact munitions, dazzling lasers, LRAD 100X

  15. Ethiopia

    African Journals Online (AJOL)

    Nneka Umera-Okeke

    To secure a computer system and ensure cyber security, it is important to understand the attacks ... Denial-of-service attack: Denial of service attacks are designed to make a machine or network ... Many fail to recognize cybercrimes in their IT.

  16. ВОПРОСЫ БЕЗОПАСНОСТИ ПРИ ОРГАНИЗАЦИИ ЗАЩИТЫ СИСТЕМЫ ЭЛЕКТРОННЫХ ПЛАТЕЖЕЙ

    Directory of Open Access Journals (Sweden)

    Глеб Николаевич Мальцев

    2009-06-01

    Full Text Available This article views main questions of payment systems security, including two aspects: possible attacks on users and security vulnerability of systems architecture. Particular attention is paid to problem of DDOS attacks. When time of response is very critical and system is working under high load it must by flexible and balanced between different servers. The autonomous system of Internet could resolve this problem. In the article was performed an analysis of delays in a processing of users requests on different levels such as application servers and database in the case of high load traffic.

  17. Determinação e padronização da vitamina E e seus isomeros : comparação entre o metodo de cromatografia liquida de alta eficiencia (CLAE) e o metodo espectrofotometrico por redução de ions cupricos

    OpenAIRE

    Andrea Scabora Boix Caro

    2002-01-01

    Resumo: A presente Tese visou estudar a determinação da vitamina E, estabelecendo uma comparação entre o método clássico modificado com um outro método de determinação, a cromatografia líquida de alta eficiência (CLAE).Para efeito de comparação foram utilizados cinco tipos de amostras diferentes: suplementos vitamínicos, óleos vegetais, DDOS, farinha de germe de trigo e fígados liofilizados de ratos. Os resultados encontrados nos métodos avaliados diferiram quanto ao tipo de isômero encontrad...

  18. Indexes to Nuclear Regulatory Commission issuances, January 19, 1975 through December 31, 1979

    International Nuclear Information System (INIS)

    1981-03-01

    The document contains indexes for adjudicatory decisions of the Commission (CLI), the Atomic Safety and Licensing Appeal Board (ALAB), the Atomic Safety and Licensing Board (LBP), the Administrative Law Judge (ALJ), the Directors Denials (DD), and the Denials of Petitions for Rulemaking (DPRM). The Directors Denials and Denials of Petition for Rulemaking are new categories, added in 1979. Information elements common to the cases heard and ruled upon are: Case name (owners of facility); Name of facility, Docket number; Type of hearing (for construction permit, operating license, etc.); Issues raised by appellants; Issuance number; Type of issuance (memorandum, order, decision, etc.); Issuance pagination; Legal citations (cases, regulations, and statutes); and Subject matter of issues and/or rulings. These information elements are displayed in one or more of five separate formats arranged as follows: Case name index; Digests and headers; Legal citation index; Subject index; and Facility index

  19. Project of law, adopted by the Senate after urgency declaration, relative to the energy markets and to the energy public utilities; Projet de loi adopte par le Senat apres declaration d'urgence relatif aux marches energetiques et au service public de l'energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-10-01

    This project of law treats of: 1 - the right of access to natural gas distribution networks (transit contracts, eligible clients and market opening, acknowledged suppliers, diversification of supplies, denial of contract, derogations); 2 - the transparency and regulation of the natural gas sector (prices and commercial conditions, transport and storage informations, organisation of the regulation authority); 3 - the natural gas public utility (organisation, obligations, supplies warranty and security, national observatory); 4 - the natural gas transport and distribution (network management, expertises and controls, maintenance); 5 - the underground storage (mining law, storage concession, exploitation); 6 - the controls and sanctions; 7 - the dispositions relative to the electric public utility (costs, taxes and contributions, overruns, regulation authority). (J.S.)

  20. Nuclear Regulatory Commission issuance, pages 933-1089

    International Nuclear Information System (INIS)

    1981-11-01

    This report includes the issuances received during the specified period from the Commission (CLI), the Atomic Safety and Licensing Appeal Boards (ALAB), the Atomic Safety and Licensing Boards (LBP), the Administrative Law Judge (ALJ), the Directors Denial (DD), and the Denial of Petitions for Rulemaking

  1. Nuclear Regualtory Commission Issuances, October 1981

    International Nuclear Information System (INIS)

    1981-10-01

    This report includes the issuances received during the specified period from the Commission (CLI), the Atomic Safety and Licensing Appeal Boards (ALAB), the Atomic Safety and Licensing Boards (LBP), the Administrative Law Judge (ALJ), the Directors Denial (DD), and the Denial of Petitions for Rulemaking

  2. Anorexia Nervosa and First-Person Perspective: Altruism, Family System, and Body Experience.

    Science.gov (United States)

    Englebert, Jérôme; Follet, Valérie; Valentiny, Caroline

    2018-01-01

    Based on the case study of Jeanne, the objective of this article is to study patterns of specific subjectivity in anorexic subjects. We seek to identify, in a first-person perspective, the core vulnerability features of anorexic existence, beyond the dimension of food alone. The identification of a psychopathological structure results in a better understanding of Jeanne's clinical situation and helps formulate psychotherapeutic and prophylactic recommendations. We suggest that so-called "denial" is a psychological mechanism that should be reconsidered. Denial is not a mechanism pertaining to anorexic subjects alone, but is also a process encountered both in the patient's family and in the therapeutic environment. Anorexic denial is based on anosognosia and the refusal to see one's own thinness, while other people's denial consists in a widespread inability to perceive the altruism and intersubjective problematic on which the existence of an anorexic subject fundamentally depends. © 2017 S. Karger AG, Basel.

  3. 15 CFR Supplement No. 1 to Part 764 - Standard Terms of Orders Denying Export Privileges

    Science.gov (United States)

    2010-01-01

    ... decision following charges of violation, settlement agreement, section 11(h) of the EAA, or temporary... denial order; (2) the basis for the denial order, such as final decision following charges of violation..., transporting, financing, or otherwise servicing in any way, any transaction involving any item exported or to...

  4. Botnet Propagation Via Public Websited Detection Algorithm

    Directory of Open Access Journals (Sweden)

    Jonas Juknius

    2011-08-01

    Full Text Available The networks of compromised and remotely controlled computers (bots are widely used in many Internet fraudulent activities, especially in the distributed denial of service attacks. Brute force gives enormous power to bot masters and makes botnet traffic visible; therefore, some countermeasures might be applied at early stages. Our study focuses on detecting botnet propagation via public websites. The provided algorithm might help with preventing from massive infections when popular web sites are compromised without spreading visual changes used for malware in botnets.Article in English

  5. الإنكار وتمثلاته في النص المسرحي مسرحية (سبع ثوانٍ في الرب نثق إنموذجا

    Directory of Open Access Journals (Sweden)

    زيد ثامر عبد الكاظم

    2018-01-01

    Full Text Available Denial was and still is a way for a person to reject the real and painful reality that lies ahead. The images of denial and its pluralism in the theatrical structure have a role in clarifying the spatial and dialogical data and indications through the experiments and this is what makes the denial is achieved in all components of the theatrical test, according on the style and nature of the writer so this research consists of four chapters, the first chapter (the methodological framework has the problem of the research that I have done with the following question:- What is denial? And what are their representations in theatrical text.                  The importance of the research was on the social and psychological reasons that explain and find out the solutions, and the aim of the research to recognize the denial and its representations in the theater text. the research was limited in time (2011 and place in Germany this chapter concluded with the definition of terms either Chapter II (theoretical framework, which consists of two sections specialized the first section of philosophical innovation, in terms of the second section devoted to the denial in the Western theater text, and concluded the chapter with the indicators that resulted from the theoretical framework and the chapter concluded with the indicators that resulted from the theoretical framework, and the third chapter has been specialized in the research procedures, which was represented in the statement of the research, the type of research, and research methodology, then analysis the sample of the research. The fourth chapter also included the results of the research as the following: 1-The basic images of denial and consists of direct and indirect positions within the text of the text and also through breaking the familiar and transformed into an unfamiliar that is embodied by the reader while reading the text 2-The denial contributes to rid the person of the

  6. 75 FR 63802 - Action Affecting Export Privileges; Parto Abgardan Cooling Towers Co.

    Science.gov (United States)

    2010-10-18

    ... Abgardan Cooling Towers Co. Parto Abgardan Cooling Towers Co., P.O. Box 966, Folsom, CA 95763; and P.O. Box... Making Denial of Export Privileges of Aqua-Loop Cooling Towers, Co. Applicable to Parto Abgardan Cooling...-Loop Cooling Towers, Co. (``Aqua-Loop'') on March 25, 2010 (``Denial Order''), applicable to the...

  7. Proliferation resistance design of a plutonium cycle (Proliferation Resistance Engineering Program: PREP)

    Energy Technology Data Exchange (ETDEWEB)

    Sorenson, R.J.; Roberts, F.P.; Clark, R.G.

    1979-01-19

    This document describes the proliferation resistance engineering concepts developed to counter the threat of proliferation of nuclear weapons in an International Fuel Service Center (IFSC). The basic elements of an International Fuel Service Center are described. Possible methods for resisting proliferation such as processing alternatives, close-coupling of facilities, process equipment layout, maintenance philosophy, process control, and process monitoring are discussed. Political and institutional issues in providing proliferation resistance for an International Fuel Service Center are analyzed. The conclusions drawn are (1) use-denial can provide time for international response in the event of a host nation takeover. Passive use-denial is more acceptable than active use-denial, and acceptability of active-denial concepts is highly dependent on sovereignty, energy dependence and economic considerations; (2) multinational presence can enhance proliferation resistance; and (3) use-denial must be nonprejudicial with balanced interests for governments and/or private corporations being served. Comparisons between an IFSC as a national facility, an IFSC with minimum multinational effect, and an IFSC with maximum multinational effect show incremental design costs to be less than 2% of total cost of the baseline non-PRE concept facility. The total equipment acquisition cost increment is estimated to be less than 2% of total baseline facility costs. Personnel costs are estimated to increase by less than 10% due to maximum international presence. 46 figures, 9 tables.

  8. Proliferation resistance design of a plutonium cycle (Proliferation Resistance Engineering Program: PREP)

    International Nuclear Information System (INIS)

    Sorenson, R.J.; Roberts, F.P.; Clark, R.G.

    1979-01-01

    This document describes the proliferation resistance engineering concepts developed to counter the threat of proliferation of nuclear weapons in an International Fuel Service Center (IFSC). The basic elements of an International Fuel Service Center are described. Possible methods for resisting proliferation such as processing alternatives, close-coupling of facilities, process equipment layout, maintenance philosophy, process control, and process monitoring are discussed. Political and institutional issues in providing proliferation resistance for an International Fuel Service Center are analyzed. The conclusions drawn are (1) use-denial can provide time for international response in the event of a host nation takeover. Passive use-denial is more acceptable than active use-denial, and acceptability of active-denial concepts is highly dependent on sovereignty, energy dependence and economic considerations; (2) multinational presence can enhance proliferation resistance; and (3) use-denial must be nonprejudicial with balanced interests for governments and/or private corporations being served. Comparisons between an IFSC as a national facility, an IFSC with minimum multinational effect, and an IFSC with maximum multinational effect show incremental design costs to be less than 2% of total cost of the baseline non-PRE concept facility. The total equipment acquisition cost increment is estimated to be less than 2% of total baseline facility costs. Personnel costs are estimated to increase by less than 10% due to maximum international presence. 46 figures, 9 tables

  9. 19 CFR 201.6 - Confidential business information.

    Science.gov (United States)

    2010-04-01

    ...) of a type for which there is a clear and compelling need to withhold from disclosure. Special rules... the right to appeal to the Commission. (e) Appeals from denial of confidential treatment. (1) For good cause shown, the Commission may grant an appeal from a denial by the Secretary of a request for...

  10. Coulomb correlation effects in YBaCuO system

    International Nuclear Information System (INIS)

    Costa-quintana, J.; Lopez-Aguilar, F.; Munoz, J.S.; Sanchez, A.; Balle, S.

    1989-01-01

    In this work, the authors apply a mean field potential deduced from the multiband Hubbard Hamiltonian in order to obtain the lower and upper strongly correlated bands. They have obtained the total and partial density of states for U d = O and U d = 4 eV. The results show that the density of states calculated with U d = 4 eV at E F is lesser than that obtained with U d = 0. A small peak above E F arising from the strong correlated bands appears in the dDOS calculated with U d = 4 eV and this is in agreement with the experimental data

  11. Thinking About Denial

    Science.gov (United States)

    2017-01-01

    Abstract This essay considers the frequent and varied uses of ‘denial’ in modern political discourse, suggests the specific psychoanalytic meanings the term has acquired and asks how useful this Freudian concept may be for historians. It notes the debates among historians over the uses of psychoanalysis, but argues that concepts such as ‘denial’, ‘disavowal’, ‘splitting’ and ‘negation’ can help us to understand both individual and group behaviour. The authors dwell, especially, on ‘disavowal’ and argue it can provide a particularly useful basis for exploring how and why states of knowing and not knowing co-exist. Historical examples are utilized to explore these states of mind: most briefly, a fragment from a report about the war criminals, produced by an American psychiatrist at the Nuremberg Trial; at greater length, the political arguments and historical writings of an eighteenth-century slave-owner; and finally, a case in a borough of London in the late-twentieth-century, where the neglect, abuse and murder of a child was shockingly ‘missed’ by a succession of social agencies and individuals, who had evidence of the violence available to them.

  12. A New Distribution-Random Limit Normal Distribution

    OpenAIRE

    Gong, Xiaolin; Yang, Shuzhen

    2013-01-01

    This paper introduces a new distribution to improve tail risk modeling. Based on the classical normal distribution, we define a new distribution by a series of heat equations. Then, we use market data to verify our model.

  13. The effect of stimulus duration and motor response in hemispatial neglect during a visual search task.

    Directory of Open Access Journals (Sweden)

    Laura M Jelsone-Swain

    Full Text Available Patients with hemispatial neglect exhibit a myriad of profound deficits. A hallmark of this syndrome is the patients' absence of awareness of items located in their contralesional space. Many studies, however, have demonstrated that neglect patients exhibit some level of processing of these neglected items. It has been suggested that unconscious processing of neglected information may manifest as a fast denial. This theory of fast denial proposes that neglected stimuli are detected in the same way as non-neglected stimuli, but without overt awareness. We evaluated the fast denial theory by conducting two separate visual search task experiments, each differing by the duration of stimulus presentation. Specifically, in Experiment 1 each stimulus remained in the participants' visual field until a response was made. In Experiment 2 each stimulus was presented for only a brief duration. We further evaluated the fast denial theory by comparing verbal to motor task responses in each experiment. Overall, our results from both experiments and tasks showed no evidence for the presence of implicit knowledge of neglected stimuli. Instead, patients with neglect responded the same when they neglected stimuli as when they correctly reported stimulus absence. These findings thus cast doubt on the concept of the fast denial theory and its consequent implications for non-conscious processing. Importantly, our study demonstrated that the only behavior affected was during conscious detection of ipsilesional stimuli. Specifically, patients were slower to detect stimuli in Experiment 1 compared to Experiment 2, suggesting a duration effect occurred during conscious processing of information. Additionally, reaction time and accuracy were similar when reporting verbally versus motorically. These results provide new insights into the perceptual deficits associated with neglect and further support other work that falsifies the fast denial account of non

  14. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers

    Directory of Open Access Journals (Sweden)

    Vishal Sharma

    2017-01-01

    Full Text Available Internet of things (IoT aims at bringing together large business enterprise solutions and architectures for handling the huge amount of data generated by millions of devices. For this aim, IoT is necessary to connect various devices and provide a common platform for storage and retrieval of information without fail. However, the success of IoT depends on the novelty of network and its capability in sustaining the increasing demand by users. In this paper, a self-aware communication architecture (SACA is proposed for sustainable networking over IoT devices. The proposed approach employs the concept of mobile fog servers which make relay using the train and unmanned aerial vehicle (UAV networks. The problem is presented based on Wald’s maximum model, which is resolved by the application of a distributed node management (DNM system and state dependency formulations. The proposed approach is capable of providing prolonged connectivity by increasing the network reliability and sustainability even in the case of failures. The effectiveness of the proposed approach is demonstrated through numerical and network simulations in terms of significant gains attained with lesser delay and fewer packet losses. The proposed approach is also evaluated against Sybil, wormhole, and DDoS attacks for analyzing its sustainability and probability of connectivity in unfavorable conditions.

  15. Einstein Critical-Slowing-Down is Siegel CyberWar Denial-of-Access Queuing/Pinning/ Jamming/Aikido Via Siegel DIGIT-Physics BEC ``Intersection''-BECOME-UNION Barabasi Network/GRAPH-Physics BEC: Strutt/Rayleigh-Siegel Percolation GLOBALITY-to-LOCALITY Phase-Transition Critical-Phenomenon

    Science.gov (United States)

    Buick, Otto; Falcon, Pat; Alexander, G.; Siegel, Edward Carl-Ludwig

    2013-03-01

    Einstein[Dover(03)] critical-slowing-down(CSD)[Pais, Subtle in The Lord; Life & Sci. of Albert Einstein(81)] is Siegel CyberWar denial-of-access(DOA) operations-research queuing theory/pinning/jamming/.../Read [Aikido, Aikibojitsu & Natural-Law(90)]/Aikido(!!!) phase-transition critical-phenomenon via Siegel DIGIT-Physics (Newcomb[Am.J.Math. 4,39(1881)]-{Planck[(1901)]-Einstein[(1905)])-Poincare[Calcul Probabilités(12)-p.313]-Weyl [Goett.Nachr.(14); Math.Ann.77,313 (16)]-{Bose[(24)-Einstein[(25)]-Fermi[(27)]-Dirac[(1927)]}-``Benford''[Proc.Am.Phil.Soc. 78,4,551 (38)]-Kac[Maths.Stat.-Reasoning(55)]-Raimi[Sci.Am. 221,109 (69)...]-Jech[preprint, PSU(95)]-Hill[Proc.AMS 123,3,887(95)]-Browne[NYT(8/98)]-Antonoff-Smith-Siegel[AMS Joint-Mtg.,S.-D.(02)] algebraic-inversion to yield ONLY BOSE-EINSTEIN QUANTUM-statistics (BEQS) with ZERO-digit Bose-Einstein CONDENSATION(BEC) ``INTERSECTION''-BECOME-UNION to Barabasi[PRL 876,5632(01); Rev.Mod.Phys.74,47(02)...] Network /Net/GRAPH(!!!)-physics BEC: Strutt/Rayleigh(1881)-Polya(21)-``Anderson''(58)-Siegel[J.Non-crystalline-Sol.40,453(80)

  16. Distributed Data Management and Distributed File Systems

    CERN Document Server

    Girone, Maria

    2015-01-01

    The LHC program has been successful in part due to the globally distributed computing resources used for collecting, serving, processing, and analyzing the large LHC datasets. The introduction of distributed computing early in the LHC program spawned the development of new technologies and techniques to synchronize information and data between physically separated computing centers. Two of the most challenges services are the distributed file systems and the distributed data management systems. In this paper I will discuss how we have evolved from local site services to more globally independent services in the areas of distributed file systems and data management and how these capabilities may continue to evolve into the future. I will address the design choices, the motivations, and the future evolution of the computing systems used for High Energy Physics.

  17. Loss optimization in distribution networks with distributed generation

    DEFF Research Database (Denmark)

    Pokhrel, Basanta Raj; Nainar, Karthikeyan; Bak-Jensen, Birgitte

    2017-01-01

    This paper presents a novel power loss minimization approach in distribution grids considering network reconfiguration, distributed generation and storage installation. Identification of optimum configuration in such scenario is one of the main challenges faced by distribution system operators...... in highly active distribution grids. This issue is tackled by formulating a hybrid loss optimization problem and solved using the Interior Point Method. Sensitivity analysis is used to identify the optimum location of storage units. Different scenarios of reconfiguration, storage and distributed generation...... penetration are created to test the proposed algorithm. It is tested in a benchmark medium voltage network to show the effectiveness and performance of the algorithm. Results obtained are found to be encouraging for radial distribution system. It shows that we can reduce the power loss by more than 30% using...

  18. The distributional properties of the family of logistic distributions ...

    African Journals Online (AJOL)

    The distributional properties of half logistic distribution and Type I generalized logistic distribution were studied, bringing out the L-moments (up to order four) of each of these. Skewness and Kurtosis were obtained. Keywords: Logistic distribution, L-moments ...

  19. Resummation of transverse momentum distributions in distribution space

    International Nuclear Information System (INIS)

    Ebert, Markus A.; Tackmann, Frank J.

    2016-11-01

    Differential spectra in observables that resolve additional soft or collinear QCD emissions exhibit Sudakov double logarithms in the form of logarithmic plus distributions. Important examples are the total transverse momentum q_T in color-singlet production, N-jettiness (with thrust or beam thrust as special cases), but also jet mass and more complicated jet substructure observables. The all-order logarithmic structure of such distributions is often fully encoded in differential equations, so-called (renormalization group) evolution equations. We introduce a well-defined technique of distributional scale setting, which allows one to treat logarithmic plus distributions like ordinary logarithms when solving these differential equations. In particular, this allows one (through canonical scale choices) to minimize logarithmic contributions in the boundary terms of the solution, and to obtain the full distributional logarithmic structure from the solution's evolution kernel directly in distribution space. We apply this technique to the q_T distribution, where the two-dimensional nature of convolutions leads to additional difficulties (compared to one-dimensional cases like thrust), and for which the resummation in distribution (or momentum) space has been a long-standing open question. For the first time, we show how to perform the RG evolution fully in momentum space, thereby directly resumming the logarithms [ln"n(q"2_T/Q"2)/q"2_T]_+ appearing in the physical q_T distribution. The resummation accuracy is then solely determined by the perturbative expansion of the associated anomalous dimensions.

  20. Distribution view: a tool to write and simulate distributions

    OpenAIRE

    Coelho, José; Branco, Fernando; Oliveira, Teresa

    2006-01-01

    In our work we present a tool to write and simulate distributions. This tool allows to write mathematical expressions which can contain not only functions and variables, but also statistical distributions, including mixtures. Each time the expression is evaluated, for all inner distributions, is generated a value according to the distribution and is used for expression value determination. The inversion method can be used in this language, allowing to generate all distributions...

  1. Handbook of distribution

    International Nuclear Information System (INIS)

    Mo, In Gyu

    1992-01-01

    This book tells of business strategy and distribution innovation, purpose of intelligent distribution, intelligent supply distribution, intelligent production distribution, intelligent sale distribution software for intelligence and future and distribution. It also introduces component technology keeping intelligent distribution such as bar cord, OCR, packing, and intelligent auto-warehouse, system technology, and cases in America, Japan and other countries.

  2. Resummation of transverse momentum distributions in distribution space

    Energy Technology Data Exchange (ETDEWEB)

    Ebert, Markus A.; Tackmann, Frank J. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany). Theory Group

    2016-11-15

    Differential spectra in observables that resolve additional soft or collinear QCD emissions exhibit Sudakov double logarithms in the form of logarithmic plus distributions. Important examples are the total transverse momentum q{sub T} in color-singlet production, N-jettiness (with thrust or beam thrust as special cases), but also jet mass and more complicated jet substructure observables. The all-order logarithmic structure of such distributions is often fully encoded in differential equations, so-called (renormalization group) evolution equations. We introduce a well-defined technique of distributional scale setting, which allows one to treat logarithmic plus distributions like ordinary logarithms when solving these differential equations. In particular, this allows one (through canonical scale choices) to minimize logarithmic contributions in the boundary terms of the solution, and to obtain the full distributional logarithmic structure from the solution's evolution kernel directly in distribution space. We apply this technique to the q{sub T} distribution, where the two-dimensional nature of convolutions leads to additional difficulties (compared to one-dimensional cases like thrust), and for which the resummation in distribution (or momentum) space has been a long-standing open question. For the first time, we show how to perform the RG evolution fully in momentum space, thereby directly resumming the logarithms [ln{sup n}(q{sup 2}{sub T}/Q{sup 2})/q{sup 2}{sub T}]{sub +} appearing in the physical q{sub T} distribution. The resummation accuracy is then solely determined by the perturbative expansion of the associated anomalous dimensions.

  3. Resummation of transverse momentum distributions in distribution space

    Energy Technology Data Exchange (ETDEWEB)

    Ebert, Markus A.; Tackmann, Frank J. [Theory Group, Deutsches Elektronen-Synchrotron (DESY),D-22607 Hamburg (Germany)

    2017-02-22

    Differential spectra in observables that resolve additional soft or collinear QCD emissions exhibit Sudakov double logarithms in the form of logarithmic plus distributions. Important examples are the total transverse momentum q{sub T} in color-singlet production, N-jettiness (with thrust or beam thrust as special cases), but also jet mass and more complicated jet substructure observables. The all-order logarithmic structure of such distributions is often fully encoded in differential equations, so-called (renormalization group) evolution equations. We introduce a well-defined technique of distributional scale setting, which allows one to treat logarithmic plus distributions like ordinary logarithms when solving these differential equations. In particular, this allows one (through canonical scale choices) to minimize logarithmic contributions in the boundary terms of the solution, and to obtain the full distributional logarithmic structure from the solution’s evolution kernel directly in distribution space. We apply this technique to the q{sub T} distribution, where the two-dimensional nature of convolutions leads to additional difficulties (compared to one-dimensional cases like thrust), and for which the resummation in distribution (or momentum) space has been a long-standing open question. For the first time, we show how to perform the RG evolution fully in momentum space, thereby directly resumming the logarithms [ln{sup n} (q{sub T}{sup 2}/Q{sup 2})/q{sub T}{sup 2}]{sub +} appearing in the physical q{sub T} distribution. The resummation accuracy is then solely determined by the perturbative expansion of the associated anomalous dimensions.

  4. Maternal and Paternal Distress and Coping Over Time Following Pediatric Traumatic Brain Injury.

    Science.gov (United States)

    Narad, Megan E; Yeates, Keith O; Taylor, H Gerry; Stancin, Terry; Wade, Shari L

    2017-04-01

    Examine differences in maternal and paternal coping and distress following traumatic brain injury (TBI) and orthopedic injuries (OI). Concurrent cohort/prospective design with five assessments between 1 and an average of 7 years after injury of children aged 3-6 years hospitalized for TBI ( n  = 87) or OI ( n  = 119). Mixed models analyses were used to examine hypotheses. Overall, fathers reported greater depression and general distress than mothers 18 months after injury, but not at long-term follow-up. Active and acceptance coping were unrelated to parental sex, injury factors, or time since injury. A group × rater × time interaction was noted for Denial coping. Following severe TBI, fathers reported greater denial at 18 months, whereas mothers reported greater denial at the long-term follow-up. Denial coping did not differ between mothers and fathers following OI and moderate TBI. Parental response to early TBI is complex and may warrant clinical intervention even years after injury. © The Author 2016. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  5. Integration issues of distributed generation in distribution grids

    NARCIS (Netherlands)

    Coster, E.J.; Myrzik, J.M.A.; Kruimer, B.; Kling, W.L.

    2011-01-01

    In today’s distribution grids the number of distributed generation (DG) units is increasing rapidly. Combined heat and power (CHP) plants and wind turbines are most often installed. Integration of these DG units into the distribution grid leads to planning as well as operational challenges. Based on

  6. Income Distribution Impacts of Irrigation Water Distribution Policy

    Science.gov (United States)

    Sampath, Rajan K.

    1984-06-01

    In the majority of lesser developed countries (LDC's) there is acute inequality in income distribution in the rural sector, particularly between large and small farms on the one hand and between land owners and the landless on the other. Irrigation water distribution policy of the government is both an economic and political problem. It has both equity and efficiency implications. It has effects on both the level and distribution of income. This paper deals with the conditions under which using water redistribution as an effective governmental policy variable can reduce inequality in the distribution of income. This paper also deals with the relationship between the objectives of equity and efficiency in water distribution under different objective realities, such as dualistic versus nondualistic conditions, two-sector versus three-sector modeling, optimum versus equal water distribution, specifically to derive the conditions under which promotion of equity promotes efficiency and vice versa and the conditions under which it does not.

  7. Coulomb correlation effects in YBaCuO system

    Energy Technology Data Exchange (ETDEWEB)

    Costa-Quintana, J; Lopez-Aguilar, F; Munoz, J S; Sanchez, A [Dept. de Fisica, Grupo de Electromagnetismo, Univ. Autonoma de Barcelona (Spain); Balle, S [Dept. de Fisica, Univ. de les Illes Balears, Palma de Mallorca (Spain)

    1989-12-01

    In this work, we apply a mean field potential deduced from the multiband Hubbard hamiltonian in order to obtain the lower and upper strongly correlated bands. We have obtained the total and partial density of states for U{sub d} = 0 and U{sub d} = 4 eV. The results show that the density of states calculated with U{sub d} = 4 eV at E{sub F} is lesser than that obtained with U{sub d} = 0. A small peak above E{sub F} arising from the strong correlated bands appears in the dDOS calculated with U{sub d} = 4 eV and this is in agreement with the experimental data. (orig.).

  8. Psychosomatic disorders of gravida status: false and denied pregnancies.

    Science.gov (United States)

    Kenner, William D; Nicolson, Stephen E

    2015-01-01

    The authors review the literature on two dramatic psychosomatic disorders of reproduction and offer a potential classification of pregnancy denial. Information on false and denied pregnancies is summarized by comparing the descriptions, differential diagnoses, epidemiology, patient characteristics, psychological factors, abdominal tone, and neuroendocrinology. Pregnancy denial's association with neonaticide is reviewed. False and denied pregnancies have fooled women, families, and doctors for centuries as the body obscures her true condition. Improvements in pregnancy testing have decreased reports of false pregnancy. However, recent data suggests 1/475 pregnancies are denied to 20 weeks, and 1/2455 may go undiagnosed to delivery. Factors that may contribute to the unconscious deception include abdominal muscle tone, persistent corpus luteum function, and reduced availability of biogenic amines in false pregnancy, and posture, fetal position, and corpus luteum insufficiency in denied pregnancy. For each condition, there are multiple reports in which the body reveals her true pregnancy status as soon as the woman is convinced of her diagnosis. Forensic literature on denied pregnancy focused on the woman's rejection of motherhood, while psychiatric studies have revealed that trauma and dissociation drive her denial. False pregnancy has firm grounding as a classic psychosomatic disorder. Pregnancy denial's association with neonaticide has led to misleading forensic data, which obscures the central role of trauma and dissociation. A reappraisal of pregnancy denial confirms it as the somatic inverse of false pregnancy. With that perspective, clinicians can help women understand their pregnancy status to avoid unexpected deliveries with tragic outcomes. Copyright © 2015 The Academy of Psychosomatic Medicine. Published by Elsevier Inc. All rights reserved.

  9. Voltage regulation in distribution networks with distributed generation

    Science.gov (United States)

    Blažič, B.; Uljanić, B.; Papič, I.

    2012-11-01

    The paper deals with the topic of voltage regulation in distribution networks with relatively high distributed energy resources (DER) penetration. The problem of voltage rise is described and different options for voltage regulation are given. The influence of DER on voltage profile and the effectiveness of the investigated solutions are evaluated by means of simulation in DIgSILENT. The simulated network is an actual distribution network in Slovenia with a relatively high penetration of distributed generation. Recommendations for voltage control in networks with DER penetration are given at the end.

  10. Distributed generation and distribution market diversity in Europe

    International Nuclear Information System (INIS)

    Lopes Ferreira, H.; Costescu, A.; L'Abbate, A.; Minnebo, P.; Fulli, G.

    2011-01-01

    The unbundling of the electricity power system will play a key role on the deployment of distributed generation (DG) in European distribution systems evolving towards Smart Grids. The present paper firstly reviews the relevant European Union (EU) regulatory framework: specific attention is paid to the concept of unbundling of power distribution sector in Europe. Afterwards, the focus is on the current state of penetration of DG technologies in the EU Member States and the corresponding interrelations with distribution features. A comparison between the unbundling of the distribution and supply markets using econometric indicators such as the Herfindahl-Hirschmann (I HH ) and the Shannon-Wiener (I SW ) indices is then presented. Finally, a comparative analysis between these indices and the current level of penetration of distributed generation in most EU is shown; policy recommendations conclude the paper. - Highlights: →The EU regulatory framework and the concept of unbundling are addressed. →A comparison between the unbundling of the distribution and supply markets is shown. →The Herfindahl-Hirschmann and the Shannon-Wiener econometric indices are applied. →A comparison between the indices and the penetration level of DG in EU is presented. →A comparison between the indices and the penetration level of DG in EU is presented.

  11. The Unsinkable Aircraft Carrier: An American Response to the Chinese Anti-Access/Area Denial (A2/AD) Challenge

    Science.gov (United States)

    2013-04-01

    Graduation Requirements Advisor: Dr. Jeffrey M. Reilly Maxwell Air Force Base, Alabama April 2013 DISTRIBUTION A. Approved for public release... Distribution unlimited Maj. John O. Birkeland CDOS Research Paper CDOS Seminar 1 ii Disclaimer The views expressed on this...Battalion-71 st Artillery to Taiwan with the new Nike -Hercules missile batteries. 121 The idea of an active defense against missiles has been

  12. Distributed terascale volume visualization using distributed shared virtual memory

    KAUST Repository

    Beyer, Johanna

    2011-10-01

    Table 1 illustrates the impact of different distribution unit sizes, different screen resolutions, and numbers of GPU nodes. We use two and four GPUs (NVIDIA Quadro 5000 with 2.5 GB memory) and a mouse cortex EM dataset (see Figure 2) of resolution 21,494 x 25,790 x 1,850 = 955GB. The size of the virtual distribution units significantly influences the data distribution between nodes. Small distribution units result in a high depth complexity for compositing. Large distribution units lead to a low utilization of GPUs, because in the worst case only a single distribution unit will be in view, which is rendered by only a single node. The choice of an optimal distribution unit size depends on three major factors: the output screen resolution, the block cache size on each node, and the number of nodes. Currently, we are working on optimizing the compositing step and network communication between nodes. © 2011 IEEE.

  13. State Electricity Regulatory Policy and Distributed Resources: Distributed Resource Distribution Credit Pilot Programs--Revealing the Value to Consumers and Vendors

    Energy Technology Data Exchange (ETDEWEB)

    Moskovitz, D.; Harrington, C.; Shirley, W.; Cowart, R.; Sedano, R.; Weston, F.

    2002-10-01

    Designing and implementing credit-based pilot programs for distributed resources distribution is a low-cost, low-risk opportunity to find out how these resources can help defer or avoid costly electric power system (utility grid) distribution upgrades. This report describes implementation options for deaveraged distribution credits and distributed resource development zones. Developing workable programs implementing these policies can dramatically increase the deployment of distributed resources in ways that benefit distributed resource vendors, users, and distribution utilities. This report is one in the State Electricity Regulatory Policy and Distributed Resources series developed under contract to NREL (see Annual Technical Status Report of the Regulatory Assistance Project: September 2000-September 2001, NREL/SR-560-32733). Other titles in this series are: (1) Accommodating Distributed Resources in Wholesale Markets, NREL/SR-560-32497; (2) Distributed Resources and Electric System Re liability, NREL/SR-560-32498; (3) Distribution System Cost Methodologies for Distributed Generation, NREL/SR-560-32500; (4) Distribution System Cost Methodologies for Distributed Generation Appendices, NREL/SR-560-32501.

  14. Concentration distribution of trace elements: from normal distribution to Levy flights

    International Nuclear Information System (INIS)

    Kubala-Kukus, A.; Banas, D.; Braziewicz, J.; Majewska, U.; Pajek, M.

    2003-01-01

    The paper discusses a nature of concentration distributions of trace elements in biomedical samples, which were measured by using the X-ray fluorescence techniques (XRF, TXRF). Our earlier observation, that the lognormal distribution well describes the measured concentration distribution is explained here on a more general ground. Particularly, the role of random multiplicative process, which models the concentration distributions of trace elements in biomedical samples, is discussed in detail. It is demonstrated that the lognormal distribution, appearing when the multiplicative process is driven by normal distribution, can be generalized to the so-called log-stable distribution. Such distribution describes the random multiplicative process, which is driven, instead of normal distribution, by more general stable distribution, being known as the Levy flights. The presented ideas are exemplified by the results of the study of trace element concentration distributions in selected biomedical samples, obtained by using the conventional (XRF) and (TXRF) X-ray fluorescence methods. Particularly, the first observation of log-stable concentration distribution of trace elements is reported and discussed here in detail

  15. The Unsinkable Aircraft Carrier - An American Response to the Chinese Anti-Access/Area Denial (A2/AD) Challenge

    Science.gov (United States)

    2013-04-01

    DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16...new Nike -Hercules missile batteries. 121 The idea of an active defense against missiles has been disregarded by some because the necessary... Nike -Hercules) Defends Northern Taiwan 1958-1959.” http://www.2-71adataiwan.com/Member%20Articles/RHM%20Deployment%20Article.htm 122 Martin

  16. Transformation of Bayesian posterior distribution into a basic analytical distribution

    International Nuclear Information System (INIS)

    Jordan Cizelj, R.; Vrbanic, I.

    2002-01-01

    Bayesian estimation is well-known approach that is widely used in Probabilistic Safety Analyses for the estimation of input model reliability parameters, such as component failure rates or probabilities of failure upon demand. In this approach, a prior distribution, which contains some generic knowledge about a parameter is combined with likelihood function, which contains plant-specific data about the parameter. Depending on the type of prior distribution, the resulting posterior distribution can be estimated numerically or analytically. In many instances only a numerical Bayesian integration can be performed. In such a case the posterior is provided in the form of tabular discrete distribution. On the other hand, it is much more convenient to have a parameter's uncertainty distribution that is to be input into a PSA model to be provided in the form of some basic analytical probability distribution, such as lognormal, gamma or beta distribution. One reason is that this enables much more convenient propagation of parameters' uncertainties through the model up to the so-called top events, such as plant system unavailability or core damage frequency. Additionally, software tools used to run PSA models often require that parameter's uncertainty distribution is defined in the form of one among the several allowed basic types of distributions. In such a case the posterior distribution that came as a product of Bayesian estimation needs to be transformed into an appropriate basic analytical form. In this paper, some approaches on transformation of posterior distribution to a basic probability distribution are proposed and discussed. They are illustrated by an example from NPP Krsko PSA model.(author)

  17. Performance of Distributed CFAR Processors in Pearson Distributed Clutter

    Directory of Open Access Journals (Sweden)

    Messali Zoubeida

    2007-01-01

    Full Text Available This paper deals with the distributed constant false alarm rate (CFAR radar detection of targets embedded in heavy-tailed Pearson distributed clutter. In particular, we extend the results obtained for the cell averaging (CA, order statistics (OS, and censored mean level CMLD CFAR processors operating in positive alpha-stable (P&S random variables to more general situations, specifically to the presence of interfering targets and distributed CFAR detectors. The receiver operating characteristics of the greatest of (GO and the smallest of (SO CFAR processors are also determined. The performance characteristics of distributed systems are presented and compared in both homogeneous and in presence of interfering targets. We demonstrate, via simulation results, that the distributed systems when the clutter is modelled as positive alpha-stable distribution offer robustness properties against multiple target situations especially when using the "OR" fusion rule.

  18. Performance of Distributed CFAR Processors in Pearson Distributed Clutter

    Directory of Open Access Journals (Sweden)

    Faouzi Soltani

    2007-01-01

    Full Text Available This paper deals with the distributed constant false alarm rate (CFAR radar detection of targets embedded in heavy-tailed Pearson distributed clutter. In particular, we extend the results obtained for the cell averaging (CA, order statistics (OS, and censored mean level CMLD CFAR processors operating in positive alpha-stable (P&S random variables to more general situations, specifically to the presence of interfering targets and distributed CFAR detectors. The receiver operating characteristics of the greatest of (GO and the smallest of (SO CFAR processors are also determined. The performance characteristics of distributed systems are presented and compared in both homogeneous and in presence of interfering targets. We demonstrate, via simulation results, that the distributed systems when the clutter is modelled as positive alpha-stable distribution offer robustness properties against multiple target situations especially when using the “OR” fusion rule.

  19. Conspiracy Beliefs and Knowledge About HIV Origins Among Adolescents in Soweto, South Africa

    OpenAIRE

    Hogg, Robert; Nkala, Busisiwe; Dietrich, Janan; Collins, Alexandra; Closson, Kalysha; Cui, Zishan; Kanters, Steve; Chia, Jason; Barhafuma, Bernard; Palmer, Alexis; Kaida, Angela; Gray, Glenda; Miller, Cari

    2017-01-01

    Purpose We examined adolescents? knowledge regarding the origin of HIV/AIDS and correlates of beliefs surrounding conspiracy theories in Soweto, South Africa. Now, a decade post-AIDS denialism, South Africa has the largest antiretroviral therapy roll-out worldwide. However, conspiracy theories stemming from past AIDS denialism may impact HIV prevention and treatment efforts. Methods Study participants were recruited through the Kganya Motsha Adolescent Health Centre and the Perinatal HIV Rese...

  20. Cyberspace Human Capital: Building a Cadre Today to Win Tomorrows War

    Science.gov (United States)

    2016-04-28

    U.S. homeland and U.S. vital interests from disruptive or destructive cyber [space] attacks of significant consequence. DoD Strategic Goal #4: Build...and maintain viable cyber [space] options and plan to use those options to control conflict escalation and to shape the conflict environment at all...strategies like cyberspace denial operations, espionage activities and anti-access/area-denial (A2/AD) strategies, turning traditional mass and maneuver

  1. Načini ispoljavanja krize srednjih godina, osećanje smisla života i oblici usklađivanja porodičnih i profesionalnih uloga u Srbiji

    OpenAIRE

    Pavlović, Milica M.

    2015-01-01

    The main objective of this research was to explore the relationship beetwen characteristic manifestations of mid-life crisis, the attained sense of meaning in life, the satisfaction with professional and family roles, and the way people in Serbia balance all of these. More precisely, it examined the connection beetwen denial by escape, denial by overcompensation, decompensation, and creative and successful coping with the crisis, as different aspects of the external manifestati...

  2. Distribution planning with reliability options for distributed generation

    International Nuclear Information System (INIS)

    Trebolle, David; Gomez, Tomas; Cossent, Rafael; Frias, Pablo

    2010-01-01

    The promotion of electricity generation from renewable energy sources (RES) and combined heat and power (CHP) has resulted in increasing penetration levels of distributed generation (DG). However, large-scale connection of DG involves profound changes in the operation and planning of electricity distribution networks. Distribution System Operators (DSOs) play a key role since these agents have to provide flexibility to their networks in order to integrate DG. Article 14.7 of EU Electricity Directive states that DSOs should consider DG as an alternative to new network investments. This is a challenging task, particularly under the current regulatory framework where DSOs must be legally and functionally unbundled from other activities in the electricity sector. This paper proposes a market mechanism, referred to as reliability options for distributed generation (RODG), which provides DSOs with an alternative to the investment in new distribution facilities. The mechanism proposed allocates the firm capacity required to DG embedded in the distribution network through a competitive auction. Additionally, RODG make DG partly responsible for reliability and provide DG with incentives for a more efficient operation taking into account the network conditions. (author)

  3. Distribution planning with reliability options for distributed generation

    Energy Technology Data Exchange (ETDEWEB)

    Trebolle, David [Union Fenosa Distribucion, C/Antonio Lopez, 19, 28026 Madrid (Spain); Gomez, Tomas; Cossent, Rafael; Frias, Pablo [Instituto de Investigacion Tecnologica, Escuela Tecnica Superior de Ingenieria, Universidad Pontificia Comillas, C/Quintana 21, 28008 Madrid (Spain)

    2010-02-15

    The promotion of electricity generation from renewable energy sources (RES) and combined heat and power (CHP) has resulted in increasing penetration levels of distributed generation (DG). However, large-scale connection of DG involves profound changes in the operation and planning of electricity distribution networks. Distribution System Operators (DSOs) play a key role since these agents have to provide flexibility to their networks in order to integrate DG. Article 14.7 of EU Electricity Directive states that DSOs should consider DG as an alternative to new network investments. This is a challenging task, particularly under the current regulatory framework where DSOs must be legally and functionally unbundled from other activities in the electricity sector. This paper proposes a market mechanism, referred to as reliability options for distributed generation (RODG), which provides DSOs with an alternative to the investment in new distribution facilities. The mechanism proposed allocates the firm capacity required to DG embedded in the distribution network through a competitive auction. Additionally, RODG make DG partly responsible for reliability and provide DG with incentives for a more efficient operation taking into account the network conditions. (author)

  4. Unifying distribution functions: some lesser known distributions.

    Science.gov (United States)

    Moya-Cessa, J R; Moya-Cessa, H; Berriel-Valdos, L R; Aguilar-Loreto, O; Barberis-Blostein, P

    2008-08-01

    We show that there is a way to unify distribution functions that describe simultaneously a classical signal in space and (spatial) frequency and position and momentum for a quantum system. Probably the most well known of them is the Wigner distribution function. We show how to unify functions of the Cohen class, Rihaczek's complex energy function, and Husimi and Glauber-Sudarshan distribution functions. We do this by showing how they may be obtained from ordered forms of creation and annihilation operators and by obtaining them in terms of expectation values in different eigenbases.

  5. 77 FR 75636 - Baldev Raj Bhutani; Denial of Hearing on Application for Special Termination of Debarment

    Science.gov (United States)

    2012-12-21

    ... information and analyses sufficient to create a basis for a hearing concerning this action. DATES: This order... his company's manufacture and distribution of the drug products LACTULOSE Syrup and K + 10. According...

  6. Probability distribution relationships

    Directory of Open Access Journals (Sweden)

    Yousry Abdelkader

    2013-05-01

    Full Text Available In this paper, we are interesting to show the most famous distributions and their relations to the other distributions in collected diagrams. Four diagrams are sketched as networks. The first one is concerned to the continuous distributions and their relations. The second one presents the discrete distributions. The third diagram is depicted the famous limiting distributions. Finally, the Balakrishnan skew-normal density and its relationship with the other distributions are shown in the fourth diagram.

  7. COVAL, Compound Probability Distribution for Function of Probability Distribution

    International Nuclear Information System (INIS)

    Astolfi, M.; Elbaz, J.

    1979-01-01

    1 - Nature of the physical problem solved: Computation of the probability distribution of a function of variables, given the probability distribution of the variables themselves. 'COVAL' has been applied to reliability analysis of a structure subject to random loads. 2 - Method of solution: Numerical transformation of probability distributions

  8. DNSSEC and Its Potential for DDoS Attacks - A Comprehensive Measurement Study

    NARCIS (Netherlands)

    van Rijswijk, Roland M.; Sperotto, Anna; Pras, Aiko

    2014-01-01

    Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the DNS that relies on digital signatures. DNSSEC strengthens DNS by preventing attacks such as cache poisoning. However, a common argument against the deployment of DNSSEC is its potential for abuse in

  9. Danger of Prolific Cybercrime and Network DDOS from Unprotected IoT Devices

    Science.gov (United States)

    internet, the internet of things pumping all of the big data, all of the, enable all types of the security framework that you can use the big data, leveraging the AI based approach, fully leveraging that vulnerability detection like the use case we mentioned earlier or to protect the whole traffic and network so

  10. An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

    OpenAIRE

    Feng Tao; Zhao Ming-Tao

    2017-01-01

    Tor (The Second Onion Router) is modified by the first generation onion router and known as the most prevalent anonymous communication system. According to the advantage of low latency, high confidentiality of transmission content, high security of communication channels and et al., Tor is widely used in anonymous Web browsing, instant message and so on. However, the vulnerability and blemish of Tor affect system security. An identity and Signcryption-based concurrent signature scheme was use...

  11. Predictable return distributions

    DEFF Research Database (Denmark)

    Pedersen, Thomas Quistgaard

    trace out the entire distribution. A univariate quantile regression model is used to examine stock and bond return distributions individually, while a multivariate model is used to capture their joint distribution. An empirical analysis on US data shows that certain parts of the return distributions......-of-sample analyses show that the relative accuracy of the state variables in predicting future returns varies across the distribution. A portfolio study shows that an investor with power utility can obtain economic gains by applying the empirical return distribution in portfolio decisions instead of imposing...

  12. Confirming and denying in co-construction processes: a case study of an adult with cerebral palsy and two familiar partners.

    Science.gov (United States)

    Hörmeyer, Ina; Renner, Gregor

    2013-09-01

    For individuals with complex communication needs, one of the most frequent communicative strategies is the co-construction of meaning with familiar partners. This preliminary single-case study gives insight into a special sequential pattern of co-construction processes - the search sequence - particularly in relation to the processes of confirming and denying meanings proposed by familiar interaction partners. Five different conversations between an adult with cerebral palsy and complex communication needs and two familiar co-participants were videotaped and analyzed using the methodology of conversation analysis (CA). The study revealed that confirmations and denials are not simply two alternative actions, but that several possibilities to realize confirmations and denials exist that differ in their frequency and that have different consequences for the sequential context. This study of confirmations and denials demonstrates that co-construction processes are more complex than have previously been documented.

  13. Color-blind racial ideology: theory, training, and measurement implications in psychology.

    Science.gov (United States)

    Neville, Helen A; Awad, Germine H; Brooks, James E; Flores, Michelle P; Bluemel, Jamie

    2013-09-01

    Synthesizing the interdisciplinary literature, we characterize color-blind racial ideology (CBRI) as consisting of two interrelated domains: color-evasion (i.e., denial of racial differences by emphasizing sameness) and power-evasion (i.e., denial of racism by emphasizing equal opportunities). Mounting empirical data suggest that the color-evasion dimension is ineffective and in fact promotes interracial tension and potential inequality. CBRI may be conceived as an ultramodern or contemporary form of racism and a legitimizing ideology used to justify the racial status quo. Four types of CBRI are described: denial of (a) race, (b) blatant racial issues, (c) institutional racism, and (d) White privilege. We discuss empirical findings suggesting a relationship between CBRI and increased racial prejudice, racial anger, and racial fear. Implications for education, training, and research are provided. © 2013 APA, all rights reserved.

  14. Advanced Distribution Network Modelling with Distributed Energy Resources

    Science.gov (United States)

    O'Connell, Alison

    The addition of new distributed energy resources, such as electric vehicles, photovoltaics, and storage, to low voltage distribution networks means that these networks will undergo major changes in the future. Traditionally, distribution systems would have been a passive part of the wider power system, delivering electricity to the customer and not needing much control or management. However, the introduction of these new technologies may cause unforeseen issues for distribution networks, due to the fact that they were not considered when the networks were originally designed. This thesis examines different types of technologies that may begin to emerge on distribution systems, as well as the resulting challenges that they may impose. Three-phase models of distribution networks are developed and subsequently utilised as test cases. Various management strategies are devised for the purposes of controlling distributed resources from a distribution network perspective. The aim of the management strategies is to mitigate those issues that distributed resources may cause, while also keeping customers' preferences in mind. A rolling optimisation formulation is proposed as an operational tool which can manage distributed resources, while also accounting for the uncertainties that these resources may present. Network sensitivities for a particular feeder are extracted from a three-phase load flow methodology and incorporated into an optimisation. Electric vehicles are the focus of the work, although the method could be applied to other types of resources. The aim is to minimise the cost of electric vehicle charging over a 24-hour time horizon by controlling the charge rates and timings of the vehicles. The results demonstrate the advantage that controlled EV charging can have over an uncontrolled case, as well as the benefits provided by the rolling formulation and updated inputs in terms of cost and energy delivered to customers. Building upon the rolling optimisation, a

  15. Soil nuclide distribution coefficients and their statistical distributions

    International Nuclear Information System (INIS)

    Sheppard, M.I.; Beals, D.I.; Thibault, D.H.; O'Connor, P.

    1984-12-01

    Environmental assessments of the disposal of nuclear fuel waste in plutonic rock formations require analysis of the migration of nuclides from the disposal vault to the biosphere. Analyses of nuclide migration via groundwater through the disposal vault, the buffer and backfill, the plutonic rock, and the consolidated and unconsolidated overburden use models requiring distribution coefficients (Ksub(d)) to describe the interaction of the nuclides with the geological and man-made materials. This report presents element-specific soil distribution coefficients and their statistical distributions, based on a detailed survey of the literature. Radioactive elements considered were actinium, americium, bismuth, calcium, carbon, cerium, cesium, iodine, lead, molybdenum, neptunium, nickel, niobium, palladium, plutonium, polonium, protactinium, radium, samarium, selenium, silver, strontium, technetium, terbium, thorium, tin, uranium and zirconium. Stable elements considered were antimony, boron, cadmium, tellurium and zinc. Where sufficient data were available, distribution coefficients and their distributions are given for sand, silt, clay and organic soils. Our values are recommended for use in assessments for the Canadian Nuclear Fuel Waste Management Program

  16. State Electricity Regulatory Policy and Distributed Resources: Distributed Resources and Electric System Reliability

    Energy Technology Data Exchange (ETDEWEB)

    Cowart, R.; Harrington, C.; Moskovitz, D.; Shirley, W.; Weston, F.; Sedano, R.

    2002-10-01

    Designing and implementing credit-based pilot programs for distributed resources distribution is a low-cost, low-risk opportunity to find out how these resources can help defer or avoid costly electric power system (utility grid) distribution upgrades. This report describes implementation options for deaveraged distribution credits and distributed resource development zones. Developing workable programs implementing these policies can dramatically increase the deployment of distributed resources in ways that benefit distributed resource vendors, users, and distribution utilities. This report is one in the State Electricity Regulatory Policy and Distributed Resources series developed under contract to NREL (see Annual Technical Status Report of the Regulatory Assistance Project: September 2000-September 2001, NREL/SR-560-32733). Other titles in this series are: (1) Accommodating Distributed Resources in Wholesale Markets, NREL/SR-560-32497; (2) Distributed Resources and Electric System Re liability, NREL/SR-560-32498; (3) Distribution System Cost Methodologies for Distributed Generation, NREL/SR-560-32500; (4) Distribution System Cost Methodologies for Distributed Generation Appendices, NREL/SR-560-32501.

  17. Dyadic distributions

    International Nuclear Information System (INIS)

    Golubov, B I

    2007-01-01

    On the basis of the concept of pointwise dyadic derivative dyadic distributions are introduced as continuous linear functionals on the linear space D d (R + ) of infinitely differentiable functions compactly supported by the positive half-axis R + together with all dyadic derivatives. The completeness of the space D' d (R + ) of dyadic distributions is established. It is shown that a locally integrable function on R + generates a dyadic distribution. In addition, the space S d (R + ) of infinitely dyadically differentiable functions on R + rapidly decreasing in the neighbourhood of +∞ is defined. The space S' d (R + ) of dyadic distributions of slow growth is introduced as the space of continuous linear functionals on S d (R + ). The completeness of the space S' d (R + ) is established; it is proved that each integrable function on R + with polynomial growth at +∞ generates a dyadic distribution of slow growth. Bibliography: 25 titles.

  18. The exponential age distribution and the Pareto firm size distribution

    OpenAIRE

    Coad, Alex

    2008-01-01

    Recent work drawing on data for large and small firms has shown a Pareto distribution of firm size. We mix a Gibrat-type growth process among incumbents with an exponential distribution of firm’s age, to obtain the empirical Pareto distribution.

  19. Detailed Debunking of Denial

    Science.gov (United States)

    Enting, I. G.; Abraham, J. P.

    2012-12-01

    The disinformation campaign against climate science has been compared to a guerilla war whose tactics undermine the traditional checks and balances of science. One comprehensive approach has to been produce archives of generic responses such as the websites of RealClimate and SkepticalScience. We review our experiences with an alternative approach of detailed responses to a small number of high profile cases. Our particular examples were Professor Ian Plimer and Christopher Monckton, the Third Viscount Monckton of Brenchley, each of whom has been taken seriously by political leaders in our respective countries. We relate our experiences to comparable examples such as John Mashey's analysis of the Wegman report and the formal complaints about Lomborg's "Skeptical Environmentalist" and Durkin's "Great Global Warming Swindle". Our two approaches used contrasting approaches: an on-line video of a lecture vs an evolving compendium of misrepresentations. Additionally our approaches differed in the emphasis. The analysis of Monckton concentrated on the misrepresentation of the science, while the analysis of Plimer concentrated on departures from accepted scientific practice: fabrication of data, misrepresentation of cited sources and unattributed use of the work of others. Benefits of an evolving compendium were the ability to incorporate contributions from members of the public who had identified additional errors and the scope for addressing new aspects as they came to public attention. `Detailed debunking' gives non-specialists a reference point for distinguishing non-science when engaging in public debate.

  20. Distributing Knight. Using Type-Based Publish/Subscribe for Building Distributed Collaboration Tools

    DEFF Research Database (Denmark)

    Damm, Christian Heide; Hansen, Klaus Marius

    2002-01-01

    more important. We present Distributed Knight, an extension to the Knight tool, for distributed, collaborative, and gesture-based object-oriented modelling. Distributed Knight was built using the type-based publish/subscribe paradigm. Based on this case, we argue that type-based publish......Distributed applications are hard to understand, build, and evolve. The need for decoupling, flexibility, and heterogeneity in distributed collaboration tools present particular problems; for such applications, having the right abstractions and primitives for distributed communication becomes even....../subscribe provides a natural and effective abstraction for developing distributed collaboration tools....

  1. Extended Poisson Exponential Distribution

    Directory of Open Access Journals (Sweden)

    Anum Fatima

    2015-09-01

    Full Text Available A new mixture of Modified Exponential (ME and Poisson distribution has been introduced in this paper. Taking the Maximum of Modified Exponential random variable when the sample size follows a zero truncated Poisson distribution we have derived the new distribution, named as Extended Poisson Exponential distribution. This distribution possesses increasing and decreasing failure rates. The Poisson-Exponential, Modified Exponential and Exponential distributions are special cases of this distribution. We have also investigated some mathematical properties of the distribution along with Information entropies and Order statistics of the distribution. The estimation of parameters has been obtained using the Maximum Likelihood Estimation procedure. Finally we have illustrated a real data application of our distribution.

  2. Weighted Lomax distribution.

    Science.gov (United States)

    Kilany, N M

    2016-01-01

    The Lomax distribution (Pareto Type-II) is widely applicable in reliability and life testing problems in engineering as well as in survival analysis as an alternative distribution. In this paper, Weighted Lomax distribution is proposed and studied. The density function and its behavior, moments, hazard and survival functions, mean residual life and reversed failure rate, extreme values distributions and order statistics are derived and studied. The parameters of this distribution are estimated by the method of moments and the maximum likelihood estimation method and the observed information matrix is derived. Moreover, simulation schemes are derived. Finally, an application of the model to a real data set is presented and compared with some other well-known distributions.

  3. Poisson distribution

    NARCIS (Netherlands)

    Hallin, M.; Piegorsch, W.; El Shaarawi, A.

    2012-01-01

    The random variable X taking values 0,1,2,…,x,… with probabilities pλ(x) = e−λλx/x!, where λ∈R0+ is called a Poisson variable, and its distribution a Poisson distribution, with parameter λ. The Poisson distribution with parameter λ can be obtained as the limit, as n → ∞ and p → 0 in such a way that

  4. Extreme value distributions

    CERN Document Server

    Ahsanullah, Mohammad

    2016-01-01

    The aim of the book is to give a through account of the basic theory of extreme value distributions. The book cover a wide range of materials available to date. The central ideas and results of extreme value distributions are presented. The book rwill be useful o applied statisticians as well statisticians interrested to work in the area of extreme value distributions.vmonograph presents the central ideas and results of extreme value distributions.The monograph gives self-contained of theory and applications of extreme value distributions.

  5. Distributed plot-making

    DEFF Research Database (Denmark)

    Jensen, Lotte Groth; Bossen, Claus

    2016-01-01

    different socio-technical systems (paper-based and electronic patient records). Drawing on the theory of distributed cognition and narrative theory, primarily inspired by the work done within health care by Cheryl Mattingly, we propose that the creation of overview may be conceptualised as ‘distributed plot......-making’. Distributed cognition focuses on the role of artefacts, humans and their interaction in information processing, while narrative theory focuses on how humans create narratives through the plot construction. Hence, the concept of distributed plot-making highlights the distribution of information processing...

  6. Distributed coordination of energy storage with distributed generators

    NARCIS (Netherlands)

    Yang, Tao; Wu, Di; Stoorvogel, Antonie Arij; Stoustrup, Jakob

    2016-01-01

    With a growing emphasis on energy efficiency and system flexibility, a great effort has been made recently in developing distributed energy resources (DER), including distributed generators and energy storage systems. This paper first formulates an optimal DER coordination problem considering

  7. Distributed optimal coordination for distributed energy resources in power systems

    DEFF Research Database (Denmark)

    Wu, Di; Yang, Tao; Stoorvogel, A.

    2017-01-01

    Driven by smart grid technologies, distributed energy resources (DERs) have been rapidly developing in recent years for improving reliability and efficiency of distribution systems. Emerging DERs require effective and efficient coordination in order to reap their potential benefits. In this paper......, we consider an optimal DER coordination problem over multiple time periods subject to constraints at both system and device levels. Fully distributed algorithms are proposed to dynamically and automatically coordinate distributed generators with multiple/single storages. With the proposed algorithms...

  8. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  9. [Refusal of application to care in Alzheimer's disease and related diseases: establishment of a mobile unit hospital extra].

    Science.gov (United States)

    Collignon, Julien; Rouch, Isabelle; Gonthier, Régis; Corbin-Seguin, Aude; Combe, Lorraine; Trombert-Paviot, Béatrice; Laurent, Bernard; Girtanner, Chantal

    2013-03-01

    Refusal of care and support in these patients with Alzheimer's disease and related illnesses at home is a cause of accelerated loss of autonomy and increases the risk of a crisis with early institutionalization. Factors contributing to the denial of care are poorly understood and very few epidemiological data exist. we compared age, diagnosis, level of severity of the disease, the type of behavioral, family status of 101 patients living in denial of care and support as seen by a mobile home (group UPEPc) to 136 control patients seen at the memory clinic (group CM). Patients living in denial of care appear to significantly low age [82/80.5, prefusing home care is specific and it is important to educate GPs conditions that favor an obstacle to medicalization. The advantage of a mobile extramural to analyze risk factors for refusal of care and propose alternatives should be further investigated.

  10. Reactor power distribution monitor

    International Nuclear Information System (INIS)

    Hoizumi, Atsushi.

    1986-01-01

    Purpose: To grasp the margin for the limit value of the power distribution peaking factor inside the reactor under operation by using the reactor power distribution monitor. Constitution: The monitor is composed of the 'constant' file, (to store in-reactor power distributions obtained from analysis), TIP and thermocouple, lateral output distribution calibrating apparatus, axial output distribution synthesizer and peaking factor synthesizer. The lateral output distribution calibrating apparatus is used to make calibration by comparing the power distribution obtained from the thermocouples to the power distribution obtained from the TIP, and then to provide the power distribution lateral peaking factors. The axial output distribution synthesizer provides the power distribution axial peaking factors in accordance with the signals from the out-pile neutron flux detector. These axial and lateral power peaking factors are synthesized with high precision in the three-dimensional format and can be monitored at any time. (Kamimura, M.)

  11. An exponential distribution

    International Nuclear Information System (INIS)

    Anon

    2009-01-01

    In this presentation author deals with the probabilistic evaluation of product life on the example of the exponential distribution. The exponential distribution is special one-parametric case of the weibull distribution.

  12. Geographic wormhole detection in wireless sensor networks.

    Directory of Open Access Journals (Sweden)

    Mehdi Sookhak

    Full Text Available Wireless sensor networks (WSNs are ubiquitous and pervasive, and therefore; highly susceptible to a number of security attacks. Denial of Service (DoS attack is considered the most dominant and a major threat to WSNs. Moreover, the wormhole attack represents one of the potential forms of the Denial of Service (DoS attack. Besides, crafting the wormhole attack is comparatively simple; though, its detection is nontrivial. On the contrary, the extant wormhole defense methods need both specialized hardware and strong assumptions to defend against static and dynamic wormhole attack. The ensuing paper introduces a novel scheme to detect wormhole attacks in a geographic routing protocol (DWGRP. The main contribution of this paper is to detect malicious nodes and select the best and the most reliable neighbors based on pairwise key pre-distribution technique and the beacon packet. Moreover, this novel technique is not subject to any specific assumption, requirement, or specialized hardware, such as a precise synchronized clock. The proposed detection method is validated by comparisons with several related techniques in the literature, such as Received Signal Strength (RSS, Authentication of Nodes Scheme (ANS, Wormhole Detection uses Hound Packet (WHOP, and Wormhole Detection with Neighborhood Information (WDI using the NS-2 simulator. The analysis of the simulations shows promising results with low False Detection Rate (FDR in the geographic routing protocols.

  13. Taxonomy for Evaluation of Distributed Control Strategies for Distributed Energy Resources

    DEFF Research Database (Denmark)

    Han, Xue; Heussen, Kai; Gehrke, Oliver

    2017-01-01

    Distributed control strategies applied to power distribution control problems are meant to offer robust and scalable integration of distributed energy resources (DER). However, the term “distributed control” is often loosely applied to a variety of very different control strategies. In particular....... For such comparison, a classification is required that is consistent across the different aspects mentioned above. This paper develops systematic categories of control strategies that accounts for communication, control and physical distribution aspects of the problem, and provides a set of criteria that can...

  14. Distribution effects of electricity tax illustrated by different distribution concepts

    International Nuclear Information System (INIS)

    Halvorsen, Bente; Larsen, Bodil M.; Nesbakken, Runa

    2001-01-01

    This study demonstrates the significance of the choice of distribution concepts in analyses of distribution effects of electricity tax. By distribution effects are meant that life circumstances are changing. The focus is on different income concepts. Income is an important element in the life circumstances of the households. The distribution effects are studied by focusing on general income before and after tax, pension able earnings before and after tax and total consumption expenditure. The authors study how increased electricity expenses caused by a proportional increase of the electricity tax affect the households in various income groups. It is found that the burden of such an increased tax, measured by the budget part set aside for electricity, decreases with income no matter what distribution concept is used. By calculating measures of inequality for income minus electricity tax before and after the tax increase, it is found that the measures of inequality significantly depend on the choice of distribution concept

  15. Performance of Distributed CFAR Processors in Pearson Distributed Clutter

    OpenAIRE

    Messali Zoubeida; Soltani Faouzi

    2007-01-01

    This paper deals with the distributed constant false alarm rate (CFAR) radar detection of targets embedded in heavy-tailed Pearson distributed clutter. In particular, we extend the results obtained for the cell averaging (CA), order statistics (OS), and censored mean level CMLD CFAR processors operating in positive alpha-stable (P&S) random variables to more general situations, specifically to the presence of interfering targets and distributed CFAR detectors. The receiver operating ...

  16. Fitting statistical distributions the generalized lambda distribution and generalized bootstrap methods

    CERN Document Server

    Karian, Zaven A

    2000-01-01

    Throughout the physical and social sciences, researchers face the challenge of fitting statistical distributions to their data. Although the study of statistical modelling has made great strides in recent years, the number and variety of distributions to choose from-all with their own formulas, tables, diagrams, and general properties-continue to create problems. For a specific application, which of the dozens of distributions should one use? What if none of them fit well?Fitting Statistical Distributions helps answer those questions. Focusing on techniques used successfully across many fields, the authors present all of the relevant results related to the Generalized Lambda Distribution (GLD), the Generalized Bootstrap (GB), and Monte Carlo simulation (MC). They provide the tables, algorithms, and computer programs needed for fitting continuous probability distributions to data in a wide variety of circumstances-covering bivariate as well as univariate distributions, and including situations where moments do...

  17. Protection of Distribution Systems with Distributed Energy Resources

    DEFF Research Database (Denmark)

    Bak-Jensen, Birgitte; Browne, Matthew; Calone, Roberto

    of 17 months of work of the Joint Working Group B5/C6.26/CIRED “Protection of Distribution Systems with Distributed Energy Resources”. The working group used the CIGRE report TB421 “The impact of Renewable Energy Sources and Distributed Generation on Substation Protection and Automation”, published...... by WG B5.34 as the entry document for the work on this report. In doing so, the group aligned the content and the scope of this report, the network structures considered, possible islanding, standardized communication and adaptive protection, interface protection, connection schemes and protection...... are listed (chapter 3). The first main part of the report starts with a summary of the backgrounds on DER and current practices in protection at the distribution level (chapter 4). This chapter contains an analysis of CIGRE TB421, protection relevant characteristics of DER, a review of current practices...

  18. Islanding Operation of Distribution System with Distributed Generations

    DEFF Research Database (Denmark)

    Mahat, Pukar; Chen, Zhe; Bak-Jensen, Birgitte

    2010-01-01

    The growing interest in distributed generations (DGs) due to environmental concern and various other reasons have resulted in significant penetration of DGs in many distribution system worldwide. DGs come with many benefits. One of the benefits is improved reliability by supplying load during power...

  19. Distributed generation and distribution market diversity in Europe

    NARCIS (Netherlands)

    Lopes Ferreira, H.M.; Costescu, A; L'Abbate, A.; Minnebo, P.; Fulli, G.

    2011-01-01

    The unbundling of the electricity power system will play a key role on the deployment of distributed generation (DG) in European distribution systems evolving towards Smart Grids. The present paper firstly reviews the relevant European Union (EU) regulatory framework: specific attention is paid to

  20. Loss Allocation in a Distribution System with Distributed Generation Units

    DEFF Research Database (Denmark)

    Lund, Torsten; Nielsen, Arne Hejde; Sørensen, Poul Ejnar

    2007-01-01

    In Denmark, a large part of the electricity is produced by wind turbines and combined heat and power plants (CHPs). Most of them are connected to the network through distribution systems. This paper presents a new algorithm for allocation of the losses in a distribution system with distributed...... generation. The algorithm is based on a reduced impedance matrix of the network and current injections from loads and production units. With the algorithm, the effect of the covariance between production and consumption can be evaluated. To verify the theoretical results, a model of the distribution system...

  1. Multivariate Matrix-Exponential Distributions

    DEFF Research Database (Denmark)

    Bladt, Mogens; Nielsen, Bo Friis

    2010-01-01

    be written as linear combinations of the elements in the exponential of a matrix. For this reason we shall refer to multivariate distributions with rational Laplace transform as multivariate matrix-exponential distributions (MVME). The marginal distributions of an MVME are univariate matrix......-exponential distributions. We prove a characterization that states that a distribution is an MVME distribution if and only if all non-negative, non-null linear combinations of the coordinates have a univariate matrix-exponential distribution. This theorem is analog to a well-known characterization theorem...

  2. Impact of distributed generation on distribution investment deferral

    International Nuclear Information System (INIS)

    Mendez, V.H.; Rivier, J.; Fuente, J.I. de la; Gomez, T.; Arceluz, J.; Marin, J.; Madurga, A.

    2006-01-01

    The amount of distributed generation (DG) is increasing worldwide, and it is foreseen that in the future it will play an important role in electrical energy systems. DG is located in distribution networks close to consumers or even in the consumers' side of the meter. Therefore, the net demand to be supplied through transmission and distribution networks may decrease, allowing to postpone reinforcement of existing networks. This paper proposes a method to assess the impact of DG on distribution networks investment deferral in the long-term. Due to the randomness of the variables that have an impact on such matter (load demand patterns, DG hourly energy production, DG availability, etc.), a probabilistic approach using a Monte Carlo simulation is adopted. Several scenarios characterized by different DG penetration and concentration levels, and DG technology mixes, are analyzed. Results show that, once initial network reinforcements for DG connection have been accomplished, in the medium and long-term DG can defer feeder and/or transformer reinforcements. (author)

  3. Smart Distribution Systems

    Directory of Open Access Journals (Sweden)

    Yazhou Jiang

    2016-04-01

    Full Text Available The increasing importance of system reliability and resilience is changing the way distribution systems are planned and operated. To achieve a distribution system self-healing against power outages, emerging technologies and devices, such as remote-controlled switches (RCSs and smart meters, are being deployed. The higher level of automation is transforming traditional distribution systems into the smart distribution systems (SDSs of the future. The availability of data and remote control capability in SDSs provides distribution operators with an opportunity to optimize system operation and control. In this paper, the development of SDSs and resulting benefits of enhanced system capabilities are discussed. A comprehensive survey is conducted on the state-of-the-art applications of RCSs and smart meters in SDSs. Specifically, a new method, called Temporal Causal Diagram (TCD, is used to incorporate outage notifications from smart meters for enhanced outage management. To fully utilize the fast operation of RCSs, the spanning tree search algorithm is used to develop service restoration strategies. Optimal placement of RCSs and the resulting enhancement of system reliability are discussed. Distribution system resilience with respect to extreme events is presented. Test cases are used to demonstrate the benefit of SDSs. Active management of distributed generators (DGs is introduced. Future research in a smart distribution environment is proposed.

  4. Spatial distribution

    DEFF Research Database (Denmark)

    Borregaard, Michael Krabbe; Hendrichsen, Ditte Katrine; Nachman, Gøsta Støger

    2008-01-01

    , depending on the nature of intraspecific interactions between them: while the individuals of some species repel each other and partition the available area, others form groups of varying size, determined by the fitness of each group member. The spatial distribution pattern of individuals again strongly......Living organisms are distributed over the entire surface of the planet. The distribution of the individuals of each species is not random; on the contrary, they are strongly dependent on the biology and ecology of the species, and vary over different spatial scale. The structure of whole...... populations reflects the location and fragmentation pattern of the habitat types preferred by the species, and the complex dynamics of migration, colonization, and population growth taking place over the landscape. Within these, individuals are distributed among each other in regular or clumped patterns...

  5. Definition of Distribution Network Tariffs Considering Distribution Generation and Demand Response

    DEFF Research Database (Denmark)

    Soares, Tiago; Faria, Pedro; Vale, Zita

    2014-01-01

    The use of distribution networks in the current scenario of high penetration of Distributed Generation (DG) is a problem of great importance. In the competitive environment of electricity markets and smart grids, Demand Response (DR) is also gaining notable impact with several benefits for the wh......The use of distribution networks in the current scenario of high penetration of Distributed Generation (DG) is a problem of great importance. In the competitive environment of electricity markets and smart grids, Demand Response (DR) is also gaining notable impact with several benefits...... the determination of topological distribution factors, and consequent application of the MW-mile method. The application of the proposed tariffs definition methodology is illustrated in a distribution network with 33 buses, 66 DG units, and 32 consumers with DR capacity...

  6. A Simple Adaptive Overcurrent Protection of Distribution Systems With Distributed Generation

    DEFF Research Database (Denmark)

    Mahat, Pukar; Chen, Zhe; Bak-Jensen, Birgitte

    2011-01-01

    current when the system is connected to the grid and when it is islanded. This paper proposes the use of adaptive protection, using local information, to overcome the challenges of the overcurrent protection in distribution systems with distributed generation. The trip characteristics of the relays...... are updated by detecting operating states (grid connected or island) and the faulted section. The paper also proposes faulted section detection using the time over-current characteristics of the protective relays. Simulation results show that the operating state and faulted section can be correctly identified......A significant increase in the penetration of distributed generation has resulted in a possibility of operating distribution systems with distributed generation in islanded mode. However, over-current protection of an islanded distribution system is still an issue due to the difference in fault...

  7. The Impact of Distributed Generation on Distribution Networks ...

    African Journals Online (AJOL)

    Their advantages are the ability to reduce or postpone the need for investment in the transmission and distribution infrastructure when optimally located; the ability to reduce technical losses within the transmission and distribution networks as well as general improvement in power quality and system reliability. This paper ...

  8. Beyond denial and exclusion: The history of relations between Christians and Muslims in the Cape Colony during the 17th–18th centuries with lessons for a post-colonial theology of religions

    Directory of Open Access Journals (Sweden)

    Jaco Beyers

    2016-04-01

    Full Text Available Learning from the past prepares one for being able to cope with the future. History is made up of strings of relationships. This article follows a historical line from colonialism, through apartheid to post-colonialism in order to illustrate inter-religious relations in South-Africa and how each context determines these relations. Social cohesion is enhanced by a post-colonial theology of religions based on the current context. By describing the relationship between Christians and Muslims during the 17th–18th centuries in the Cape Colony, lessons can be deduced to guide inter-religious relations in a post-colonial era in South Africa. One of the most prominent Muslim leaders during the 17th century in the Cape Colony was Sheik Yusuf al-Makassari. His influence determined the future face of Islam in the Cape Colony and here, during the 18th century, ethics started playing a crucial role in determining the relationship between Christians and Muslims. The ethical guidance of the Imams formed the Muslim communities whilst ethical decline was apparent amongst the Christian colonists during the same period. The place of ethics as determinative of future inter-religious dialogue is emphasised. Denial and exclusion characterised relationships between Christians and Muslims. According to a post-colonial understanding of inter-religious contact the equality and dignity of non-Christian religions are to be acknowledged. In the postcolonial and postapartheid struggle for equality, also of religions, prof Graham Duncan, to whom this article is dedicated, contributed to the process of acknowledging the plurality of the religious reality in South Africa.

  9. On immorality of terrorism and war

    OpenAIRE

    Čičovački Predrag

    2003-01-01

    The author first analyzes differences and similarities between war and terrorism and then argues that both are deeply immoral. Their differences are far less significant that their similarities, the main one of which consists in the denial of the view that every human life is equally worthy. This denial opens a way for an inhuman and violent treatment of those (enemies, others) who are not as valuable as we are, which characterizes both terrorism and war. Besides having such unacceptable mora...

  10. Fault tolerance improvement for queuing systems under stress load

    International Nuclear Information System (INIS)

    Nikonov, Eh.G.; Florko, A.B.

    2009-01-01

    Various kinds of queuing information systems (exchange auctions systems, web servers, SCADA) are faced to unpredictable situations during operation, when information flow that requires being analyzed and processed rises extremely. Such stress load situations often require human (dispatcher's or administrator's) intervention that is the reason why the time of the first denial of service is extremely important. Common queuing systems architecture is described. Existing approaches to computing resource management are considered. A new late-first-denial-of-service resource management approach is proposed

  11. Return of the Viking: Restoring a Proven Asset to Combat an Advanced Threat

    Science.gov (United States)

    2017-05-12

    ability to project power.32F33 Among the threats are the land based DF-21D and DF-26 Anti -Surface Ballistic Missiles (ASBMs). These systems have an...strikers. Analysis of potential future conflicts projects the use of advanced Anti -Access/Area-Denial (A2/AD) systems and the requirement for the carrier... Anti -Access/Area Denial Challenges”.29F30 Specifically, in response to the development of sophisticated weapons systems by China and Iran “the U.S

  12. Empirical analysis for Distributed Energy Resources' impact on future distribution network

    DEFF Research Database (Denmark)

    Han, Xue; Sandels, Claes; Zhu, Kun

    2012-01-01

    There has been a large body of statements claiming that the large scale deployment of Distributed Energy Resources (DERs) will eventually reshape the future distribution grid operation in various ways. Thus, it is interesting to introduce a platform to interpret to what extent the power system...... operation will be alternated. In this paper, quantitative results in terms of how the future distribution grid will be changed by the deployment of distributed generation, active demand and electric vehicles, are presented. The analysis is based on the conditions for both a radial and a meshed distribution...... network. The input parameters are based on the current and envisioned DER deployment scenarios proposed for Sweden....

  13. Distributional Inference

    NARCIS (Netherlands)

    Kroese, A.H.; van der Meulen, E.A.; Poortema, Klaas; Schaafsma, W.

    1995-01-01

    The making of statistical inferences in distributional form is conceptionally complicated because the epistemic 'probabilities' assigned are mixtures of fact and fiction. In this respect they are essentially different from 'physical' or 'frequency-theoretic' probabilities. The distributional form is

  14. State Electricity Regulatory Policy and Distributed Resources: Accommodating Distributed Resources in Wholesale Markets

    Energy Technology Data Exchange (ETDEWEB)

    Weston, F.; Harrington, C.; Moskovitz, D.; Shirley, W.; Cowart, R.; Sedano, R.

    2002-10-01

    Distributed resources can provide cost-effective reliability and energy services - in many cases, obviating the need for more expensive investments in wires and central station electricity generating facilities. Given the unique features of distributed resources, the challenge facing policymakers today is how to restructure wholesale markets for electricity and related services so as to reveal the full value that distributed resources can provide to the electric power system (utility grid). This report looks at the functions that distributed resources can perform and examines the barriers to them. It then identifies a series of policy and operational approaches to promoting DR in wholesale markets. This report is one in the State Electricity Regulatory Policy and Distributed Resources series developed under contract to NREL (see Annual Technical Status Report of the Regulatory Assistance Project: September 2000-September 2001, NREL/SR-560-32733). Other titles in this series are: (1) Distributed Resource Distribution Credit Pilot Programs - Revealing the Value to Consumers and Vendors, NREL/SR-560-32499; (2) Distributed Resources and Electric System Reliability, NREL/SR-560-32498; (3) Distribution System Cost Methodologies for Distributed Generation, NREL/SR-560-32500; (4) Distribution System Cost Methodologies for Distributed Generation Appendices, NREL/SR-560-32501

  15. Maintained in Very Good Condition or Virtually Rebuilt? Destruction of Cultural Property and Narration of Violent Histories

    Directory of Open Access Journals (Sweden)

    Samuel Andrew Hardy

    2013-09-01

    Full Text Available This paper explores the use of cultural heritage in shaping public understandings of history, identity and justice; it focuses on misinterpretations and misrepresentations of damage to and destruction of archaeological sites and historic buildings in Cyprus. It examines: restoration and its impact on public understandings of history; scholarly conduct in the collection and presentation of data; denial of violence as a tactic to establish peace and recognition of violence as a strategy for building trust; and denial of violence as a strategy for fostering nationalist sentiment and inciting ethnic hatred. First, it addresses the role of monuments and their destruction in memory and amnesia. Then, it identifies inappropriate restoration, which has misdirected professional and public understanding of history. It also demonstrates either wilful ignorance of events or conscious exclusion of inconvenient facts from archaeological and official texts; either way, this is unprofessional practice, which has led to the implicit denial of real violence that was intended to cause ethnic cleansing.

  16. Pro-environmental actions, climate change, and defensiveness: do self-affirmations make a difference to people's motives and beliefs about making a difference?

    Science.gov (United States)

    Sparks, Paul; Jessop, Donna C; Chapman, James; Holmes, Katherine

    2010-09-01

    Social concerns with the imperative of environmentally sustainable life-styles sit rather awkwardly with ideas about the widespread denial of global environmental problems. Given the very obvious threat and denial dimensions to these issues, we conducted two studies assessing the impact of self-affirmation manipulations on people's beliefs and motives regarding pro-environmental actions. In Study 1, participants (N=125) completed a self-affirmation task and read information on the threat of climate change. Results showed that the self-affirmation manipulation resulted in lower levels of denial and greater perceptions of personal involvement in relation to climate change. In Study 2, participants (N=90) completed a self-affirmation task and read some information on recycling. Findings showed a beneficial effect of a self-affirmation manipulation on intentions to increase recycling behaviour (among lower recyclers). The results are discussed in relation to the potential benefits of self-affirmation manipulations for promoting pro-environmental actions.

  17. NS [Nuclear Safety] update. Current safety and security activities and developments taking place in the Department of Nuclear Safety and Security, Issue no. 8, September 2008

    International Nuclear Information System (INIS)

    2008-09-01

    The current issue presents information about the following activities: 1) International Workshops on Denial of Shipments raise awareness of suppliers, recipients, regulators, carriers/consignors and international organizations of the problems relating to denials of radioactive shipments to determine effective measures to prevent or reduce the instances of shipment denials and delays. 2) Communication and knowledge Management in the Department of Nuclear Safety and Security (NS). 3) Nuclear Security at the Beijing Olympics - an excellent example of the IAEA's work in protecting large scale public events. 4) The Incident and Emergency Centre's Participation in the ConvEx 3 Exercise, 9-10 July 2008, which took place at the Laguna Verde nuclear power plant in Mexico. During the 43 hour long exercise, the Incident and Emergency Centre (IEC) was fully activated. Staff members participating in the exercise represented different departments within the IAEA and the diversity of their knowledge and experience ensured an effective response

  18. Underfrequency Load Shedding for an Islanded Distribution System With Distributed Generators

    DEFF Research Database (Denmark)

    Mahat, Pukar; Chen, Zhe; Bak-Jensen, Birgitte

    2010-01-01

    Significant penetration of distributed generation in many distribution systems has opened an option of operating distribution systems in island mode for economical and technical reasons. However, balancing frequency of the islanded system is still an issue to be solved, especially when the demand...

  19. Distributed generation hosting capacity calculation of MV distribution feeders in Turkey

    DEFF Research Database (Denmark)

    Altin, Müfit; Oguz, Emre Utku; Bizkevelci, Erdal

    2014-01-01

    Integration of distributed generation into distribution networks introduces new challenges to distribution system operators while the penetration level increases. One of the challenges is the voltage rise issue as a part of the steady-state analysis of DGs during planning and operational stages. ...

  20. Distribution network planning method considering distributed generation for peak cutting

    International Nuclear Information System (INIS)

    Ouyang Wu; Cheng Haozhong; Zhang Xiubin; Yao Liangzhong

    2010-01-01

    Conventional distribution planning method based on peak load brings about large investment, high risk and low utilization efficiency. A distribution network planning method considering distributed generation (DG) for peak cutting is proposed in this paper. The new integrated distribution network planning method with DG implementation aims to minimize the sum of feeder investments, DG investments, energy loss cost and the additional cost of DG for peak cutting. Using the solution techniques combining genetic algorithm (GA) with the heuristic approach, the proposed model determines the optimal planning scheme including the feeder network and the siting and sizing of DG. The strategy for the site and size of DG, which is based on the radial structure characteristics of distribution network, reduces the complexity degree of solving the optimization model and eases the computational burden substantially. Furthermore, the operation schedule of DG at the different load level is also provided.