WorldWideScience

Sample records for initial attack success

  1. Predicting the effect of climate change on wildfire behavior and initial attack success

    Energy Technology Data Exchange (ETDEWEB)

    Riley, William; Fried, Jeremy S.; Gilless, J. Keith; Riley, William J.; Moody, Tadashi J.; Simon de Blas, Clara; Hayhoe, Katharine; Moritz, Max; Stephens, Scott; Torn, Margaret

    2007-12-01

    This study focused on how climate change-induced effects on weather will translate into changes in wildland fire severity and outcomes in California, particularly on the effectiveness of initial attack at limiting the number of fires that escape initial attack. The results indicate that subtle shifts in fire behavior of the sort that might be induced by the climate changes anticipated for the next century are of sufficient magnitude to generate an appreciable increase in the number of fires that escape initial attack. Such escapes are of considerable importance in wildland fire protection planning, given the high cost to society of a catastrophic escape like those experienced in recent decades in the Berkeley-Oakland, Santa Barbara, San Diego, or Los Angeles areas. However, at least for the three study areas considered, it would appear that relatively modest augmentations to existing firefighting resources might be sufficient to compensate for change-induced changes in wildland fire outcomes.

  2. Toronto Heart Attack Collaborative: an administrative model that facilitated a successful city-wide integration initiative.

    Science.gov (United States)

    Young, Justin; McLellan, Barry; Escaf, Marnie; Dzavik, Vladimir; Michaud, Susan; Newton, Janet; Newman, Erone

    2014-01-01

    This article provides a description of the administrative model that enabled a city-wide integration effort between Greater Toronto Area hospitals and Toronto Emergency Medical Services in the care of patients within the city of Toronto with ST elevation myocardial infarction (STEMI). This administrative structure, known as the Toronto Heart Attack Collaborative (THAC), enabled universal 24/7 access to primary percutaneous coronary intervention within Toronto, improving patient efficacy and outcomes. The lessons and administrative enablers from this experience may be useful for regions that are embarking on multi-centre integration efforts. This article presents a five-year perspective on the THAC integration effort.

  3. On the anatomy of social engineering attacks -- A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing sin

  4. Minimizing Expected Maximum Risk from Cyber-Attacks with Probabilistic Attack Success

    Energy Technology Data Exchange (ETDEWEB)

    Bhuiyan, Tanveer H.; Nandi, Apurba; Medal, Hugh; Halappanavar, Mahantesh

    2016-07-16

    The goal of our work is to enhance network security by generating partial cut-sets, which are a subset of edges that remove paths from initially vulnerable nodes (initial security conditions) to goal nodes (critical assets), on an attack graph given costs for cutting an edge and a limited overall budget.

  5. Successful attack on permutation-parity-machine-based neural cryptography.

    Science.gov (United States)

    Seoane, Luís F; Ruttor, Andreas

    2012-02-01

    An algorithm is presented which implements a probabilistic attack on the key-exchange protocol based on permutation parity machines. Instead of imitating the synchronization of the communicating partners, the strategy consists of a Monte Carlo method to sample the space of possible weights during inner rounds and an analytic approach to convey the extracted information from one outer round to the next one. The results show that the protocol under attack fails to synchronize faster than an eavesdropper using this algorithm.

  6. Privacy-Enhancing Security Protocol in LTE Initial Attack

    Directory of Open Access Journals (Sweden)

    Uijin Jang

    2014-12-01

    Full Text Available Long-Term Evolution (LTE is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI, Radio Network Temporary Identities (RNTI, etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

  7. A Guide to Successful Organic Marketing Initiatives

    OpenAIRE

    Schmid, Otto; Hamm, Ulrich; Richter, Toralf; Dahlke, Andrea

    2004-01-01

    A Guide to Successful Organic Marketing Initiatives provides practical application of the business and marketing ideas developed from the EU research project OMIaRD. Businesses based on the collaboration between organic farmers often have resources of enthusiasm and considerable skill in agricultural production but lack the means and expertise to develop successfully in the face of rapidly changing market structures and conditions. It provides useful advice on the market and policy issues to ...

  8. The Role of Initial Attack and Performer Expertise on Instrument Identification

    Science.gov (United States)

    Cassidy, Jane W.; Schlegel, Amanda L.

    2016-01-01

    The purpose of this study was to examine the role initial attack and expertise play in the identification of instrumental tones. A stimulus CD was made of 32 excerpts of instrumental tones. Sixteen possible combinations of the variables of initial attack (present or absent), expertise (beginner versus professional), and timbre (flute, clarinet,…

  9. Modelling the attack success of planktonic predators: patterns and mechanisms of prey size selectivity

    DEFF Research Database (Denmark)

    Caparroy, P.; Thygesen, Uffe Høgsbro; Visser, Andre

    2000-01-01

    A mathematical model of the attack success of planktonic predators (fish larvae and carnivorous copepods) is proposed. Based on a geometric representation of attack events, the model considers how the escape reaction characteristics (speed and direction) of copepod prey affect their probability...... of being captured. By combining the attack success model with previously published hydrodynamic models of predator and prey perception, we examine how predator foraging behaviour and prey perceptive ability affect the size spectra of encountered and captured copepod prey. We examine food size spectra of (i...... also acts in modifying the prey escape direction. The model demonstrates that the reorientation of the prey escape path towards the centre of the feeding current's flow field results in increased attack success of the predator. Finally, the model examines how variability in the kinetics of approach...

  10. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Fafoutis, Xenofon; Mödersheim, Sebastian Alexander

    2013-01-01

    In receiver-initiated MAC protocols for Wireless Sensor Networks (WSNs), communication is initiated by the receiver of the data through beacons containing the receiver's identity. In this paper, we consider the case of a network intruder that captures and replays such beacons towards legitimate...... nodes, pretending to have a fake identity within the network. To prevent this attack we propose RAP, a challenge-response authentication protocol that is able to detect and prevent the beacon replay attack. The effectiveness of the protocol is formally verified using OFMC and ProVerif. Furthermore, we...

  11. Time Required to Initiate a Defensive Reaction to Direct and Feint Attacks in Fencing.

    Science.gov (United States)

    Gutiérrez-Davila, Marcos; Rojas, F Javier; Gutiérrez-Cruz, Carmen; García, Carlos; Navarro, Enrique

    2016-12-01

    The two-fold purpose of this study was to analyze the time required by a fencer to initiate a defensive action in response to a direct attack, which involves identifying when the defending fencer detects the just-noticeable difference, and, secondly, to assess the effect that an attacker's rapid armed hand movement (feint attack) has on the time required to initiate a defensive move. Twenty-four elite fencers and a fencing master were included in the study. Four adapted force plates were installed on a scaffold used as a fencing piste. A 3D video analysis system recorded the location of 2 markers installed on the fencing master's shoulder and sword. The results confirm that the defending fencer has a mean movement time of 0.353 ± 0.028 s to perform the defensive action, which provides an advantage over the attacking fencer. The velocity of movement in the peripheral visual field has no influence on the time required by elite fencers to initiate a defensive action. This confirms the crucial role that response inhibition processes play when nonrelevant actions are perceived. Kinematic analysis of markers suggests that the eye movements of elite fencers are not the only source of information used while observing an attack.

  12. Leaf-cutting ant attack in initial pine plantations and growth of defoliated plants

    Directory of Open Access Journals (Sweden)

    Mariane Aparecida Nickele

    2012-07-01

    Full Text Available The objective of this work was to evaluate the natural attack by Acromyrmex crassispinus in initial Pinus taeda plantations without control measures against ants, as well as the effect of defoliation in seedlings of P. taeda. Evaluations of the attack of leaf-cutting ants on P. taeda plantations were done monthly in the first six months, then 9 and 12 months after planting. The percentages of plants that were naturally attacked by ants were registered. The effect of defoliation was evaluated by artificial defoliation, simulating the natural patterns of attack by A. crassispinus on P. taeda seedlings. The natural attack of A. crassispinus was greater during the first months after planting, being more intense in the first 30 days. Artificial defoliation indicated that there were no significant losses in diameter and height in plants with less than 75% defoliation. However, there were significant losses in diameter and height in plants with 100% defoliation, independently of the cut of the apical meristem, and also plant death. The control of leaf-cutting ants in P. taeda plantings, in which A. crassispinus is the most frequent leaf-cutting ant, should be intense only at the beginning of planting, since the most severe attacks occur during this time.

  13. Strategies for the prevention of a successful biological warfare aerosol attack.

    Science.gov (United States)

    Wiener, S L

    1996-05-01

    Biological warfare (BW) aerosol attacks are different from chemical attacks in that they may provide no warning/all clear signals that allow the soldier to put on or remove his M17/M40 protective mask. Methods are now being perfected to detect a BW aerosol cloud using an airborne (helicopter) pulsed laser system to scan the lower altitudes upwind from a troop concentration of corps size, and to sample and analyze the nature of the aerosol within a brief time interval. This system has certain limitations and vulnerabilities, since it is designed specifically to detect a line-type aerosol attack. Provision of, training with, and field use of a lightweight dust mist or HEPA filter respirator for each soldier is proposed for protection against undetected aerosol attacks. This particulate filter respirator would be issued in addition to the M17/M40 mask. Such a BW respirator will be able to purify the soldier's air by removing particles in the 0.3- to 15-micro m-diameter range with an efficiency of 98 to 100%. Particle size of BW aerosols is in the same range, with an optimum size for high-efficiency casualty production of 1 to 5 micro m mass median diameter. The proposed BW respirator will be lightweight; will require low inhalation pressures; will be comfortable to wear for prolonged periods; will not interfere with vision, hearing, and communication; and will not degrade overall effectiveness and performance to the degree observed with the M17/M40 masks. Such respirators would be worn as part of a contingency defense against an enemy likely to use BW agents. This respirator could be worn for prolonged periods when under threat of an undetectable BW attack during weather conditions favorable to the success of such an attack (i.e., low wind velocity and temperature inversion in the target area). In addition, tactically important assets such as command and control centers and missile batteries can also be protected continuously by air filtration systems powered by

  14. Does the initiation of urate-lowering treatment during an acute gout attack prolong the current episode and precipitate recurrent attacks: a systematic literature review.

    Science.gov (United States)

    Eminaga, Fatma; La-Crette, Jonathan; Jones, Adrian; Abhishek, A

    2016-12-01

    The aim of this study was to systematically review the literature on effect of initiating urate-lowering treatment (ULT) during an acute attack of gout on duration of index attack and persistence on ULT. OVID (Medline), EMBASE and AMED were searched to identify randomized controlled trials (RCTs) of ULT initiation during acute gout attack published in English language. Two reviewers appraised the study quality and extracted data independently. Standardized mean difference (SMD) and relative risk (RR) were used to pool continuous and categorical data. Meta-analysis was carried out using STATA version 14. A total of 537 studies were selected. A total of 487 titles and abstracts were reviewed after removing duplicates. Three RCTs were identified. There was evidence from two high-quality studies that early initiation of allopurinol did not increase pain severity at days 10-15 [SMDpooled (95 % CI) 0.18 (-0.58, 0.93)]. Data from three studies suggested that initiation of ULT during an acute attack of gout did not associate with dropouts [RRpooled (95 % CI) 1.16 (0.58, 2.31)]. There is moderate-quality evidence that the initiation of ULT during an acute attack of gout does not increase pain severity and risk of ULT discontinuation. Larger studies are required to confirm these findings so that patients with acute gout can be initiated on ULT with confidence.

  15. Initial crisis risk communications: A success story

    Energy Technology Data Exchange (ETDEWEB)

    Goldman, S.B. (TECH-PLAN, Olney, MD (United States)); Traverso, D.K. (Cleveland Electric Illuminating Co., Perry, OH (United States))

    1992-01-01

    Federal regulations require nuclear facilities to be prepared for the risk communication aspects of a catastrophic emergency. Thus, all nuclear plants have provisions for a Joint Public Information Center (JPIC). The JPICs are designed to handle more than 300 media for 24 hours a day; to coordinate information among utility, federal, state, and local agencies; to provide spokespersons; etc. For a large-scale emergency, JPICs can work very well. However, some utilities - indeed, most companies - appear to have only two modes of emergency communication response: normal staff and JPIC. Experience has shown that normal staffing is inadequate to handle the risk communication response for media-intensive low-level emergencies and for the initial stages of an escalating emergency. It is clear that initial response will determine how well a company fares in its overall emergency response and in its long-term relations with the media and public. A solution to this risk communication challenge was developed by Cleveland Electric Illuminating Company's Perry Nuclear Plant - the Public Information Response Team. Using existing facilities and staff - only one of whom works regularly with the media - the Perry plant proactively manages its initial risk communication response.

  16. Information Technology and Successful Knowledge Management Initiatives

    Directory of Open Access Journals (Sweden)

    Fattah Sharifzade

    2012-02-01

    Full Text Available Knowledge as an intellectual capital is one of the valuable properties of an organization which can play a vital role in success of organization providing combine with information technology. The aim of this research is to answer this question: Does the using of information technology affect knowledge management development? The results presented the effectiveness of information technology on knowledge management development. The remarkable point was the relationship strength of hard activities toward knowledge management soft activities. This paper was a descriptive-application research. The statistical society of this research included human resource and R&D experts of Mellat Bank and data were gathered by questionnaires. In order to analyzing the data by SPSS and LISREL, first, Spearman correlation test was used for testing hypothesis. Moreover, in order to investigate the casual relationship and model fitting test, structural equations model were used and results presented proper fitness of model and correlation between variables.

  17. Transient ischemic attack as an unusual initial manifestation of acute promyelocytic leukemia.

    Science.gov (United States)

    Liu, Lifeng; Yuan, Xiaoling

    2016-07-01

    Patients with acute promyelocytic leukemia (APL) are prone to both bleeding and thrombosis. Both of these have a significant impact on the morbidity and mortality of patients with this disease. Here we report a case of a 41-year-old male, who presented with transient ischemic attack (TIA) and early neurological deterioration (END) as initial manifestations prior to an ultimate diagnosis of APL. This patient had no cerebrovascular risk factors or familial cerebrovascular disease. The patient experienced an acute ischemic stroke, verified by magnetic resonance imaging (MRI), in less than 24 h after his second hospital admission. Some APL patients suffer from cerebral ischemia as an initial manifestation or during induction therapy, and patients presenting this condition may continue to deteriorate until their death during hospitalization. Thus, APL should be considered as a possible underlying disease in patients with TIA without cerebrovascular risk factors. Delayed diagnosis and treatment of APL can be fatal.

  18. Proto-cooperation: group hunting sailfish improve hunting success by alternating attacks on grouping prey.

    Science.gov (United States)

    Herbert-Read, James E; Romanczuk, Pawel; Krause, Stefan; Strömbom, Daniel; Couillaud, Pierre; Domenici, Paolo; Kurvers, Ralf H J M; Marras, Stefano; Steffensen, John F; Wilson, Alexander D M; Krause, Jens

    2016-11-16

    We present evidence of a novel form of group hunting. Individual sailfish (Istiophorus platypterus) alternate attacks with other group members on their schooling prey (Sardinella aurita). While only 24% of attacks result in prey capture, multiple prey are injured in 95% of attacks, resulting in an increase of injured fish in the school with the number of attacks. How quickly prey are captured is positively correlated with the level of injury of the school, suggesting that hunters can benefit from other conspecifics' attacks on the prey. To explore this, we built a mathematical model capturing the dynamics of the hunt. We show that group hunting provides major efficiency gains (prey caught per unit time) for individuals in groups of up to 70 members. We also demonstrate that a free riding strategy, where some individuals wait until the prey are sufficiently injured before attacking, is only beneficial if the cost of attacking is high, and only then when waiting times are short. Our findings provide evidence that cooperative benefits can be realized through the facilitative effects of individuals' hunting actions without spatial coordination of attacks. Such 'proto-cooperation' may be the pre-cursor to more complex group-hunting strategies.

  19. The persuasion and security awareness experiment: reducing the success of social engineering attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2015-01-01

    Objectives: The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g. the obtaining of access by persuasion) in an office environment. In particular, we study the effect of authority during a `social engineering' attack. Methods: 31 dif

  20. Key success factors when implementing strategic manufacturing initiatives

    OpenAIRE

    Minarro-Viseras, Enrique; Baines, Timothy; Sweeney, Mike

    2005-01-01

    Purpose – This paper reports the study of key success factors (KSFs) in the project management of the implementation of strategic manufacturing initiatives (SMIs). Design/methodology/approach – In order to gather the experience and knowledge of many industries, from different geographic locations, in a broad range of types and sizes of SMIs, a questionnaire-based survey of practitioners worldwide was selected as the most appropriate research method among those available. Findings – The identi...

  1. The successful implementation of STEM initiatives in lower income schools

    Science.gov (United States)

    Bakshi, Leena

    The purpose of this study was to examine the leadership strategies utilized by superintendents, district administrators and school principals and the impact of these identified strategies on implementing STEM initiatives specifically for lower-income students. This study set out to determine (a) What role does district leadership play in the implementation of STEM initiatives in lower income secondary schools; (b) What internal systems of accountability exist in successful lower income secondary schools' STEM programs; (c) What leadership strategies are used to implement STEM curriculum initiatives; (d) How do school and district leadership support staff in order to achieve student engagement in STEM Initiative curriculum. This study used a mixed-methods approach to determine the impact of leadership strategies utilized by superintendents, district administrators and school principals on implementing STEM initiatives. Quantitative data analyzed survey questionnaires to determine the degree of correlation between the school districts that have demonstrated the successful implementation of STEM initiatives at the school and district levels. Qualitative data was collected using highly structured participant interviews and purposeful sampling of four district superintendents, one district-level administrator and five school leaders to capture the key strategies in implementing STEM initiatives in lower income secondary schools. Through the process of triangulation, the results of the study revealed that superintendents and principals should consider the characteristics of effective STEM initiatives that have shown a considerable degree of correlation with positive outcomes for lower income students. These included the leadership strategies of personnel's making decisions about the district's and school's instructional direction and an emphasis on the conceptual development of scientific principles using the Next Generation Science Standards coupled with the Common Core

  2. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  3. How effective leaders achieve success in critical change initiatives, Part 2: why change leadership must transcend project management for complex initiatives to be successful.

    Science.gov (United States)

    King, Sharon; Peterson, Larry

    2007-01-01

    This article is the second in a series outlining how effective leaders achieve success in critical change initiatives. This article focuses on why change leadership must transcend project management for complex initiatives to be successful.

  4. The History of Attack and Success of Emerald Ash Borer (Coleoptera: Buprestidae) on White Fringetree in Southwestern Ohio.

    Science.gov (United States)

    Thiemann, Danielle; Lopez, Vanessa; Ray, Ann M; Cipollini, Don

    2016-08-01

    Emerald ash borer, Agrilus planipennis Fairmaire, is an invasive insect that has caused widespread mortality of ash species in North America. The ability of emerald ash borer to utilize white fringetree as an alternate host was reported recently. We aimed to determine how long white fringetree has been under attack from emerald ash borer, the degree of attack, and the overall success of this beetle on this novel host. Stems from three of nine infested white fringetrees collected from the Dayton and Cincinnati, OH, areas in the winter of 2015 yielded four live adult emerald ash borers after being held in rearing containers, and numerous older exit holes were observed. Measurement and aging of feeding galleries on these stems indicated that emerald ash borer has been using this species since 2011, at least, with peak gallery densities reached in 2012 and 2013 on most of the harvested trees. On average, 32 galleries per square meter were found in these stems with about one-third of them being indicative of fourth-instar larvae. This supports the assertion that emerald ash borer has been using white fringetree as a host plant with moderate to good success for as long as ash species in these particular areas have been utilized.

  5. Africa's Great Green Wall Initiative: a model for restoration success

    Science.gov (United States)

    Berrahmouni, Nora; Sacande, Moctar

    2014-05-01

    The Great Green Wall for the Sahara and the Sahel Initiative was launched to address the increasing challenges of land degradation, desertification and drought, climate change, food insecurity and poverty in more than 20 countries. Restoration of agro-sylvo-pastoral landscapes and degraded lands is one of the priority interventions initiated, enabling the springing up of green nests of life. When complete, the Great Green Wall of Africa will reverse the seemingly unstoppable desertification and address the development of its drylands' inhabitant rural communities. Today's planting of modest seedlings will grow into vast mosaics of forest and agroforestry landscapes and grasslands, which will provide essential ecosystem goods and services, restore lost livelihoods and create new wealth. The ambition of reforestation efforts within this initiative - the like of which the world has never seen before - sounds like an impossible dream. However, learning from past mistakes and capitalising on current advancement in science and technology, it is a reality that is taking root. Following a successful restoration model that RBG Kew experts have devised, we are helping to mobilise, train and support communities in four border regions in Burkina Faso, Mali and Niger. In collaboration with FAO, the Millennium Seed Bank Partnership is using its unique expertise to ensure that seeds of environmentally well-adapted and economically useful local species are collected and planted in communal gardens and village agroforestry systems managed by the communities themselves. In our first year, an estimated total of 162,000 seedlings and 61 kg of seeds from 40 useful native species, including grasses for livestock, have been planted to cover 237 ha of farmer-managed land in 19 villages. The keen interest it has created has indicated that these figures will rise five-fold in the second year. These green bricks are the foundations of the living wall that will eventually reach across the

  6. Financial planning for major initiatives: a framework for success.

    Science.gov (United States)

    Harris, John M

    2007-11-01

    A solid framework for assessing a major strategic initiative consists of four broad steps: Initial considerations, including level of analysis required and resources that will be brought to bear. Preliminary financial estimates for board approval to further assess the initiative. Assessment of potential partners' interest in the project. Feasibility analysis for board green light.

  7. Host Plants Affect the Foraging Success of Two Parasitoids that Attack Light Brown Apple Moth Epiphyas postvittana (Walker) (Lepidoptera: Tortricidae).

    Science.gov (United States)

    Feng, Yi; Wratten, Steve; Sandhu, Harpinder; Keller, Michael

    2015-01-01

    The light brown apple moth, Epiphyas postvittana is a key pest of wine grapes in Australia. Two parasitoids, Dolichogenidea tasmanica and Therophilus unimaculatus, attack the larval stage of this pest. D. tasmanica is dominant in vineyards, whereas T. unimaculatus is mainly active in native vegetation. We sought to understand why they differ in their use of habitats. Plants are a major component of habitats of parasitoids, and herbivore-infested plants influence parasitoid foraging efficiency by their architecture and emission of volatile chemicals. We investigated how different plant species infested by E. postvittana could affect the foraging success of the two parasitoid species in both laboratory and field experiments. Four common host-plant species were selected for this study. In paired-choice experiments to determine the innate foraging preferences for plants, both parasitoid species showed differences in innate search preferences among plant species. The plant preference of D. tasmanica was altered by oviposition experience with hosts that were feeding on other plant species. In a behavioral assay, the two parasitoid species allocated their times engaged in various types of behavior differently when foraging on different plant species. For both parasitoids, parasitism on Hardenbergia violacea was the highest of the four plant species. Significantly more larvae dropped from Myoporum insulare when attacked than from the other three host-plant species, which indicates that parasitism is also affected by interactions between plants and host insects. In vineyards, parasitism by D. tasmanica was significantly lower on M. insulare than on the other three host-plant species, but the parasitism rates were similar among the other three plant species. Our results indicate that plants play a role in the habitat preferences of these two parasitoid species by influencing their foraging behavior, and are likely to contribute to their distributions among habitats.

  8. An Attack on Inclusive Education in Secondary Education. Limitations in Initial Teacher Training in Spain

    Science.gov (United States)

    López-Torrijo, Manuel; Mengual-Andrés, Santiago

    2015-01-01

    Inclusive education is hard to implement in secondary schools. Probably, one of the determining factors lies in teachers' initial training that determines their attitude, identity and professional practice. This research analyses the initial teacher education programmes for Secondary Education, Higher Secondary Education, called…

  9. Isolated Cataplexy in the Differential Diagnosis of Drop Attacks: A Case of Successful Clinical Diagnosis and Treatment

    Directory of Open Access Journals (Sweden)

    Robert T. Egel

    2012-01-01

    Full Text Available Drop attacks are sudden spontaneous falls that are not accompanied by alteration of consciousness and are followed by immediate recovery. Cataplexy, which is usually associated with narcolepsy, is one of the causes of drop attacks. We report a patient with the rare condition of cataplexy without associated narcolepsy (isolated cataplexy. Isolated cataplexy should be included in the differential diagnosis when a patient presents with recurrent drop attacks and normal diagnostic test results.

  10. Innovating and Entrepreneurial Initiatives: Some Cases of Success

    Directory of Open Access Journals (Sweden)

    Carmen De Pablos Heredero

    2017-05-01

    An entrepreneur cannot be guided by his own interests. He has to invest in order to know the needs of the potential customers Impact on Society\t: Customer experience is key to have success in new business models

  11. The Common Core Initiative: What Are the Chances of Success?

    Science.gov (United States)

    Loveless, Tom

    2013-01-01

    The Common Core State Standards have been adopted by 46 states and the District of Columbia. They enjoy a huge following of well-wishers and supporters who are optimistic that the standards will boost achievement in U.S. schools. Setting aside the cheerleading and fond hopes, what are the real chances of success? The most reasonable prediction is…

  12. An Attack on Inclusive Education in Secondary Education. Limitations in Initial Teacher Training in Spain

    Directory of Open Access Journals (Sweden)

    Manuel López-Torrijo

    2015-01-01

    Full Text Available Inclusive education is hard to implement in secondary schools. Probably, one of the determining factors lies in teachers' initial  training that determines their attitude, identity and professional practice. This research analyses the initial teacher education programmes for Secondary Education, Higher Secondary Education, called bachillerato in Spain, and Vocational and Artistic training in the five best valued Spanish universities in the education field, according to the ranking I-UGR, after the European convergence process in the European Higher Education Area. The study analyses the national regulations that govern this training. A quantitative study was conducted to examine the number of credits dedicated to inclusive education and also a review of the contents of these subjects was carried out. The study concludes that this initial teacher training provides sufficient theoretical basis regarding the conceptualization of inclusive education and the skills to deal with the tutorship and academic and professional orientation. However, important limitations in training prevent future teachers from identifying students’ and context’s special educational needs, and the attention to diversity through different methods and curriculum adaptations.

  13. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  14. Personality Factors and Nuclear Power Plant Operators: Initial License Success

    Science.gov (United States)

    DeVita-Cochrane, Cynthia

    Commercial nuclear power utilities are under pressure to effectively recruit and retain licensed reactor operators in light of poor candidate training completion rates and recent candidate failures on the Nuclear Regulatory Commission (NRC) license exam. One candidate failure can cost a utility over $400,000, making the successful licensing of new operators a critical path to operational excellence. This study was designed to discover if the NEO-PI-3, a 5-factor measure of personality, could improve selection in nuclear utilities by identifying personality factors that predict license candidate success. Two large U.S. commercial nuclear power corporations provided potential participant contact information and candidate results on the 2014 NRC exam from their nuclear power units nation-wide. License candidates who participated (n = 75) completed the NEO-PI-3 personality test and results were compared to 3 outcomes on the NRC exam: written exam, simulated operating exam, and overall exam result. Significant correlations were found between several personality factors and both written and operating exam outcomes on the NRC exam. Further, a regression analysis indicated that personality factors, particularly Conscientiousness, predicted simulated operating exam scores. The results of this study may be used to support the use of the NEO-PI-3 to improve operator selection as an addition to the current selection protocol. Positive social change implications from this study include support for the use of a personality measure by utilities to improve their return-on-investment in candidates and by individual candidates to avoid career failures. The results of this study may also positively impact the public by supporting the safe and reliable operation of commercial nuclear power utilities in the United States.

  15. Immigrants' initial steps in Germany and their later economic success.

    Science.gov (United States)

    Kogan, Irena; Weißmann, Markus

    2013-09-01

    In line with the emerging research that acknowledges the importance of the process character of immigrants' labour market integration, this paper examines the existence of path dependencies of early employment trajectories on later labour market outcomes. Theoretically we are interested in establishing whether career trajectories provide a distinct signal, used by both employers and employees: a signal that operates apart and beyond the accumulation of host-country relevant resources, especially, host-country labour market experience or training. The analyses are performed with the help of a unique dataset comprised of recent immigrants from the former Soviet Union in Germany. Sequence analysis techniques and multivariate regressions are applied. Results show that starting in higher-status employment leaves a distinguishable imprint on immigrants' later occupational standings, even after the returns to the skills associated with early trajectories are taken into account. At the same time, initial career trajectories do not have any direct effect on wages, apart from the pay-off to relevant skills acquired while pursuing these careers. The findings are discussed in concurrence with the human capital and signalling theories.

  16. Hereditary angioedema and pregnancy: successful management of recurrent and frequent attacks of angioedema with C1-inhibitor concentrate, danazol and tranexamic acid – a case report

    OpenAIRE

    Milingos, D S; Madhuvrata, P; Dean, J.; Shetty, A.; Campbell, D. M.

    2009-01-01

    Hereditary angioedema (HAE) is a rare but potentially life-threatening condition caused by deficiency of C1 esterase inhibitor. It is characterized by subcutaneous swelling in any part of the skin, gastrointestinal and respiratory tracts. We present the case of a pregnant woman with known HAE that deteriorated during pregnancy with frequent attacks that were managed successfully with danazol, tranexamic acid and regular intravenous administration of C1 esterase inhibitor.

  17. Success factors for strategic change initiatives: a qualitative study of healthcare administrators' perspectives.

    Science.gov (United States)

    Kash, Bita Arbab; Spaulding, Aaron; Johnson, Christopher E; Gamm, Larry

    2014-01-01

    Success factors related to the implementation of change initiatives are well documented and discussed in the management literature, but they are seldom studied in healthcare organizations engaged in multiple strategic change initiatives. The purpose of this study was to identify key success factors related to implementation of change initiatives based on rich qualitative data gathered from health leader interviews at two large health systems implementing multiple change initiatives. In-depth personal interviews with 61 healthcare leaders in the two large systems were conducted and inductive qualitative analysis was employed to identify success factors associated with 13 change initiatives. Results from this analysis were compared to success factors identified in the literature, and generalizations were drawn that add significantly to the management literature, especially to that in the healthcare sector. Ten specific success factors were identified for the implementation of change initiatives. The top three success factors were (1) culture and values, (2) business processes, and (3) people and engagement. Two of the identified success factors are unique to the healthcare sector and not found in the literature on change models: service quality and client satisfaction (ranked fourth of 10) and access to information (ranked ninth). Results demonstrate the importance of human resource functions, alignment of culture and values with change, and business processes that facilitate effective communication and access to information to achieve many change initiatives. The responses also suggest opportunities for leaders of healthcare organizations to more formally recognize the degree to which various change initiatives are dependent on one another.

  18. Rising from failure and learning from success: The role of past experience in radical initiative taking

    NARCIS (Netherlands)

    D. Deichmann (Dirk); J.C.M. van den Ende (Jan)

    2014-01-01

    markdownabstract__Abstract__ We investigate how the successes and failures of people who initiate radical ideas influence (a) the inclination to take new personal initiatives and (b) the outcome of those initiatives. Using the data of 1,792 radical ideas suggested by 908 employees in a multinationa

  19. An Initial Attack of Urinary Stone Disease Is Associated with an Increased Risk of Developing New-Onset Irritable Bowel Syndrome: Nationwide Population-Based Study

    Science.gov (United States)

    Lei, Wei-Yuan; Chang, Chih-Yu; Wu, Jr-Hau; Lin, Fei-Hung; Hsu Chen, Cheng; Chang, Chin-Fu

    2016-01-01

    Background The neurotransmitter pathways in irritable bowel syndrome (IBS) and urinary stone attacks are both related to serotonin, and each disease may be influenced by viscero-visceral hyperalgesia. However, the relationship between urinary tract stone disease and IBS has never been addressed. We aimed to investigate the risk of suffering new-onset IBS after an initial urinary stone attack using a nationwide database. Methods A study group enrolled a total of 13,254 patients who were diagnosed with an initial urinary stone attack; a comparison group recruited 39,762 matched non-urinary stone participants during 2003 and 2007. We followed each patient for 3 years to determine new-onset IBS. We also used Cox proportional hazards models to analyze the risk of IBS between the study and comparison groups after modified by demographics, residence, patient characteristics and personal histories. Results The occurrence rates of IBS were 3.3% (n = 440) and 2.6% (n = 1,034) respectively in the study and comparison groups. A covariate-adjusted hazard ratio (HR) of IBS in the study group that was 1.28 times greater (HR = 1.29, 95% CI, 1.15–1.44) than that in the comparison group was showed in the stratified Cox proportional analysis. The adjusted HRs of IBS did not decrease after considering demographics and past histories. The majority of IBS (30.5%) occurred within the first 6 months after the stone attack. Conclusion Patients with an initial urinary stone attack are at increased risk of developing new-onset IBS. The HRs of IBS did not decrease even after adjusting for patient demographics and past histories. Most importantly, 30.5% of IBS occurred within the first 6 months after the urinary stone attack. PMID:27337114

  20. Successful treatment of acute hereditary angioedema attacks with self-administered icatibant in patients with venous access problems.

    Science.gov (United States)

    Wiednig, Michaela

    2013-04-25

    Hereditary angioedema is a rare and potentially fatal autosomal dominant disorder characterised by unpredictable skin, gastrointestinal tract or respiratory tract oedema. Plasma-derived C1-esterase inhibitors are effective in the prophylaxis or treatment of hereditary angioedema type I and II attacks, but must be administered intravenously. This may be problematic in patients with venous access difficulties. Icatibant, a bradykinin B2-receptor antagonist, is administered subcutaneously. In July 2008 icatibant received approval for healthcare professional-administered treatment of hereditary angioedema attacks in adults. In 2011 it received European Medicines Agency and US Food and Drug Administration licences for patient-administered treatment of hereditary angioedema attacks. Given these approvals, and with the appropriate training, icatibant could provide the opportunity for patients to self-administer treatment. This is one of the first long-term follow-up reports of patients with hereditary angioedema using self-administered icatibant. During follow-up, icatibant remained effective and patient satisfaction was high.

  1. Learning from Success: Exploring the Sustainability of a Collaborative Learning Initiative

    Science.gov (United States)

    Schechter, Chen; Ganon, Sherry

    2012-01-01

    Purpose: In light of limited sustainability of past collaborative-learning-centered initiatives over time, the purpose of this paper is to explore the determinants considered by both teachers and principals to influence the sustainability of a collective-learning-from-success (CLS) initiative in 12 urban elementary schools.…

  2. College and Career Readiness and Success: Inventory of Policies, Programs, and Initiatives

    Science.gov (United States)

    College and Career Readiness and Success Center, 2013

    2013-01-01

    This inventory is designed to assist state education agencies and other stakeholders to identify the policies, programs, and initiatives in their states that support students on their pathways to success in college and careers. In other words, it addresses the question: What policies, programs, and initiatives does your state have in place to…

  3. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  4. Counting equations in algebraic attacks on block ciphers

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Miolane, Charlotte Vikkelsø

    2010-01-01

    This paper is about counting linearly independent equations for so-called algebraic attacks on block ciphers. The basic idea behind many of these approaches, e.g., XL, is to generate a large set of equations from an initial set of equations by multiplication of existing equations by the variables...... independent equations which can be generated in algebraic attacks within each of these sets of a certain degree. While this does not give us a direct formula for the success of algebraic attacks on block ciphers, it gives some interesting bounds on the number of equations one can obtain from a given block...... to the algebraic attacks as defined here....

  5. 500 Maori PhDs in Five Years: Insights from a Successful Indigenous Higher Education Initiative

    Science.gov (United States)

    Villegas, Malia Maya

    2010-01-01

    With this thesis, I present a case study of the effort to graduate 500 "Maori" doctorates in five years in New Zealand in order to advance our understanding of a successful Indigenous higher education initiative. By paying careful attention to contextual factors, I describe the theoretical and practical significance of this effort and…

  6. SUCCESS FACTORS FOR E-LIVESTOCK: AN E-GOVERNMENT INITIATIVE

    Directory of Open Access Journals (Sweden)

    Arief Ramadhan

    2013-01-01

    Full Text Available E-Government system has been developed in various countries. Currently, e-Government specifically appears in various paradigms, such as e-Procurement, e-Voting. Lastly, has emerged a new paradigm in e-Government, called e-Livestock. Therefore, in this study, we will propose and discuss about several success factors for e-Livestock in Indonesia. We will take into account four previous researches that are related to this research. Based on four previous researches, we compose first round questionnaire that consists of 65 suggested success factors. We also compose second round questionnaire that consists of 14 suggested success factors. We combine and analyzed the result of both questionnaires, so that we get 62 success factors for e-Livestock in Indonesia. We propose that in practice, to make their initiative success, all of the 62 success factors that resulted from this research have to exist and be accommodated by all parties that involved in the e-Livestock initiative in Indonesia.

  7. Differences in Attack Avoidance and Mating Success between Strains Artificially Selected for Dispersal Distance in Tribolium castaneum.

    Directory of Open Access Journals (Sweden)

    Kentarou Matsumura

    Full Text Available Individuals of both dispersal and non-dispersal types (disperser and non-disperser are found in a population, suggesting that each type has both costs and benefits for fitness. However, few studies have examined the trade-off between the costs and benefits for the types. Here, we artificially selected for walking distance, i.e., an indicator of dispersal ability, in the red flour beetle Tribolium castaneum and established strains with longer (L-strains or shorter (S-strains walking distances. We then compared the frequency of predation by the assassin bug Amphibolus venator and the mating frequency of the selected strains. L-strain beetles suffered higher predation risk, than did S-strain beetles. L-strain males had significantly increased mating success compared to S-strain males, but females did not show a significant difference between the strains. The current results showed the existence of a trade-off between predation avoidance and mating success associated with dispersal types at a genetic level only in males. This finding can help to explain the maintenance of variation in dispersal ability within a population.

  8. Why cryptography should not rely on physical attack complexity

    CERN Document Server

    Krämer, Juliane

    2015-01-01

    This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successfully implemented in practice, they have generally not been considered a serious threat. In short, their physical attack complexity has been overestimated and the implied security threat has been underestimated. First, the book introduces the photonic side channel, which offers not only temporal resolution, but also the highest possible spatial resolution. Due to the high cost of its initial implementation, it has not been taken seriously. The work shows both simple and differential photonic side channel analyses. Then, it presents a fault attack against pairing-based cryptography. Due to the need for at least two indepe...

  9. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  10. THE ANALYSIS OF THE COMMODITY PRICE FORECASTING SUCCESS CONSIDERING DIFFERENT LENGTHS OF THE INITIAL CONDITION DRIFT

    Directory of Open Access Journals (Sweden)

    Marcela Lascsáková

    2015-09-01

    Full Text Available In the paper the numerical model based on the exponential approximation of commodity stock exchanges was derived. The price prognoses of aluminium on the London Metal Exchange were determined as numerical solution of the Cauchy initial problem for the 1st order ordinary differential equation. To make the numerical model more accurate the idea of the modification of the initial condition value by the stock exchange was realized. By having analyzed the forecasting success of the chosen initial condition drift types, the initial condition drift providing the most accurate prognoses for the commodity price movements was determined. The suggested modification of the original model made the commodity price prognoses more accurate.

  11. The connectivity agenda five years of success in Colombian e-gov initiatives.

    Directory of Open Access Journals (Sweden)

    Diego Fernando Cardona

    2010-05-01

    Full Text Available In this article the author try to emphasize how the Connectivity Agenda, enacted in 2000 as the Colombian policy to move the country toward the knowledge society trough the intensive use of Information and Communication Technologies – ICT, has been a successful electronic government initiative. To achieve it, the author describes first the general policy outline and then the proposed benefits comparing them to the ones already obtained, and explaining how there is no gap between planning and execution. To complement this exposition, the author presents the results of an evaluation model applied, which focused on determining what the citizens expect from the electronic administration and how they perceive it. Finally, the author states how both approaches conclude that the Connectivity Agenda can be considered as a successful electronic government initiative.

  12. Global mobility orientation and the success of self-initiated expatriates in greater China

    DEFF Research Database (Denmark)

    Lauring, Jakob; Selmer, Jan

    2014-01-01

    We investigated 640 self-initiated expatriate academics residing in Greater China. We examined whether their inherent demographic characteristics (age/gender) and acquired demographic characteristics (marital status/seniority) differentiated their work outcomes regarding job adjustment, time...... mobility orientation was associated with all the work outcomes, except satisfaction. For inherent demographic characteristics, we found support for our hypotheses that for individuals with less successful demographics (younger, male), there was a stronger relationship between global mobility orientation...

  13. Factors affecting initial training success of blood glucose testing in captive chimpanzees (Pan troglodytes).

    Science.gov (United States)

    Reamer, Lisa A; Haller, Rachel L; Thiele, Erica J; Freeman, Hani D; Lambeth, Susan P; Schapiro, Steven J

    2014-01-01

    Type 2 diabetes can be a problem for captive chimpanzees. Accurate blood glucose (BG) readings are necessary to monitor and treat this disease. Thus, obtaining voluntary samples from primates through positive reinforcement training (PRT) is critical. The current study assessed the voluntary participation of 123 chimpanzees in BG sampling and investigated factors that may contribute to individual success. All subjects participate in regular PRT sessions as part of a comprehensive behavioral management program. Basic steps involved in obtaining BG values include: voluntarily presenting a finger/toe; allowing digit disinfection; holding for the lancet device; and allowing blood collection onto a glucometer test strip for analysis. We recorded the level of participation (none, partial, or complete) when each chimpanzee was first asked to perform the testing procedure. Nearly 30% of subjects allowed the entire procedure in one session, without any prior specific training for the target behavior. Factors that affected this initial successful BG testing included sex, personality (chimpanzees rated higher on the factor "openness" were more likely to participate with BG testing), and past training performance for "present-for-injection" (chimpanzees that presented for their most recent anesthetic injection were more likely to participate). Neither age, rearing history, time since most recent anesthetic event nor social group size significantly affected initial training success. These results have important implications for captive management and training program success, underlining individual differences in training aptitude and the need for developing individual management plans in order to provide optimal care and treatment for diabetic chimpanzees in captivity.

  14. Neural correlates of user-initiated motor success and failure - A brain-computer interface perspective.

    Science.gov (United States)

    Yazmir, Boris; Reiner, Miriam

    2016-11-02

    Any motor action is, by nature, potentially accompanied by human errors. In order to facilitate development of error-tailored Brain-Computer Interface (BCI) correction systems, we focused on internal, human-initiated errors, and investigated EEG correlates of user outcome successes and errors during a continuous 3D virtual tennis game against a computer player. We used a multisensory, 3D, highly immersive environment. Missing and repelling the tennis ball were considered, as 'error' (miss) and 'success' (repel). Unlike most previous studies, where the environment "encouraged" the participant to perform a mistake, here errors happened naturally, resulting from motor-perceptual-cognitive processes of incorrect estimation of the ball kinematics, and can be regarded as user internal, self-initiated errors. Results show distinct and well-defined Event-Related Potentials (ERPs), embedded in the ongoing EEG, that differ across conditions by waveforms, scalp signal distribution maps, source estimation results (sLORETA) and time-frequency patterns, establishing a series of typical features that allow valid discrimination between user internal outcome success and error. The significant delay in latency between positive peaks of error- and success-related ERPs, suggests a cross-talk between top-down and bottom-up processing, represented by an outcome recognition process, in the context of the game world. Success-related ERPs had a central scalp distribution, while error-related ERPs were centro-parietal. The unique characteristics and sharp differences between EEG correlates of error/success provide the crucial components for an improved BCI system. The features of the EEG waveform can be used to detect user action outcome, to be fed into the BCI correction system.

  15. The GDAHA hospital performance reports project: a successful community-based quality improvement initiative.

    Science.gov (United States)

    Snow, Richard J; Engler, David; Krella, Joseph M

    2003-01-01

    During the past decade there has been increasing distribution of hospital performance information but few examples of how this information is affecting the quality of health care delivery. This article describes the methods of implementation and factors influencing a successful community-based quality improvement initiative in Dayton, Ohio, involving a collaborative of five competing hospitals in partnership with the business community and local and state hospital associations. The initiative contributed to a 36% reduction in acute myocardial infarction mortality over a 3-year period by changing reperfusion patterns in patients with ST segment elevated myocardial infarction. Identification of an opportunity gap, root cause analysis, and development of process measures used to facilitate health care provider change are summarized. The driving and restraining forces that have shaped this initiative from a report card to a quality improvement program are outlined and a list of five contributors to success are presented. These factors can serve as a basis for how other communities can benefit from this collaborative model.

  16. Kinetics of successive seeding of monodisperse polystyrene latexes. I - Initiation via potassium persulfate. II - Azo initiators with and without inhibitors

    Science.gov (United States)

    Sudol, E. D.; El-Aasser, M. S.; Vanderhoff, J. W.

    1986-01-01

    The polymerization kinetics of monodisperse polystyrene latexes with diameters of 1 micron are studied. The monodisperse latexes were prepared by the successive seeding method using 1 mM K2S2O8 with an 8 percent emulsifier surface coverage and 0.5 mM K2S2O8 with a 4 percent emulsifier surface coverage, and the kinetics were measured in a piston/cylinder dialometer. The data reveal that the polymerization rate decreases with increasing particle size; and the surface charge decreases with increasing particle size. The effects of initiators (AIBN and AMBN) and inhibitors (NH24SCN, NaNO2, and hydroquinone) on the product monodispersity and polymerization kinetics of latexes with diameters greater than 1 micron are investigated in a second experiment. It is observed that hydroquinone combined with AMBN are most effective in reducing nucleation without causing flocculation. It is noted that the kinetic transition from emulsion to bulk is complete for a particle size exceeding 1 micron in which the polymerization rate is independent of the particle size.

  17. Strategies, tools and processes for succession planning: Analysis of the BC ministry of forests and range succession planning initiative

    OpenAIRE

    Allen, Sheila

    2005-01-01

    Succession Planning is fast becoming an urgent issue facing today's organizations. Looming mass retirements due to the baby boomer generation means that organizations can expect to lose knowledgeable and experienced workers and finding replacements will be difficult as mass retirements force a labour shortage. Consequently, many organizations are creating succession plans. In an investigation of the British Columbia Ministry of Forests and Range Succession Plan, internal documents and previou...

  18. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  19. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  20. IVs to Skip for Immunizing WEP against FMS Attack

    Science.gov (United States)

    Kobara, Kazukuni; Imai, Hideki

    The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While almost all of the WLAN (Wireless LAN) cards and the APs (Access Points) support WEP, a serious key recovery attack (aka FMS attack) was identified by Fluhrer et al. The FMS attack can basically be prevented by skipping IVs (Initial Values) used in the attack, but naive skip methods reveal information on the WEP key since most of them depend on the WEP key and the patterns of the skipped IV reveal it. In order to skip IVs safely, the skip patterns must be chosen carefully. In this paper, we review the attack conditions (6) and (7), whose success probability is the highest, 0.05, amongst all known conditions to guess one key-byte from one packet. Then we identify their safe skip patterns.

  1. Succession on regraded placer mine spoil in Alaska, USA, in relation to initial site characteristics

    Science.gov (United States)

    Densmore, R.V.

    1994-01-01

    This study evaluated the rate and pattern of natural succession on regraded placer mine spoil in relation to initial substrate characteristics. The study site was the Glen Creek watershed of the Kantishna mining area of Denali National Park and Preserve, Alaska. After regrading, twelve 0.01-ha plots were established and substrate characteristics were measured. Natural plant succession was evaluated after five growing seasons. Three successional patterns were identified on the basis of plant community characteristics using cluster analysis, and were related to substrate characteristics. First, a riparian plant community with vigorous Salix alaxensis and Alnus crispa grew rapidly on topsoil that had been spread over the regraded spoil. Second, a similar plant community with less vigorous S. alaxensis developed more slowly on unprocessed spoil and spoil amended with a small amount of topsoil. Third, processed spoil remained almost bare of vegetation, although S. alaxensis was able to establish and persist in a stunted growth form. In contrast, Alnus crispa had difficulty establishing on processed spoil, but the few established seedlings grew well. Several substrate variables, including the proportion of silt and clay vs. sand, total nitrogen, and water retention capacity, were good predictors of the rate and pattern of succession. Total nitrogen was the best single predictor for the number of vigorous S. alaxensis.

  2. The attack initiation of Al-Zn-In-Sn anode by the segregation concentrating Zn,Sn and In

    Energy Technology Data Exchange (ETDEWEB)

    Qi, G.T.; Qiu, Y.B.; Cai, Q.Z. [Department of Chemistry and Chemical Engineering, Huazhong University of Science and Technology, Wuhan (China); Zhao, Y.N. [Department of Biological and Chemical Engineering, Nanyang Institute of Technology, Nanyang (China)

    2009-03-15

    The microstructure of Al-5%Zn-0.025%In-0.15%Sn anode was investigated by EPMA, and EDAX. The result showed that the microstructure at the Al-Zn-In-Sn anode can be categorized into two different types, namely the catenulate segregation enriched in Zn, Fe, Si, and the elliptical or rounded segregation where Zn, Sn, In concentrated. In order to explain the initial dissolution of the aluminum anode, the electrochemical behavior in 3% NaCl solution of the Al-Zn-In-Sn anode and its simulated segregation concentrating Zn, Sn, In were tested using potentiodynamic polarization and electrochemical impedance spectroscopy. The result showed that the simulated segregation concentrating Zn,Sn, In would preferentially be dissolved into the solution as the anode of galvanic cell. (Abstract Copyright [2009], Wiley Periodicals, Inc.)

  3. RESISTANCE TO CHANGE AND ERP IMPLEMENTATION SUCCESS: THE MODERATING ROLE OF CHANGE MANAGEMENT INITIATIVES

    Directory of Open Access Journals (Sweden)

    Zafar U. Ahmed

    2006-01-01

    Full Text Available Enterprise Resource Planning (ERP is a useful tool that builds strong capabilities, improves performance, supports better decision making, and provides competitive advantage for businesses. ERP aims to help the management by setting better business practices and equipping them with the right information to take timely decision. In any new technology implementation, one of the issues that need to be addressed is the resistance to change. Many implementations have failed due to strong resistance from the end users. Thus, the main purpose of this paper is to test the impact of resistance to change on ERP's implementation success and how change management initiatives acts in the capacity of a moderating role. Using data collected from 69 manufacturing organizations through a mail survey, it was found that resistance to change is negatively related to achievement of predetermined goals (b = –0.930, p < 0.01 and usersatisfaction (b = –0.952, p < 0.01. Further, change management initiatives did not moderate the relationship between resistance and predetermined goals but it moderated the relationship between resistance and user satisfaction. In addition, change management initiatives have a direct positive impact on user satisfaction. This research concludes that the human factor is very important in ERP's implementation.

  4. Successful Reconstruction of Tooth Germ with Cell Lines Requires Coordinated Gene Expressions from the Initiation Stage

    Directory of Open Access Journals (Sweden)

    Yasuhiro Tomooka

    2012-10-01

    Full Text Available Tooth morphogenesis is carried out by a series of reciprocal interactions between the epithelium and mesenchyme in embryonic germs. Previously clonal dental epithelial cell (epithelium of molar tooth germ (emtg lines were established from an embryonic germ. They were odontogenic when combined with a dental mesenchymal tissue, although the odontogenesis was quantitatively imperfect. To improve the microenvironment in the germs, freshly isolated dental epithelial cells were mixed with cells of lines, and germs were reconstructed in various combinations. The results demonstrated that successful tooth construction depends on the mixing ratio, the age of dental epithelial cells and the combination with cell lines. Analyses of gene expression in these germs suggest that some signal(s from dental epithelial cells makes emtg cells competent to communicate with mesenchymal cells and the epithelial and mesenchymal compartments are able to progress  odontogenesis from the initiation stage.

  5. Measures of student success with textbook transformations: the Affordable Learning Georgia Initiative

    Directory of Open Access Journals (Sweden)

    Emily Croteau

    2017-03-01

    Full Text Available In 2014, the state of Georgia’s budget supported a University System of Georgia (USG initiative: Affordable Learning Georgia (ALG. The initiative was implemented via Textbook Transformation Grants, which provided grants to USG faculty, libraries and librarians, and institutions to “transform their use of textbooks and other learning materials into using lower cost options”, in other words to use open educational resources (OER in lieu of a traditional bound textbook. The Round One Textbook Transformation Grants have already shown to be successful in that they saved students approximately $760,000.  What is not known, is the collective impact on student learning. This study examines the learning gains or losses pre- and post-transformation in ALG Round One courses where traditional resources were replaced with OER.  It estimates differences between pre- and post- textbook transformation across the following outcomes: 1 Drop Fail Withdraw (DFW rates, 2 rates of completion, 3 numbers of students receiving a final grade of A or B, C and D, 4 numerical final grades as a percent, 5 final exam grades as a percent, and, 6 course-specific assessment grades measured in percent. Twenty-four data sets were analyzed for DFW rate, eight data sets for completion rate, fourteen data sets for grade distribution, three data sets for final exam grades, three data sets for course specific assessment and one data set for final grades. The null hypothesis that there would be no differences between pre- and post-transformation rates in these learning outcomes was supported.  Thus, this study demonstrates that the USG’s ALG initiative helped students save money without negatively impacting learning outcomes. In addition, it is the first of its kind to measure some of these learning outcomes (e.g. final exam grade, assessment grade, and distribution of letter grades at this scale.

  6. Five Major State-Level Copper,Lead, Zinc Resource Succession Bases in Tibet Have Initially Taken Shape

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    According to the Chengdu Center of China Geological Survey,five major state-level copper-lead-zinc resource succession bases in Tibet have initially taken shape,featuring tremendous resource potentials.It has been learned that these five major resource succession bases are respectively copper-lead-zinc molybdenum iron prospecting development base in Central Tibet,chromite

  7. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  8. Engaging Faculty in the Achieving the Dream Initiative. Principles and Practices of Student Success

    Science.gov (United States)

    Birnback, Lara; Friedman, Will

    2009-01-01

    Stakeholder engagement is critical to the success of Achieving the Dream. Broad-based support for the college's student success agenda and institutional change efforts requires engaging faculty, staff, students, community members, and others in the change process. These stakeholders can bring to light critical obstacles to student success and help…

  9. The New Hampshire Ten Steps to Successful Breastfeeding Collaborative: A Statewide QI Initiative.

    Science.gov (United States)

    Whalen, Bonny L; Kelly, Joyce; Holmes, Alison Volpe

    2015-06-01

    Despite national recognition for their breastfeeding-friendly practices, many New Hampshire hospitals are still not achieving the Ten Steps to Successful Breastfeeding. To increase achievement of the Ten Steps in New Hampshire's birthing hospitals, facilitate Baby-Friendly Hospital Initiative (BFHI) designation for interested hospitals, and improve rates of in-hospital any and exclusive breastfeeding. After a 2010 needs assessment, we conducted 2 statewide workshops targeting 6 of the Ten Steps found to be most deficient among New Hampshire birthing hospitals. Eighteen of 20 hospitals attended at least 1 workshop, and 6 participated in an intensive collaborative. In 2013, we analyzed interval Ten Step achievement and in-hospital breastfeeding trends. Staff education showed the greatest improvement, increasing step 2 achievement from 1 to 6 hospitals (P=.05). Although the number of hospitals implementing step 6 (breast milk only) and step 9 (no artificial nipples) increased, differences were not statistically significant. Intensive collaborative hospitals achieved an average of 1.5 new steps, whereas non-Baby Friendly hospitals lost 0.7 steps (P=.05). In-hospital breastfeeding rates increased in intensive collaborative hospitals and were significantly higher than those in non-Baby Friendly hospitals by the end of the study (any breastfeeding, 89% vs 73%, P=.03; exclusive breastfeeding, 84% vs 61%, Pbreastfeeding for hospitals participating in an intensive collaborative. Active work in Ten Step implementation, including staff education, appears to be more effective in increasing in-hospital breastfeeding than does BFHI designation alone. Copyright © 2015 by the American Academy of Pediatrics.

  10. An integrated mission approach to the space exploration initiative will ensure success

    Science.gov (United States)

    Coomes, Edmund P.; Dagle, Jefferey E.; Bamberger, Judith A.; Noffsinger, Kent E.

    1991-01-01

    The direction of the American space program, as defined by President Bush and the National Commission on Space, is to expand human presence into the solar system. Landing an American on Mars by the 50th anniversary of the Apollo 11 lunar landing is the goal. This challenge has produced a level of excitement among young Americans not seen for nearly three decades. The exploration and settlement of the space frontier will occupy the creative thoughts and energies of generations of Americans well into the next century. The return of Americans to the moon and beyond must be viewed as a national effort with strong public support if it is to become a reality. Key to making this an actuality is the mission approach selected. Developing a permanent presence in space requires a continual stepping outward from Earch in a logical progressive manner. If we seriously plan to go and to stay, then not only must we plan what we are to do and how we are to do it, we must address the logistic support infrastructure that will allow us to stay there once we arrive. A fully integrated approach to mission planning is needed if the Space exploration Initiative (SEI) is to be successful. Only in this way can a permanent human presence in space be sustained. An integrated infrastructure approach would reduce the number of new systems and technologies requiring development. The resultant horizontal commonality of systems and hardware would reduce the direct economic impact of SEI while an early return on investment through technology spin-offs would be an economic benefit by greatly enhancing our international technical competitiveness. If the exploration, development, and colonization of space is to be affordable and acceptable, careful consideration must be given to such things as ``return on investment'' and ``commercial product potential'' of the technologies developed. This integrated approach will win the Congressional support needed to secure the financial backing necessary to assure

  11. Extracorporeal Shock-wave Lithotripsy Success Rate and Complications: Initial Experience at Sultan Qaboos University Hospital

    Directory of Open Access Journals (Sweden)

    Mohammed S. Al-Marhoon

    2013-07-01

    Full Text Available Objective: To assess the efficacy and safety of extracorporeal shock wave lithotripsy with Modularis Vario Siemens in the management of patients with renal and ureteral stones.Methods: Between 2007 and 2009, 225 outpatients were treated with Siemens Modularis Vario lithotripter at Sultan Qaboos University Hospital. Stone size, location, total number of shockwaves, stone-free rate, complications and adjunctive interventions were investigated. Chi-Square and Logistic Regression analyses were used, with p<0.05 set as the level of significance.Results: Of the 225 initial consecutive patients who underwent extracorporeal shock wave lithotripsy, 192 (85% had renal stones and 33 (15% had ureteric stones. The mean±SD stone size was 11.3 ± 4.5 mm, while the mean age of the patients was 39.9 ± 12.8 years with 68.5% males. The mean renal stone size was 11.6 ± 4.7 mm; a mean of 1.3 sessions was required. The mean ureteric stone size was 9.9 ± 3 mm; and a mean of 1.3 sessions was required. Treatment success (defined as complete clearance of ureteric stones, stone-free or clinically insignificant residual fragments of <4 mm for renal stones was 74% for renal stones and 88% for ureteric stones. Additional extracorporeal shock wave lithotripsy and ureteroscopy were the most adjunctive procedures used for stone clearance. Complications occurred in 74 patients (38.5% with renal stones and 13 patients (39.4% with uretetric stones. The most common complication was loin pain (experienced by 16.7% with renal stones and 21% with ureteric stones. Severe renal colic mandating admission occurred in 2% of patients with renal stones and 6% of patients with ureteric stones. In patients with renal stone, steinstrasse occurred in 3.6% and infection post extracorporeal shock wave lithotripsy in 0.5%. Using Multivariate Logistic Regression analysis, factors found to have significant effect on complete stone clearance were serum creatinine (p=0.004 and the number of

  12. Ways of decision of problem of forming for the cadets of the special qualities, need the militiaman to successful counteract against the armed attack

    Directory of Open Access Journals (Sweden)

    Bondarenko V.V.

    2010-10-01

    Full Text Available Directions of forming of the special qualities of workers of militia are certain. Information is systematized about the real collisions of workers of militia with criminals. Conformities to law are rotined in the conduct of a be out for scalps criminal. The necessity of development and perfection of the special qualities of workers of militia is exposed. The terms of the hidden attack of criminal are considered. The necessity of mastering of knowledge is rotined about preparatory motions of the armed criminal. Directions of perfection of the special physical and psychical qualities, forming of abilities and skills of implementation of receptions of disarmament, are resulted.

  13. Impact of School Based Leadership Teams for Implementing a Successful Professional Development Initiative

    Science.gov (United States)

    Yager, Stuart; Yager, Robert

    2011-01-01

    This study focuses on the depth of implementation of a professional development initiative. In one group, the school based leadership team was provided specialized coaching to support and monitor the implementation of the initiative. In the other group, no assistance was provided. Results indicate that the coaching of a school-based leadership…

  14. Has the Alberta daily physical activity initiative been successfully implemented in Calgary schools?

    NARCIS (Netherlands)

    Kennedy, Christine Diane; Cantell, Marja; Dewey, Deborah

    INTRODUCTION: In September 2005, the Alberta government introduced the daily physical activity (DPA) initiative, which requires that students from grades 1 to 9 be physically active in school for a minimum of 30 min per day. OBJECTIVE: To obtain information on whether and how the DPA initiative has

  15. Expansion of the Baby-Friendly Hospital Initiative Ten Steps to Successful Breastfeeding into Neonatal Intensive Care : Expert Group Recommendations

    NARCIS (Netherlands)

    Nyqvist, Kerstin H.; Haggkvist, Anna-Pia; Hansen, Mette N.; Kylberg, Elisabeth; Frandsen, Annemi L.; Maastrup, Ragnhild; Ezeonodo, Aino; Hannula, Leena; Haiek, Laura N.

    2013-01-01

    In the World Health Organization/United Nations Children's Fund document Baby-Friendly Hospital Initiative: Revised, Updated and Expanded for Integrated Care, neonatal care is mentioned as 1 area that would benefit from expansion of the original Ten Steps to Successful Breastfeeding. The different s

  16. Ciclovía initiatives: engaging communities, partners, and policy makers along the route to success.

    Science.gov (United States)

    Zieff, Susan G; Hipp, J Aaron; Eyler, Amy A; Kim, Mi-Sook

    2013-01-01

    Recent efforts to increase physical activity through changes to the built environment have led to strategies and programs that use existing public space, including bicycle lanes, temporary parks, and the ciclovia initiative (scheduled events in which streets are closed to motorized vehicles and opened for recreational activities) popularized in South America. This article describes and compares the processes and structures involved in developing and implementing a ciclovia-type program in 2 US urban contexts: San Francisco, California, and St Louis, Missouri. Considering the current growth of and interest in ciclovia initiatives, important outcomes, lessons learned are offered for application in other, similar settings. Primary sources from both initiatives and from published research on ciclovias constitute the body of evidence and include year-end reports, grant applications, meeting minutes, budgets, published ciclovia guidelines, evaluation studies and Web sites, media sources, and interviews and personal communication with the organizers. Primary source documents were reviewed and included in this analysis if they offered information on 3 grounded questions: What processes were used in developing the initiative? What are the current structures and practices used in implementation of initiatives? What are important lessons learned and best practices from initiatives for recommendations to stakeholders and policy makers in other contexts? Among the categories compared, the structures and processes for implementation regarding buy-in and city department collaboration, route selection, programming, partnerships, media promotion, community outreach, and merchant support were relatively similar among the 2 initiatives. The categories that differed included staffing and volunteer engagement and funding. Buy-in from community partners, merchants, residents, and city agencies is critical for a positive experience in developing and implementing ciclovia-type initiatives

  17. Entrepreneurial Choices of Initial Human Capital Endowments and New Venture Success

    DEFF Research Database (Denmark)

    Rocha, Vera; Van Praag, Mirjam; B. Folta, Timothy;

    The founder (team)'s human capital is a vital determinant of future firm performance. This is a stylized fact. Less is known about the effect of the human capital of the initial workforce hired by the founder(s). We study the performance consequences of a founder's choice of the initial workforce......'s human capital (quantity and quality), besides the human capital of the founder(s). The analysis is based on matched employer-employee data and covers about 5,300 startups in manufacturing industries founded by individuals coming from employment between 1992 and 2007. We acknowledge that initial hiring...... decisions are endogenous and correlated with the human capital of the founders and the ownership structure of startups (single founder versus team of founders). Given the stickiness of initial choices, human capital decisions at entry turn out to be a close to irreversible matter with significant...

  18. Organizational and individual determinants of using initiatives conducive to successful work-life balance

    National Research Council Canada - National Science Library

    Andysz, Aleksandra; Najder, Anna; Merecz-Kot, Dorota

    2014-01-01

    .... Unfortunately, many professionally active people experience work-family conflict. In order to minimize it, employees are offered various solutions aimed at reconciling professional and private spheres (work-life balance (WLB) initiatives...

  19. ORGANIZATIONAL AND INDIVIDUAL DETERMINANTS OF USING INITIATIVES CONDUCIVE TO SUCCESSFUL WORK-LIFE BALANCE

    National Research Council Canada - National Science Library

    Andysz, Aleksandra; Najder, Anna; Merecz-Kot, Dorota

    2014-01-01

    .... Unfortunately, many professionally active people experience work-family conflict. In order to minimize it, employees are offered various solutions aimed at reconciling professional and private spheres (work-life balance (WLB) initiatives...

  20. Entrepreneurial Choices of Initial Human Capital Endowments and New Venture Success

    DEFF Research Database (Denmark)

    Rocha, Vera; Van Praag, Mirjam; B. Folta, Timothy

    The founder (team)'s human capital is a vital determinant of future firm performance. This is a stylized fact. Less is known about the effect of the human capital of the initial workforce hired by the founder(s). We study the performance consequences of a founder's choice of the initial workforce......'s human capital (quantity and quality), besides the human capital of the founder(s). The analysis is based on matched employer-employee data and covers about 5,300 startups in manufacturing industries founded by individuals coming from employment between 1992 and 2007. We acknowledge that initial hiring...... decisions are endogenous and correlated with the human capital of the founders and the ownership structure of startups (single founder versus team of founders). Given the stickiness of initial choices, human capital decisions at entry turn out to be a close to irreversible matter with significant...

  1. [Organizational and individual determinants of using initiatives conducive to successful work-life balance].

    Science.gov (United States)

    Andysz, Aleksandra; Najder, Anna; Merecz-Kot, Dorota

    2014-01-01

    Appropriate distribution of time and energy between work and personal life poses a challenge to many working people. Unfortunately, many professionally active people experience work-family conflict. In order to minimize it, employees are offered various solutions aimed at reconciling professional and private spheres (work-life balance (WLB) initiatives). The authors attempt to answer what makes employees use WLB initiatives and what influences the decision to reject the available options. The review is based on the articles published after 2000, searched by Google Scholar and Web of Knowledge with use of the key words: work-life balance, work-family conflict, work-life balance initiatives, work-life balance initiatives use, use of WLB solutions. We focused on organizational and individual determinants of WLB initiatives use, such as organizational culture, stereotypes and values prevailing in the work environment that may result in stigmatization of workers - flexibility stigma. We discuss the reasons why supervisors and co-workers stigmatize their colleagues, and what are the consequences of experiencing such stigmatization. Among the individual determinants of WLB initiatives use, we have inter alia focused on the preference for integration vs. separation of the spheres of life. The presented material shows that social factors - cultural norms prevailing in a society, relationships in the workplace and individual factors, such as the level of self-control - are of equal importance for decisions of using WLB initiatives as their existence. Our conclusion is that little attention has been paid to the research on determinants of WLB initiatives use, especially to individual ones.

  2. Organizational and individual determinants of using initiatives conducive to successful work-life balance

    Directory of Open Access Journals (Sweden)

    Aleksandra Andysz

    2014-02-01

    Full Text Available Appropriate distribution of time and energy between work and personal life poses a challenge to many working people. Unfortunately, many professionally active people experience work-family conflict. In order to minimize it, employees are offered various solutions aimed at reconciling professional and private spheres (work-life balance (WLB initiatives. The authors attempt to answer what makes employees use WLB initiatives and what influences the decision to reject the available options. The review is based on the articles published after 2000, searched by Google Scholar and Web of Knowledge with use of the key words: work-life balance, work-family conflict, work-life balance initiatives, work-life balance initiatives use, use of WLB solutions. We focused on organizational and individual determinants of WLB initiatives use, such as organizational culture, stereotypes and values prevailing in the work environment that may result in stigmatization of workers - flexibility stigma. We discuss the reasons why supervisors and co-workers stigmatize their colleagues, and what are the consequences of experiencing such stigmatization. Among the individual determinants of WLB initiatives use, we have inter alia focused on the preference for integration vs. separation of the spheres of life. The presented material shows that social factors - cultural norms prevailing in a society, relationships in the workplace and individual factors, such as the level of self-control - are of equal importance for decisions of using WLB initiatives as their existence. Our conclusion is that little attention has been paid to the research on determinants of WLB initiatives use, especially to individual ones. Med Pr 2014;65(1:119–129

  3. Coping Successfully with Dyslexia: An Initial Study of an Inclusive School-Based Resilience Programme

    Science.gov (United States)

    Firth, Nola; Frydenberg, Erica; Steeg, Charlotte; Bond, Lyndal

    2013-01-01

    A dyslexia coping programme entitled "Success and Dyslexia" was implemented in two primary schools within a whole-class coping programme and whole-school dyslexia professional development context. One hundred and two year 6 students, 23 of whom had dyslexia, undertook surveys pretest, post-test and at 1-year follow-up. Effectiveness of…

  4. Coping Successfully with Dyslexia: An Initial Study of an Inclusive School-Based Resilience Programme

    Science.gov (United States)

    Firth, Nola; Frydenberg, Erica; Steeg, Charlotte; Bond, Lyndal

    2013-01-01

    A dyslexia coping programme entitled "Success and Dyslexia" was implemented in two primary schools within a whole-class coping programme and whole-school dyslexia professional development context. One hundred and two year 6 students, 23 of whom had dyslexia, undertook surveys pretest, post-test and at 1-year follow-up. Effectiveness of the coping…

  5. Coping Successfully with Dyslexia: An Initial Study of an Inclusive School-Based Resilience Programme

    Science.gov (United States)

    Firth, Nola; Frydenberg, Erica; Steeg, Charlotte; Bond, Lyndal

    2013-01-01

    A dyslexia coping programme entitled "Success and Dyslexia" was implemented in two primary schools within a whole-class coping programme and whole-school dyslexia professional development context. One hundred and two year 6 students, 23 of whom had dyslexia, undertook surveys pretest, post-test and at 1-year follow-up. Effectiveness of…

  6. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. The Occurrence and the Success Rate of Self-Initiated Self-Repair

    Science.gov (United States)

    Sato, Rintaro; Takatsuka, Shigenobu

    2016-01-01

    Errors naturally appear in spontaneous speeches and conversations. Particularly in a second or foreign language, it is only natural that mistakes happen as a part of the learning process. After an inappropriate expression is detected, it can be corrected. This act of correcting can be initiated either by the speaker (non-native speaker) or the…

  8. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  9. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  10. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  11. Initial Sleep Time Predicts Success in Manual-Guided Cognitive Behavioral Therapy for Insomnia.

    Science.gov (United States)

    Bothelius, Kristoffer; Kyhle, Kicki; Broman, Jan-Erik; Gordh, Torsten; Fredrikson, Mats

    2016-01-01

    Cognitive behavioral therapy produces significant and long-lasting improvement for individuals with insomnia, but treatment resources are scarce. A "stepped care" approach has therefore been proposed, but knowledge is limited on how to best allocate patients to different treatment steps. In this study, 66 primary-care patients with insomnia attended a low-end treatment step: manual-guided cognitive behavioral therapy (CBT) for insomnia delivered by ordinary primary-care personnel. Based on clinically significant treatment effects, subjects were grouped into treatment responders or nonresponders. Baseline data were analyzed to identify predictors for treatment success. Long total sleep time at baseline assessment was the only statistically significant predictor for becoming a responder, and sleep time may thus be important to consider before enrolling patients in low-end treatments.

  12. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  13. Speed enforcement in China: National, provincial and city initiatives and their success.

    Science.gov (United States)

    He, Jie; King, Mark; Watson, Barry; Rakotonirainy, Andry; Fleiter, Judy

    2013-01-01

    China is motorizing rapidly, with associated urban road development and extensive construction of motorways. Speeding accounts for about 10% of fatalities, which represents a large decrease from a peak of 17.2% in 2004. Speeding has been addressed at a national level through the introduction of laws and procedural requirements in 2004, in provinces either across all road types or on motorways, and at city level. Typically, documentation of speed enforcement programmes has taken place when new technology (i.e. speed cameras) is introduced, and it is likely that many programmes have not been documented or widely reported. In particular, the national legislation of 2004 and its implementation was associated with a large reduction in fatalities attributed to speeding. In Guangdong Province, after using speed detection equipment, motorway fatalities due to speeding in 2005 decreased by 32.5% comparing with 2004. In Beijing, the number of traffic monitoring units which were used to photograph illegal traffic activities such as traffic light violations, speeding and using bus lanes illegally increased to 1958 by April 1, 2009, and in the future such automated enforcement will become the main means of enforcement, expected to account for 60% of all traffic enforcement in Beijing. This paper provides a brief overview of the speeding enforcement programmes in China which have been documented and their successes.

  14. The role of tissue-specific microbiota in initial establishment success of Pacific oysters.

    Science.gov (United States)

    Lokmer, Ana; Kuenzel, Sven; Baines, John F; Wegner, Karl Mathias

    2016-03-01

    Microbiota can have positive and negative effects on hosts depending on the environmental conditions. Therefore, it is important to decipher host-microbiota-environment interactions, especially under natural conditions exerting (a)biotic stress. Here, we assess the relative importance of microbiota in different tissues of Pacific oyster for its successful establishment in a new environment. We transplanted oysters from the Southern to the Northern Wadden Sea and controlled for the effects of resident microbiota by administering antibiotics to half of the oysters. We then followed survival and composition of haemolymph, mantle, gill and gut microbiota in local and translocated oysters over 5 days. High mortality was recorded only in non-antibiotic-treated translocated oysters, where high titres of active Vibrio sp. in solid tissues indicated systemic infections. Network analyses revealed the highest connectivity and a link to seawater communities in the haemolymph microbiota. Since antibiotics decreased modularity and increased connectivity of the haemolymph-based networks, we propose that community destabilization in non-treated translocated oysters could be attributed to interactions between resident and external microbiota, which in turn facilitated passage of vibrios into solid tissues and invoked disease. These interactions of haemolymph microbiota with the external and internal environment may thus represent an important component of oyster fitness.

  15. Phytoplankton succession in an isolated upwelled Benguela water body in relation to different initial nutrient conditions

    Science.gov (United States)

    Wasmund, Norbert; Nausch, Günther; Hansen, Anja

    2014-11-01

    Freshly upwelled water is poor in phytoplankton biomass but rich in nutrients. With its ageing, phytoplankton biomass increases whereas the nutrients are consumed. The overall aim of our investigation was to check the succession in the phytoplankton composition as a consequence of changing nutrient conditions. The experiments were carried out in mesocosms filled with surface water in the northern Benguela region and installed on board of R/V "Maria S. Merian". In the freshly upwelled water, phytoplankton took up nitrogen at a higher rate than phosphorus if compared with the Redfield ratio. Therefore, nitrogen was exhausted already by day 6. Nitrogen limitation after day 6 was indicated by decreasing chlorophyll a (chla) concentrations, primary production rates and productivity indices and increasing C/N ratios in particulate matter. Despite nitrogen limitation, phosphorus addition stimulated further growth, mainly of diatoms, pointing to luxury uptake. Cyanobacteria did not develop and nitrogen fixation was zero even with phosphorus and iron addition. Diatoms stay the most important group in the freshly upwelled water, but autotrophic and heterotrophic dinoflagellates increase strongly in the matured upwelled water. Mesocosms excluded disturbances by advective water transports, which influence the study of succssions under field conditions.

  16. Immunomodulating and Immunoresistance Properties of Cancer-Initiating Cells: Implications for the Clinical Success of Immunotherapy.

    Science.gov (United States)

    Maccalli, Cristina; Parmiani, Giorgio; Ferrone, Soldano

    2017-04-01

    Cancer-initiating cells (CICs) represent a relatively rare subpopulation of cells endowed with self-renewal, stemness properties, tumorigenicity in immunodeficient mice, and resistance to standard therapies as well as to immunotherapy. Here, we review the biological and immunological characteristics of CICs with special focus on the immunomodulating mechanisms they utilize to escape from immunosurveillance. The recently developed immunotherapeutic strategies have yielded remarkable clinical results in many types of tumors, indicating that indeed a patient's immune system can mount an immune response, which is effective in controlling tumor growth. However, a high proportion of patients is resistant or acquires resistance to these therapeutic strategies. The latter findings may reflect, at least in some cases, the inability of the immunotherapeutic strategies used to eradicate CICs. The CICs that escape immune recognition and destruction may give rise to new tumors in the same organ site or through the metastatic colonization in other anatomic sites. Identification of novel therapeutic approaches that can eradicate CICs is a major challenge in the cancer therapy area. An improved understanding of the interactions of CICs with immune system and with tumor microenvironment may contribute to optimize the available therapies and to design novel combination treatments for cancer therapy.

  17. Determinants of percutaneous coronary intervention success in repeat chronic total occlusion procedures following an initial failed attempt

    Science.gov (United States)

    Cuevas, Cecilia; Ryan, Nicola; Quirós, Alicia; Del Angel, Juan Gustavo; Gonzalo, Nieves; Salinas, Pablo; Jiménez-Quevedo, Pilar; Nombela-Franco, Luis; Nuñez-Gil, Ivan; Fernandez-Ortiz, Antonio; Macaya, Carlos; Escaned, Javier

    2017-01-01

    AIM To investigate the rates and determinants of success of repeat percutaneous coronary intervention (PCI) following an initial failed attempt at recanalising the chronic total occlusions (CTO) percutaneously. METHODS In 445 consecutive first attempt CTO-PCI procedures in our institution, procedural failure occurred in 149 (33.5%). Sixty-four re-PCI procedures were performed in 58 patients (39%) all had a single CTO. Procedural and outcome data in the re-PCI population was entered into the institutional database. A retrospective analysis of clinical, angiographic and procedural data was performed. RESULTS Procedural success was achieved in 41 (64%) procedures. Univariate analysis of clinical and angiographic characteristics showed that re-PCI success was associated with intravascular ultrasound (IVUS) guidance (19.5% vs 0%, P = 0.042), while failure was associated with severe calcification (30.4% vs 9.7%, P = 0.047) and a JCTO score > 3 (56.5% vs 17.1% P = 0.003). Following multiple regression analysis the degree of lesion complexity (J-CTO score > 3), IVUS use, involvement of an experienced CTO operator and LAD CTO location were significant predictors of successful re-PCI. Overall the complication rate was low, with the only MACCE two periprocedural MI’s neither of which required intervention. CONCLUSION Re-PCI substantially increases the overall success rate of CTO revascularization. Predictors of re-PCI success included the use of IVUS, the involvement of an experienced CTO operator in the repeat attempt and the location of the CTO. PMID:28515854

  18. Spontaneous and initiated succession on unvegetated slopes in the abandoned lignite-mining area of Goitsche, Germany

    Energy Technology Data Exchange (ETDEWEB)

    Kirmer, A.; Mahn, E.G. [Hsch Anhalt, Bernburg (Germany)

    2001-07-01

    The colonization of unvegetated, dry slopes in the lignite-mining area of Goitsche, Germany was examined. The plots, characterized by different habitat conditions, were studied from 1994-2000. The vegetation development on treated plots was compared to untreated plots showing spontaneous succession. For initial treatments the authors used fresh plant clippings from a species-rich sandy grassland (Armerion elongatae) mowed at the end of July. Soil seed bank samples, taken at the beginning of the experiments and cultivated for 18 months, confirmed that the vegetation development on the slopes started with primary succession. The hospitable Quaternary substrate of Site I (pH = 4.1-4.7, 92% sand) supports fast vegetation development on treated and untreated plots. On treated plots, we have identified plant assemblages similar to initial stages of the Armerion elongatae community were identified. On control plots, Coryne-phorion communities have established spontaneously. At Site II (mixed Quaternary and Tertiary substrate, pH = 3.0-3.5, 40% sand) the total cover and number of psammophytic species was low. Treated plots showed development towards ruderal sandy grassland, but the establishment of Calamagrostis epigejos would eventually lead to monodominant stands. Untreated control plots showed basically the same pattern, however the development was slower. At Site III (pH = 1.8-2.8, 34% sand), the hostile Tertiary substrate impeded the succession on both treated and untreated plots because low pH and therefore high amounts of Al{sup 3+} produced elemental toxicity to plants. The application of plant clippings accelerated the vegetation development in sites with a pH exceeding 3. On plots with the initial treatment, vegetation cover and total number of species were higher than on untreated plots. The application of fresh plant clippings from areas with similar habitat conditions appears to be a viable alternative to traditional restoration methods.

  19. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  20. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  1. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  2. Initiation of the Mekong River delta at 8 ka: evidence from the sedimentary succession in the Cambodian lowland

    Science.gov (United States)

    Tamura, Toru; Saito, Yoshiki; Sieng, Sotham; Ben, Bunnarin; Kong, Meng; Sim, Im; Choup, Sokuntheara; Akiba, Fumio

    2009-02-01

    Modern deltas are understood to have initiated around 7.5-9 ka in response to the deceleration of sea-level rise. This episode of delta initiation is closely related to the last deglacial meltwater events and eustatic sea-level rises. The initial stage of the Mekong River delta, one of the world's largest deltas, is well recorded in Cambodian lowland sediments. This paper integrates analyses of sedimentary facies, diatom assemblages, and radiocarbon dates for three drill cores from the lowland to demonstrate Holocene sedimentary evolution in relation to sea-level changes. The cores are characterized by a tripartite succession: (1) aggrading flood plain to natural levee and tidal-fluvial channel during the postglacial sea-level rise (10-8.4 ka); (2) aggrading to prograding tidal flats and mangrove forests around and after the maximum flooding of the sea (8.4-6.3 ka); and (3) a prograding fluvial system on the delta plain (6.3 ka to the present). The maximum flooding of the sea occurred at 8.0 ± 0.1 ka, 2000 years before the mid-Holocene sea-level highstand, and tidal flats penetrated up to 20-50 km southeast of Phnom Penh after a period of abrupt ˜5 m sea-level rise at 8.5-8.4 ka. The delta progradation then initiated as a result of the sea-level stillstand at around 8-7.5 ka. Another rapid sea-level rise at 7.5-7 ka allowed thick mangrove peat to be widely deposited in the Cambodian lowland, and the peat accumulation endured until 6.3 ka. Since 6.3 ka, a fluvial system has characterized the delta plain, and the fluvial sediment discharge has contributed to rapid delta progradation. The uppermost part of the sedimentary succession, composed of flood plain to natural-levee sediments, reveals a sudden increase in sediment accumulation over the past 600-1000 years. This increase might reflect an increase in the sediment yield due to human activities in the upper to middle reaches of the Mekong, as with other Asian rivers.

  3. Expansion of the baby-friendly hospital initiative ten steps to successful breastfeeding into neonatal intensive care

    DEFF Research Database (Denmark)

    Nyqvist, Kerstin H; Häggkvist, Anna-Pia; Hansen, Mette N

    2013-01-01

    In the World Health Organization/United Nations Children's Fund document Baby-Friendly Hospital Initiative: Revised, Updated and Expanded for Integrated Care, neonatal care is mentioned as 1 area that would benefit from expansion of the original Ten Steps to Successful Breastfeeding. The different...... situations faced by preterm and sick infants and their mothers, compared to healthy infants and their mothers, necessitate a specific breastfeeding policy for neonatal intensive care and require that health care professionals have knowledge and skills in lactation and breastfeeding support, including...... at the breast. Alternatives to bottles should be used until breastfeeding is well established. The discharge program should include adequate preparation of parents, information about access to lactation and breastfeeding support, both professional and peer support, and a plan for continued follow-up....

  4. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  5. Expansion of the baby-friendly hospital initiative ten steps to successful breastfeeding into neonatal intensive care: expert group recommendations.

    Science.gov (United States)

    Nyqvist, Kerstin H; Häggkvist, Anna-Pia; Hansen, Mette N; Kylberg, Elisabeth; Frandsen, Annemi L; Maastrup, Ragnhild; Ezeonodo, Aino; Hannula, Leena; Haiek, Laura N

    2013-08-01

    In the World Health Organization/United Nations Children's Fund document Baby-Friendly Hospital Initiative: Revised, Updated and Expanded for Integrated Care, neonatal care is mentioned as 1 area that would benefit from expansion of the original Ten Steps to Successful Breastfeeding. The different situations faced by preterm and sick infants and their mothers, compared to healthy infants and their mothers, necessitate a specific breastfeeding policy for neonatal intensive care and require that health care professionals have knowledge and skills in lactation and breastfeeding support, including provision of antenatal information, that are specific to neonatal care. Facilitation of early, continuous, and prolonged skin-to-skin contact (kangaroo mother care), early initiation of breastfeeding, and mothers' access to breastfeeding support during the infants' whole hospital stay are important. Mother's own milk or donor milk (when available) is the optimal nutrition. Efforts should be made to minimize parent-infant separation and facilitate parents' unrestricted presence with their infants. The initiation and continuation of breastfeeding should be guided only by infant competence and stability, using a semi-demand feeding regimen during the transition to exclusive breastfeeding. Pacifiers are appropriate during tube-feeding, for pain relief, and for calming infants. Nipple shields can be used for facilitating establishment of breastfeeding, but only after qualified support and attempts at the breast. Alternatives to bottles should be used until breastfeeding is well established. The discharge program should include adequate preparation of parents, information about access to lactation and breastfeeding support, both professional and peer support, and a plan for continued follow-up.

  6. A Review of a Successful Unsubsidized Market-Based Rural Solar Development Initiative in Laikipia District, Central Kenya

    Directory of Open Access Journals (Sweden)

    O. Wambuguh

    2013-10-01

    Full Text Available The development of renewable energy technologies (RETs in many areas far from grid-based electricity have primarily involved solar photovoltaics (SPVs which tap solar radiation to provide heat, light, hot water, electricity, and cooling for homes, businesses, and industry. A study on RETs took place in the Wiyumiririe Location of Laikipia District (north-central Kenya, a rich agricultural region. To explore this solar initiative in such a remote part of the country, a purposive randomized convenience sample of 246 households was selected and landowner interviews conducted, followed by field visits and observations. Although more than half of the households visited had SPV installations, solar energy was found to contribute only 18% of household estimated total energy needs; most residents still primarily relying on traditional energy sources. Several types of solar panels of different capacities and costs were utilized. Many landowners had at least one or two rooms using solar energy for household lighting, for appliance charging and to power radio and television. Almost all respondents appreciated that solar energy was clean renewable energy that greatly improved household living conditions; gave them some prestige; was easy to use and maintain; and was available year around. Although such significant benefits were associated with SPVs, only about 40% of residents interviewed were somehow satisfied with its development. Respondents expressed specific developmental initiatives that were closely associated with the availability of solar energy. Nevertheless, a number of challenges were raised associated with SPVs primarily investment capital and equipment costs and maintenance. As solutions to capital building will not solely rely on subsidies or individual farmer inputs, strategies must be found to mobilize the essential and tested tools for success including sustainable capital generation, building local institutions and capacities that

  7. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  8. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  9. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  11. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  12. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  13. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  14. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  15. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  16. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  17. Reactivity trends of hydroxide ion attack on high spin Fe(II complexes including bromosalicylidene amino acid ligands in some mixed aqueous solvents: Gibb’s Free Energy of Transfer and initial-transition state analysis

    Directory of Open Access Journals (Sweden)

    Laila H. Abdel-Rahman

    2017-05-01

    Full Text Available The kinetics of hydroxide ion attack on bis(bromosalicylidene alanateiron (II (bsali, bis(bromosalicylidene phenylalanateiron(II (bsphali, bis(bromosalicylidene aspartateiron(II (bsasi, (bromosalicylidene histidinateiron(II (bshi, bis(bromosalicylidene arginateiron(II (bsari have been reported in different binary aqueous solvent mixtures at 298 K. The observed reactivity trends are discussed in terms of the hydrophilic and hydrophobic forms of the complexes investigated, as well as the transfer chemical potentials of hydroxide ion and the complex. Both the solvent–solute and solvent–solvent interactions have been considered. The hydrophobic character of the complexes studied was manifested by decreasing in reactivity. Solvent effect on reactivity trends of the investigated complexes has been analyzed into initial and transition state components by using the transfer chemical potentials of the reactants and the kinetic data of the studied compounds. The decrease in the observed rate constant values (kobs of the base hydrolysis of the investigated complexes with increasing of solvent % is dominated by the initial state (IS.

  18. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  19. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  20. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  1. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  3. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  4. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  5. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  6. Social acceptance and consumer participation as success factors: insights from the CONCERTO initiative; Soziale Akzeptanz und Verbrauchermitwirkung als Erfolgsfaktoren. Erkenntnisse aus der CONCERTO-Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Di Nucci, Maria-Rosaria [DN Consulting Rom (Italy); Freie Univ. Berlin (Germany). Forschungszentrum fuer Umweltpolitik; Spitzbart, Christina [Oesterreichische Energieagentur, Wien (Austria)

    2011-05-15

    CONCERTO is a Europe-wide initiative in which cities and municipalities actively take on the challenge of sustainable urban development. Dedicated primarily to the planning and construction of new suburbs as well as urban renewal, the CONCERTO projects mostly deal with regional decentralised power supply from renewable energy resources and measures for reducing energy consumption. Five years after the initiative's launch by the European Commission experience and evaluation reports summarising some preliminary results have now been published. The evaluation reports were prepared as part of CONCERTO Plus, a now completed project which provided support to the CONCERTO programme through monitoring and other activities.

  7. Understanding How Components of Organisations Contribute to Attacks

    DEFF Research Database (Denmark)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is diffi......Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors...... is difficult. Recently, system models have been used for automatically identifying possible attacks on the modelled organisation. The generated attacks consider all three layers, making the contribution of building infrastructure, computer infrastructure, and humans (insiders and outsiders) explicit. However...... components quickly results in a large quantity of interrelations, which are hard to grasp. In this work we present several approaches for visualising attributes of attacks such as likelihood of success, impact, and required time or skill level. The resulting visualisations provide a link between attacks...

  8. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  9. 2010 Cooperative Initial Attack Annual Operating Plan

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The objective of this plan is to provide a pre-approved system to coordinate efforts and exchange or utilize resources for the prevention, detection, and...

  10. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  11. Investigating Sophomore Student Success: The National Survey of Sophomore-Year Initiatives and the Sophomore Experiences Survey, 2014. Research Reports on College Transitions No. 6

    Science.gov (United States)

    Young, Dallin George; Schreiner, Laurie A.; McIntosh, Eric J.

    2015-01-01

    Less is known about the second college year compared to other transition points, and fewer high-impact initiatives and curricular programs tend to be offered to sophomores. To increase our knowledge of this important, but sometimes neglected, year on the collegiate journey, "Investigating Sophomore Student Success" presents findings from…

  12. Investigating Sophomore Student Success: The National Survey of Sophomore-Year Initiatives and the Sophomore Experiences Survey, 2014. Research Reports on College Transitions No. 6

    Science.gov (United States)

    Young, Dallin George; Schreiner, Laurie A.; McIntosh, Eric J.

    2015-01-01

    Less is known about the second college year compared to other transition points, and fewer high-impact initiatives and curricular programs tend to be offered to sophomores. To increase our knowledge of this important, but sometimes neglected, year on the collegiate journey, "Investigating Sophomore Student Success" presents findings from…

  13. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  14. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  15. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  16. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  17. A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack

    Directory of Open Access Journals (Sweden)

    S.Vidya

    2011-09-01

    Full Text Available The Address Resolution Protocol (ARP, has proved to work well under regular circumstances, but it is not equipped to cope with malicious hosts. Several methods to mitigate, detect and prevent these attacks do exist for the gateways/routers and nodes. This work is focused towards developing our own tailor made Intrusion Detection technique at the subnet level and we present an algorithm that detects the source of ARP poisoning in the Man-in-the-Middle attack. It is designed to detect both the attack and the attacker. The algorithm uses filtering rules to capture the network traffic and pass the IP packets through four phases. After the first three phases, the algorithm is made to raise an alarm on potential ARP poisoning to the user, if one exists, and the fourth phase detects the source IP that has initiated the attack and raises another alarm. This method works successfully even if there is more than one MITM attacker in the subnet. There is a proof of concept implemented for this algorithm. As a result of this experiment, it was found that the Windows 7 Operating System is also vulnerable to ARP attacks as the earlier versions of Windows.

  18. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  19. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  20. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  1. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  2. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  4. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  5. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  6. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  7. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  8. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    which guarantee or optimise some quantitative property, such as the probability of a successful attack, the expected cost incurred, or some multi-objective trade-off between the two. We implement our approach, building upon the PRISM-games model checker, and apply it to a case study of an RFID goods...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  9. The Environmental Health/Home Safety Education Project: a successful and practical U.S.-Mexico border initiative.

    Science.gov (United States)

    Forster-Cox, Susan C; Mangadu, Thenral; Jacquez, Benjamín; Fullerton, Lynne

    2010-05-01

    The Environmental Health/Home Safety Education Project (Proyecto de Salud Ambiental y Seguridad en el Hogar) has been developed in response to a wide array of severe and often preventable environmental health issues occurring in and around homes on the U.S.-Mexico border. Utilizing well-trained community members, called promotoras , homes are visited and assessed for potential environmental hazards, including home fire and food safety issues. Data analyzed from project years 2002 to 2005 shows a significant impact in knowledge levels and initial behavior change among targeted participants as it relates to fire and food safety issues. Since the initiation of the project in 1999, hundreds of participants have improved their quality of life by making their homes safer. The project has proven to be sustainable, replicable, flexible, and attractive to funders.

  10. An E-government initiative to support supply chain integration for small to medium size enterprises: Successes and challenges

    OpenAIRE

    H. Chen; Papazafeiropoulou, A; Wu, C

    2011-01-01

    This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2011 ACM, Inc. The paper highlights the importance of the e-government initiative to support the supply chain integration among Small and Medium Size Enterprises (SMEs). It has been reported that organisations need to integrate their Information Technology (IT) infrastructures to support the integration of their supply chains to increase their efficiency. However, the current...

  11. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  12. The Success Rate of Initial {sup 131I} Ablation in Differentiated Thyroid Cancer: Comparison Between Less strict and Very Strict Low Iodine Diets

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Ik Dong; Kim, Sung Hoon; Seo, Ye Young; Oh, Jin Kyoung; O, Joo Hyun; Chung, Soo Kyo [The Catholic Univ. of Korea, Seoul (Korea, Republic of)

    2012-03-15

    To decrease the risk of recurrence or metastasis in differentiated thyroid cancer (DTC), selected patients receive radioactive iodine ablation of remnant thyroid tissue or tumor. A low iodine diet can enhance uptake of radioactive iodine. We compared the success rates of radioactive iodine ablation therapy in patients who followed two different low iodine diets (LIDs). The success rates of postsurgical radioactive iodine ablation in DTC patients receiving empiric doses of 150 mCi were retrospectively reviewed. First-time radioactive iodine ablation therapy was done in 71 patients following less strict LID. Less strict LID restricted seafood, iodized salt, egg yolk, dairy products, processed meat, instant prepared meals, and multivitamins. Very strict LID additionally restricted rice, freshwater fish, spinach, and soybean products. Radioactive iodine ablation therapy was considered successful when follow up {sup 123I} whole body scan was negative and stimulated serum thyroglobulin level was less than 2.0 ng/mL. The success rate of patients following less strict LID was 80.3% and for very strict LID 75.6%. There was no statistically significant difference in the success rates between the two LID groups (P=0.48). Very strict LID may not contribute to improving the success rate of initial radioactive iodine ablation therapy at the cost of great inconvenience to the patient.

  13. Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks

    DEFF Research Database (Denmark)

    Pawar, Pranav M.; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2012-01-01

    and initiate security attacks that disturb the normal functioning of the network in a severe manner. Such attacks affect the performance of the network by increasing the energy consumption, by reducing throughput and by inducing long delays. Of all existing WSN attacks, MAC layer attacks are considered....... The second aim of the paper is to simulate these attacks on hybrid MAC mechanisms, which shows the performance degradation of aWSN under the considered attacks. The modelling and implementation of the security attacks give an actual view of the network which can be useful in further investigating secure......Applications of wireless sensor networks (WSNs) are growing tremendously in the domains of habitat, tele-health, industry monitoring, vehicular networks, home automation and agriculture. This trend is a strong motivation for malicious users to increase their focus on WSNs and to develop...

  14. Routine delayed voiding cystourethography after initial successful endoscopic treatment with Dextranomer/Hialuronic Acid Copolimer (Dx/HA) of vesicoureteral reflux (VUR). Is it necessary?

    Science.gov (United States)

    García-Aparicio, L; Blázquez-Gómez, E; Vila Santandreu, A; Camacho Diaz, J A; Vila-Cots, J; Ramos Cebrian, M; de Haro, I; Martin, O; Tarrado, X

    2016-12-01

    Some guidelines recommend an early voiding cystourethrography (VCUG) after endoscopic treatment of vesicoureteral reflux (VUR), but there's no consensus if it's necessary a long-term follow-up in these patients. The aim of our study is analyze if it's necessary a delayed VCUG after initial successful treatment with Dx/HA. We have reviewed all medical charts of patients that underwent Dx/HA treatment from 2006 to 2010. We have selected patients with initial successful treatment and more than 3 years of radiological and clinical follow-up. We have analyzed late clinical and radiological outcomes. One hundred and sixty children with 228 refluxing ureters underwent Dx/HA endoscopic treatment with a mean follow-up of 52.13 months. Early VCUG was performed in 215 ureters with an initial successful rate of 84.1%. The group of study was 94/215 ureters with more than 3 years of follow-up with a delayed VCUG. VUR was still resolved in 79,8% of the ureters. Clinical success rate was 91.7%. The incidence of febrile urinary tract infection in those patients with cured VUR and those with a relapsed VUR was 8 and 15%, respectively; but there were no significant differences. We have not found any variable related with relapsed VUR except those ureters that initially received 2 injections (P<.05). If our objective in the treatment of VUR is to reduce the incidence of febrile urinary tract infection it is not necessary to perform a delayed VCUG even though the long-term radiological outcomes is worse than clinical outcome. Copyright © 2016 AEU. Publicado por Elsevier España, S.L.U. All rights reserved.

  15. Efecto de la posición inicial sobre la respuesta de reacción en las acciones de ataque en esgrima. [Effect of the initial position on the reaction response in the actions of attack in fencing].

    Directory of Open Access Journals (Sweden)

    Marcos Gutiérrez-Dávila

    2013-10-01

    competition of more than five years participated in this study. Two force platforms, operating to 500 Hz, a video camera, to 210 Hz and an electronic chronometer adapted to the system of wired up of the sword were used to record data. An electronic signal was used to synchronise all the recording systems mentioned. For the experimental situation where the CM was moving towards the back foot (backward, the fencer adopted the position of "en garde" with a vertical force on the back foot, between 65 % and 75 % of the corporal weight, and between 45 % and 55 % for the experimental situation of equidistant (equidistant distribution of both supports. In a third situation, the fencer adopted his/her habitual position of "en garde". The results indicated that, the backward position increases the time of movement and the speed of the CM decreases during the movement initiation of the lunge attack.http://dx.doi.org/10.5232/ricyde2013.03406

  16. New trends in Internet attacks: Clickjacking in detail

    OpenAIRE

    Thoresen, Torgeir Dahlqvist

    2009-01-01

    While the complexity of web applications and their functionality continually increase, so do the number of opportunities for an attacker to launch successful attacks against a web application's users. In this thesis we investigate and describe clickjacking in great detail. To our knowledge, this work represent the first systematic scientific approach to assess clickjacking that also consider the attack's social consequences for users' security through an experiment and survey. We address the...

  17. Cooperative Defense Against DDoS Attack using GOSSIP Protocol

    OpenAIRE

    Sohail, Imran; Hayat,Sikandar

    2009-01-01

    The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.

  18. [Successful treatment of HIV-associated chronic inflammatory demyelinating polyneuropathy by early initiation of highly active anti-retroviral therapy].

    Science.gov (United States)

    Kume, Kodai; Ikeda, Kazuyo; Kamada, Masaki; Touge, Tetsuo; Deguchi, Kazushi; Masaki, Tsutomu

    2013-01-01

    A 47-year-old man with HIV infection presented with lower leg dominant dysesthesia, muscle weakness and sensory ataxia of 3 month's duration. Nerve conduction studies (NCS) showed demyelination change in the median and tibial nerves and sensory nerve action potential (SNAP) in the sural nerve was not evoked. Somatosensory evoked potential (SEP) showed the delayed N9 latency. Diagnose of HIV-associated chronic inflammatory demyelinating polyneuropathy (CIDP) was made. Although the CD4 lymphocyte counts were relatively preserved (466/μl), highly active anti-retroviral therapy (HAART) was started according to a new guideline for the use of antiretroviral agents in HIV-1-infected adults and adolescents recommending early initiation of treatment. After six months, HIV1-RNA was not detected and the CD4 lymphocyte counts showed a recovering trend (585/μl). His symptoms had disappeared, except for dysesthesia in the tip of a toe. Repeated NCS demonstrated full recovery from the demyelination and appearance of SNAP in the sural nerve. The improvement of his symptoms and NCS findings has been maintained for two years. Although effectiveness of immunotherapies such as oral prednisone, high-dose immunoglobulins and plasmapheresis have been reported in HIV-associated CIDP, early initiation of HAART may be also important for favorable prognosis in HIV-associated CIDP.

  19. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  20. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  1. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  2. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  3. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  4. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation.

  5. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  6. Initial study of arthropods succession and pig carrion decomposition in two freshwater ecosystems in the Colombian Andes.

    Science.gov (United States)

    Barrios, Maria; Wolff, Marta

    2011-10-10

    Entomological succession and trophic roles of arthropods associated with different stages of carcass decomposition were studied to estimate the post-mortem submersion interval in two freshwater ecosystems in the Colombian Andes, at an altitude of 2614 m. Pig carcasses were employed as models placed 68 m apart, one in a stream (lotic) and another in an artificial lake (lentic). Decomposition time to skeletal remains was 74 days in the lake and 80 days in the stream. Six phases of decomposition were established: submerged fresh, early floating, floating decay, bloated deterioration, floating remains and sunken remains. A total of 18,832 organisms associated with the carcasses were collected: 11,487 in the lake (four orders, 19 families and 33 species) and 7345 in the stream (eight orders, 15 families and 25 species). Organisms were classified in the following ecological categories: shredders, collectors, predators, necrophagous, sarcosaprophagous and opportunists. Physical and chemical properties of the habitats, such as water temperature, CO(2) and conductivity, varied according to rainfall. In the lake, shredders (Coleoptera: Tropisternus sp. and Berosus sp.) and collectors (Diptera: Chironomus sp.) were found to be associated with submerged phases. Predators (Odonata) were only present during the first phases. Coleoptera (Dytiscidae) were found during floating decay and bloated deterioration stages. In the stream, shredders (Hyalella sp.) and collectors (Simulium sp.) were found during all stages, whereas the predator Oxelytrum discicolle was found exclusively during the floating stages, during which body temperature increased in a fashion similar to active decay in terrestrial environments.

  7. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  8. Role of heterozygous APC mutation in niche succession and initiation of colorectal cancer--a computational study.

    Directory of Open Access Journals (Sweden)

    Roschen Sasikumar

    Full Text Available Mutations in the adenomatous polyposis coli (APC gene are found in most colorectal cancers. They cause constitutive activation of proliferative pathways when both alleles of the gene are mutated. However studies on individuals with familial adenomatous polyposis (FAP have shown that a single mutated APC allele can also create changes in the precancerous colon crypt, like increased number of stem cells, increased crypt fission, greater variability of DNA methylation patterns, and higher somatic mutation rates. In this paper, using a computational model of colon crypt dynamics, we evolve and investigate a hypothesis on the effect of heterozygous APC mutation that explains these different observations. Based on previous reports and the results from the computational model we propose the hypothesis that heterozygous APC mutation has the effect of increasing the chances for a stem cell to divide symmetrically, producing two stem cell daughters. We incorporate this hypothesis into the model and perform simulation experiments to investigate the consequences of the hypothesis. Simulations show that this hypothesis links together the changes in FAP crypts observed in previous studies. The simulations also show that an APC(+/- stem cell gets selective advantages for dominating the crypt and progressing to cancer. This explains why most colon cancers are initiated by APC mutation. The results could have implications for preventing or retarding the onset of colon cancer in people with inherited or acquired mutation of one APC allele. Experimental validation of the hypothesis as well as investigation into the molecular mechanisms of this effect may therefore be worth undertaking.

  9. Characterization of an urban-rural CO 2 /temperature gradient and associated changes in initial plant productivity during secondary succession

    Energy Technology Data Exchange (ETDEWEB)

    Ziska, L. H.; Bunce, J. A.; Goins, E. W.

    2004-05-01

    To examine the impact of climate change on vegetative productivity, we exposed fallow agricultural soil to an in situ temperature and CO2 gradient between urban, suburban and rural areas in 2002. Along the gradient, average daytime CO2 concentration increased by 21% and maximum (daytime) and minimum (nighttime) daily temperatures increased by 1.6 and 3.3°C, respectively in an urban relative to a rural location. Consistent location differences in soil temperature were also ascertained. No other consistent differences in meteorological variables (e.g. wind speed, humidity, PAR, tropospheric ozone) as a function of urbanization were documented. The urban-induced environmental changes that were observed were consistent with most short-term (~50 year) global change scenarios regarding CO2 concentration and air temperature. Productivity, determined as final above-ground biomass, and maximum plant height were positively affected by daytime and soil temperatures as well as enhanced [CO2], increasing 60 and 115% for the suburban and urban sites, respectively, relative to the rural site. While long-term data are needed, these initial results suggest that urban environments may act as a reasonable surrogate for investigating future climatic change in vegetative communities.

  10. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore...

  11. Preventing caries in preschoolers: successful initiation of an innovative community-based clinical trial in Navajo Nation Head Start.

    Science.gov (United States)

    Quissell, David O; Bryant, Lucinda L; Braun, Patricia A; Cudeii, Diana; Johs, Nikolas; Smith, Vongphone L; George, Carmen; Henderson, William G; Albino, Judith

    2014-03-01

    Navajo Nation children have the greatest prevalence of early childhood caries in the United States. This protocol describes an innovative combination of community-based participatory research and clinical trial methods to rigorously test a lay native Community Oral Health Specialists-delivered oral health intervention, with the goal of reducing the progression of disease and improving family knowledge and behaviors. This cluster-randomized trial designed by researchers at the Center for Native Oral Health Research at the University of Colorado in conjunction with members of the Navajo Nation community compares outcomes between the manualized 2-year oral health fluoride varnish-oral health promotion intervention and usual care in the community (child-caregiver dyads from 26 Head Start classrooms in each study arm; total of 1016 dyads). Outcome assessment includes annual dental screening and an annual caregiver survey of knowledge, attitudes and behaviors; collection of cost data will support cost-benefit analyses. The study protocol meets all standards required of randomized clinical trials. Aligned with principles of community-based participatory research, extended interaction between members of the Navajo community and researchers preceded study initiation, and collaboration between project staff and a wide variety of community members informed the study design and implementation. We believe that the benefits of adding CBPR methods to those of randomized clinical studies outweigh the barriers and constraints, especially in studies of health disparities and in challenging settings. When done well, this innovative mix of methods will increase the likelihood of valid results that communities can use. Copyright © 2014 Elsevier Inc. All rights reserved.

  12. Textual Manipulation for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Hussein AlNabulsi

    2013-11-01

    Full Text Available SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such SQL statements to be processed or executed. In this paper, we highlighted several examples of such text manipulations that can be successfully used in SQL injection attacks. We evaluated the usage of those strings on several websites and web pages using SNORT open source. We also conducted an extensive comparison study of some relevant papers.

  13. Preventing Recommendation Attack in Trust-Based Recommender Systems

    Institute of Scientific and Technical Information of China (English)

    Fu-Guo Zhang

    2011-01-01

    Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website.

  14. Sapwood Stored Resources Decline in Whitebark and Lodgepole Pines Attacked by Mountain Pine Beetles (Coleoptera: Curculionidae).

    Science.gov (United States)

    Lahr, Eleanor C; Sala, Anna

    2016-12-01

    Recent outbreaks of forest insects have been directly linked to climate change-induced warming and drought, but effects of tree stored resources on insects have received less attention. We asked whether tree stored resources changed following mountain pine beetle (Dendroctonus ponderosae Hopkins) attack and whether they affected beetle development. We compared initial concentrations of stored resources in the sapwood of whitebark pine (Pinus albicaulis Engelmann) and lodgepole pine (Pinus contorta Douglas ex. Louden) with resource concentrations one year later, in trees that were naturally attacked by beetles and trees that remained unattacked. Beetles did not select host trees based on sapwood resources-there were no consistent a priori differences between attacked versus unattacked trees-but concentrations of nonstructural carbohydrate (NSC), lipids, and phosphorus declined in attacked trees, relative to initial concentrations and unattacked trees. Whitebark pine experienced greater resource declines than lodgepole pine; however, sapwood resources were not correlated with beetle success in either species. Experimental manipulation confirmed that the negative effect of beetles on sapwood and phloem NSC was not due to girdling. Instead, changes in sapwood resources were related to the percentage of sapwood with fungal blue-stain. Overall, mountain pine beetle attack affected sapwood resources, but sapwood resources did not contribute directly to beetle success; instead, sapwood resources may support colonization by beetle-vectored fungi that potentially accelerate tree mortality. Closer attention to stored resource dynamics will improve our understanding of the interaction between mountain pine beetles, fungi, and host trees, an issue that is relevant to our understanding of insect range expansion under climate change.

  15. A Traceability Attack against e-Passports

    Science.gov (United States)

    Chothia, Tom; Smirnov, Vitaliy

    Since 2004, many nations have started issuing "e-passports" containing an RFID tag that, when powered, broadcasts information. It is claimed that these passports are more secure and that our data will be protected from any possible unauthorised attempts to read it. In this paper we show that there is a flaw in one of the passport's protocols that makes it possible to trace the movements of a particular passport, without having to break the passport's cryptographic key. All an attacker has to do is to record one session between the passport and a legitimate reader, then by replaying a particular message, the attacker can distinguish that passport from any other. We have implemented our attack and tested it successfully against passports issued by a range of nations.

  16. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  17. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  18. Step to improve neural cryptography against flipping attacks.

    Science.gov (United States)

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  19. Occurrence of a 'bad' split and success of initial mandibular healing: a review of 524 sagittal ramus osteotomies in 262 patients.

    Science.gov (United States)

    Posnick, J C; Choi, E; Liu, S

    2016-10-01

    The purpose of this study was to assess the prevalence of a 'bad' split after sagittal ramus osteotomies (SRO) and report the results of initial mandibular healing. A retrospective cohort study derived from patients treated by a single surgeon at one institution between 2004 and 2013 was performed. An index group consisting of a series of subjects with a spectrum of bimaxillary dentofacial deformities also involving the chin and symptomatic chronic obstructive nasal breathing was identified. The SRO design, bicortical screw fixation technique, and perioperative management were consistent. Outcome variables included the occurrence of a 'bad' split and the success of initial SRO healing. Two hundred sixty-two subjects undergoing 524 SROs met the inclusion criteria. Their average age was 25 years (range 13-63 years) and 134 were female (51%). Simultaneous removal of a third molar was performed during 209 of the SROs (40%). There were no 'bad' splits. All subjects achieved successful bone union, the planned occlusion, and return to a chewing diet and physical activities by 5 weeks after surgery. The presence of a third molar removed during SRO was not associated with an increased frequency of a 'bad' split or delayed mandibular healing.

  20. No survival difference after successful {sup 131}I ablation between patients with initially low-risk and high-risk differentiated thyroid cancer

    Energy Technology Data Exchange (ETDEWEB)

    Verburg, Frederik Anton [University of Wuerzburg, Department of Nuclear Medicine, Wuerzburg (Germany); University Medical Center Utrecht, Department of Radiology and Nuclear Medicine, Utrecht (Netherlands); Stokkel, Marcel P.M.; Verkooijen, Robbert B.T. [Leiden University Medical Center, Department of Radiology, Division of Nuclear Medicine, Leiden (Netherlands); Dueren, Christian; Reiners, Christoph [University of Wuerzburg, Department of Nuclear Medicine, Wuerzburg (Germany); Maeder, Uwe [University of Wuerzburg, Comprehensive Cancer Center, Wuerzburg (Germany); Isselt, Johannes W. van [University Medical Center Utrecht, Department of Radiology and Nuclear Medicine, Utrecht (Netherlands); Marlowe, Robert J. [Spencer-Fontayne Corporation, Jersey City, NJ (United States); Smit, Johannes W. [Leiden University Medical Center, Department of Endocrinology, Leiden (Netherlands); Luster, Markus [University of Ulm, Department of Nuclear Medicine, Ulm (Germany)

    2010-02-15

    To compare disease-specific survival and recurrence-free survival (RFS) after successful {sup 131}I ablation in patients with differentiated thyroid carcinoma (DTC) between those defined before ablation as low-risk and those defined as high-risk according to the European Thyroid Association 2006 consensus statement. Retrospective data from three university hospitals were pooled. Of 2009 consecutive patients receiving ablation, 509 were identified as successfully ablated based on both undetectable stimulated serum thyroglobulin in the absence of antithyroglobulin antibodies and a negative diagnostic whole-body scan in a follow-up examination conducted 8.1{+-}4.6 months after ablation. Of these 509 patients, 169 were defined as high-risk. After a mean follow-up of 81{+-}64 months (range 4-306 months), only three patients had died of DTC, rendering assessment of disease-specific survival differences impossible. Of the 509 patients, 12 (2.4%) developed a recurrence a mean 35 months (range 12-59 months) after ablation. RFS for the duration of follow-up was 96.6% according to the Kaplan-Meier method. RFS did not differ between high-risk and low-risk patients (p=0.68). RFS differed slightly but significantly between those with papillary and those with follicular thyroid carcinoma (p=0.03) and between those aged {<=}45 years those aged >45 years at diagnosis (p=0.018). After (near) total thyroidectomy and successful {sup 131}I ablation, RFS does not differ between patients classified as high-risk and those classified as low-risk based on TNM stage at diagnosis. Consequently, the follow-up protocol should be determined on the basis of the result of initial treatment rather than on the initial tumour classification. (orig.)

  1. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  2. Delay in cART Initiation Results in Persistent Immune Dysregulation and Poor Recovery of T-Cell Phenotype Despite a Decade of Successful HIV Suppression

    Science.gov (United States)

    Ndumbi, Patricia; Falutz, Julian; Pant Pai, Nitika; Tsoukas, Christos M.

    2014-01-01

    Background Successful combination antiretroviral therapy (cART) increases levels of CD4+ T-cells, however this increase may not accurately reflect long-term immune recovery since T-cell dysregulation and loss of T-cell homeostasis often persist. We therefore assessed the impact of a decade of effective cART on immune regulation, T-cell homeostasis, and overall T-cell phenotype. Methods We conducted a retrospective study of 288 HIV+ cART-naïve patients initiating therapy. We identified 86 individuals who received cART for at least a decade, of which 44 consistently maintained undetectable plasma HIV-RNA levels throughout therapy. At baseline, participants were classified into three groups according to pre-treatment CD4+ T-cell counts: Group I (CD4350 cells/mm3). Outcomes of interest were: (1) CD4+ T-cell count restoration (CD4>532 cells/mm3); (2) normalization of CD4:CD8 T-cell ratio (1.2–3.3); (3) maintenance of CD3+ T-cell homeostasis (CD3: 65%–85% of peripheral lymphocytes); (4) normalization of the complete T-cell phenotype (TCP). Results Despite a decade of sustained successful cART, complete T-cell phenotype normalization only occurred in 16% of patients, most of whom had initiated therapy at high CD4+ T-cell counts (>350 cells/mm3). The TCP parameter that was the least restored among patients was the CD4:CD8 T-cell ratio. Conclusions Failure to normalize the complete T-cell phenotype was most apparent in patients who initiated cART with a CD4+ T-cell count <200 cells/mm3. The impact of this impaired T-cell phenotype on life-long immune function and potential comorbidities remains to be elucidated. PMID:24710051

  3. Delay in cART initiation results in persistent immune dysregulation and poor recovery of T-cell phenotype despite a decade of successful HIV suppression.

    Directory of Open Access Journals (Sweden)

    Patricia Ndumbi

    Full Text Available BACKGROUND: Successful combination antiretroviral therapy (cART increases levels of CD4+ T-cells, however this increase may not accurately reflect long-term immune recovery since T-cell dysregulation and loss of T-cell homeostasis often persist. We therefore assessed the impact of a decade of effective cART on immune regulation, T-cell homeostasis, and overall T-cell phenotype. METHODS: We conducted a retrospective study of 288 HIV+ cART-naïve patients initiating therapy. We identified 86 individuals who received cART for at least a decade, of which 44 consistently maintained undetectable plasma HIV-RNA levels throughout therapy. At baseline, participants were classified into three groups according to pre-treatment CD4+ T-cell counts: Group I (CD4350 cells/mm3. Outcomes of interest were: (1 CD4+ T-cell count restoration (CD4>532 cells/mm3; (2 normalization of CD4:CD8 T-cell ratio (1.2-3.3; (3 maintenance of CD3+ T-cell homeostasis (CD3: 65%-85% of peripheral lymphocytes; (4 normalization of the complete T-cell phenotype (TCP. RESULTS: Despite a decade of sustained successful cART, complete T-cell phenotype normalization only occurred in 16% of patients, most of whom had initiated therapy at high CD4+ T-cell counts (>350 cells/mm3. The TCP parameter that was the least restored among patients was the CD4:CD8 T-cell ratio. CONCLUSIONS: Failure to normalize the complete T-cell phenotype was most apparent in patients who initiated cART with a CD4+ T-cell count <200 cells/mm3. The impact of this impaired T-cell phenotype on life-long immune function and potential comorbidities remains to be elucidated.

  4. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  5. Public knowledge of heart attack symptoms in Beijing residents

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qing-tan; HU Da-yi; YANG Jin-gang; ZHANG Shou-yan; ZHANG Xin-quan; LIU Shu-shan

    2007-01-01

    Background Definitive treatment for heart attack is early reperfusion with either angioplasty or thrombolytic therapy,and the benefit is strictly time-dependent. Patient outcomes are improved with either therapy when initiated as soon as possible. Recognition of heart attack symptoms is logically tied to taking action to receive prompt emergency care.Inadequate knowledge of heart attack symptoms may prolong delay. The purpose of this study was to document knowledge about heart attack symptoms in Beijing residents and to identify the characteristics associated with increased knowledge of heart attack.Methods A structured survey was conducted in 18 communities in Beijing from March 1 through June 10 in 2006.Addresses and participants were selected randomly following a stratification. The survey was designed to collect knowledge of heart attack symptoms from sampled adults in each community.Results A total of 4627 respondents completed the questionnaires correctly, and 50.29% of them were female. Totally 64.15% of the respondents reported chest pain or discomfort (common symptoms) as a symptom of heart attack; 75.38% reported at least one of the following eight symptoms as a symptom of heart attack: back pain, shortness of breath, arm pain or numbness, nausea or vomiting, neck, jaw or shoulder pain, epigastric pain, sweating, weakness (less common symptoms); 20.36% correctly reported four or more heart attack symptoms, only 7.4% knew all the correct heart attack symptoms, and 28.94% knew about reperfusion therapy for heart attack; 31.7% reported to call 120 or 999 while having a heart attack themselves; however 89.6% reported to call 120 or 999 when someone else is suffering from a heart attack. Very old persons and those with health insurance coverage, high education level, high household income, longer living in Beijing and previous experience with heart disease had greater knowledge of heart attack symptoms.Conclusions Public knowledge of common heart attack

  6. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  7. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  8. Impact Analysis of Recent DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Ketki Arora

    2011-02-01

    Full Text Available In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replacedby cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with the growth of Internet, count of attacks on Internet has also increased incredibly fast. Denial-of-service attack is one of them, which poses immense threat on the availability. Since, the World is highly dependent on the Internet, availability of the Internet is very critical for the socio-economic growth of the society. Denial-of-service attacks occur almost every day,and the frequency and the volume of these attacks are increasing day by day. One of the biggest challenges before researchers is to find the details of such attacks because due to damaging reputationissues, most of the commercial sites do not even disclose that they were blitzed by such attacks. Details of attacks can guide very well in the formulation of comprehensive defensive solution for such attacks. In this paper, an overview on DDoS problem, major factors causing DDoS attacks are demonstrated, brief detail of most recent DDoS incidents on online organizations is outlined and finally, the need for a comprehensive distributed solution is highlighted.

  9. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  10. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  11. Initial deposition and electron paramagnetic resonance defects characterization of TiO{sub 2} films prepared using successive ionic layer adsorption and reaction method

    Energy Technology Data Exchange (ETDEWEB)

    Wu Yiyong, E-mail: wuyiyong2001@yahoo.com.cn [National Key Laboratory of Materials Behaviors and Evaluation Technology in Space Environments, Harbin Institute of Technology, P.O. 432, Nan gang District, Harbin, 150080 (China); Shi Yaping [National Key Laboratory of Materials Behaviors and Evaluation Technology in Space Environments, Harbin Institute of Technology, P.O. 432, Nan gang District, Harbin, 150080 (China); Harbin University of Commerce, P.O. 493, Song bei District, Harbin, 150028 (China); Xu Xianbin; Sun Chengyue [National Key Laboratory of Materials Behaviors and Evaluation Technology in Space Environments, Harbin Institute of Technology, P.O. 432, Nan gang District, Harbin, 150080 (China)

    2012-06-01

    Successive ionic layer adsorption and reaction (SILAR) technique was considered promisingly to deposit ultra thin titanium dioxide (TiO{sub 2}) films under ambient condition. In this paper, the growth process, structures and paramagnetic defects of the films were characterized by complementary techniques of atomic force microscopy, X-ray photoelectron spectroscopy, Raman spectroscopy and electron paramagnetic resonance spectroscopy. The results indicate that on glass substrate the SILAR TiO{sub 2} film nucleates in an island mode within the initial five deposition cycles but grows in a layer-by-layer mode afterwards. The growth rate was measured as 4.6 A/cycle. In the as-deposited films, a kind of paramagnetic defects is detected at g (2.0029) and it can be attributed to oxygen vacancies. These as-received oxygen vacancies could be annealed out at 473 K. Ultraviolet irradiation on the as-deposited films can also decrease the density of the defects. The relative mechanisms on the phenomenon were discussed in this paper. - Highlights: Black-Right-Pointing-Pointer TiO{sub 2} films are deposited on glass at 25 Degree-Sign C by successive ionic layer adsorption and reaction method with a rate of 4.6 A/cycle. Black-Right-Pointing-Pointer The films nucleate in an island mode initially but grow in a layer mode afterwards. Black-Right-Pointing-Pointer The SILAR TiO{sub 2} films nucleation period is five cycles. Black-Right-Pointing-Pointer Electron paramagnetic resonance spectroscopy shows that TiO{sub 2} films paramagnetic defects are attributed to oxygen vacancies. Black-Right-Pointing-Pointer They will decrease by anneal or ultraviolet radiation and form hydroxyl or superoxide radicals.

  12. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. The research of DPA attacks against AES implementations

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    This article examines vulnerabilities to power analysis attacks between software and hardware implementations of cryptographic algorithms. Representative platforms including an Atmel 89S8252 8-bit processor and a 0.25 μm 1.8 v standard cell circuit are proposed to implement the advance encryption standard (AES). A simulation-based experimental environment is built to acquire power data, and single-bit differential power analysis (DPA), and multi-bit DPA and correlation power analysis (CPA) attacks are conducted on two implementations respectively. The experimental results show that the hardware implementation has less data-dependent power leakages to resist power attacks. Furthermore, an improved DPA approach is proposed. It adopts hamming distance of intermediate results as power model and arranges plaintext inputs to differentiate power traces to the maximal probability. Compared with the original power attacks, our improved DPA performs a successful attack on AES hardware implementations with acceptable power measurements and fewer computations.

  15. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  16. Cut-off value of initial serum β-hCG level predicting a successful MTX therapy in tubal ectopic pregnancy: a retrospective cohort study.

    Science.gov (United States)

    Helmy, S; Bader, Y; Pablik, E; Tiringer, D; Pils, S; Laml, T; Kölbl, H; Koch, M

    2014-08-01

    To determine the optimal serum β-hCG cut-off level to predict MTX treatment success in tubal ectopic pregnancy (EP). Data of 240 women, who presented between 2003 and 2011 at the Department of Gynecology and Obstetrics, Medical University of Vienna, with tubal EP and who received MTX as primary treatment, were retrieved from the hospital information system (KIS). 198 patients could be included for final evaluation. Statistical analysis included area under the ROC curve, maximal Euclidean and Youden index, chi-squared and a five-fold cross validation. The serum β-hCG level cut-off value was calculated at 2121mlU/ml with a specificity of 76.54% and sensitivity of 80.56% (AUC 0.789; phCG level below 2121mlU/ml (n=131) experienced MTX treatment failure in 5.3% (n=7), compared to 43.3% (n=29) of patients with an initial serum β-hCG level equal to or above 2121mlU/ml (n=67). There was no statistically significant correlation between clinical symptoms and the MTX therapy outcome (p=0.580; likelihood quotient p=0.716). The correct decision of therapy in patients with tubal ectopic pregnancy still represents a challenge. In this study we can conclude that, according to our results there is no endpoint of initial serum β-hCG levels, which can be clearly used as cut-off value for the optimal management of tubal EP. However, an initial serum β-hCG level of less than 2121mlU/ml seems to be a good value to expect a successful MTX treatment. Limitations are the retrospective study design and the inability of classifying clinical symptoms like pain as an objective parameter. Wider implications of the findings may include more detailed patient information and more accurate selection of suitable patients for MTX therapy. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  17. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  18. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  20. Lattice Based Attack on Common Private Exponent RSA

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Ravva

    2012-03-01

    Full Text Available Lattice reduction is a powerful concept for solving diverse problems involving point lattices. Lattice reduction has been successfully utilizing in Number Theory, Linear algebra and Cryptology. Not only the existence of lattice based cryptosystems of hard in nature, but also has vulnerabilities by lattice reduction techniques. In this paper, we show that Wieners small private exponent attack, when viewed as a heuristic lattice based attack, is extended to attack many instances of RSA when they have the same small private exponent.

  1. Using the Domain Name System to Thwart Automated Client-Based Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, Curtis R [ORNL; Shue, Craig A [ORNL

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  2. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  3. Two fatal tiger attacks in zoos.

    Science.gov (United States)

    Tantius, Britta; Wittschieber, Daniel; Schmidt, Sven; Rothschild, Markus A; Banaschak, Sibylle

    2016-01-01

    Two captive tiger attacks are presented that took place in Cologne and Münster zoos. Both attacks occurred when the handlers, intent on cleaning the enclosures, entered whilst the tigers accidently retained access to the location, and thus defended their territory against the perceived intruders. Both victims suffered fatal neck injuries from the bites. At Münster, colleagues managed to lure the tiger away from its victim to enable treatment, whilst the Cologne zoo tiger had to be shot in order to allow access to be gained. Whilst it was judged that human error led to the deaths of the experienced zookeepers, the investigation in Münster was closed as no third party was found to be at fault, whereas the Cologne zoo director was initially charged with being negligent. These charges were subsequently dismissed as safety regulations were found to be up to date.

  4. Resist DoS attacks in UMTS-WLAN

    Science.gov (United States)

    Qu, Huyu; Cheng, Qiang

    2005-06-01

    Wireless network is more vulnerable to denial of service (DoS) attacks than wired one. In this paper we propose two methods to resist DoS attacks in UMTS-WLAN network, one is active and the other is passive. These two are complementary to each other. In active DoS defense method, a mobile terminal generates an authorized anonymous ID (AAI) using its true ID such as IP address, MAC address, PIN code, or asymmetric key, and substitutes its true ID with the authorized anonymous ID. The mobile terminal may be authenticated by the UMTS-WLAN, however its true ID is anonymous to intending attackers. This method can be used to isolate de-authenticating/disassociating DoS attackers, spoofing power-save DoS attacker, etc. In passive DoS defense method, we propose a trace back scheme. We use covert channels in the header of mobile IP packets to trace back the malicious nodes by embedding some address information of intermediate nodes, and recovering the embedded information by the victim. After the victim successfully traces the attacking paths from malicious nodes, it can segregate the malicious nodes and protect itself. This method can be used to resist DoS attacks of mass-produced junk message congestions.

  5. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  6. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  7. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  8. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  9. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  10. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  11. Turning the Tables: Using Wireless Communication Against an Attacker

    Science.gov (United States)

    Martinovic, Ivan; Schmitt, Jens B.

    In this paper, we propose a system leveraging the peculiarities of the wireless medium, such as the broadcast nature of wireless communication and the unpredictability of indoor signal propagation to achieve effective protection against attacks based on the injection of fake data in wireless sensor networks (WSNs). Using a real-world WSN deployment and a realistic implementation of an attacker, we analyze this protection scheme and demonstrate that neither position change, transmission power manipulation, nor complete knowledge of wireless parameters can help an attacker to successfully attack the network. As a result, this work demonstrates how the chaotic nature of radio communication, which is often considered a disadvantage in regard to security objectives, can be exploited to enhance protection and support implementation of lightweight security mechanisms.

  12. A Survey of DDOS Attacks in TCP/IP Stack

    Directory of Open Access Journals (Sweden)

    P.C. Senthil Mahesh

    2014-08-01

    Full Text Available The aim of study is to discuss DDOS attack in TCP/IP layer. A Denial-of-Service (DoS or Distributed Denial-of-Service (DDoS attack is an attempt to make a device or network source not available to its designed customers. The purposes and objectives of a DoS attack may differ, it usually includes initiatives to momentarily or consistently disrupt or hold solutions of a variety linked with the Online. As explanation, DDoS (Distributed Denial of Service attack are sent by two or more individuals, or bots. DoS (Denial of Service attack are sent by one person or system. DoS attack typically focus on sites or solutions organized on high-profile web or web servers such as financial institutions, bank card payment gateways and even main name servers. This technique has now seen comprehensive use in certain activities, used by server owners, or dissatisfied opponents on activities. Progressively, DoS attack have also been used as a way of level of resistance.

  13. Construction of a Cyber Attack Model for Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Varuttamaseni, Athi; Bari, Robert A.; Youngblood, Robert

    2017-05-01

    The consideration of how one compromised digital equipment can impact neighboring equipment is critical to understanding the progression of cyber attacks. The degree of influence that one component may have on another depends on a variety of factors, including the sharing of resources such as network bandwidth or processing power, the level of trust between components, and the inclusion of segmentation devices such as firewalls. The interactions among components via mechanisms that are unique to the digital world are not usually considered in traditional PRA. This means potential sequences of events that may occur during an attack may be missed if one were to only look at conventional accident sequences. This paper presents a method where, starting from the initial attack vector, the progression of a cyber attack can be modeled. The propagation of the attack is modeled by considering certain attributes of the digital components in the system. These attributes determine the potential vulnerability of a component to a class of attack and the capability gained by the attackers once they are in control of the equipment. The use of attributes allows similar components (components with the same set of attributes) to be modeled in the same way, thereby reducing the computing resources required for analysis of large systems.

  14. Robustness of coevolution in resolving prisoner's dilemma games on interdependent networks subject to attack

    Science.gov (United States)

    Liu, Penghui; Liu, Jing

    2017-08-01

    Recently, coevolution between strategy and network structure has been established as a rule to resolve social dilemmas and reach optimal situations for cooperation. Many follow-up researches have focused on studying how coevolution helps networks reorganize to deter the defectors and many coevolution methods have been proposed. However, the robustness of the coevolution rules against attacks have not been studied much. Since attacks may directly influence the original evolutionary process of cooperation, the robustness should be an important index while evaluating the quality of a coevolution method. In this paper, we focus on investigating the robustness of an elementary coevolution method in resolving the prisoner's dilemma game upon the interdependent networks. Three different types of time-independent attacks, named as edge attacks, instigation attacks and node attacks have been employed to test its robustness. Through analyzing the simulation results obtained, we find this coevolution method is relatively robust against the edge attack and the node attack as it successfully maintains cooperation in the population over the entire attack range. However, when the instigation probability of the attacked individuals is large or the attack range of instigation attack is wide enough, coevolutionary rule finally fails in maintaining cooperation in the population.

  15. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  16. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  17. A LINEARIZATION ATTACK ON MODIFIED E0 ALGORITHM

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A linearization attack on the Key Stream Generator (KSG) of the modified E0 algorithm proposed by Hermelin [Proceedings of ICISC'99, Springer LNCS 1787, 2000, 17-29] is given in this paper. The initial value can be recovered by a linearization attack with O(260.52) operations by solving a System of Linear Equations (SLE) with at most 220.538 unknowns. Frederik Armknecht [Cryptology ePrint Archive, 2002/191]proposed a linearization attack on the KSG ofE0 algorithm with O(270.341) operations by solving an SLE with at most 224.056 unknowns, so the modification proposed by Hermelin reduces the ability of E0 to resist the linearization attack by comparing with the results of Frederik Armknecht.

  18. Concurrency Attacks and Defenses

    Science.gov (United States)

    2016-10-04

    Administration, Morningside 615 West 131st Street, Room 254, Mail Code 8725 New York, NY 10027-7922 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING...on desktops (e.g., word processing), are now served from distributed “clouds” of servers to meet the current computing demands for high scalability...Document - Text Analysis Report Document - Text Analysis Appendix Documents 2. Thank You E- mail user Sep 28, 2016 18:09:13 Success: Email Sent to: junfeng@cs.columbia.edu

  19. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  20. Pregnant & Lactating Mothers' Attitudes and Practice of the Ten Steps to Successful Breastfeeding at King Fahd Hospital of University (KFHU)--Khobar, Saudi Arabia: Appraisal of Baby Friendly Hospital Initiatives

    Science.gov (United States)

    Salem, Laila Younis Abu; Al Madani, Maha Mohammed

    2015-01-01

    Background: World Health organization (WHO) and the United Nations Children's Fund (UNICEF) have been recommended the application of the Ten Steps to Successful Breastfeeding of the Baby-Friendly Hospital Initiative (BFHI) in order to promote & support breastfeeding. The aim of this study was to assess pregnant and lactating mothers' attitudes…

  1. Programs of Study as a State Policy Mandate: A Longitudinal Study of the South Carolina Personal Pathways to Success Initiative. Technical Appendix A: Implementation of the Education and Economic Development Act

    Science.gov (United States)

    Hammond, Cathy; Drew, Sam F.; Withington, Cairen; Griffith, Cathy; Swiger, Caroline M.; Mobley, Catherine; Sharp, Julia L.; Stringfield, Samuel C.; Stipanovic, Natalie; Daugherty, Lindsay

    2013-01-01

    This Technical Appendix is part of the report from the National Research Center for Career and Technical Education's (NRCCTE's) five-year longitudinal study of South Carolina's Personal Pathway to Success initiative, which was authorized by the state's Education and Economic Development Act (EEDA) in 2005. NRCCTE-affiliated researchers at the…

  2. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  3. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  4. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  5. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  6. AN INTEGRATED APPROACH AGAINST APP-DDoS FOR MITIGATING IP SPOOFED ATTACKS AND MAC ATTACKS

    Directory of Open Access Journals (Sweden)

    S.PRABHA

    2013-06-01

    Full Text Available The nature of data traffic flow from wired network is extremely different from wireless network. Therefore as the DDoS application service attacks from the wired ones are produced from IP frame and wireless ones from Media Access Control (MAC frame. The variant in the frames motivates the requirement of enhanced resistive mechanism for application DDoS attacks for interfaced internet application servers enabled with both wired and wireless infrastructure. With the wired and wireless interface access in internet application services made us to present an Application Service Network Request Identification (ASNRI scheme in this work. ASNRI scheme first identifies the type of data stream frame and input it to the IHBCM method. In Bayes packet classifier, separated data frames are verified for its malicious characteristic in its data frame attributes to filter out the malicious data packet frames. Simulations are carried out to evaluate the performance of ASNRI to conventional application DDoS attack resistance schemes by measuring its true positive and true negative of data frame classification and its malicious attack resistance rate at different traffic volumes.In the process of applying Bayes has been planned to provide insight into the behavior of this technique itself. In this paper has been illustrated the sensitivity of the algorithm to its initial assumptions and demonstrated the use of two techniques, one to break the Gaussian assumptions and the other to improve the quality of discriminators as input, It leads to significant improvements in the accuracy of the Bayes technique. Integrated Hidden Markov Model (HMM and Bayes Packet Classifier based Gaussian distribution factor to detect and respond to the App-DDoS attacks if they occur during a flash crowd event for both dynamic and stationary objects.

  7. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  8. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  9. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  10. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  11. A rare case report of peri-implant bone necrosis: Mapping the distance of initial peri-implant complication toward a path of success

    Directory of Open Access Journals (Sweden)

    S K Salaria

    2011-01-01

    Full Text Available In the past decade, science of implant placement has greatly advanced and at the same time much success has been experienced with the endosseous implant. Despite the long-term predictability of the implants, however, biological, technical and esthetic complications do occur. The use of osseointegrated implants as a foundation for prosthetic replacement of missing teeth has been highly predictable, but still at present, there is no consensus of how to best manage the complications occurring after implant placement. In this report, we discuss post-insertion complication of bone necrosis and its successful management.

  12. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  13. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  14. The success factors of scaling-up Estonian sexual and reproductive health youth clinic network--from a grassroots initiative to a national programme 1991-2013

    NARCIS (Netherlands)

    Kempers, J.P.; Ketting, E.; Chandra-Mouli, V.; Raudsepp, T.

    2015-01-01

    BACKGROUND: A growing number of middle-income countries are scaling up youth-friendly sexual and reproductive health pilot projects to national level programmes. Yet, there are few case studies on successful national level scale-up of such programmes. Estonia is an excellent example of scale-up of a

  15. The success factors of scaling-up Estonian sexual and reproductive health youth clinic network--from a grassroots initiative to a national programme 1991-2013

    NARCIS (Netherlands)

    Kempers, J.P.; Ketting, E.; Chandra-Mouli, V.; Raudsepp, T.

    2015-01-01

    BACKGROUND: A growing number of middle-income countries are scaling up youth-friendly sexual and reproductive health pilot projects to national level programmes. Yet, there are few case studies on successful national level scale-up of such programmes. Estonia is an excellent example of scale-up of a

  16. A New Guess-and-Determine Attack on the A5/1

    CERN Document Server

    Shah, Jay

    2012-01-01

    In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with a minimum time complexity of around 2^(40) and an average complexity of 2^(48.5), which is much less than the brute-force attack with a complexity of 2^(64). The attack has a 100% success rate and requires about 5.65GB storage. We provide a detailed description of our new attack along with its implementation and results.

  17. Current Injection Attack against the KLJN Secure Key Exchange

    CERN Document Server

    Chen, Hsien-Pu; Kish, Laszlo B

    2015-01-01

    The Kirchhoff-law-Johnson-noise (KLJN) scheme is a statistical/physical secure key exchange system based on the laws of classical statistical physics to provide unconditional security. We used the LTSPICE industrial cable and circuit simulator to emulate one of the major active (invasive) attacks, the current injection attack, against the ideal and a practical KLJN system, respectively. We show that two security enhancement techniques, namely, the instantaneous voltage/current comparison method, and a simple privacy amplification scheme, independently and effectively eliminate the information leak and successfully preserve the system's unconditional security.

  18. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed.

  19. Dynamics of Gram-negative bacteria population density in a soil in the course of the succession initiated by chitin and cellulose

    Science.gov (United States)

    Konstantin, Ivanov; Lubov, Polyanskaya

    2014-05-01

    The functions of actinomycetes in polymer destruction in soil traditionally considered as the dominant, compare to another groups of bacteria. Gram-positive bacteria also have ecological functions in destruction of soil organic matter. The role of Gram-negative bacteria has been researched in the microbial succession in terms of polymers destruction, which are widely spreads in soils: chitin and cellulose. The method with nalidixic acid as an inhibitor of DNA division of Gram-negative bacteria was modified. By modified method microbial succession of Gram-negative bacteria in the different horizons of a chernozem under aerobic and anaerobic conditions was researched. Chitin and cellulose as the source of nutrients with moistening was used in experiments. The introduction of chitin had no positive effect on the population density of Gram-negative bacteria in a chernozem, but it advanced the date of their appearance in microbial succession: the maximum of Gram-negative bacteria population density was registered on the 3rd- 7th day of the experiment with adding chitin. Compare to the control, which one was without any nutrient adding this dynamics registered much earlier. Consequently, the introduction of chitin as an additional source of nutrition promoted revealing of the Gram-negative bacteria in soil already at the early stages of the succession. In the course of the succession, when the fungal mycelium begins to die off, the actinomycetic mycelium increases in length, i.e., Gram-negative bacteria are replaced at this stage with Gram-positive ones, the leading role among which belongs to actinomycetes. The growth rate of Gram-negative bacteria is higher than that of actinomycetes, so they start chitin utilization at the early stages of the succession, whereas actinomycetes dominate at the late stages. The population density of Gram-negative bacteria was lower under the anaerobic conditions as compared with that in the aerobic ones. The population density of Gram

  20. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  1. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  2. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  3. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  4. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  5. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  6. Systematic Management of Change Is the Key to Successful Staff Development. An Initial Study of the Bloomfield Public Schools Staff Development Project. Teacher Essentials, Styles & Strategies (TESS).

    Science.gov (United States)

    Celso, Nicholas; Morris, Harold

    Confronted by a maturing staff, lower teacher turnover rates, declining enrollments, and more sophisticated instructional methods, the Bloomfield (New Jersey) Public School District adopted an ambitious staff development initiative in 1983. This paper describes the planning and implementation strategies used to launch Bloomfield's Teaching…

  7. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  8. Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications

    Directory of Open Access Journals (Sweden)

    Asish Kumar Dalai

    2017-01-01

    Full Text Available Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.

  9. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  10. Strategies of detecting Profile-injection attacks in E-Commerce Recommender System: A survey Partha

    Directory of Open Access Journals (Sweden)

    Sarathi Chakraborty,

    2015-12-01

    Full Text Available E-commerce recommender systems are vulnerable to different types of shilling attack where the attacker influences the recommendation procedure in favor of him by inserting fake user-profiles into the system. From one point of view, the attacks can be of type push or nuke-either to promote or to demote a product. On the other hand, attacks can be classified as high-knowledge or low-knowledge attack depending on the amount of system knowledge required for making the attack successful. Several research works have been done in the last two decades for defending attacks on recommender systems. In this paper, we have surveyed the major works done in this area by different researchers. After a brief explanation of different attack types and attack models, we discussed the attack detection strategies proposed by the researchers mainly under five categories- Generic and model specific attribute based, rating distribution based, outlier analysis based, statistical approach based and clustering based.

  11. Case Studies of Attacks over Adaptive Modulation Based Tactical Software Defined Radios

    Directory of Open Access Journals (Sweden)

    David Fernandes Cruz Moura

    2012-01-01

    Full Text Available This paper presents case studies of attacks aimed at tactical software defined radios based on a classification with the most common sources of vulnerabilities, classes of attacks, and types of intrusions that military radio sets may suffer. Besides that, we also describe how attack mitigation strategies can impact the development of SDR infrastructures. By using such approach, we identify several possible sources of vulnerabilities, attacks, intrusions, and mitigation strategies, illustrating them onto typical tactical radio network deployment scenarios, as an initial and necessary step for the definition of realistic and relevant security requirements for military software defined radio applications.

  12. An ensemble approach for feature selection of Cyber Attack Dataset

    CERN Document Server

    Singh, Shailendra

    2009-01-01

    Feature selection is an indispensable preprocessing step when mining huge datasets that can significantly improve the overall system performance. Therefore in this paper we focus on a hybrid approach of feature selection. This method falls into two phases. The filter phase select the features with highest information gain and guides the initialization of search process for wrapper phase whose output the final feature subset. The final feature subsets are passed through the Knearest neighbor classifier for classification of attacks. The effectiveness of this algorithm is demonstrated on DARPA KDDCUP99 cyber attack dataset.

  13. Identifying optimal targets of network attack by belief propagation

    CERN Document Server

    Mugisha, Salomon

    2016-01-01

    For a network formed by nodes and undirected links between pairs of nodes, the network optimal attack problem aims at deleting a minimum number of target nodes to break the network down into many small components. This problem is intrinsically related to the feedback vertex set problem that was successfully tackled by spin glass theory and an associated belief propagation-guided decimation (BPD) algorithm [H.-J. Zhou, Eur.~Phys.~J.~B 86 (2013), 455]. In the present work we apply a slightly adjusted version of the BPD algorithm to the network optimal attack problem, and demonstrate that it has much better performance than a recently proposed Collective Information algorithm [F. Morone and H. A. Makse, Nature 524 (2015), 63--68] for different types of random networks and real-world network instances. The BPD-guided attack scheme often induces an abrupt collapse of the whole network, which may make it very difficult to defend.

  14. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  15. Gemcitabine-induced gouty arthritis attacks.

    Science.gov (United States)

    Bottiglieri, Sal; Tierson, Neil; Patel, Raina; Mo, Jae-Hyun; Mehdi, Syed

    2013-09-01

    In this case report, we review the experience of a patient who presented with early stage pancreatic cancer (Stage IIb) who underwent a Whipple procedure and adjuvant chemoradiation. The patient's past medical history included early stage colon cancer in remission, post-traumatic-stress-disorder, hypertension, hyperlipidemia, osteoarthritis, gout, and pre-diabetes. Chemotherapy initially consisted of weekly gemcitabine. The patient developed acute gouty attacks after his second dose of gemcitabine, which brought him to the emergency room for emergent treatment on several occasions. Gemcitabine was held and treatment began with fluorouracil and concurrent radiation. After completion of his chemoradiation with fluorouracil, he was again treated with weekly gemcitabine alone. As soon as the patient started gemcitabine chemotherapy the patient developed gouty arthritis again, requiring discontinuation of chemotherapy. The patient received no additional treatment until his recent recurrence 8 months later where gemcitabine chemotherapy was again introduced with prophylactic medications consisting of allopurinol 100 mg by mouth daily and colchicine 0.6 mg by mouth daily throughout gemcitabine chemotherapy, and no signs of gouty arthritis occurred. To our knowledge, this is the first case report describing gout attacks associated with gemcitabine therapy. There is limited data available describing the mechanism that gouty arthritis may be precipitated from gemcitabine chemotherapy. Further monitoring and management may be required in patients receiving gemcitabine chemotherapy with underlying gout.

  16. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  17. Timing and hamming weight attacks on minimal cost encryption scheme

    Institute of Scientific and Technical Information of China (English)

    YUAN Zheng; WANG Wei; ZHANG Hua; WEN Qiao-yan

    2009-01-01

    The timing and Hamming weight attacks on the data encryption standard (DES) cryptosystem for minimal cost encryption scheme is presented in this article. In the attack, timing information on encryption processing is used to select and collect effective plaintexts for attack. Then the collected plaintexts are utilized to infer the expanded key differences of the secret key, from which most bits of the expanded secret key are recovered. The remaining bits of the expanded secret key are deduced by the correlations between Hamming weight values of the input of the S-boxes in the first-round. Finally, from the linear relation of the encryption time and the secret key's Hamming weight, the entire 56 bits of the secret key are thoroughly recovered. Using the attack, the minimal cost encryption scheme can be broken with 223 known plaintexts and about 221 calculations at a success rate a>99%. The attack has lower computing complexity, and the method is more effective than other previous methods.

  18. A video-polygraphic analysis of the cataplectic attack

    DEFF Research Database (Denmark)

    Rubboli, G; d'Orsi, G; Zaniboni, A

    2000-01-01

    with bradycardia, that was maximal during the atonic phase. CONCLUSIONS: Analysis of the muscular phenomena that characterize cataplectic attacks in a standing patient suggests that the cataplectic fall occurs with a pattern that might result from the interaction between neuronal networks mediating muscular atonia......OBJECTIVES AND METHODS: To perform a video-polygraphic analysis of 11 cataplectic attacks in a 39-year-old narcoleptic patient, correlating clinical manifestations with polygraphic findings. Polygraphic recordings monitored EEG, EMG activity from several cranial, trunk, upper and lower limbs...... muscles, eye movements, EKG, thoracic respiration. RESULTS: Eleven attacks were recorded, all of them lasting less than 1 min and ending with the fall of the patient to the ground. We identified, based on the video-polygraphic analysis of the episodes, 3 phases: initial phase, characterized essentially...

  19. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    Energy Technology Data Exchange (ETDEWEB)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo' ; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  20. Gray matter is targeted in first-attack multiple sclerosis.

    Directory of Open Access Journals (Sweden)

    Steven E Schutzer

    Full Text Available The cause of multiple sclerosis (MS, its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF of first-attack MS patients (two independent groups compared to established relapsing remitting (RR MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse. Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  1. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  2. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  3. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  4. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  5. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  6. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  7. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  8. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  9. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  10. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  11. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  12. Resveratrol products resulting by free radical attack

    Science.gov (United States)

    Bader, Yvonne; Quint, R. M.; Getoff, Nikola

    2008-06-01

    Trans-resveratrol ( trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  13. Resveratrol products resulting by free radical attack

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Yvonne; Quint, R.M. [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria); Getoff, Nikola [Section Radiation Biology, Department of Nutritional Sciences, Faculty of Life Sciences, University of Vienna, UZAII, Althanstrasse 14, A-1090 Vienna (Austria)], E-mail: nikola.getoff@univie.ac.at

    2008-06-15

    Trans-resveratrol (trans-3,4',5-trihydroxystilbene; RES), which is contained in red wine and many plants, is one of the most relevant and extensively investigated stilbenes with a broad spectrum of biological activities. Among other duties, RES has been reported to have anti-carcinogenetic activities, which could be attributed to its antioxidant properties. The degradation of RES was studied under various conditions. The products (aldehydes, carboxylic acids, etc.) generated from RES by the attack of free radicals were registered as a function of the radical concentration (absorbed radiation dose). Based on the obtained data it appears that the OH radicals are initiating the rather complicated process, which involves of the numerous consecutive reactions. A possible starting reaction mechanism is presented.

  14. Traumatic near amputation secondary to hippopotamus attack: lessons for surgeons.

    Science.gov (United States)

    Drake, Frederick Thurston; Quiroga, Elina; Kariuki, Hazel W; Shisanya, Kizito A; Hotchkiss, Matthew P; Monroe-Wise, Aliza; Drake, John K; Mburu, Joseph; Farquhar, Carey; Flum, David R

    2014-05-01

    A 34-y-old man presented to Naivasha District Hospital (NDH) in Naivasha Town, Kenya, with near-complete below-knee amputation and hemorrhage after a hippopotamus attack. Residents from the University of Washington (UW), Departments of Surgery, Anesthesia, and Medicine, were rotating at NDH with the Clinical Education Partnership Initiative, a joint venture of UW and University of Nairobi. These providers met the patient in the operating theater. The leg was mangled with severely traumatized soft tissues and tibia-fibula fractures. The visiting UW Surgery resident (R3) and an NDH medical officer (second-year house officer) performed emergency below-knee completion amputation--the first time either had performed this operation. The three major vessel groups were identified and ligated. Sufficient gastrocnemius and soleus were preserved for future stump construction. The wound was washed out, packed with betadine-soaked gauze, and wrapped in an elasticized bandage. Broad-spectrum antibiotics were initiated. Unfortunately, the patient suffered infection and was revised above the knee. After a prolonged course, the patient recovered well and was discharged home. NDH house officers and UW trainees collaborated successfully in an emergency and conducted the postoperative care of a patient with a serious and challenging injury. Their experience highlights the importance of preparedness, command of surgical basics, humility, learning from mistakes, the expertise of others, a digitally connected surgical community, and the role of surgery in global health. These lessons will be increasingly pertinent as surgical training programs create opportunities for their residents to work in developing countries; many of these lessons are equally applicable to surgical practice in the developed world. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  16. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  17. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  18. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  19. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  20. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  1. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  2. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  3. The NSF-Supported ADVANCE Initiative at the University of Michigan Aimed at Successful Recruitment and Retention of Women Faculty in Science and Engineering

    Science.gov (United States)

    Mukasa, S. B.; Committee, S.

    2004-12-01

    The University of Michigan obtained funding from the NSF ADVANCE Program for 2001-2006 to devise and implement strategies to improve representation and climate for its tenure-track women faculty in the natural sciences departments and the College of Engineering. In addition to increased representation and an improved campus environment for women faculty in science and engineering, the initiative aims to positively affect - through exposure to role models - the expectations and attitudes of the many women and men who are graduate and undergraduate students in these fields who make a sizeable pool from which future faculty are going to be drawn. This initiative was launched with a campus-wide survey to pinpoint problem areas, followed by the appointment of a committee of senior faculty now known as "Science and Technology Recruiting to Improve Diversity and Excellence" or STRIDE to provide information and advice about practices that will maximize the likelihood that well-qualified female and minority candidates for faculty positions will be identified, and, if selected for offers, recruited, retained, and promoted at the University of Michigan. The principal activities of STRIDE have so far included (i) helping in the development of an easy-to-navigate website with information about the ADVANCE project (URL: http://www.umich.edu/~advproj/index.html); (ii) development of a data-based PowerPoint presentation about non-conscious bias and the low numbers of women faculty in science and engineering; (iii) producing a handbook that offers guidelines for improving recruitment of women and minorities; and (iv) giving presentations in a variety of formats and providing advice to department chairs and other recruitment leaders on search committee composition and search practices. More recently, STRIDE has expanded its scope to include facilitation of departmental climate studies and informal discussions with women faculty about the importance of networking and receiving career

  4. [Successful second cord blood transplantation (CBT) for late graft failure associated with several immune disorders after the initial CBT in a patient with acute myeloid leukemia].

    Science.gov (United States)

    Mori, Minako; Yonezawa, Akihito; Kitagawa, Tomoya; Sasaki, Yuya; Onaka, Takashi; Imada, Kazunori

    2015-07-01

    A 64-year-old woman underwent reduced-intensity conditioning cord blood transplantation (RIC-CBT) for refractory acute myeloid leukemia (AML). A 6/6 antigen-level HLA-identical cord blood from a male infant was transfused. After successful engraftment with complete donor chimerism, the patient developed mixed chimera (XX 8.8%) on day 82. Tapering of tacrolimus was started on day 96. Bone marrow chimerism analysis showed a decreasing recipient cell population (XX 2.2%) on day 117 and tacrolimus was discontinued with no clinical signs of GVHD on day 123. However, pancytopenia with agranulocytosis was detected on day 138. She was diagnosed as having secondary graft failure associated with Coombs-positive immune hemolytic anemia and immune thrombocytopenia (ITP). At the same time, the percentage of recipient T cell chimerism in peripheral blood was about 50% and the B cell population showed lambda light chain restriction. On day 180, she received a second RIC-CBT due to lack of improvement of agranulocytosis. A single dose of rituximab was administered on day - 11 before the second CBT to eliminate the activated B cells. Prompt neutrophil engraftment was achieved and both hemolytic anemia and ITP also showed resolution. She is currently well (30 months after the second CBT), showing normal blood cell counts and complete second donor chimerism of marrow cells.

  5. Temporal characterization of experimental recorder attack transients.

    Science.gov (United States)

    Ernoult, A; Fabre, B

    2017-01-01

    Through the comparison of notes produced on two recorders by one novice and two experienced players in musical contexts, this study identifies the temporal aspects of the attack transients which are controlled by the player and those which are imposed by the dynamic response of the instrument. The rise times of mouth pressure used by the novice player are longer than the ones produced by the experienced players, which are the shortest ones preserving the control of the jet velocity rise times. For shortest rise times, the jet development is limited by the inertia of the channel. The onset time of the acoustic oscillation is divided in two parts: the time needed to initiate the oscillation and the duration of the growth. The times of growth are similar for the novice and the experienced players, which is linked to the similarity of the gain characterizing the linear behavior of the instrument. The times needed to initiate the oscillation show the most pronounced difference between the two types of players; it is much longer for a novice player. This difference is interpreted in terms of the initial input of energy in the system which is larger for the experienced players.

  6. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  7. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  8. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  9. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  10. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  11. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  12. Assessment of Malawi’s success in child mortality reduction through the lens of the Catalytic Initiative Integrated Health Systems Strengthening programme: Retrospective evaluation

    Directory of Open Access Journals (Sweden)

    Tanya Doherty

    2015-12-01

    Full Text Available Malawi is estimated to have achieved its Millennium Development Goal (MDG 4 target. This paper explores factors influencing progress in child survival in Malawi including coverage of interventions and the role of key national policies. We performed a retrospective evaluation of the Catalytic Initiative (CI programme of support (2007–2013. We developed estimates of child mortality using four population household surveys undertaken between 2000 and 2010. We recalculated coverage indicators for high impact child health interventions and documented child health programmes and policies. The Lives Saved Tool (LiST was used to estimate child lives saved in 2013. The mortality rate in children under 5 years decreased rapidly in the 10 CI districts from 219 deaths per 1000 live births (95% confidence interval (CI 189 to 249 in the period 1991–1995 to 119 deaths (95% CI 105 to 132 in the period 2006–2010. Coverage for all indicators except vitamin A supplementation increased in the 10 CI districts across the time period 2000 to 2013. The LiST analysis estimates that there were 10 800 child deaths averted in the 10 CI districts in 2013, primarily attributable to the introduction of the pneumococcal vaccine (24% and increased household coverage of insecticide–treated bednets (19%. These improvements have taken place within a context of investment in child health policies and scale up of integrated community case management of childhood illnesses. Malawi provides a strong example for countries in sub–Saharan Africa of how high impact child health interventions implemented within a decentralised health system with an established community–based delivery platform, can lead to significant reductions in child mortality.

  13. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  14. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  15. Resisting persuasion by the skin of one's teeth: the hidden success of resisted persuasive messages.

    Science.gov (United States)

    Tormala, Zakary L; Clarkson, Joshua J; Petty, Richard E

    2006-09-01

    Recent research has suggested that when people resist persuasion they can perceive this resistance and, under specifiable conditions, become more certain of their initial attitudes (e.g., Z. L. Tormala & R. E. Petty, 2002). Within the same metacognitive framework, the present research provides evidence for the opposite phenomenon--that is, when people resist persuasion, they sometimes become less certain of their initial attitudes. Four experiments demonstrate that when people perceive that they have done a poor job resisting persuasion (e.g., they believe they generated weak arguments against a persuasive message), they lose attitude certainty, show reduced attitude-behavioral intention correspondence, and become more vulnerable to subsequent persuasive attacks. These findings suggest that resisted persuasive attacks can sometimes have a hidden yet important success by reducing the strength of the target attitude. ((c) 2006 APA, all rights reserved).

  16. Application of stochastic discrete event system framework for detection of induced low rate TCP attack.

    Science.gov (United States)

    Barbhuiya, F A; Agarwal, Mayank; Purwar, Sanketh; Biswas, Santosh; Nandi, Sukumar

    2015-09-01

    TCP is the most widely accepted transport layer protocol. The major emphasis during the development of TCP was its functionality and efficiency. However, not much consideration was given on studying the possibility of attackers exploiting the protocol, which has lead to several attacks on TCP. This paper deals with the induced low rate TCP attack. Since the attack is relatively new, only a few schemes have been proposed to mitigate it. However, the main issues with these schemes are scalability, change in TCP header, lack of formal frameworks, etc. In this paper, we have adapted the stochastic DES framework for detecting the attack, which addresses most of these issues. We have successfully deployed and tested the proposed DES based IDS on a test bed.

  17. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  18. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  19. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  20. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  1. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  2. Intrusion Detection System to Overcome a Novel Form of Replay Attack (Data Replay in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yasmine Medjadba

    2017-07-01

    Full Text Available Wireless Sensor Networks (WSNs are widely and successfully employed in various application domains. They are easily deployed to collect valuable information and monitor potential environmental phenomena. However, the special nature of WSNs as well as their severe constraints and resource limitations make them vulnerable to various types of threats. Replay attack, is one example. According to this attack, the adversary intercepts and replays several times the same (old message leading either to missed alerts or to false alerts. Many solutions have been proposed to mitigate message replay attack. However, all these solutions are of cryptographic natures and consider only external attacks exercising a trivial scenario of replay attack. In fact, the attacker could be a lot smarter, and in this case, it replays only the data field in the message while keeping the remaining fields updated. This novel form of replay attack is much more dangerous and difficult to be detected. We call this attack variant by data replay attack. As sensor nodes may be easily captured and compromised, the worst scenario occurs if data replay attack is performed by an internal intruder. In this paper we propose an efficient intrusion detection framework to overcome data replay attack in WSNs. The proposed intrusion detection system is named DR-IDS (Data Replay Intrusion Detection System. The performance evaluations performed under NS2 simulator show that the proposed solution is sufficiently robust.

  3. Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures

    Directory of Open Access Journals (Sweden)

    Ghaboosi Kaveh

    2009-01-01

    Full Text Available Abstract Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.

  4. Botnet: Classification, Attacks, Detection, Tracing, and Preventive Measures

    Directory of Open Access Journals (Sweden)

    Jing Liu

    2009-01-01

    Full Text Available Botnets become widespread in wired and wireless networks, whereas the relevant research is still in the initial stage. In this paper, a survey of botnets is provided. We first discuss fundamental concepts of botnets, including formation and exploitation, lifecycle, and two major kinds of topologies. Several related attacks, detection, tracing, and countermeasures, are then introduced, followed by recent research work and possible future challenges.

  5. A Comparative Study of Power Consumption Models for CPA Attack

    Directory of Open Access Journals (Sweden)

    Hassen Mestiri

    2013-03-01

    Full Text Available Power analysis attacks are types of side channel attacks that are based on analyzing the power consumption of the cryptographic devices. Correlation power analysis is a powerful and efficient cryptanalytic technique. It exploits the linear relation between the predicted power consumption and the real power consumption of cryptographic devices in order to recover the correct key. The predicted power consumption is determined by using the appropriate consumption model. Until now, only a few models have been proposed and used.In this paper, we describe the process to conduct the CPA attack against AES on SASEBO-GII board. We present a comparison between the Hamming Distance model and the Switching Distance model, in terms of number of power traces needed to recover the correct key using these models. The global successful rate achieves 100% at 11100 power traces. The power traces needed to recover the correct key have been decreased by 12.6% using a CPA attack with Switching Distance model.

  6. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  7. Detecting Sinkhole Attacks in Wireless Sensor Network using Hop Count

    Directory of Open Access Journals (Sweden)

    Md. Ibrahim Abdullah

    2015-02-01

    Full Text Available Nowadays, Wireless Sensor Networks (WSNs are widely used in many areas, especially in environment applications, military applications, queue tracking, etc. WSNs are vulnerable to different types of security attacks due to various constraints such as broadcasted nature of transmission medium, deployment in open or hostile environment where they are not physically protected, less memory, and limited battery power. So, security system is the crucial requirements of these networks. One of the most notably routing attacks is the sinkhole attack where an adversary captures or insert nodes in the sensor field that advertise high quality routes to the base station. In this paper, a mechanism is proposed against sinkhole attacks which detect malicious nodes using hop counting. The main advantage of the proposed technique is that, a node can detects malicious nodes only collaborating with the neighbor nodes without requiring any negotiation with the base station. Simulation result shows that, the proposed technique successfully detects the sinkhole nodes for large sensor field.

  8. Some Attacks On Quantum-based Cryptographic Protocols

    CERN Document Server

    Lo, H K; Lo, Hoi-Kwong; Ko, Tsz-Mei

    2003-01-01

    Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, subtle attacks that are outside the original design of the protocols may allow eavesdroppers to break those protocols. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. Moreover, if technological assumptions are made in the design of a quantum-based cryptographic protocol, then the actual security of the protocol may fall short of expectations. This is because it is often hard to quantify those technological assumptions in a precise manner. Here, we give an attack against a recently proposed ``secure communication using coherent state scheme''. Our attack requires only beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2^k copies of what Bob receives, where k is the length of the seed key pre-shared by Alice an...

  9. The Effect of Elevated CO2 and Increased Temperature on in Vitro Fertilization Success and Initial Embryonic Development of Single Male:Female Crosses of Broad-Cast Spawning Corals at Mid- and High-Latitude Locations

    Directory of Open Access Journals (Sweden)

    Miriam Schutter

    2015-05-01

    Full Text Available The impact of global climate change on coral reefs is expected to be most profound at the sea surface, where fertilization and embryonic development of broadcast-spawning corals takes place. We examined the effect of increased temperature and elevated CO2 levels on the in vitro fertilization success and initial embryonic development of broadcast-spawning corals using a single male:female cross of three different species from mid- and high-latitude locations: Lyudao, Taiwan (22° N and Kochi, Japan (32° N. Eggs were fertilized under ambient conditions (27 °C and 500 μatm CO2 and under conditions predicted for 2100 (IPCC worst case scenario, 31 °C and 1000 μatm CO2. Fertilization success, abnormal development and early developmental success were determined for each sample. Increased temperature had a more profound influence than elevated CO2. In most cases, near-future warming caused a significant drop in early developmental success as a result of decreased fertilization success and/or increased abnormal development. The embryonic development of the male:female cross of A. hyacinthus from the high-latitude location was more sensitive to the increased temperature (+4 °C than the male:female cross of A. hyacinthus from the mid-latitude location. The response to the elevated CO2 level was small and highly variable, ranging from positive to negative responses. These results suggest that global warming is a more significant and universal stressor than ocean acidification on the early embryonic development of corals from mid- and high-latitude locations.

  10. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  11. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  12. Big News: The Indian Media and Student Attacks in Australia

    Directory of Open Access Journals (Sweden)

    Matt Wade

    2016-05-01

    Full Text Available By any measure, 2009 was a big year for news in India. And yet the safety of Indian students in Australia ranked among the major news events in India that year. The India-Australia Poll 2013 found 65 per cent of respondents believed the Indian media had accurately reported the problems faced by Indian students in Australia in 2009-10. That implies two-thirds of Indians accepted the Indian media’s mostly negative depictions of Australia. Those who believed the media reporting about Australia had been accurate were more likely to be from large cities, be tertiary educated and have relatively high-incomes. The poll found 62 per cent of respondents thought Australia was a dangerous place for Indian students and that 61 per cent believed attacks on Indian students were motivated by racism. The results suggest negative perceptions about Australia created by the media’s portrayal of the student attacks linger in the Indian community. The timing of the initial attacks, and the imagery associated with them, helped attract and sustain media attention on the issue. The diplomatic tensions created by the crisis highlighted the growing influence of the broadcast media on India’s foreign relations. But the episode also exposed a deep lack of understanding about India in Australia. Governments were slow to comprehend how much damage media coverage of student attacks could do to Australia’s reputation in India.

  13. Query Based Approach Towards Spam Attacks Using Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Gaurav Kumar Tak

    2010-10-01

    Full Text Available Currently, spam and scams are passive attack over the inbox which can initiated to steal someconfidential information, to spread Worms, Viruses, Trojans, cookies and Sometimes they are used forphishing attacks. Spam mails are the major issue over mail boxes as well as over the internet. Spam mailscan be the cause of phishing attack, hacking of banking accounts, attacks on confidential data. Spammingis growing at a rapid rate since sending a flood of mails is easy and very cheap. Spam mails disturb themind-peace, waste time and consume various resources e.g., memory space and network bandwidth, sofiltering of spam mails is a big issue in cyber security.This paper presents an novel approach of spam filtering which is based on some query generatedapproach on the knowledge base and also use some artificial neural network methods to detect the spammails based on their behavior. analysis of the mail header, cross validation. Proposed methodologyincludes the 7 several steps which are well defined and achieve the higher accuracy. It works well with allkinds of spam mails (text based spam as well as image spam. Our tested data and experiments resultsshows promising results, and spam’s are detected out at least 98.17 % with 0.12% false positive.

  14. Query Based Approach Towards Spam Attacks Using Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Gaurav Kumar Tak

    2010-10-01

    Full Text Available Currently, spam and scams are passive attack over the inbox which can initiated to steal some confidential information, to spread Worms, Viruses, Trojans, cookies and Sometimes they are used for phishing attacks. Spam mails are the major issue over mail boxes as well as over the internet. Spam mails can be the cause of phishing attack, hacking of banking accounts, attacks on confidential data. Spamming is growing at a rapid rate since sending a flood of mails is easy and very cheap. Spam mails disturb the mind-peace, waste time and consume various resources e.g., memory space and network bandwidth, so filtering of spam mails is a big issue in cyber security. This paper presents an novel approach of spam filtering which is based on some query generated approach on the knowledge base and also use some artificial neural network methods to detect the spam mails based on their behavior. analysis of the mail header, cross validation. Proposed methodology includes the 7 several steps which are well defined and achieve the higher accuracy. It works well with all kinds of spam mails (text based spam as well as image spam. Our tested data and experiments results shows promising results, and spam’s are detected out at least 98.17 % with 0.12% false positive.

  15. Impact of migraine attacks on the blood-brain barrier

    Institute of Scientific and Technical Information of China (English)

    GAO Hong-mei; LI Le; ZHANG Ke-ling; CHEN Xu-hui; TIAN Shu-qing; ZHANG Zhong-ling

    2010-01-01

    Background Cortical spreading depression can cause migraine attack, and up-regulate matrix metalloproteinase-9 (MMP-9) expression in animal. This study aimed to determine the impact on the structure and function of the blood-brain barrier by measuring plasma MMP-9 levels in patients at the acute and late stages of migraine attacks in order to elucidate the pathological mechanisms involved.Methods We recruited a case-control cohort of 38 adult migraine patients and 20 age- and gender-matched healthy control subjects. Five milliliter blood samples were collected at the acute and late stages of migraine (days 1-7), and also from the control subjects. Solid phase double antibody sandwich enzyme-linked immunosorbent assay was used to determine plasma MMP-9 levels. Statistical analysis was performed using the SAS version 9.1.Results Initial plasma MMP-9 levels of migraine patients were significantly higher than those of controls ((12.612±0.016)μg/L vs. (6.069±0.023) μg/L, respectively, P 0.05); in addition, levels were not correlated with degree of headache pain (P >0.05).Conclusions We hypothesize that migraine could lead to increased plasma MMP-9 levels resulting in blood-brain barrier damage. MMP-9 levels increase during days 1-6 of migraine attacks, peaking on day 3. Therefore, MMP-9 could be used as a biological marker to guide treatment of migraine attacks.

  16. A mathematical model for a distributed attack on targeted resources in a computer network

    Science.gov (United States)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2014-09-01

    A mathematical model has been developed to analyze the spread of a distributed attack on critical targeted resources in a network. The model provides an epidemic framework with two sub-frameworks to consider the difference between the overall behavior of the attacking hosts and the targeted resources. The analysis focuses on obtaining threshold conditions that determine the success or failure of such attacks. Considering the criticality of the systems involved and the strength of the defence mechanism involved, a measure has been suggested that highlights the level of success that has been achieved by the attacker. To understand the overall dynamics of the system in the long run, its equilibrium points have been obtained and their stability has been analyzed, and conditions for their stability have been outlined.

  17. State of the art on defenses against wormhole attacks in wireless sensor networks

    DEFF Research Database (Denmark)

    Prasad, Neeli R.; Giannetsos, T.; Dimitriou, T.

    2009-01-01

    describe the wormhole attack, a severe routing attack against sensor networks that is particularly challenging to defend against. We detail its characteristics and study its effects on the successful operation of a sensor network. We present state-of-the-art research for addressing wormhole related...... the possibility of using more sophisticated methods, like intrusion detection systems, to achieve a more complete and autonomic defense mechanism against wormhole attackers. We present our work on intrusion detection and introduce a lightweight IDS framework, called LIDeA, designed for wireless sensor networks....... LIDeA is based on a distributed architecture, in which nodes overhear their neighboring nodes and collaborate with each other in order to successfully detect an intrusion. We conclude by highlighting how such a system can be used for defending against wormhole attackers....

  18. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  19. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  20. Induced attack during multiple fixed-ratio, variable-ratio schedules of reinforcement1

    Science.gov (United States)

    Webbe, Frank M.; DeWeese, Jo; Malagodi, E. F.

    1974-01-01

    Two pigeons were exposed to a multiple schedule of reinforcement: in the presence of one discriminative stimulus, key pecks produced grain according to a fixed-ratio schedule; in the presence of a second discriminative stimulus, key pecks produced grain according to a variable-ratio schedule. The key-peck requirements in the two components were increased in successive stages from 50 to 125 responses. Live target pigeons were restrained at the rear of the chamber. Attacks against the targets were automatically recorded, and a variety of measures of attack behavior were taken. Attacks, when they occurred, always followed grain presentation. All measures revealed higher levels of attack during the fixed-ratio component at all parameter values. All measures generally increased with increases in fixed-ratio values with both birds, and with increases in variable-ratio values with one bird. With the other bird, only the per cent of reinforcements followed by attack increased with increases in variable-ratio value; all other measures first increased and then decreased. Both increasing and bitonic functions relating induced attack to schedule parameters have been reported in experiments usually employing a single measure of attack. The measures have varied widely among these experiments. It is suggested that further studies of induced attack examine a wider range of schedule parameters and that relationships among measures be studied. PMID:16811777

  1. Induced attack during multiple fixed-ratio, variable-ratio schedules of reinforcement.

    Science.gov (United States)

    Webbe, F M; Deweese, J; Malagodi, E F

    1974-07-01

    TWO PIGEONS WERE EXPOSED TO A MULTIPLE SCHEDULE OF REINFORCEMENT: in the presence of one discriminative stimulus, key pecks produced grain according to a fixed-ratio schedule; in the presence of a second discriminative stimulus, key pecks produced grain according to a variable-ratio schedule. The key-peck requirements in the two components were increased in successive stages from 50 to 125 responses. Live target pigeons were restrained at the rear of the chamber. Attacks against the targets were automatically recorded, and a variety of measures of attack behavior were taken. Attacks, when they occurred, always followed grain presentation. All measures revealed higher levels of attack during the fixed-ratio component at all parameter values. All measures generally increased with increases in fixed-ratio values with both birds, and with increases in variable-ratio values with one bird. With the other bird, only the per cent of reinforcements followed by attack increased with increases in variable-ratio value; all other measures first increased and then decreased. Both increasing and bitonic functions relating induced attack to schedule parameters have been reported in experiments usually employing a single measure of attack. The measures have varied widely among these experiments. It is suggested that further studies of induced attack examine a wider range of schedule parameters and that relationships among measures be studied.

  2. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    Science.gov (United States)

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.

  3. A decision framework for managing risk to airports from terrorist attack.

    Science.gov (United States)

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period.

  4. Characterization of the soil organic matter and plant tissues in an initial stage of the plant succession and soil development by means of curie-point pyrolysis coupled with GC-MS

    Science.gov (United States)

    Rahmonov, Oimahmad; Kowalski, Witold J.; Bednarek, Renata

    2010-12-01

    The composition of the soil organic matter in soil developing under the influence of vegetation during the primary succession in the poor sandy area was investigated. The Curie-point pyrolysis method coupled with gas chromatographic separation and mass spectrometric identification of pyrolysates was applied during the investigation. A comparison of occurrence and diversity in composition of organic compounds in plant tissues and humus horizon of soils under the communities of coniferous forest series in the initial stages and phases was carried out. A large diversity of organic compounds under Algae-Cyanophyta communities, biological soil crusts and Polytrichum piliferum was noticed. A clear differentiation in the composition of the soil organic matter at different phases of succession under predominating communities with cryptogamous and vascular plants was observed. The analysis of organic compounds in plant tissues was found to facilitate the determination of origin of various groups of organic compounds in the soil. The results obtained from the Curie point pyrograms in the humus horizon (A) under grasses ( Corynephorus canescens, Koeleria glauca) differed from the pyrolysates obtained under Algae-Cyanophyta communities. The polysaccharide derivates are more frequent in the pyrolysis products under algae, grasses ( Corynephorus canescens, Koeleria glauca) and mosses than under Pinus sylvestris. In the beginning of the terminal stage of succession, lignin, phenols and aliphatic substances, prevailed over the polysaccharide derivates in the humus horizon.

  5. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  6. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  7. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  8. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  9. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  10. Network Coding Based Security for Routing Attacks in WRN: Frechet Interference and Rayleigh Outage Evaluation

    Directory of Open Access Journals (Sweden)

    R. Villalpando-Hernández

    2011-08-01

    Full Text Available We present a network coding security method capable of detecting several routing attacks in wireless reconfigurablenetworks. Routing security attacks include selective forwarding, black holes, and wormholes. The proposed methodperforms linear network coding over intermediate nodes composing a given route, not only to distribute content, butalso to provide data confidentiality by cooperation as a mechanism of detection. The method presents a robust,accurate and fast response under security attacks for varying network conditions, such as interference and outagedue to channel fading. It also provides a gain in network throughput by increasing the number of successfully receivedpackets without a significant increase of the bandwidth usage.

  11. Rhynchophorus ferrugineus attack affects a group of compounds rather than rearranging Phoenix canariensis metabolic pathways.

    Science.gov (United States)

    Giovino, Antonio; Martinelli, Federico; Saia, Sergio

    2016-04-01

    The red palm weevil (RPW; Rhynchophorus ferrugineus) is spreading worldwide and severely harming many palm species. However, most studies on RPW focused on insect biology, and little information is available about the plant response to the attack. In the present experiment, we used metabolomics to study the alteration of the leaf metabolome of Phoenix canariensis at initial (1st stage) or advanced (2nd stage) attack by RPW compared with healthy (unattacked) plants. The leaf metabolome significantly varied among treatments. At the 1st stage of attack, plants showed a reprogramming of carbohydrate and organic acid metabolism; in contrast, peptides and lipid metabolic pathways underwent more changes during the 2nd than 1st stage of attack. Enrichment metabolomics analysis indicated that RPW attack mostly affected a particular group of compounds rather than rearranging plant metabolic pathways. Some compounds selectively affected during the 1st rather than 2nd stage (e.g. phenylalanine; tryptophan; cellobiose; xylose; quinate; xylonite; idonate; and iso-threonate; cellobiotol and arbutine) are upstream events in the phenylpropanoid, terpenoid and alkaloid biosynthesis. These compounds could be designated as potential markers of initial RPW attack. However, further investigation is needed to determine efficient early screening methods of RPW attack based on the concentrations of these molecules.

  12. Rhynchophorus ferrugineus attack affects a group of compounds rather than rearranging Phoenix canariensis metabolic pathways

    Institute of Scientific and Technical Information of China (English)

    Antonio Giovino; Federico Martinelli; Sergio Saia

    2016-01-01

    The red palm weevil (RPW; Rhynchophorus ferrugi-neus) is spreading worldwide and severely harming many palm species. However, most studies on RPW focused on insect biology, and little information is available about the plant response to the attack. In the present experiment, we used metabolomics to study the alteration of the leaf metabolome of Phoenix canariensis at initial (1st stage) or advanced (2nd stage) attack by RPW compared with healthy (unattacked) plants. The leaf metabolome significantly varied among treatments. At the 1st stage of attack, plants showed a reprogramming of carbohydrate and organic acid metabolism;in contrast, peptides and lipid metabolic pathways underwent more changes during the 2nd than 1st stage of attack. Enrichment metabolomics analysis indicated that RPW attack mostly affected a particular group of compounds rather than rearranging plant metabolic pathways. Some compounds selectively affected during the 1st rather than 2nd stage (e.g. phenylalanine;tryptophan;cel obiose;xylose;quinate;xylonite;idonate;and iso-threonate;cel obiotol and arbutine) are upstream events in the phenylpropanoid, terpenoid and alkaloid biosynthesis. These compounds could be designated as potential markers of initial RPW attack. However, further investigation is needed to determine efficient early screening methods of RPW attack based on the concentrations of these molecules.

  13. PAKE-based mutual HTTP authentication for preventing phishing attacks

    CERN Document Server

    Oiwa, Yutaka; Takagi, Hiromitsu

    2009-01-01

    This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

  14. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  15. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  16. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  17. Prevention of Spoofing Attacks in the Infrastructure Wireless Networks

    Directory of Open Access Journals (Sweden)

    Samraa A. AlAsady

    2012-01-01

    Full Text Available Problem statement: Spoofing Attack is one of the vulnerabilities in the wireless networks, which is a situation in which the intruder successfully masquerades as legal one. Spoofing Attacks will decrease the performance of the network and violate many security issues. In the networks that use MAC address based filtering approach to authenticate the clients, the spoofer just needs to get a valid MAC address that belong to some authorized client in the network in order to gain an illegitimate advantage. Approach: In this article, it has proposed an algorithm that uses an additional authentication process beside MAC address filtering and periodically re-authenticates the client after sending every specific number of Data frames. The proposed additional authentication process is based on two parts. First: Using unique information that belongs to every client in the network such as computer name, CPU ID and the current time as inputs to a hash function (one-way function, then insert the hash value in the slack fields of the header of the frame (Steganography. Second: Make a modification to the access point access control list by adding that unique information belong to each client in addition to its MAC address in the access control list. Thus, when the AP receives an Authentication frame from a client, it will first check the MAC address, if it is legal; the AP will re-compute the Hash value depending on the corresponding identifiers stored in the access control list and the time of creating the frame, then compare the resulted hash value with the received one and decide whether to reject or accept the access. Results: The results has been found is that even the attacker is spoofed the MAC address; he/she cannot communicate with the network because the attacker will fail in computing the hash value that depends on the Computer name and CPU ID. Also the attacker will be prevented even if he/she enters the network after the legal client finished the

  18. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  19. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  20. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  1. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  2. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  3. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  4. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  5. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  6. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  7. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  8. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  9. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  10. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  11. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  12. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  13. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  14. Aseptic meningoencephalitis mimicking transient ischaemic attacks.

    Science.gov (United States)

    Papavasileiou, V; Milionis, H; Cordier, M; Eskandari, A; Ntaios, G; Michel, P

    2013-04-01

    To highlight meningoencephalitis as a transient ischaemic attack (TIA) mimic and suggest clinical clues for differential diagnosis. This was an observational study of consecutively admitted patients over a 9.75-year period presenting as TIAs at a stroke unit. A total of 790 patients with TIAs and seven with TIA-like symptoms but a final diagnosis of viral meningoencephalitis were recognised. The most frequent presentations of meningoencephalitis patients were acute sensory hemisyndrome (6) and cognitive deficits (5). Signs of meningeal irritation were minor or absent on presentation. Predominantly lymphocytic pleocytosis, hyperproteinorachia and a normal cerebrospinal fluid (CSF)/serum glucose index (in 5 out of 6 documented patients) were present. Meningeal thickening on a brain magnetic resonance imaging (MRI) scan was the only abnormal imaging finding. Six patients received initial vascular treatment; one thrombolysed. Finally, six patients were treated with antivirals and/or antibiotics. Although neither bacterial nor viral agents were identified on extensive testing, viral meningoencephalitis was the best explanation for all clinical and laboratory findings. Aseptic meningoencephalitis should be part of the differential diagnosis in patients presenting as TIA. The threshold for a lumbar puncture in such patients should be set individually and take into account the presence of mild meningeal symptoms, age and other risk factors for vascular disease, the results of brain imaging and the basic diagnostic work-up for a stroke source.

  15. Performance analyses of wormhole attack in Cognitive Radio Network (CRN

    Directory of Open Access Journals (Sweden)

    Prabhjot

    2015-06-01

    Full Text Available Mobile wirelesses networks are generally open to various attacks like information and physical security attacks than fixed wired networks. Securing wireless ad hoc networks is particularly more difficult for many of the reasons for example vulnerability of channels and nodes, absence of infrastructure, dynamically changing topology etc. After that we initialize the number of nodes. Then implement protocol for the communication of nodes. Due to these protocols communication start. And this will be then implemented in CRNs which stand for cognitive radio network in which channel sensing is done. By the use of CRN security will be improved and performance will be enhanced. Find the malicious nodes occur in the network. One malicious node uses routing protocol to claim itself of being shortest path to last node but drops routing packets and doesn’t send packets to its neighbors. In last evaluate the parameters.

  16. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  17. Patent foramen ovale and migraine attacks: a systematic review.

    Science.gov (United States)

    Lip, Philomena Z Y; Lip, Gregory Y H

    2014-05-01

    Migraine headache and the presence of a patent foramen ovale have been associated with each other, although the precise pathophysiological mechanism(s) are uncertain. The purpose of this systematic review was to identify the extent of patent foramen ovale prevalence in migraineurs and to determine whether closure of a patent foramen ovale would improve migraine headache. An electronic literature search was performed to select studies between January 1980 and February 2013 that were relevant to the prevalence of patent foramen ovale and migraine, and the effects of intervention(s) on migraine attacks. Of the initial 368 articles presented by the initial search, 20 satisfied the inclusion criteria assessing patent foramen ovale prevalence in migraineurs and 21 presented data on patent foramen ovale closure. In case series and cohort studies, patent foramen ovale prevalence in migraineurs ranged from 14.6% to 66.5%. Case-control studies reported a prevalence ranging from 16.0% to 25.7% in controls, compared with 26.8% to 96.0% for migraine with aura. The extent of improvement or resolution of migraine headache attack symptoms was variable. In case series, intervention ameliorated migraine headache attack in 13.6% to 92.3% of cases. One single randomized trial did not show any benefit from patent foramen ovale closure. The data overall do not exclude the possibility of a placebo effect for resolving migraine following patent foramen ovale closure. This systematic review demonstrates firstly that migraine headache attack is associated with a higher prevalence of patent foramen ovale than among the general population. Observational data suggest that some improvement of migraine would be observed if the patent foramen ovale were to be closed. A proper assessment of any interventions for patent foramen ovale closure would require further large randomized trials to be conducted given uncertainties from existing trial data. Copyright © 2014 Elsevier Inc. All rights reserved.

  18. Towards automated incident handling: how to select an appropriate response against a network-based attack?

    NARCIS (Netherlands)

    Ossenbühl, Sven; Steinberger, Jessica; Baier, Harald

    2015-01-01

    The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate suitable reactions. However, initiating a suita

  19. Towards automated incident handling: how to select an appropriate response against a network-based attack?

    NARCIS (Netherlands)

    Ossenbühl, Sven; Steinberger, Jessica; Baier, Harald

    2015-01-01

    The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate suitable reactions. However, initiating a suita

  20. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  1. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  2. An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

    Directory of Open Access Journals (Sweden)

    ZUBAIR AHMED KHAN

    2016-07-01

    Full Text Available MANETs (Mobile Ad Hoc Networks are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time and RSSI (Received Signal Strength Indicator for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

  3. Forensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System

    Directory of Open Access Journals (Sweden)

    Manghui Tu

    2012-12-01

    Full Text Available Forensic readiness can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business frauds. To establish forensics readiness, it is essential for an organization to identify what evidences are relevant and where they can be found, to determine whether they are logged in a forensic sound way and whether all the needed evidences are available to reconstruct the events successfully.  Our goal of this research is to ensure evidence availability. First, both external and internal attacks are molded as augmented attack trees/graphs based on the system vulnerabilities. Second, modeled attacks are conducted against a honeynet simulating an online business information system, and each honeypot's hard drive is forensic sound imaged for each individual attack. Third, an evidence tree/graph will be built after forensics examination on the disk images for each attack. The evidence trees/graphs are expected to be used for automatic crime scene reconstruction and automatic attack/fraud detection in the future.

  4. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  6. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  7. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  8. Kinetic and structural analysis of enzyme sliding on a substrate: multiple attack in beta-amylase.

    Science.gov (United States)

    Ishikawa, Kazuhiko; Nakatani, Hiroshi; Katsuya, Yoshio; Fukazawa, Chikafusa

    2007-01-23

    Beta-amylase (EC 3.2.1.2) is starch-hydrolyzing exo-type enzyme that can catalyze the successive liberation of beta-maltose from the nonreducing ends of alpha-1,4-linked glucopyranosyl polymers. There is a well-known phenomenon called multiple or repetitive attack where the enzyme releases several maltose molecules in a single enzyme-substrate complex. In order to understand it further, we examined the beta-amylase-catalyzed reaction using maltooligosaccharides. The Monte Carlo method was applied for simulation of the beta-amylase-catalyzed reaction including the multiple attack mechanism. Through site-directed mutagenesis, we have successfully prepared a mutant enzyme which may be simulated as a multiple attack action reduced one with retaining significant hydrolytic activity. From the results of X-ray structure analysis of the mutant enzyme, it was clarified that one carboxyl residue plays a very important role in the multiple attack. The multiple attack action needs the force of enzyme sliding on the substrate. In addition, it is important for the multiple attack that the enzyme and substrate have the characteristics of a stable productive substrate-enzyme complex through a hydrogen bond between the nonreducing end of the substrate and the carboxyl residue of the enzyme.

  9. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  10. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  11. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  12. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  13. Countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme

    Science.gov (United States)

    Lee, Min Soo; Park, Byung Kwon; Woo, Min Ki; Park, Chang Hoon; Kim, Yong-Su; Han, Sang-Wook; Moon, Sung

    2016-12-01

    We developed a countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme in quantum key distribution (QKD) systems. Background-noise cancellation includes self-differencing and balanced avalanche photon diode (APD) schemes and is considered a promising solution for low-noise APDs, which are critical components in high-performance QKD systems. However, its vulnerability to blinding attacks has been recently reported. In this work, we propose a countermeasure that prevents this potential security loophole from being used in detector blinding attacks. An experimental QKD setup is implemented and various tests are conducted to verify the feasibility and performance of the proposed method. The obtained measurement results show that the proposed scheme successfully detects occurring blinding-attack-based hacking attempts.

  14. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Science.gov (United States)

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  15. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  16. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  17. Traits of Masson Pine Affecting Attack of Pine Wood Nematode

    Institute of Scientific and Technical Information of China (English)

    Juan Shi; You-Qing Luo; Ji-Ying Song; Hai-Wei Wu; Lei Wang; Gary Z. Wang

    2007-01-01

    Masson pine characteristics were analyzed in five sample plots in Zhejiang Province, China.Bursaphelenchus xylophilus (Steiner et Buhrer) Nickle (pine wood nematode, PWN) carried by Monochamus alternatus predominately attacked Masson pines in the lower diameter classes.Among the 10 tree characteristics examined, mean crown width, percentage of bole with crown, 5-year cumulative diameter growth, and resin amount showed significant variation between successfully attacked and unattacked trees.The attacked trees had a lower percentage of the bole covered with tree crown, lower crown width, lower radial growth in the last 5 years, and produced less induced resinosis than unattacked trees.Results allowed for effective ranking of the pine forest based on individual tree resistance to PWN.This Index of resistance should be considered throughout the development of an "Evaluation Criterion and Indicator System".The preceding ranking can be used to evaluate the resistance and resiliency of the pine forest ecosystem to PWN's invasion, which is similar to Pest Risk Analysis (PRA).

  18. Identifying optimal targets of network attack by belief propagation

    Science.gov (United States)

    Mugisha, Salomon; Zhou, Hai-Jun

    2016-07-01

    For a network formed by nodes and undirected links between pairs of nodes, the network optimal attack problem aims at deleting a minimum number of target nodes to break the network down into many small components. This problem is intrinsically related to the feedback vertex set problem that was successfully tackled by spin-glass theory and an associated belief propagation-guided decimation (BPD) algorithm [Zhou, Eur. Phys. J. B 86, 455 (2013), 10.1140/epjb/e2013-40690-1]. In the present work we apply the BPD algorithm (which has approximately linear time complexity) to the network optimal attack problem and demonstrate that it has much better performance than a recently proposed collective information algorithm [Morone and Makse, Nature 524, 65 (2015), 10.1038/nature14604] for different types of random networks and real-world network instances. The BPD-guided attack scheme often induces an abrupt collapse of the whole network, which may make it very difficult to defend.

  19. Runtime Monitoring Technique to handle Tautology based SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Ramya Dharam

    2015-05-01

    Full Text Available Software systems, like web applications, are often used to provide reliable online services such as banking, shopping, social networking, etc., to users. The increasing use of such systems has led to a high need for assuring confidentiality, integrity, and availability of user data. SQL Injection Attacks (SQLIAs is one of the major security threats to web applications. It allows attackers to get unauthorized access to the back-end database consisting of confidential user information. In this paper we present and evaluate a Runtime Monitoring Technique to detect and prevent tautology based SQLIAs in web applications. Our technique monitors the behavior of the application during its post- deployment to identify all the tautology based SQLIAs. A framework called Runtime Monitoring Framework, that implements our technique, is used in the development of runtime monitors. The framework uses two pre-deployment testing techniques, such as basis-path and data-flow to identify a minimal set of all legal/valid execution paths of the application. Runtime monitors are then developed and integrated to perform runtime monitoring of the application, during its post-deployment for the identified valid/legal execution paths. For evaluation we targeted a subject application with a large number of both legitimate inputs and illegitimate tautology based inputs, and measured the performance of the proposed technique. The results of our study show that runtime monitor developed for the application was successfully able to detect all the tautology based attacks without generating any false positives.

  20. Realization of correlation attack against the fuzzy vault scheme

    Science.gov (United States)

    Kholmatov, Alisher; Yanikoglu, Berrin

    2008-02-01

    User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem. The scheme is based on binding the biometric template with a secret key and scrambling it with a large amount of redundant data, such that it is computationally infeasible to extract the secret key without possession of the biometric trait. It was recently claimed that the scheme is susceptible to correlation based attacks which assume the availability of two fuzzy vaults created using the same biometric data (e.g. two impressions of the same fingerprint) and suggests that correlating them would reveal the biometric data hidden inside. In this work, we implemented the fuzzy vault scheme using fingerprints and performed correlation attacks against a database of 400 fuzzy vaults (200 matching pairs). Given two matching vaults, we could successfully unlock 59% of them within a short time. Furthermore, it was possible to link an unknown vault to a short list containing its matching pair, for 41% of all vaults. These results prove the claim that the fuzzy vault scheme without additional security measures is indeed vulnerable to correlation attacks.

  1. Post-attack aposematic display in prey facilitates predator avoidance learning

    Directory of Open Access Journals (Sweden)

    Changku eKang

    2016-04-01

    Full Text Available Warning signals protect unpalatable prey from predation because predators who learn the association between the warning signal and prey unprofitability decrease attacks on the prey. Most of the research have focused on visual aposematic signals that are constantly presented and visible to the predators. But a variety of chemically defended insects are rather cryptic when resting, and only in response to predator attacks (post-attack they perform displays of conspicuous abdomens or hindwings normally hidden under forewings. The function of those displays in unpalatable insects is not well understood. We examined two adaptive hypotheses on this facultative aposematic display using wild-caught oriental tits (Parus minor as predators. First, we tested whether the display increases the rejection of the prey by predators upon seeing the display (i.e. at the moment of attack through learning trials (aposematic signaling hypothesis. Second, we tested whether the display facilitates the memory formation between cryptic visible form of the prey and prey defense so that it prevents the predators initiate an attack upon seeing the cryptic form (facilitation hypothesis. We found that predators learned to avoid attacking the prey which supports the facilitation hypothesis. However, the support for the aposematic signaling hypothesis was equivocal. Our results open new directions of research by highlighting the possibility that similar facilitation effects may contribute to the evolution of various forms of post-attack visual displays in chemically, or otherwise, defended animals.

  2. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  3. Firmware Counterfeiting and Modification Attacks on Programmable Logic Controllers

    Science.gov (United States)

    2013-03-01

    considered the first reported cyber attack against critical infrastructure took place in 1997 [1, 21]. In March, a teenager successfully hacked into a local... Hack in the Box Sec-Conference. Kuala Lumpur, Malaysia. 2010. [23] He↵ner, Craig. “Reverse Engineering Firmware: Linksys WAG120N”. DEV/TTYS0, May 29...news/6767. [46] Ramabadran, Tenkasi V. and Sunil S. Gaitonde. “A Tutorial on CRC Computations”. Micro, IEEE, 8(4):62–75, 1988. [47] Roberts, Paul F

  4. Success in Science, Success in Collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Johnston, Mariann R. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-08-25

    This is a series of four different scientific problems which were resolved through collaborations. They are: "Better flow cytometry through novel focusing technology", "Take Off®: Helping the Agriculture Industry Improve the Viability of Sustainable, Large-Production Crops", "The National Institutes of Health's Models of Infectious Disease Agent Study (MIDAS)", and "Expanding the capabilities of SOLVE/RESOLVE through the PHENIX Consortium." For each one, the problem is listed, the solution, advantages, bottom line, then information about the collaboration including: developing the technology, initial success, and continued success.

  5. Use of outcomes to evaluate surveillance systems for bioterrorist attacks

    Directory of Open Access Journals (Sweden)

    Abrams Allyson M

    2010-05-01

    Full Text Available Abstract Background Syndromic surveillance systems can potentially be used to detect a bioterrorist attack earlier than traditional surveillance, by virtue of their near real-time analysis of relevant data. Receiver operator characteristic (ROC curve analysis using the area under the curve (AUC as a comparison metric has been recommended as a practical evaluation tool for syndromic surveillance systems, yet traditional ROC curves do not account for timeliness of detection or subsequent time-dependent health outcomes. Methods Using a decision-analytic approach, we predicted outcomes, measured in lives, quality adjusted life years (QALYs, and costs, for a series of simulated bioterrorist attacks. We then evaluated seven detection algorithms applied to syndromic surveillance data using outcomes-weighted ROC curves compared to simple ROC curves and timeliness-weighted ROC curves. We performed sensitivity analyses by varying the model inputs between best and worst case scenarios and by applying different methods of AUC calculation. Results The decision analytic model results indicate that if a surveillance system was successful in detecting an attack, and measures were immediately taken to deliver treatment to the population, the lives, QALYs and dollars lost could be reduced considerably. The ROC curve analysis shows that the incorporation of outcomes into the evaluation metric has an important effect on the apparent performance of the surveillance systems. The relative order of performance is also heavily dependent on the choice of AUC calculation method. Conclusions This study demonstrates the importance of accounting for mortality, morbidity and costs in the evaluation of syndromic surveillance systems. Incorporating these outcomes into the ROC curve analysis allows for more accurate identification of the optimal method for signaling a possible bioterrorist attack. In addition, the parameters used to construct an ROC curve should be given careful

  6. A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer

    Directory of Open Access Journals (Sweden)

    Maria Sebastian

    2013-06-01

    Full Text Available Nowadays, the computing and communication services are accessed while on the move. Setting up of fixed access points and backbone infrastructure is not always viable. So in order to provide communication where there is lack of infrastructure or inconvenience in using the existing infrastructure, Mobile Adhoc Networks (MANETs are used. This inherent flexibility allows MANETs to be used for a wide range of applications such as rescue operations, military applications, vehicular communication, and business meetings. As there is no apriori trust relationship between the nodes of an ad hoc network and basic network functions like packet forwarding and routing are performed by the available nodes, security is an essential component in MANETs. Various attacks in MANETs are blackhole attack, byzantine attack, resource consumption attack, rushing attack, and wormhole attack. Wormhole attack is a severe threat among the other threats in MANET. Existing solutions to detect wormhole attacks include Packet Leashes, SECTOR, DelPHI, RTT-TC, TTM, etc. These solutions require special hardware or strict synchronized clocks or cause message overhead. Some solutions do not locate the wormhole, and some other may generate false alarms or does not consider network congestion into account. In this paper, wormhole attack detection is proposed based on RTT between successive nodes and congestion detection mechanism. If the RTT between two successive nodes is higher than the threshold value, a wormhole attack is suspected. If a wormhole is suspected, node's transitory buffer is probed to determine whether the long delay between the nodes is due to wormhole or not, as delays can be caused due to congestion or by queuing delays. The proposed method prevents both the hidden and the exposed attack. Advantage of our proposed solution is that it does not require any specialized hardware or synchronized clocks.

  7. Efficient Identification Scheme Provably Secure Against Reset Attack

    Institute of Scientific and Technical Information of China (English)

    ZHUHuafei; LIUJianwei; JIANGRuzhong; FENGDengguo

    2004-01-01

    Smart cards have been used extensively in practice, e.g., in user access control and secure electronic commerce. Since a smart card is no more than some electronic device embedded with a desired chip capable for processing private information, it is vulnerable to the reset attack. We remark that the reset attack is a real security concern since a malicious user can simply disconnect its battery so as to reset its content to the initial state and then re-insert the battery and use it with that state a number of times if the smart card is available to the malicious users, e.g., in the cases that a smart card is lost or is stolen. In this report, we develop an efficient identification scheme based on Cramer-Shoup's test function.The scheme is provably secure against reset attack under post-processing model provided there are the hardness assumption of the decisional Diffie-Hellman problem as well as the existence of collision free hash functions.

  8. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  9. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  10. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  11. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  12. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  13. Performance Evaluation of AODV under Blackhole Attack

    National Research Council Canada - National Science Library

    Tarunpreet Bhatia; A K Verma

    2013-01-01

    .... This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously...

  14. Uncertainties of a preemptive nuclear attack

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, M.; Tsipis, K.

    1983-11-01

    The deterrence of nuclear war requires that nuclear forces not be vulnerable to a preemptive disarming attack that would preclude retaliation. The uncertainties surrounding a countersilo attack stem from incomplete intelligence information about the accuracy of weapons delivery due to errors in the inertial-guidance system and those associated with reentry into the atmosphere. An analyses of these uncertainties examines the results of test flights and calculations based on simulations that consider the problems of fratricide, estimates of yield, and a number of other technical uncertainties that are overshadowed by the uncertainty of whether the nation under attack would respond with launch-on-warning or launch-under-attack. The analysis concludes that, despite a current level of stability, the progress of weapons technology bodes ill for the future unless stringent testing and deployment limitations are imposed. 6 figures, 1 table. (DCK)

  15. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  16. Identifying and Analyzing Web Server Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  17. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  18. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  19. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  20. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  1. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  2. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  3. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  4. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  5. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  6. Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2013-01-01

    Given the proliferation of internet connected devices, IPv6 has been proposed to replace IPv4. Aside from providing a larger address space which can be assigned to internet enabled devices, it has been suggested that the IPv6 protocol offers increased security due to the fact that with the large number of addresses available, standard IP scanning attacks will no longer become feasible. However, given the interest in attacking organizations rather than individual devices, most initial points of entry onto an organization's network and their attendant devices are visible and reachable through web crawling techniques, and, therefore, attacks on the visible application layer may offer ways to compromise the overall network. In this evaluation, we provide a straightforward implementation of a web crawler in conjunction with a benign black box penetration testing system and analyze the ease at which SQL injection attacks can be carried out.

  7. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  8. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  9. Indirect Speculative Attacks and the Black Market for Foreing Exchange: The Example of Sudan Indirect Speculative Attacks and the Black Market for Foreing Exchange: The Example of Sudan

    Directory of Open Access Journals (Sweden)

    Ibrahim A. Elbadawi

    1993-03-01

    Full Text Available Indirect Speculative Attacks and the Black Market for Foreing Exchange: The Example of Sudan The paper extends the recent literature on collapsing exchange roles and balance of payment crises to the case when currency inconvertibility gives rise to the emergence of an "illegal" black market. The presence of the black market generates indirect speculative attacks on the official reserves because, due to inconvertibility, agents cannot directly buy official reserves. The paper derives several conditional probability statements regarding the likelihood of successful devaluation as a way to unify the official and black market exchange rates and achieve economic stabilization.

  10. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  11. Stability of Random Networks under Evolution of Attack and Repair

    Institute of Scientific and Technical Information of China (English)

    CHI Li-Ping; YANG Chun-Bin; CAI Xu

    2006-01-01

    With a simple model, we study the stability of random networks under the evolution of attack and repair. We introduce a new quantity, i.e. invulnerability I(s), to describe the stability of the system. It is found that the network can evolve to a stationary state. The stationary value Ic has a power-law dependence on the initial average degree , with the slope about -1.5. In the stationary state, the degree distribution is a normal distribution, rather than a typical Poisson distribution for general random graphs. The clustering coefficient in the stationary state is much larger than that in the initial state. The stability of the network depends only on the initial average degree , which increases rapidly with the decrease of .

  12. How Successful is Non-Invasive Ventilation Treatment that is Initiated in the Emergency Department in Cases of COPD Exacerbations with Acute Hypercapnic Respiratory Failure? Can We Predict Treatment Failure?

    Directory of Open Access Journals (Sweden)

    Meltem Çoban Ağca

    2017-04-01

    Full Text Available Objective: We aimed to investigate the success rate of non-invasive ventilation (NIV in wards and the predictors of failure in cases of chronic obstructive pulmonary disease (COPD-related acute hypercapnic respiratory failure (AHRF. Methods: The was a retrospective study conducted in a tertiary teaching hospital between May 2011 and 2013. Patients who were admitted to the emergency department (ED because of COPD with AHRF were evaluated; 544 patients who initially received NIV in ED and were transferred to wards were included. Patient characteristics, baseline and follow-up pH values, and partial arterial carbon dioxide (PaCO2 values were recorded. Baseline pH values were categorized as severe (pH<7.26, moderate (pH≥7.26–7.30, and mild (pH≥7.30 acidosis. According to the in-hospital outcome, patients were classified in 2 groups: Group 1: home discharge, Group 2: death or intensive care unit transfer. Results: Treatment resulted in success in 477 (88% patients. Albumin levels were significantly low and the mean Charlson index (CI score was significantly high in Group 2. Admission pH and PaCO2 values did not affect the treatment outcome. Patients in Group 2 had higher PaCO2 and lower pH values as well as a lower level of decrease in PaCO2 values within 2 hours of treatment in ED. Similarly, higher PaCO2 and lower pH values at the end of the first day in wards were indicative of NIV failure (p<0.05. Conclusion: The success rate of NIV in wards in cases of AHRF is high. Patients with low albumin levels and higher CI scores have worse response to treatment. pH or PaCO2 values after a few hours of treatment and not the baseline pH or PaCO2 values are better predictors than the baseline pH and PaCO2 values.

  13. Insights Into French Emergency Planning, Response, and Resilience Procedures From a Hospital Managerial Perspective Following the Paris Terrorist Attacks of Friday, November 13, 2015.

    Science.gov (United States)

    Ghanchi, Ali

    2016-10-01

    On Friday, November 13, 2015, Paris was subjected to a multiple terrorist attack that caused widespread carnage. Although French emergency planning, response, and resilience procedures (Plan Blanc) anticipated crisis management of a major incident, these had to be adapted to the local context of Pitié-Salpêtrière University Teaching Hospital. Health care workers had undergone Plan Blanc training and exercises and it was fortunate that such a drill had occurred on the morning of the attack. The procedures were observed to work well because this type of eventuality had been fully anticipated, and staff performance exceeded expectations owing to prior in-depth training and preparations. Staff performance was also facilitated by overwhelming staff solidarity and professionalism, ensuring the smooth running of crisis management and improving victim survival rates. Although lessons learned are ongoing, an initial debriefing of managers found organizational improvements to be made. These included improvements to the activation of Plan Blanc and how staff were alerted, bed management, emergency morgue facilities, and public relations. In conclusion, our preparations for an eventual terrorist attack on this unprecedented scale ensured a successful medical response. Even though anticipating the unthinkable is difficult, contingency plans are being made to face other possible terrorist threats including chemical or biological agents. (Disaster Med Public Health Preparedness. 2016;page 1 of 6).

  14. Does the aggressiveness of the prey modify the attack behavior of the predator Supputius cincticeps (Stål (Hemiptera, Pentatomidae?

    Directory of Open Access Journals (Sweden)

    Rafael Braga da Silva

    2012-06-01

    Full Text Available Does the aggressiveness of the prey modify the attack behavior of the predator Supputius cincticeps (Stål (Hemiptera, Pentatomidae? The stink bug Supputius cincticeps (Stål (Hemiptera, Pentatomidae is a predator found in several Brazilian regions, which possesses desirable attributes as a natural control agent and in biological control programs. The aim of this study was to test if the attack behavior and predation success of S. cincticeps were affected by prey species. Larvae of Tenebrio molitor (L. (Coleoptera, Tenebrionidae, Spodoptera frugiperda (J. E. Smith (Lepidoptera, Noctuidae, and Thyrinteina arnobia (Stoll (Lepidoptera, Geometridae were offered to S. cincticeps in laboratory bioassays where predatory attack and prey defensive behaviors were observed for 2-hour periods. The attack behavior of S. cincticeps changed with the prey species offered. More than 25% of T. molitor and S. frugiperda larvae were immediately attacked, but T. arnobia was not immediately attacked by S. cincticeps. Successful attack (i.e., successful insertion of the predator stylets into the prey depends on the region of the body attacked, with a greater proportion of successful attacks in the anterior than in the median or posterior regions. Larvae of T. arnobia and S. frugiperda displayed a sequence of abrupt head and body movements in response to S. cincticeps attack. Attempts of predation were more successful on T. molitor and S. frugiperda than on T. arnobia. Information about the differential attack behavior of S. cincticeps on different prey species is important for designing successful biological control programs using this hemipteran predator.

  15. Modification of ¤mlo5¤ resistance to ¤Blumeria graminis¤ attack in barley as a consequence of induced accessibility and inaccessibility

    DEFF Research Database (Denmark)

    Lyngkjær, M.F.; Carver, T.L.W.

    1999-01-01

    and formed haustoria within epidermal cells. When either isolate was inoculated onto the same leaves as challenger 48 h later, attacks on cells containing an inducer haustorium were almost invariably successful. Thus, cells containing an inducer haustorium showed almost complete induced accessibility...... to challenge attacks, even by the avirulent isolate. Accessibility was also induced to someextent in adjacent cells, but the effect was localized. By contrast, where inducer attacks failed, and a papilla was formed in the attacked cell, later challenge attacks on the same cells always failed. These......" followed by "challenger") using two fungal isolates. Isolate GE3 is a wild-type, unable to infect Riso-R, and is termed "mlo-avirulent". Isolate HL3/5, selected from GE3, is capable of infecting Riso-R, and is termed "mlo-virulent". When HL3/5 was used as inducer, some attacks penetrated successfully...

  16. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  17. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  18. Succession planning. A strategy for taking charge.

    Science.gov (United States)

    Bower, F L

    2000-01-01

    This article on succession planning includes a definition of succession planning, the reasons for and components of succession planning, and why succession planning is important to the leadership of an organization, unit, division or department. Each component of succession planning, that is, vision, networking, and mentorship, is described, with examples that are intended to guide the reader to initiate and evaluate succession planning.

  19. DETERMINATION OF HEART ATTACK RISK ON PATIENTS DATA by DATA MINING APPLICATIONS

    Directory of Open Access Journals (Sweden)

    İlhan TARIMER

    2015-04-01

    Full Text Available In this study, it has been investigated that feasibility of data mining which is used to extract meaningful knowledge in order to effect to decision making processes in health field. As an example to a case study, it has been tried to obtain that determining the factors which trigger heart attacks by defining common changes in blood values of patients whom have got heart attacks previously. Success of the analysis done has been measured by testing the obtained results on a group of patients. In the study, Apriori and GRI algorithms stemming from association rule algorithms have been used; success of rule sets created by these algorithms has been investigated by making several comparisons. As the result, several patterns meant to pre-signals determining heart attacks from data of the patient group which have the blood values have been put forth.

  20. Software Maintenance Success Recipes

    CERN Document Server

    Reifer, Donald J

    2011-01-01

    Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do their work and instructs on the methods required to achieve success. Donald J. Reifer--an award winner for his contributions to the field of software engineering and whose experience includes managing the DoD Software Initiatives Office--provides step-by-step guidance on how t

  1. Joint Direct Attack Munition (JDAM)

    Science.gov (United States)

    2015-12-01

    IOT &E/OPEVAL (Dedicated 2000 lb Kit) Complete Sep 2000 Sep 2000 Sep 2000 Sep 2000 IOC (FA-18) Nov 2000 Feb 2001 Feb 2001 Feb 2001 Milestone III (2000...Demonstration/Validation DT&E - Development Test and Evaluation GPS - Global Positioning System IOT &E - Initial Operational Test and Evaluation lb - Pound...GPS) Security South Korea 12/28/2007 0.4 Fuzes South Korea 12/28/2007 0.4 Fuzes Australia 12/11/2007 2.6 Engineering Support Greece 11/20/2007 100

  2. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  3. You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors

    CERN Document Server

    Gong, Neil Zhenqiang

    2016-01-01

    We propose new privacy attacks to infer attributes (e.g., locations, occupations, and interests) of online social network users. Our attacks leverage seemingly innocent user information that is publicly available in online social networks to infer missing attributes of targeted users. Given the increasing availability of (seemingly innocent) user information online, our results have serious implications for Internet privacy -- private attributes can be inferred from users' publicly available data unless we take steps to protect users from such inference attacks. To infer attributes of a targeted user, existing inference attacks leverage either the user's publicly available social friends or the user's behavioral records (e.g., the webpages that the user has liked on Facebook, the apps that the user has reviewed on Google Play), but not both. As we will show, such inference attacks achieve limited success rates. However, the problem becomes qualitatively different if we consider both social friends and behavio...

  4. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  5. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  6. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  7. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  8. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  9. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  10. Helicobacter pylori infection as a triggering factor of attacks in patients with hereditary angioedema

    DEFF Research Database (Denmark)

    Visy, Beáta; Füst, George; Bygum, Anette

    2007-01-01

    BACKGROUND: Helicobacter pylori infection is considered among the causative factors of urticaria and angioedema. Having conducted a study on 65 patients, Hungarian authors reported in 2001 that successful eradication of H. pylori is followed by a significant reduction in the number of attacks in ...

  11. Characteristics of Successful Entrepreneurs.

    Science.gov (United States)

    McClelland, David C.

    1987-01-01

    Comparison of characteristics of 12 average and 12 superior small business people in three developing nations (India, Malawi, and Ecuador) found proactive qualities such as initiative and assertiveness, achievement orientation, and commitment to others characteristic of successful entrepreneurs. Other expected qualities (self-confidence,…

  12. Characteristics of Successful Entrepreneurs.

    Science.gov (United States)

    McClelland, David C.

    1987-01-01

    Comparison of characteristics of 12 average and 12 superior small business people in three developing nations (India, Malawi, and Ecuador) found proactive qualities such as initiative and assertiveness, achievement orientation, and commitment to others characteristic of successful entrepreneurs. Other expected qualities (self-confidence,…

  13. Turkey knockdown in successive flocks.

    Science.gov (United States)

    Evans, R D; Edson, R K; Watkins, K L; Robertson, J L; Meldrum, J B; Novilla, M N

    2000-01-01

    Turkey knockdown was diagnosed in three of five flocks of hen turkeys on a single farm within a 12-mo period. The age of birds in the flocks affected ranged from 6 wk 2 days to 7 wk 4 days. The attack rate ranged from 0.02% to 0.30% with a case fatality rate in affected birds ranging from 0 to 74%. The diagnosis was made on the basis of clinical signs and histopathologic lesions associated with knockdown. The feed in all flocks contained bacitracin methylene disalicylate and monensin (Coban). Affected birds were recumbent, demonstrated paresis, and were unable to vocalize. Postmortem examination revealed few significant lesions although pallor of the adductor muscles and petechiation in adductor and gastrocnemius muscles were noted. Birds that had been recumbent for extended periods were severely dehydrated. Consistent microscopic lesions included degeneration, necrosis, and regeneration of adductor, gastrocnemius, and abdominal muscles. No lesion in cardiac tissue was noted. Results of our investigation indicated that changes in water consumption, vitamin E status, and brooder to finisher movement correlated with the occurrence of knockdown. Turkey knockdown was defined in 1993 as any condition identified in a turkey flock that has affected the neuromuscular system to a degree that a turkey is unable to walk or stand. This definition was later modified to...neuromuscular or skeletal systems to a degree that a turkey is unable to walk or stand properly. Knockdown may be associated with numerous feed, management, or disease factors alone or in combination. Dosage of monensin, feed restriction/gorging, water restriction, heat stress, copper, mycotoxins, sodium chloride in feed, and sulfa drugs have all been suggested as contributing factors; however, laboratory studies to duplicate this have not been successful. This report presents observations from a single farm at which three of five hen flocks in a single year experienced knockdown. When a flock was reported as

  14. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  15. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  16. Successful ageing

    DEFF Research Database (Denmark)

    Bülow, Morten Hillgaard; Söderqvist, Thomas

    2014-01-01

    Since the late 1980s, the concept of ‘ successful ageing’ has set the frame for discourse about contemporary ageing research. Through an analysis of the reception to John W. Rowe and Robert L. Kahn's launch of the concept of ‘ successful ageing’ in 1987, this article maps out the important themes...... and discussions that have emerged from the interdisciplinary field of ageing research. These include an emphasis on interdisciplinarity; the interaction between biology, psycho-social contexts and lifestyle choices; the experiences of elderly people; life-course perspectives; optimisation and prevention...... strategies; and the importance of individual, societal and scientific conceptualisations and understandings of ageing. By presenting an account of the recent historical uses, interpretations and critiques of the concept, the article unfolds the practical and normative complexities of ‘ successful ageing’....

  17. Successful ageing

    DEFF Research Database (Denmark)

    Bülow, Morten Hillgaard; Söderqvist, Thomas

    2014-01-01

    Since the late 1980s, the concept of ‘ successful ageing’ has set the frame for discourse about contemporary ageing research. Through an analysis of the reception to John W. Rowe and Robert L. Kahn's launch of the concept of ‘ successful ageing’ in 1987, this article maps out the important themes...... and discussions that have emerged from the interdisciplinary field of ageing research. These include an emphasis on interdisciplinarity; the interaction between biology, psycho-social contexts and lifestyle choices; the experiences of elderly people; life-course perspectives; optimisation and prevention...... strategies; and the importance of individual, societal and scientific conceptualisations and understandings of ageing. By presenting an account of the recent historical uses, interpretations and critiques of the concept, the article unfolds the practical and normative complexities of ‘ successful ageing’....

  18. Citation Success

    DEFF Research Database (Denmark)

    Vaio, Gianfranco Di; Waldenström, Daniel; Weisdorf, Jacob Louis

    2012-01-01

    This study examines the determinants of citation success among authors who have recently published their work in economic history journals. Besides offering clues about how to improve one's scientific impact, our citation analysis also sheds light on the state of the field of economic history....... Consistent with our expectations, we find that full professors, authors appointed at economics and history departments, and authors working in Anglo-Saxon and German countries are more likely to receive citations than other scholars. Long and co-authored articles are also a factor for citation success. We...... find similar patterns when assessing the same authors' citation success in economics journals. As a novel feature, we demonstrate that the diffusion of research — publication of working papers, as well as conference and workshop presentations — has a first-order positive impact on the citation rate....

  19. Attack behavior of Podisus rostralis (Heteroptera: Pentatomidade adults on caterpillars of Bombyx mori (Lepidoptera: Bombycidae

    Directory of Open Access Journals (Sweden)

    Walkymário Paulo Lemos

    2005-11-01

    Full Text Available Attack behavior of the predator Podisus rostralis (Stäl (Heteroptera: Pentatomidae adults on fourth instar Bombyx mori L. (Lepidoptera: Bombycidae caterpillars was studied in laboratory conditions. Ten 24 hours old adults of this predator were observed during two hours with the following attack behavior: (1 Predator: prey finding; prey observation; touching prey with antenna; attack behavior; prey paralysis; predator retreat after attack; attack cessation; successive attacks; and (2 Prey: defense. The predator P. rostralis found its prey before attacking and it approached it with slow circular movements. The attack was usually made in the posterior part of the prey to reduce defense reaction. Larger size of prey in relation to the predator resulted difficult prey paralysis but it occurred in less than two hours.Estudou-se, em laboratório, o comportamento de ataque de adultos do predador Podisus rostralis (Stäl (Heteroptera: Pentatomidae tendo como presa lagartas de quarto estádio de Bombyx mori L. (Lepidoptera: Bombycidae. Dez adultos do predador, com 24 horas de idade, foram observados durante duas horas acompanhando-se os seguintes comportamentos de ataque: (1 Predador: localização da presa; observação da presa; toque das presas com as antenas; comportamento de ataque; paralisação da presa; fuga do predador após ataque; finalização do ataque; ataques sucessivos; e (2 Presa: defesa. O predador P. rostralis localizou sua presa antes do ataque, aproximando-se dela através de lentos movimentos circulares. O ataque é, usualmente, realizado na parte posterior da presa para reduzir reação de defesa. O maior tamanho da presa em relação ao predador pode dificultar a paralisação, porém o predador consegue paralisá-la em menos de duas horas.

  20. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  1. Citation Success

    DEFF Research Database (Denmark)

    Di Vaio, Gianfranco; Waldenström, Daniel; Weisdorf, Jacob Louis

    affects citations. In regard to author-specific characteristics, male authors, full professors and authors working economics or history departments, and authors employed in Anglo-Saxon countries, are more likely to get cited than others. As a ‘shortcut' to citation success, we find that research diffusion......This study analyses determinants of citation success among authors publishing in economic history journals. Bibliometric features, like article length and number of authors, are positively correlated with the citation rate up to a certain point. Remarkably, publishing in top-ranked journals hardly...

  2. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  3. Sociology facing new scientistic attacks

    Directory of Open Access Journals (Sweden)

    Paolo Parra Saiani

    2015-06-01

    Full Text Available In 2011 Marradi drew the attention to the semantic expansion that have suffered some of the terms used in the social sciences because of an inferiority complex regarding the physical sciences. The cascade of conceptual components from “hard” sciences to the “soft” ones is certainly impressive. Obviously, the problem is not the blending of the human sciences, but the substitution of thought itself with slogans, without reflecting on its epistemological and ontological assumptions. In my note I want to extend the analysis of the consequences of inferiority complex in three directions: i extending the referents (imported terms, including another key part of social science term: the term indicator; ii analyzing the significance of the quantification in the development of sociological discipline in competition with economic discipline for public recognition; iii marking the importance of a successful image of science among the world of those who take political and economic decisions, which limits the possibilities of social research

  4. Resistance of the double random phase encryption against various attacks.

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J; Javidi, Bahram

    2007-08-06

    Several attacks are proposed against the double random phase encryption scheme. These attacks are demonstrated on computer-generated ciphered images. The scheme is shown to be resistant against brute force attacks but susceptible to chosen and known plaintext attacks. In particular, we describe a technique to recover the exact keys with only two known plain images. We compare this technique to other attacks proposed in the literature.

  5. Conditional beam splitting attack on quantum key distribution

    OpenAIRE

    Calsamiglia, John; Barnett, Stephen M.; Lütkenhaus, Norbert

    2001-01-01

    We present a novel attack on quantum key distribution based on the idea of adaptive absorption [calsam01]. The conditional beam splitting attack is shown to be much more efficient than the conventional beam spitting attack, achieving a performance similar to the, powerful but currently unfeasible, photon number splitting attack. The implementation of the conditional beam splitting attack, based solely on linear optical elements, is well within reach of current technology.

  6. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  7. Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    Energy Technology Data Exchange (ETDEWEB)

    Chatterjee, Samrat; Halappanavar, Mahantesh; Tipireddy, Ramakrishna; Oster, Matthew R.; Saha, Sudip

    2015-04-15

    Representation and propagation of uncertainty in cyber attacker payoffs is a key aspect of security games. Past research has primarily focused on representing the defender’s beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and intervals. Within cyber-settings, continuous probability distributions may still be appropriate for addressing statistical (aleatory) uncertainties where the defender may assume that the attacker’s payoffs differ over time. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attacker’s payoff generation mechanism. Such epistemic uncertainties are more suitably represented as probability boxes with intervals. In this study, we explore the mathematical treatment of such mixed payoff uncertainties.

  8. Citation Success

    DEFF Research Database (Denmark)

    Di Vaio, Gianfranco; Waldenström, Daniel; Weisdorf, Jacob Louis

    This study analyses determinants of citation success among authors publishing in economic history journals. Bibliometric features, like article length and number of authors, are positively correlated with the citation rate up to a certain point. Remarkably, publishing in top-ranked journals hardl...

  9. Citation Success

    DEFF Research Database (Denmark)

    Vaio, Gianfranco Di; Waldenström, Daniel; Weisdorf, Jacob Louis

    2012-01-01

    This study examines the determinants of citation success among authors who have recently published their work in economic history journals. Besides offering clues about how to improve one's scientific impact, our citation analysis also sheds light on the state of the field of economic history. Co...

  10. Successful ageing

    DEFF Research Database (Denmark)

    Kusumastuti, Sasmita; Derks, Marloes G. M.; Tellier, Siri;

    2016-01-01

    . METHODS: We performed a novel, hypothesis-free and quantitative analysis of citation networks exploring the literature on successful ageing that exists in the Web of Science Core Collection Database using the CitNetExplorer software. Outcomes were visualized using timeline-based citation patterns...

  11. Defending Against Wormhole Attack in OLSR

    Institute of Scientific and Technical Information of China (English)

    HONG Liang; HONG Fan; FU Cai

    2006-01-01

    OLSR (optimal link state routing) is one of the four basic routing protocols used in mobile ad hoc Networks by the MANET working group of IETF(Internet engineering task force). OLSR, a proactive routing protocol, is based on a multipoint relaying flooding technique to reduce the number of topology broadcast. OLSR uses periodic HELLO packets to neighbor detection. As introduced in Reference [1], the wormhole attack can form a serious threat in wireless Networks, especially against many ad hoc Network routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in OLSR is provided and simulated in NS2.

  12. Attacks and infections in percolation processes

    Science.gov (United States)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-08-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data.

  13. A Novel Approach for Attacks Mitigation in Mobile Ad Hoc Networks Using Cellular Automatas

    Directory of Open Access Journals (Sweden)

    Himadri Nath Saha

    2012-04-01

    Full Text Available Many security schemes for mobile ad-hoc network(MANET have been proposed so far but none of them has been successful in combating the different types of attacks that a mobile ad-hoc network often faces. This paper is providing one way of mitigating attacks in mobile ad-hoc networks by authenticating the node who tries to access this network .This scheme has been applied by using cellular automata (CA. Our simulation results show how cellular automata(CA is implemented for user authentication and secure transmission in MANET.

  14. "Success"ful Reading Instruction.

    Science.gov (United States)

    George, Carol J.

    1986-01-01

    The Success in Reading and Writing Program at a K-2 school in Fort Jackson, South Carolina, teaches children of varied races and abilities to read and write using newspapers, dictionaries, library books, magazines, and telephone directories. These materials help students develop language skills in a failure-free atmosphere. Includes two…

  15. A graph based system for multi-stage attacks recognition

    Institute of Scientific and Technical Information of China (English)

    Safaa O. Al-Mamory; Zhai Jianhong; Zhang Hongli

    2008-01-01

    Building attack scenario is one of the most important aspects in network security. This paper proposed a system which collects intrusion alerts, clusters them as sub-attacks using alerts abstraction, aggregates the similar sub-attacks, and then correlates and generates correlation graphs. The scenarios were represented by alert classes instead of alerts themselves so as to reduce the required rules and have the ability of detecting new variations of attacks. The proposed system is capable of passing some of the missed attacks. To evaluate system effectiveness, it was tested with different datasets which contain multi-step attacks. Compressed and easily understandable correlation graphs which reflect attack scenarios were generated. The proposed system can correlate related alerts, uncover the attack strategies, and detect new variations of attacks.

  16. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  17. Quantitative Verification and Synthesis of Attack-Defence Scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming; Parker, David

    2016-01-01

    Attack-defence trees are a powerful technique for formally evaluating attack-defence scenarios. They represent in an intuitive, graphical way the interaction between an attacker and a defender who compete in order to achieve conflicting objectives. We propose a novel framework for the formal...... analysis of quantitative properties of complex attack-defence scenarios, using an extension of attack-defence trees which models temporal ordering of actions and allows explicit dependencies in the strategies adopted by attackers and defenders. We adopt a game-theoretic approach, translating attack......-defence trees to two-player stochastic games, and then employ probabilistic model checking techniques to formally analyse these models. This provides a means to both verify formally specified security properties of the attack-defence scenarios and, dually, to synthesise strategies for attackers or defenders...

  18. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  19. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  20. Shark Attack! Sinking Your Teeth into Anatomy.

    Science.gov (United States)

    House, Herbert

    2002-01-01

    Presents a real life shark attack story and studies arm reattachment surgery to teach human anatomy. Discusses how knowledge of anatomy can be put to use in the real world and how the arm functions. Includes teaching notes and suggestions for classroom management. (YDS)

  1. Why Does Asthma Attack Severely at Night?

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    @@ The rhythmic changes of human physiological activities by day and at night may cause regular change of the patient's condition within one day. The following is the explanation with the theory of Chinese medicine for the reason why asthma attacks severely at night.

  2. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  3. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  4. Chemical Attack of Malaysian Pozzolans Concrete

    Directory of Open Access Journals (Sweden)

    Mohd Hilton Ahmad

    2011-09-01

    Full Text Available Malaysia produces more than 10 million tonne of by-product from industrial sector per year. As the environmental impact concerns, more than half of the by-product can be recycled to be used as construction materials. One of them is pozzolan, a cement replacing material that can be used to enhance the properties of the concrete. This paper studies the chemical attack to local prozzolans concrete. The parameters studied include weight loss, length change, and residual strength of local pozzolans concrete after been exposed to severe environment. The specimen were tested under normal room temperature, exposed to magnesium sulfate, MgSO4. 2H2O where both sulfate attack and acid attack take place. Two series of pozzolans< which is Pulverized fly ash (PFA and Palm oil fuel ash (POFA were identified. Another series of admixture, Quarry Dust (QD from quarry waste that contain high amount of silica content also been carried out. Each series will study the effect of cement replacement percentage of 5%, 10% and 15%. The parameters were compared to conventional ordinary Portland cement (OPC concrete as control mix. Accelerated testing was conducted at 3, 7, 28, 56 and 90 days. The result shows that the local pozzolans concrete were found to be in good resistance against sulfate attack compared to conventional concrete. Compared to all series conducted, series of PFA replacement gave the best resistance followed by POFA and QD replacement series.

  5. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant...have campus police departments located on the university grounds, a preferred option would be to utilize the police department’s secured facility to

  6. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  7. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  8. Rhode Island School Terrorist Attack Preparedness

    Science.gov (United States)

    Dube, Michael W. M.

    2012-01-01

    This study examined the state of safety and terrorist attack preparedness in Rhode Island Schools as determined by Rhode Island school leader perceptions. The study is descriptive in nature as it gathers data to describe a particular event or situation. Using a researcher generated survey based on terrorist preparedness guidelines and suggestions…

  9. The diagnosis of transient ischemic attacks

    NARCIS (Netherlands)

    P.J. Koudstaal (Peter Jan)

    1989-01-01

    textabstractThe diagnosis of transient ischemic attack (TIA) is fraught with difficulty, since the diagnosis rests entirely upon the history of the patient's symptoms and the neurologist's skill in questioning the patient. The aim of this thesis is to investigate various measures to improve the reli

  10. Persistent cognitive impairment after transient ischemic attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.; Duijnhoven, D.A. van; Leeuw, F.E. de; Kessels, R.P.; Dijk, E.J. van

    2014-01-01

    BACKGROUND AND PURPOSE: By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whe

  11. Persistent Cognitive Impairment After Transient Ischemic Attack

    NARCIS (Netherlands)

    Rooij, F.G. van; Schaapsmeerders, P.; Maaijwee, N.A.M.M.; Duijnhoven, D.A. van; de Leeuw, F.E.; Kessels, R.P.C.; Dijk, E.J. van

    2014-01-01

    Background and Purpose—By definition, the symptoms of a transient ischemic attack (TIA) subside completely within 24 hours. Imaging studies show signs of persistent ischemic tissue damage in a substantial amount of patients with TIA. Cerebral infarction can cause permanent cognitive impairment. Whet

  12. Plant defences against herbivore and insect attack

    Science.gov (United States)

    Plants deploy a number of defences against attack by insects and other herbivores. Direct defence is conferred by plant products and structures that deter or kill the herbivores. Chemical toxins and deterrents vary widely among plant species, and some typical toxins include alkaloids, terpenoids, st...

  13. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  14. CASE STUDY: DIELDRIN ATTACK IN DALYAN LAGOON

    Science.gov (United States)

    During the first two weeks of December 2005, NATO sponsored an Advanced Study Institute (ASI) in Istanbul, Turkey. Part of this ASI involved a case study of a terrorist attack, where a chemical was assumed to be dumped into Sulunger Lake in Turkey. This chapter documents the re...

  15. Risk factors of transient ischemic attack: An overview

    Directory of Open Access Journals (Sweden)

    Supreet Khare

    2016-01-01

    Full Text Available Transient ischemic attack (TIA is a transient episode of neurologic dysfunction caused due to loss of blood flow to the brain or spinal cord without acute infarction. Depending on the area of the brain involved, symptoms of TIA vary widely from patient to patient. Since the blockage period in TIA is very short-lived, there is no permanent damage. Risk factors for TIA include family history of stroke or TIA, age above 55 years or older, higher risk of TIA in males than females, high blood pressure, diabetes mellitus, and tobacco smoking. Genetics, race, and imbalance in lipid profile are other risk factors of TIA. TIA is usually diagnosed after taking a thorough history and a physical examination. Several radiological tests such as computed tomography and magnetic resonance imaging are useful in the evaluation of patients who have had a TIA. Ultrasound of the neck and an echocardiogram of the heart are other tests useful in the diagnosis and evaluation of the attack. The treatment following acute recovery from a TIA depends on the underlying cause. Patients who have more than 70% stenosis of the carotid artery, removal of atherosclerotic plaque is usually done by carotid endarterectomy surgery. One-third of the people with TIA can later have recurrent TIAs and one-third can have a stroke because of permanent nerve cell loss. Having a TIA is a risk factor for eventually having a stroke. Educating the patients and inculcating lifestyle modifications in them are initial steps to minimize the prevalence of transient ischemic attack.

  16. Risk factors of transient ischemic attack: An overview.

    Science.gov (United States)

    Khare, Supreet

    2016-01-01

    Transient ischemic attack (TIA) is a transient episode of neurologic dysfunction caused due to loss of blood flow to the brain or spinal cord without acute infarction. Depending on the area of the brain involved, symptoms of TIA vary widely from patient to patient. Since the blockage period in TIA is very short-lived, there is no permanent damage. Risk factors for TIA include family history of stroke or TIA, age above 55 years or older, higher risk of TIA in males than females, high blood pressure, diabetes mellitus, and tobacco smoking. Genetics, race, and imbalance in lipid profile are other risk factors of TIA. TIA is usually diagnosed after taking a thorough history and a physical examination. Several radiological tests such as computed tomography and magnetic resonance imaging are useful in the evaluation of patients who have had a TIA. Ultrasound of the neck and an echocardiogram of the heart are other tests useful in the diagnosis and evaluation of the attack. The treatment following acute recovery from a TIA depends on the underlying cause. Patients who have more than 70% stenosis of the carotid artery, removal of atherosclerotic plaque is usually done by carotid endarterectomy surgery. One-third of the people with TIA can later have recurrent TIAs and one-third can have a stroke because of permanent nerve cell loss. Having a TIA is a risk factor for eventually having a stroke. Educating the patients and inculcating lifestyle modifications in them are initial steps to minimize the prevalence of transient ischemic attack.

  17. Recovery of human remains after shark attack.

    Science.gov (United States)

    Byard, Roger W; James, Ross A; Heath, Karen J

    2006-09-01

    Two cases of fatal shark attack are reported where the only tissues recovered were fragments of lung. Case 1: An 18-year-old male who was in the sea behind a boat was observed by friends to be taken by a great white shark (Carcharodon carcharias). The shark dragged him under the water and then, with a second shark, dismembered the body. Witnesses noted a large amount of blood and unrecognizable body parts coming to the surface. The only tissues recovered despite an intensive beach and sea search were 2 fragments of lung. Case 2: A 19-year-old male was attacked by a great white shark while diving. A witness saw the shark swim away with the victim's body in its mouth. Again, despite intensive beach and sea searches, the only tissue recovered was a single piece of lung, along with pieces of wetsuit and diving equipment. These cases indicate that the only tissue to escape being consumed or lost in fatal shark attacks, where there is a significant attack with dismemberment and disruption of the integrity of the body, may be lung. The buoyancy of aerated pulmonary tissue ensures that it rises quickly to the surface, where it may be recovered by searchers soon after the attack. Aeration of the lung would be in keeping with death from trauma rather than from drowning and may be a useful marker in unwitnessed deaths to separate ante- from postmortem injury, using only relatively small amounts of tissues. Early organ recovery enhances the identification of human tissues as the extent of morphologic alterations by putrefactive processes and sea scavengers will have been minimized. DNA testing is also possible on such recovered fragments, enabling confirmation of the identity of the victim.

  18. Normas jurídicas para a restauração ecológica: uma barreira a mais a dificultar o êxito das iniciativas? Legal rules for ecological restoration: an additional barrier to hinder the success of initiatives?

    Directory of Open Access Journals (Sweden)

    Giselda Durigan

    2010-06-01

    legislation. Here we offer a critical analysis of the resolution SMA 08 of the Secretary of Environment of the State of Sao Paulo, a law which aims to standardize the mixed planting of degraded areas. We believe that the State rules are based on assumptions not supported by scientific experimentation, since the present understanding of ecological processes involved in the restoration of tropical forests is far from being sufficient for standards or norms to be established as yet on this vast subject. In addition, the technicians who prepare projects and those who license and monitor such projects do not have the knowledge necessary to implement the rules of the Resolution. We also argue that strict rules are likely to constrain creativity and inhibit initiatives of scientists and restoration practitioners, and thus constitute a barrier to innovation and creativity. It also may well retard expansion of restoration to wider areas. From the perspective of biodiversity conservation objectives, we also believe that the creation of commercial demand for propagation material of rare and threatened species could endanger the conservation of natural populations of these species, which should be targeted for specific programs. In conclusion, we suggest that the Resolution has not helped to accelerate the expansion of restored areas nor does it increase the probability of success of restoration initiatives.

  19. Terrorism in the Basque press (1990, 2000, 2008 and 2009). Analysis of newspaper editorials about ETA’s fatal attacks

    OpenAIRE

    José-María Caminos-Marcet, Ph.D.; José-Ignacio Armentia-Vizuete, Ph.D.; María-Flora Marín-Murillo, Ph.D.

    2013-01-01

    This article presents an analysis of the editorials published by the Basque press in 1990, 2000, 2008 and 2009, when ETA carried out fatal attacks. The objective is to examine the treatment given by the different Basque newspapers to terrorism in their most important opinion texts, which reflect their ideology. The initial hypothesis is that the editorial line used by the Basque press to address ETA’s attacks has changed remarkably during the analysed years, going from the virtual absence of ...

  20. Kinematical and EMG-classifications of a fencing attack.

    Science.gov (United States)

    Frère, J; Göpfert, B; Nüesch, C; Huber, C; Fischer, M; Wirz, D; Friederich, N F

    2011-01-01

    8 expert fencers were studied with a 3-dimensional motion analysis system. Each subject performed 10 flèche attacks toward a standardized target. Surface electromyography signals (EMG) were recorded of the deltoid pars clavicularis, infraspinatus and triceps brachii caput laterale muscles of the weapon arm. The recorded EMGs were averaged using EMG wavelet-transformation software. 4 phases were defined based on the arm kinematics and used to classify fencers into 2 groups. A first group of 4 fencers showed an early maximal elbow extension (Early MEE) whereas the second group presented a late maximal elbow extension (Late MEE). 2 EMG-classifications were based on this kinematical classification, one in the time-domain and the other in the frequency-domain by using the spherical classification. The time-domain EMG-classification showed a significantly ( P=0.03) higher normalized deltoid intensity for the Early MEE group (91 ± 18%) than the Late MEE group (36 ± 13%) in the attack phase. The spherical classification revealed that the activity of all the muscles was significantly classified (recognition rate 75%, P=0.04) between the 2 groups. This study of EMG and kinematics of the weapon upper limb in fencing proposes several classifications, which implies a relationship between kinematic strategies, muscular activations and fencing success.

  1. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  2. A Survey of Mobile Ad Hoc Network Attacks

    Directory of Open Access Journals (Sweden)

    PRADIP M. JAWANDHIYA,

    2010-09-01

    Full Text Available Security is an essential requirement in mobile ad hoc network (MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.

  3. Effects of Angle of Attack and Velocity on Trailing Edge Noise

    Science.gov (United States)

    Hutcheson, Florence V.; Brooks, Thomas F.

    2006-01-01

    Trailing edge (TE) noise measurements for a NACA 63-215 airfoil model are presented, providing benchmark experimental data for a cambered airfoil. The effects of flow Mach number and angle of attack of the airfoil model with different TE bluntnesses are shown. Far-field noise spectra and directivity are obtained using a directional microphone array. Standard and diagonal removal beamforming techniques are evaluated employing tailored weighting functions for quantitatively accounting for the distributed line character of TE noise. Diagonal removal processing is used for the primary database as it successfully removes noise contaminates. Some TE noise predictions are reported to help interpret the data, with respect to flow speed, angle of attack, and TE bluntness on spectral shape and peak levels. Important findings include the validation of a TE noise directivity function for different airfoil angles of attack and the demonstration of the importance of the directivity function s convective amplification terms.

  4. A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ms. S. M. Nirkhi

    2013-07-01

    Full Text Available Mobile Ad Hoc Network (MANET is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ways of security compromise is denial of services (DoS form of attack, this attack may paralyze a node or the entire network and when coordinated by group of attackers is considered as distributed denial of services (DDoS attack. A typical, DoS attack is flooding excessive volume of traffic to deplete key resources of the target network. In MANET flooding can be done at routing. Ad Hoc nature of MANET calls for dynamic route management. In flat ad hoc routing categories there falls the reactive protocols sub category, in which one of the most prominent member of this subcategory is dynamic source routing (DSR which works well for smaller number of nodes and low mobility situations. DSR allows on demand route discovery, for this they broadcast a route request message (RREQ. Intelligently flooding RREQ message there forth causing DoS or DDoS attack, making targeted network paralyzed for a small duration of time is not very difficult to launch and have potential of loss to the network. After an attack on the target system is successful enough to crash or disrupt MANET for some period of time, this event of breach triggers for investigation. Investigation and forensically analyzing attack scenario provides the source of digital proof against attacker. In this paper, the parameters for RREQ flooding are pointed, on basis of these parameters fuzzy logic based rules are deduced and described for both DoS and DDoS. We implemented a fuzzy forensic tool to determine the flooding RREQ attack of the form DoS and DDoS. For this implementation various experiments and

  5. A systematic review of re-identification attacks on health data.

    Science.gov (United States)

    El Emam, Khaled; Jonker, Elizabeth; Arbuckle, Luk; Malin, Bradley

    2011-01-01

    Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a) potentially limiting its availability for secondary purposes such as research, and (b) resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a) characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b) compute the overall proportion of records that have been correctly re-identified in these attacks, and (c) assess whether these demonstrate weaknesses in current de-identification methods. Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478) and 0.34 for attacks on health data (95% CI 0-0.744). There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions about the efficacy of de-identification methods.

  6. A systematic review of re-identification attacks on health data.

    Directory of Open Access Journals (Sweden)

    Khaled El Emam

    Full Text Available BACKGROUND: Privacy legislation in most jurisdictions allows the disclosure of health data for secondary purposes without patient consent if it is de-identified. Some recent articles in the medical, legal, and computer science literature have argued that de-identification methods do not provide sufficient protection because they are easy to reverse. Should this be the case, it would have significant and important implications on how health information is disclosed, including: (a potentially limiting its availability for secondary purposes such as research, and (b resulting in more identifiable health information being disclosed. Our objectives in this systematic review were to: (a characterize known re-identification attacks on health data and contrast that to re-identification attacks on other kinds of data, (b compute the overall proportion of records that have been correctly re-identified in these attacks, and (c assess whether these demonstrate weaknesses in current de-identification methods. METHODS AND FINDINGS: Searches were conducted in IEEE Xplore, ACM Digital Library, and PubMed. After screening, fourteen eligible articles representing distinct attacks were identified. On average, approximately a quarter of the records were re-identified across all studies (0.26 with 95% CI 0.046-0.478 and 0.34 for attacks on health data (95% CI 0-0.744. There was considerable uncertainty around the proportions as evidenced by the wide confidence intervals, and the mean proportion of records re-identified was sensitive to unpublished studies. Two of fourteen attacks were performed with data that was de-identified using existing standards. Only one of these attacks was on health data, which resulted in a success rate of 0.00013. CONCLUSIONS: The current evidence shows a high re-identification rate but is dominated by small-scale studies on data that was not de-identified according to existing standards. This evidence is insufficient to draw conclusions

  7. Modified AODV Protocol against Blackhole Attacks in MANET

    Directory of Open Access Journals (Sweden)

    K.Rama,

    2010-12-01

    Full Text Available Mobile Adhoc Network (MANET consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly vulnerabledue to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation and constrained capability. So security in MANET is a complex issue. There are many routing protocols that establish the routes between the nodes in the network. The control towards the management of the nodes in the MANET is distributed. This features does not give assurance towards the security aspects of the network. There are many routing attacks caused due to lack of security. In this paper, therefore, we attempt to focus on analyzing and improving the security of one of the popularrouting protocol for MANET viz. the Adhoc On Demand Distance Vector (AODV routing protocol. Our focus specifically, is on ensuring the security against the Blackhole Attack. The proposed solution is that capable of detecting and removing black hole nodes in the MANET at the initial stage itself without any delay.

  8. A patient with atonic seizures mimicking transient ischemic attacks

    Directory of Open Access Journals (Sweden)

    Min-Ju Kang

    2015-01-01

    Full Text Available A focal atonic seizure is a partial seizure in which the ictal manifestation consists of paresis of the extremities or muscles on one side of the body, and this phenomenon can easily be misdiagnosed as a transient ischemic attack. An 86-year-old woman visited our hospital complaining of transient right upper extremity weakness lasting for 10 min following an unusual sensation in her chest accompanied by palpitations. On the third hospital day, she again complained of right arm weakness, which progressed to jerky movements of her right extremity accompanied by facial twitching and then generalized into a tonic–clonic seizure. The EEG displayed several interictal spikes in the contralateral temporal area, and the ictal SPECT, analyzed using the SISCOM system, showed an increased signal in both the contralateral superior parietal area and the mesial frontal area. In this case, the patient was diagnosed with focal atonic seizures as the cause of the monolimb weakness, which had been initially misdiagnosed aas transient ischemic attacks. In cases in which a patient presents with monolimb paresis, physicians should consider the possibility of an atonic seizure as the cause.

  9. Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Zhanyong Tang

    2017-01-01

    Full Text Available Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel Evil-Twin attack detection method based on the received signal strength indicator (RSSI. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the Wi-Fi signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of a one-off, modest connection delay.

  10. Bush animal attacks: management of complex injuries in a resource-limited setting

    Directory of Open Access Journals (Sweden)

    Mitchell Katrina B

    2011-12-01

    Full Text Available Abstract Introduction Though animal-related injuries and fatalities have been documented throughout the world, the variety of attacks by wild animals native to rural East Africa are less commonly described. Given the proximity of our northwestern Tanzania hospital to Lake Victoria, Lake Tanganyika, and the Serengeti National Park, and presentation of several patients attacked by bush animals and suffering a variety of complex injuries, we sought to report the pattern of attacks and surgical management in a resource-limited setting. Materials and methods Four patients who were admitted to the northwestern Tanzania tertiary referral hospital, Bugando Medical Centre (BMC, in 2010-2011 suffered attacks by different bush animals: hyena, elephant, crocodile, and vervet monkey. These patients were triaged as trauma patients in the Casualty Ward, then admitted for inpatient monitoring and treatment. Their outcomes were followed to discharge. Results The age and gender of the patients attacked was variable, though all but the pediatric patient were participating in food gathering or guarding activities in rural locations at the time of the attacks. All patients required surgical management of their injuries, which included debridement and closure of wounds, chest tube insertion, amputation, and external fixation of an extremity fracture. All patients survived and were discharged home. Discussion Though human injuries secondary to encounters with undomesticated animals such as cows, moose, and camel are reported, they often are indirect traumas resulting from road traffic collisions. Snake attacks are well documented and common. However, this series of unique bush animal attacks describes the initial and surgical management of human injuries in the resource-limited setting of the developing world. Conclusion Animal attacks are common throughout the world, but their pattern may vary in Africa throughout jungle and bush environmental settings. It is

  11. [A case report of mixed transcortical aphasia due to three attacks of cerebral infarction].

    Science.gov (United States)

    Ibayashi, K; Soma, Y

    1997-04-01

    This is a case report of a 69-year-old right handed male patient with mixed transcortical aphasia caused by the three consecutive strokes in the left hemisphere. The initial attack affected the left occipital region and the second one influenced the angular region of the left parietal lobe. After the second attack the patient showed a symptom similar to transcortical sensory aphasia, although the prognosis was good. The third stroke attacked the subcortical region of the left middle frontal gyrus, consequently the patient became severe mixed transcortical aphasic who could only repeat. Even two years after the last stroke the aphasia was hardly improved. These symptoms are considered to be caused by "functional isolation" of the affected anterior-posterior language areas and the fasciculus arcuatus.

  12. Intrauterine device may trigger typical attacks of familial Mediterranean fever: a case report.

    Science.gov (United States)

    Kurultak, Ilhan; Kinalp, Can; Ceri, Mevlut; Evrenkaya, Tevfik Rıfkı

    2015-01-01

    Familial Mediterranean fever (FMF) is an autosomal recessive disorder characterized by episodic, recurrent, self-limited attacks of fever and serositis (sterile peritonitis, pleuritis, arthritis, etc). The insufficiency in restriction of mild inflammation contributes this consequence in FMF.Intrauterine devices (IUDs) have been widely used in the world for contraception by gynecologists as an effective and safe method. Herein, we present a woman with FMF as the first case, whose attacks were triggered by copper-containing IUD. Our hypothesis in the present case was that sterile mild inflammation in the uterus caused by copper-containing IUD may be the initial source of systemic inflammatory response.In our opinion, clinicians should consider that the copper-containing IUDs may be another cause of FMF attacks in women using this contraceptive method.

  13. Understanding how components of organisations contribute to attacks

    NARCIS (Netherlands)

    Gu, Min; Aslanyan, Zaruhi; Probst, Christian W.

    2016-01-01

    Attacks on organisations today explore many different layers, including buildings infrastructure, IT infrastructure, and human factor – the physical, virtual, and social layer. Identifying possible attacks, understanding their impact, and attributing their origin and contributing factors is difficul

  14. An Attack Modeling Based on Colored Petri Net

    Institute of Scientific and Technical Information of China (English)

    ZHOU Shijie; QIN Zhiguang; ZHANG Feng; LIU Jinde

    2004-01-01

    A color petri net (CPN) based attack modeling approach is addressed.Compared with graph-based modeling,CPN based attack model is fiexible enough to model Intemet intrusions,because of their static and dynamic features.The processes and rules of building CPN based attack model from attack tree are also presented.In order to evaluate the risk of intrusion,some cost elements are added to CPN based attack modeling.This extended model is useful in intrusion detection and risk evaluation.Experiences show that it is easy to exploit CPN based attack modeling approach to provide the controlling functions,such as intrusion response and intrusion defense.A case study given in this paper shows that CPN based attack model has many unique characters which attack tree model hasn't.

  15. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  16. New attacks on Wi-Fi Protected Setup

    Directory of Open Access Journals (Sweden)

    Hamed Mohtadi

    2015-09-01

    Full Text Available Wi-Fi Protected Setup (WPS is a network security standard that is used to secure networks in home and office, introduced in 2006 by the Wi-Fi Alliance. It provides easier configuration setup and is used in almost all recent Wi-Fi devices. In this paper we propose two attacks on this standard. The first attack is an offline brute force attack that uses imbalance on registration protocol. This attack needs user action, but it is more efficient than previous attacks. The second attack uses weaknesses in the implementation of WPS and provides an improved evil twin attack. This attack shows that even by completely disabling the WPS on the routers, all vulnerabilities are not covered.

  17. Aspirin to Prevent a First Heart Attack or Stroke

    Science.gov (United States)

    ... Aspirin to Prevent a First Heart Attack or Stroke Also known as aspirin primary prevention. Aspirin is ... taking aspirin to prevent another heart attack or stroke? The information discussed in Who may benefit? only ...

  18. Robustness of Complex Networks against Attacks Guided by Damage

    CERN Document Server

    Wang, Hui; Xu, Xiaomin; Xiao, Yanghua; Wang, Wei

    2011-01-01

    Extensive researches have been dedicated to investigating the performance of real networks and synthetic networks against random failures or intentional attack guided by degree (degree attack). Degree is one of straightforward measures to characterize the vitality of a vertex in maintaining the integrity of the network but not the only one. Damage, the decrease of the largest component size that was caused by the removal of a vertex, intuitively is a more destructive guide for intentional attack on networks since the network functionality is usually measured by the largest component size. However, it is surprising to find that little is known about behaviors of real networks or synthetic networks against intentional attack guided by damage (damage attack), in which adversaries always choose the vertex with the largest damage to attack. In this article, we dedicate our efforts to understanding damage attack and behaviors of real networks as well as synthetic networks against this attack. To this end, existing ...

  19. Flooding attack and defence in Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    Yi Ping; Hou Yafei; Zhong Yiping; Zhang Shiyong; Dai Zhoulin

    2006-01-01

    Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack(AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept. After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

  20. Modelling Social-Technical Attacks with Timed Automata

    DEFF Research Database (Denmark)

    David, Nicolas; David, Alexandre; Hansen, Rene Rydhof

    2015-01-01

    in our model and perform analysis and simulation of both model and attack, revealing details about the specific interaction between attacker and victim. Using timed automata also allows for intuitive modelling of systems, in which quantities like time and cost can be easily added and analysed.......Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation....... In this paper we develop an approach towards modelling socio-technical systems in general and socio-technical attacks in particular, using timed automata and illustrate its application by a complex case study. Thanks to automated model checking and automata theory, we can automatically generate possible attacks...