WorldWideScience

Sample records for service attacks richard

  1. Denial of Service Attack Techniques: Analysis, Implementation and Comparison

    Directory of Open Access Journals (Sweden)

    Khaled Elleithy

    2005-02-01

    Full Text Available A denial of service attack (DOS is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. In this paper we show the implementation and analysis of three main types of attack: Ping of Death, TCP SYN Flood, and Distributed DOS. The Ping of Death attack will be simulated against a Microsoft Windows 95 computer. The TCP SYN Flood attack will be simulated against a Microsoft Windows 2000 IIS FTP Server. Distributed DOS will be demonstrated by simulating a distribution zombie program that will carry the Ping of Death attack. This paper will demonstrate the potential damage from DOS attacks and analyze the ramifications of the damage.

  2. A taxonomy of distributed denial of service attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Giaretta, Alberto; Dragoni, Nicola

    2017-01-01

    Distributed Denial of Service (DDoS) attacks which are now even more powerful and easier to achieve than the past. Understanding how these attacks work, in all their different forms, represents a first crucial step to tackle this urgent issue. To this end, in this paper we propose a new up-to-date taxonomy...... and a comprehensive classification of current DDoS attacks....

  3. Cascading Denial of Service Attacks on Wi-Fi Networks

    OpenAIRE

    Xin, Liangxiao; Starobinski, David; Noubir, Guevara

    2016-01-01

    We unveil the existence of a vulnerability in Wi-Fi, which allows an adversary to remotely launch a Denial-of-Service (DoS) attack that propagates both in time and space. This vulnerability stems from a coupling effect induced by hidden nodes. Cascading DoS attacks can congest an entire network and do not require the adversary to violate any protocol. We demonstrate the feasibility of such attacks through experiments with real Wi-Fi cards, extensive ns-3 simulations, and theoretical analysis....

  4. Security solution against denial of service attacks in BESIP system

    Science.gov (United States)

    Rezac, Filip; Voznak, Miroslav; Safarik, Jakub; Partila, Pavol; Tomala, Karel

    2013-05-01

    This article deals about embedded SIP communication server with an easy integration into the computer network based on open source solutions and its effective defense against the most frequent attack in the present - Denial of Service. The article contains brief introduction into the Bright Embedded Solution for IP Telephony - BESIP and describes the most common types of DoS attacks, which are applied on SIP elements of the VoIP infrastructure including the results of defensive mechanism that has been designed.

  5. Richard III

    DEFF Research Database (Denmark)

    Lauridsen, Palle Schantz

    2017-01-01

    Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"......Kort analyse af Shakespeares Richard III med fokus på, hvordan denne skurk fremstilles, så tilskuere (og læsere) langt henad vejen kan føle sympati med ham. Med paralleller til Netflix-serien "House of Cards"...

  6. Defending networks against denial-of-service attacks

    Science.gov (United States)

    Gelenbe, Erol; Gellman, Michael; Loukas, George

    2004-11-01

    Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.

  7. Aftermath of bustamante attack on genomic beacon service.

    Science.gov (United States)

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  8. Protecting Dynamic Mobile Agent against Denial of Service Attacks

    Science.gov (United States)

    Aggarwal, Mayank; Nipur, Pallavi

    2010-11-01

    Mobile Agents are softwares migrating from one node to another to fulfill the task of its owner. The introduction of mobile agents has reduced network latency, network traffic a lot but at the same time it has increased the vulnerability for attacks by malicious hosts. One such attack is `Denial of Service', once the agent is launched it is free to roam without any control of its owner, this on one hand decreases the cost of agent—owner interaction and on the other hand increases the chances of `Denial Of Service'. In Denial Of Service attack the malicious host may deny resources required by the agent and kill the agent, thus the result computed so far is lost and this may happen every time the agent visits any malicious host. In this paper we continued the work done in [10] in which the authors proposed techniques by which owner can detect the malicious host for `Denial Of Service' but they did not covered technique for dynamic routes i.e. where the host or agent initiate migrations to hosts which were not contained in the route composed by the owner. We introduced an algorithm and a model which can be useful for the above purpose.

  9. The accountability problem of flooding attacks in service-oriented architectures

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg

    2009-01-01

    The threat of Denial of Service attacks poses a serious problem to the security of network-based services in general. For flooding attacks against service-oriented applications, this threat is dramatically amplified with potentially much higher impact and very little effort on the attacker's side....... Additionally, due to the high distribution of a SOA application's components, fending such attacks becomes a far more complex task. In this paper, we present the problem of accountability, referring to the issue of resolving the attacker in a highly distributed service-oriented application. Using a general...

  10. Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

    Directory of Open Access Journals (Sweden)

    Chunming Zhang

    2018-01-01

    Full Text Available The advanced persistent distributed denial-of-service (APDDoS attack is a fairly significant threat to cybersecurity. Formulating a mathematical model for accurate prediction of APDDoS attack is important. However, the dynamical model of APDDoS attack has barely been reported. This paper first proposes a novel dynamical model of APDDoS attack to understand the mechanisms of APDDoS attack. Then, the attacked threshold of this model is calculated. The global stability of attack-free and attacked equilibrium are both proved. The influences of the model’s parameters on attacked equilibrium are discussed. Eventually, the main conclusions of the theoretical analysis are examined through computer simulations.

  11. Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Katarzyna Mazur

    2016-01-01

    Full Text Available The growing popularity of wireless sensor networks increases the risk of security attacks. One of the most common and dangerous types of attack that takes place these days in any electronic society is a distributed denial of service attack. Due to the resource constraint nature of mobile sensors, DDoS attacks have become a major threat to its stability. In this paper, we established a model of a structural health monitoring network, being disturbed by one of the most common types of DDoS attacks, the flooding attack. Through a set of simulations, we explore the scope of flood-based DDoS attack problem, assessing the performance and the lifetime of the network under the attack condition. To conduct our research, we utilized the Quality of Protection Modeling Language. With the proposed approach, it was possible to examine numerous network configurations, parameters, attack options, and scenarios. The results of the carefully performed multilevel analysis allowed us to identify a new kind of DDoS attack, the delayed distributed denial of service, by the authors, referred to as DDDoS attack. Multilevel approach to DDoS attack analysis confirmed that, examining endangered environments, it is significant to take into account many characteristics at once, just to not overlook any important aspect.

  12. Denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping; Lu, Bao-Liang; Zhang, Liqing; Kwok, James

    2011-01-01

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis approach to investigate and extract second-order

  13. A system for denial-of-service attack detection based on multivariate correlation analysis

    NARCIS (Netherlands)

    Tan, Zhiyuan; Jamdagni, Aruna; He, Xiangjian; Nanda, Priyadarsi; Liu, Ren Ping

    Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause serious impact on these computing systems. In this paper, we present a DoS

  14. In Conversation with Paul Richards

    Science.gov (United States)

    Holman, Andrew

    2013-01-01

    Paul Richards is one of those individuals who make a difference and is as far from institutional as one can be. The author met up with him at the Learning Disability Today conference in London to talk more about his work and life. Paul coordinates the service user involvement across Southdown Housing Association, based in Sussex.

  15. Richard's back: death, scoliosis and myth making.

    Science.gov (United States)

    Lund, Mary Ann

    2015-12-01

    The body of a mediaeval monarch was always under scrutiny, and Richard III's was no exception. In death, however, his body became subject to new forms of examination and interpretation: stripped naked after the battle of Bosworth, his corpse was carried to Leicester and exhibited before being buried. In 2012, it was rediscovered. The revelation that Richard suffered from scoliosis prompts this article to re-evaluate the historical sources about Richard's physique and his posthumous reputation. This article argues that Richard's death and his myth as 'crookback' are inextricably linked and traces attitudes to spinal curvature in the early modern period. It also considers how Shakespeare represented Richard as deformed, and aspects of performance history which suggest physical vulnerability. It then considers Richard's scoliosis from the perspective of medical history, reviewing classical accounts of scoliosis and arguing that Richard was probably treated with a mixture of axial traction and pressure. It demonstrates from the evidence of Richard's medical household that he was well placed to receive hands-on therapies and considers in particular the role of his physician and surgeon, William Hobbes. Finally, it shows how the case of Richard III demonstrates the close relationship between politics and medicine in the period and the contorted process of historical myth making. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  16. RESILIENT SCHEME AGAINST REDUCTION OF QUALITY (ROQ DISTRIBUTED DENIAL OF SERVICE ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    S.A. Arunmozhi

    2011-09-01

    Full Text Available Defending against denial-of-service attacks (DoS in a mobile ad hoc network (MANET is challenging because of the dynamic network topology. Security primitives must be dynamically adjusted to cope with the network. The Reduction-of-Quality (RoQ Distributed Denial of Service (DDoS attack is one which throttles the tcp throughput heavily and reduces the quality-of-service (QoS to end systems gradually rather than refusing the clients from the services completely. Supporting QoS in MANET is a challenging task, particularly in the presence of malicious users. In this paper, we propose a DoS resilient technique that uses a flow table to detect the attackers. The proposed defense mechanism identifies the attackers based on the congestion bit notification and asks the sending node to reduce the sending rate. Once the attackers are identified, all the packets from those nodes will be blocked. The throughput and delay performance of TCP or UDP flows are very sensitive to such RoQ attacks. Through extensive ns2 network simulations, we demonstrate the achievement of high throughput and low delay for a network under the RoQ attack.

  17. A Novel Protective Framework for Defeating HTTP-Based Denial of Service and Distributed Denial of Service Attacks

    Directory of Open Access Journals (Sweden)

    Mohammed A. Saleh

    2015-01-01

    Full Text Available The growth of web technology has brought convenience to our life, since it has become the most important communication channel. However, now this merit is threatened by complicated network-based attacks, such as denial of service (DoS and distributed denial of service (DDoS attacks. Despite many researchers’ efforts, no optimal solution that addresses all sorts of HTTP DoS/DDoS attacks is on offer. Therefore, this research aims to fix this gap by designing an alternative solution called a flexible, collaborative, multilayer, DDoS prevention framework (FCMDPF. The innovative design of the FCMDPF framework handles all aspects of HTTP-based DoS/DDoS attacks through the following three subsequent framework’s schemes (layers. Firstly, an outer blocking (OB scheme blocks attacking IP source if it is listed on the black list table. Secondly, the service traceback oriented architecture (STBOA scheme is to validate whether the incoming request is launched by a human or by an automated tool. Then, it traces back the true attacking IP source. Thirdly, the flexible advanced entropy based (FAEB scheme is to eliminate high rate DDoS (HR-DDoS and flash crowd (FC attacks. Compared to the previous researches, our framework’s design provides an efficient protection for web applications against all sorts of DoS/DDoS attacks.

  18. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  19. Mitigating Distributed Denial of Service Attacks with Dynamic Resource Pricing

    National Research Council Canada - National Science Library

    Mankins, David

    2001-01-01

    .... By employing different price and purchase functions, the architecture can provide service quality differentiation and furthermore, select good client behavior and discriminate against adversarial behavior...

  20. Protecting Database Centric Web Services against SQL/XPath Injection Attacks

    Science.gov (United States)

    Laranjeiro, Nuno; Vieira, Marco; Madeira, Henrique

    Web services represent a powerful interface for back-end database systems and are increasingly being used in business critical applications. However, field studies show that a large number of web services are deployed with security flaws (e.g., having SQL Injection vulnerabilities). Although several techniques for the identification of security vulnerabilities have been proposed, developing non-vulnerable web services is still a difficult task. In fact, security-related concerns are hard to apply as they involve adding complexity to already complex code. This paper proposes an approach to secure web services against SQL and XPath Injection attacks, by transparently detecting and aborting service invocations that try to take advantage of potential vulnerabilities. Our mechanism was applied to secure several web services specified by the TPC-App benchmark, showing to be 100% effective in stopping attacks, non-intrusive and very easy to use.

  1. Professor Richard Feynman colloquium

    CERN Multimedia

    1965-01-01

    Richard P. Feynman received the Nobel Prize for physics in 1965. Following the ceremony in Stockholm, Feynman gave the colloquium "Development of the space-time view of quantum electrodynamics" at CERN on 17th December.

  2. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Adrien Bonguet

    2017-08-01

    Full Text Available Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services. Denial-of-Service (DoS and Distributed Denial-of-Service (DDoS attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.

  3. Proactive Routing Mutation Against Stealthy Distributed Denial of Service Attacks – Metrics, Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duan, Qi; Al-Shaer, Ehab; Chatterjee, Samrat; Halappanavar, Mahantesh; Oehmen, Christopher S.

    2018-04-01

    The Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploit the inherent weakness of cyber infrastructure including deterministic nature of routes, skew distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and es- timate the impact of such susceptibility on enterprises. Second, we develop a proactive route mutation technique to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and qualify of service requirements. We present an integrated approach of proactive route mutation that combines both infrastructure-based mutation that is based on reconfiguration of switches and routers, and middle-box approach that uses an overlay of end-point proxies to construct a virtual network path free of critical links to reach a destination. We implemented the proactive path mutation technique on a Software Defined Network using the OpendDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.

  4. Denial-of-Service Security Attack in the Continuous-Time World

    DEFF Research Database (Denmark)

    Wang, Shuling; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    -of-service security attack, the expected information from the controllers is not received and as a consequence the physical systems may fail to behave as expected. This paper proposes a formal framework for expressing denial-of-service security attack in hybrid systems. As a virtue, a physical system is able to plan......Hybrid systems are integrations of discrete computation and continuous physical evolution. The physical components of such systems introduce safety requirements, the achievement of which asks for the correct monitoring and control from the discrete controllers. However, due to denial...... for reasonable behavior in case the ideal control fails due to unreliable communication, in such a way that the safety of the system upon denial-of-service is still guaranteed. In the context of the modeling language, we develop an inference system for verifying safety of hybrid systems, without putting any...

  5. Richard Halliburton's Bearded Tales

    Science.gov (United States)

    Morris, Charles E., III

    2009-01-01

    Fusing the concept of "the beard" with the genre of the tall tale to theorize bearded tales deepens our understanding of closet eloquence, or rhetorical repertories of sexual passing in U.S. history. An examination of adventurer-writer-lecturer Richard Halliburton's sexual provenance and bestselling travel tale, "The Royal Road to Romance" (1925),…

  6. Richards Bay effluent pipeline

    CSIR Research Space (South Africa)

    Lord, DA

    1986-07-01

    Full Text Available of major concern identified in the effluent are the large volume of byproduct calcium sulphate (phosphogypsum) which would smother marine life, high concentrations of fluoride highly toxic to marine life, heavy metals, chlorinated organic material... ........................ 9 THE RICHARDS BAY PIPELINE ........................................ 16 Environmental considerations ................................... 16 - Phosphogypsum disposal ................................... 16 - Effects of fluoride on locally occurring...

  7. Assessing the Stability and Robustness of Semantic Web Services Recommendation Algorithms Under Profile Injection Attacks

    Directory of Open Access Journals (Sweden)

    GRANDIN, P. H.

    2014-06-01

    Full Text Available Recommendation systems based on collaborative filtering are open by nature, what makes them vulnerable to profile injection attacks that insert biased evaluations in the system database in order to manipulate recommendations. In this paper we evaluate the stability and robustness of collaborative filtering algorithms applied to semantic web services recommendation when submitted to random and segment profile injection attacks. We evaluated four algorithms: (1 IMEAN, that makes predictions using the average of the evaluations received by the target item; (2 UMEAN, that makes predictions using the average of the evaluation made by the target user; (3 an algorithm based on the k-nearest neighbor (k-NN method and (4, an algorithm based on the k-means clustering method.The experiments showed that the UMEAN algorithm is not affected by the attacks and that IMEAN is the most vulnerable of all algorithms tested. Nevertheless, both UMEAN and IMEAN have little practical application due to the low precision of their predictions. Among the algorithms with intermediate tolerance to attacks but with good prediction performance, the algorithm based on k-nn proved to be more robust and stable than the algorithm based on k-means.

  8. The Effects of Denial-of-Service Attacks on Secure Time-Critical Communications in the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Fengli [Univ. of Arkansas, Fayetteville, AR (United States); Li, QInghua [Univ. of Arkansas, Fayetteville, AR (United States); Mantooth, Homer Alan [Univ. of Arkansas, Fayetteville, AR (United States); Ross, Chase [Univ. of Arkansas, Fayetteville, AR (United States); Yang, Jing [Univ. of Arkansas, Fayetteville, AR (United States); Di, Jia [Univ. of Arkansas, Fayetteville, AR (United States); Balda, Juan Carlos [Univ. of Arkansas, Fayetteville, AR (United States)

    2016-04-02

    According to IEC 61850, many smart grid communications require messages to be delivered in a very short time. –Trip messages and sample values applied to the transmission level: 3 ms –Interlocking messages applied to the distribution level: 10 ms •Time-critical communications are vulnerable to denial-of-service (DoS) attacks –Flooding attack: Attacker floods many messages to the target network/machine. We conducted systematic, experimental study about how DoS attacks affect message delivery delays.

  9. Richard von Volkmann

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R.

    2008-01-01

    Richard von Volkmann (1830–1889), one of the most important surgeons of the 19th century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867–1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the “antiseptic technique” to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann’s contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children’s fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics. PMID:18196438

  10. Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution

    Directory of Open Access Journals (Sweden)

    Nicholas BELIZ

    2012-09-01

    Full Text Available Normal 0 21 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-ansi-language:EN-US;} One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. Resources available in the server (memory and CPU cycles of the provider can be drastically reduced or exhausted while a malicious SOAP message is being parsed. This article presents a solution based on an adaptive solution for dealing with DoS attacks in Web service environments. The solution proposes a multi-agent hierarchical architecture that implements a classification mechanism in two phases. Each phase incorporates a special type of CBR-BDI agent that functions as a classifier. In the first phase, a case-based reasoning (CBR engine utilizes a decision tree to carry out an initial filter, and in the second phase, a CBR engine incorporates a neural network to complete the classification mechanism. A prototype of the architecture was developed and the results obtained are presented in this study. 

  11. Detecting DoS Attack in Web Services by Using an Adaptive Multiagent Solution

    Directory of Open Access Journals (Sweden)

    Chi Shun HONG

    2013-07-01

    Full Text Available Normal 0 21 false false false EN-US JA X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Tabla normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:Cambria; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-ansi-language:EN-US;} One of the most frequent techniques of a DoS attack is to exhaust available resources (memory, CPU cycles, and bandwidth on the host server. A SOAP message can be affected by a DoS attack if the incoming message has been either created or modified maliciously. Resources available in the server (memory and CPU cycles of the provider can be drastically reduced or exhausted while a malicious SOAP message is being parsed. This article presents a solution based on an adaptive solution for dealing with DoS attacks in Web service environments. The solution proposes a multi-agent hierarchical architecture that implements a classification mechanism in two phases. Each phase incorporates a special type of CBR-BDI agent that functions as a classifier. In the first phase, a case-based reasoning (CBR engine utilizes a decision tree to carry out an initial filter, and in the second phase, a CBR engine incorporates a neural network to complete the classification mechanism. A prototype of the architecture was developed and the results obtained are presented in this study. 

  12. Richard Lavenham on Future Contingents

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter

    1983-01-01

    Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186.......‘Richard Lavenham on Future Contingents’, Cahiers de l’Institut du Moyen-âge Grec et Latin, 44 (1983), p.180-186....

  13. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey

    CSIR Research Space (South Africa)

    Machaka, P

    2016-08-01

    Full Text Available This chapter reviews the evolution of the traditional internet into the Internet of Things (IoT). The characteristics and application of the IoT are also reviewed, together with its security concerns in terms of distributed denial of service attacks...

  14. Chlorine attack in copper/cupronickel heat exchangers tubes in service water system

    International Nuclear Information System (INIS)

    Hortiguela, Ruben; Corchon, Fernando; Villesccas, Gilberto

    2012-09-01

    Santa Maria de Garona is a nuclear power plant design BWR type 3 with an open cooling circuit without cooling towers which outlets to the Ebro river. In November 2006, the presence of zebra mussels was found upstream of the plant intake. The recommended option for the service water system was to install a chlorination treatment using liquid sodium hypochlorite. This recommendation was based primarily on the need to have an effective mitigation system in place at Garona in the summer of 2007. The recommendation was to apply continuous or semi-continuous addition of chlorine to the service water system, preventing any primary attachment of zebra mussels to the service water piping. The chlorine injection system was designed to deliver approximately 0,3 to 0,5 ppm Total Residual Chlorine (TRC) to the service water on continuous basis. The chlorine injection pumps located at the start of the service water system are controlled by the output of a chlorine analyzer located at the end of the service water system just prior to discharge. After four years injecting NaClO, numerous cases of tube failures in heat exchangers made of copper and cupronickel alloys have been detected. The reactions involved are as follows: Corrosion Reactions in Cupronickel alloys Cl 2 + Ni → NiCl 2 E=1.610 V (Pitting Initiator), Cl 2 + Cu → CuCl 2 E=1.023 V. Corrosion Reactions in Copper tubes Cl 2 + Cu → CuCl 2 E=1.023 V. A close examination by optical microscope of the internal wall of the tubes has shown the typical crystals created from chorine corrosion such as: Cu (OH) 2 , CuCl 2 . (2H 2 O),NiCl 2 , [CuCl 3 ] -1 and [CuCl 4 ] -2 Conclusions: The degradation of the material is due to a combination of the following items: - Ageing of material after many years of operation; - Erosion due to poor quality of river water (silica particles, silts, sediments, etc); - Attack from chlorination to base material; The solutions that have been implemented are mainly: - Reduction of chlorine

  15. Using the cumulative sum algorithm against distributed denial of service attacks in Internet of Things

    CSIR Research Space (South Africa)

    Machaka, Pheeha

    2015-11-01

    Full Text Available The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack...

  16. Distributed Denial of Service Attack Source Detection Using Efficient Traceback Technique (ETT) in Cloud-Assisted Healthcare Environment.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Latif, Seemab; Masood, Ashraf

    2016-07-01

    Security and privacy are the first and foremost concerns that should be given special attention when dealing with Wireless Body Area Networks (WBANs). As WBAN sensors operate in an unattended environment and carry critical patient health information, Distributed Denial of Service (DDoS) attack is one of the major attacks in WBAN environment that not only exhausts the available resources but also influence the reliability of information being transmitted. This research work is an extension of our previous work in which a machine learning based attack detection algorithm is proposed to detect DDoS attack in WBAN environment. However, in order to avoid complexity, no consideration was given to the traceback mechanism. During traceback, the challenge lies in reconstructing the attack path leading to identify the attack source. Among existing traceback techniques, Probabilistic Packet Marking (PPM) approach is the most commonly used technique in conventional IP- based networks. However, since marking probability assignment has significant effect on both the convergence time and performance of a scheme, it is not directly applicable in WBAN environment due to high convergence time and overhead on intermediate nodes. Therefore, in this paper we have proposed a new scheme called Efficient Traceback Technique (ETT) based on Dynamic Probability Packet Marking (DPPM) approach and uses MAC header in place of IP header. Instead of using fixed marking probability, the proposed scheme uses variable marking probability based on the number of hops travelled by a packet to reach the target node. Finally, path reconstruction algorithms are proposed to traceback an attacker. Evaluation and simulation results indicate that the proposed solution outperforms fixed PPM in terms of convergence time and computational overhead on nodes.

  17. Defending IEEE 802.11-Based Networks Against Denial Of Service Attacks

    National Research Council Canada - National Science Library

    Tan, Boon

    2003-01-01

    ...) attacks targeting its management and media access protocols Computer simulation models have proven to be effective tools in the study of cause and effect in numerous fields This thesis involved the design and implementation of a IEEE 8O2.11-based simulation model using OMNeT++, to investigate the effects of different types of DoS attacks on a IEEE 8O2.11 network, and the effectiveness of corresponding countermeasures.

  18. Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks

    Science.gov (United States)

    Seedorf, Jan; Beckers, Kristian; Huici, Felipe

    The Session Initiation Protocol (SIP) is widely used for signaling in multimedia communications. However, many SIP implementations are still in their infancy and vulnerable to malicious messages. We investigate flaws in the SIP implementations of eight phones, showing that the deficient verification of SIP dialogs further aggravates the problem by making it easier for attacks to succeed. Our results show that the majority of the phones we tested are susceptible to these attacks.

  19. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  20. Obituary: Dr. Richard Roland Baker

    Directory of Open Access Journals (Sweden)

    Thornton R

    2014-12-01

    Full Text Available Richard Baker died at Easter 2007 after a very short illness. It is sad that he died so soon after his retirement from the British American Tobacco Company at the end of 2005, and just as he was beginning to enjoy his new life, even though tobacco science still had a part to play.

  1. Personal Denial Of Service (PDOS Attacks: A Discussion and Exploration of a New Category of Cyber Crime

    Directory of Open Access Journals (Sweden)

    Michael Raymond Bartolacci

    2014-03-01

    Full Text Available The growth of the Internet has created a corresponding growth in Internet-based crimes and online misbehavior, particularly among younger computer-savvy people who learned the technical skills necessary for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial of Service attack (PDOS. A PDOS is a cyber crime in which an individual deliberately prevents the access of an individual or small group to online services such as email or banking. Due to the nature of a PDOS, these acts can be overlooked by law enforcement and organizations that operate Internet infrastructure such as universities. We analyze a PDOS attack in the context of the Routine Activities Theory of criminal justice. We also surveyed university students to ascertain their attitudes towards online account breaches as related to a PDOS attack.  Our motivation for this work is twofold: to stress the need for cyber ethics education at the university level, and to illustrate how a previously uncategorized type of cyber crime is easily perpetrated in such an environment.

  2. No health service able to care for victims of nuclear attack

    International Nuclear Information System (INIS)

    Anon.

    1983-01-01

    According to the article the chances of victims of a nuclear attack receiving medical attention are very small. Possible effects of a nuclear explosion are discussed, including: the collapse of the social order, cancer and other diseases, as well as psychological stress

  3. Applying IPFIX Protocol for Detection of Distributed Denial of Service Attacks against Cloud Infrastructure

    Directory of Open Access Journals (Sweden)

    M. R. Mukhtarov

    2011-12-01

    Full Text Available The way of monitoring deviations in network traffic behavior inside “Cloud Infrastructure” using IPFIX protocol is suggested in the paper. The proposed algorithm is applied for registration of “Distributed Denial of Service” attacks against “Cloud Infrastructure”.

  4. Interactive analysis of SDN-driven defence against Distributed Denial of Service attacks

    NARCIS (Netherlands)

    Koning, R.; de Graaff, B.; de Laat, C.; Meijer, R.; Grosso, P.

    2016-01-01

    The Secure Autonomous Response Networks (SARNET) framework introduces a mechanism to respond autonomously to security attacks in Software Defined Networks (SDN). Still the range of responses possible and their effectiveness need to be properly evaluated such that the decision making process and the

  5. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  6. Evaluation of a Multi-Agent System for Simulation and Analysis of Distributed Denial-of-Service Attacks

    National Research Council Canada - National Science Library

    Huu, Tee

    2003-01-01

    DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach Most of the simulations are performed at the attack phase of the DDoS attack...

  7. Distributed denial of service (DDoS) attack in cloud- assisted wireless body area networks: a systematic literature review.

    Science.gov (United States)

    Latif, Rabia; Abbas, Haider; Assar, Saïd

    2014-11-01

    Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.

  8. Richard Mattessich: vida y obra

    OpenAIRE

    Daniel Carrasco Díaz

    2006-01-01

    El texto que se ofrece a continuación constituye el discurso pronunciado por el profesor Daniel Carrasco Díaz, catedrático de Economía Financiera y Contabilidad como padrino del homenajeado, en el solemne acto de investidura del Prof. Dr. Richard Mattessich, profesor emérito de la Sauder School of Commerce, de la University of British Columbia, Vancouver (Canadá), como Doctor honoris causa por la Universidad de Málaga, celebrado el 18 de mayo de 2006.

  9. J. Richard Hackman (1940-2013)

    OpenAIRE

    Wageman, Ruth; Amabile, Teresa M.

    2013-01-01

    When J. Richard Hackman died in Cambridge, Massachusetts, on January 8, 2013, psychology lost a giant. Six and a half feet tall, with an outsize personality to match, Richard was the leading scholar in two distinct areas: work design and team effectiveness. In both domains, his work is foundational. Throughout his career, Richard applied rigorous methods to problems of great social importance, tirelessly championing multi-level analyses of problems that matter. His impact on our field has bee...

  10. Obituary: Richard B. Dunn, 1927-2005

    Science.gov (United States)

    Keil, Stephen L.; Dooling, David

    2007-12-01

    Dr. Richard B. Dunn, astronomer emeritus at the National Solar Observatory, died of a heart attack on September 29, 2005. He was recognized as one of the foremost experimental solar physicists. His innovative designs for telescopes and instruments led to many important discoveries in solar physics. Born in Baltimore, Maryland, in 1927 and raised in Minneapolis, Minnesota, Dick's parents were Dr. Halbert L. Dunn and Katherine Brandner. Halbert (MD, Ph.D., F.A.P.H.A.) was an physician who became Chief of the National Office of Vital Statistics, Public Health Service. He published a paper "High Level Wellness for Man and Society" that became the founding paper of the field of wellness health care. After their divorce in 1942, Katherine moved to New York and became a social worker. Dick had two older brothers who died before him, Halbert (born in 1921, who became a civil engineer) and Robert (born in 1924, who became an architect). Dick earned a BS in mechanical engineering and an MS in astronomy at the University of Minnesota. At the end of World War II he served in the United States Army in Japan. For his master's degree, Dick undertook the design and construction of a Lyot-type birefringent filter for observations of solar prominences. This early work led to his acceptance at Harvard, where Professor Donald Menzel encouraged him to continue his work with the 15-inch Cambridge telescope. In 1951 he conducted part of his doctoral thesis work at the fledgling Sacramento Peak Observatory in southern New Mexico. The observatory director, Dr. John Evans, was impressed with Dick's outstanding instrumental talents and invited him to join as one of the first scientific staff members. During his first few years at Sac Peak, Dick developed two more birefringent filter systems including one with an integrated coronagraph. With this system, he produced the best prominence and spicule observations ever obtained. Dick's career was dedicated to obtaining solar observations of the

  11. Denial of Service Attacks on 802.1X Security Protocol

    National Research Council Canada - National Science Library

    Ozan, Orhan

    2004-01-01

    ... infrastructure, such as military and administrative government LANs. The IEEE 802.11 wireless standard specifies both an authentication service and encryption protocol, but research has demonstrated that these protocols are severely flawed...

  12. Lendab nagu kotkas üle maailmas kogutud tarkuse / Richard Aroksaar ; intervjueerinud Ene Riet

    Index Scriptorium Estoniae

    Aroksaar, Richard

    2014-01-01

    Intervjuu eestlase Richard Aroksaarega, kes õppinud psühholoogiat ja raamatukogundust, töötab USA Rahvusparkide Ühenduse raamatukogus (National Park Service Library, NPS) süsteemi raamatukoguhoidja ja administraatorina

  13. Obituary: Richard D. Schwartz (1941-2011)

    Science.gov (United States)

    Wilking, Bruce

    2011-12-01

    Richard D. Schwartz, Professor Emeritus of Astronomy, died at his home in Sequim, WA, after a nearly 3 year battle against pancreatic cancer. Richard was born in Pretty Prairie, Kansas. He was active in sports and band and graduated in 1959. After completing a BS at Kansas State, and a Master's degree in Divinity at Union Seminary in NY, he further studied astrophysics, receiving his doctorate from University of Washington in 1973. When Dick arrived at the University of Missouri-St. Louis in 1975, he was the only astronomer in the Department of Physics. He built the astronomy program and initiated the B.S. in physics with an astrophysics option that the majority of physics majors choose. Dick was a wonderful teacher and provided outstanding leadership to the campus. He designed and provided oversight on the construction of the campus observatory that was completed in 1981. Since that time the observatory has served as both a teaching and research facility. It is also used for monthly public open houses that draw hundreds of people annually to the campus to view the moon, stars, and planets. Upon his retirement in 2003, the Board of Curators approved naming the campus observatory the "Richard D. Schwartz Observatory" in honor of his distinctive service to the University of Missouri-St. Louis. Just as important as Dick's service to promote public interest in astronomy was his effort to make the campus observatory a research facility. Dick equipped and maintained the observatory with state-of-art detectors that allowed students to get their first taste of scientific research. From 1991-2003, he managed the campus program for the NASA/Missouri Space Grant Consortium and mentored over 30 research students in projects at the observatory. Some of the results have been published in astronomical journals. Many of those students went on to graduate schools and several have achieved tenure and distinction at major universities. In addition to Dick's service to the University

  14. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  15. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  16. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  17. Richard Nixon, 1972-2016 Obituary

    OpenAIRE

    Tom, Brian Dermot; Thompson, Simon Gregory; Duffy, SW; Sweeting, Michael John; Ohlssen, DI

    2017-01-01

    After a year-long journey with cancer, Dr Richard Nixon died on August 26th, 2016, aged only 43 years. He leaves behind his wife of 5 years, Valda, and their 1-year-old baby daughter, Kyra. Richard, a Yorkshireman, was born on September 8th, 1972. He attended Ilkley Grammar School, studied mathematics at Durham University (1991–1994) and was awarded the Diploma in Mathematical Statistics from the University of Cambridge in 1995. Richard then took a career break for a couple of years to...

  18. Theodore William Richards and the Periodic Table

    Science.gov (United States)

    Conant, James B.

    1970-01-01

    Discusses the contribution of Theodore Richards to the accurate determination of atomic weights of copper and other elements; his major contribution was to the building of the definitive periodic table of the elements. (BR)

  19. Richards Barrier LA Reference Design Feature Evaluation

    International Nuclear Information System (INIS)

    N.E. Kramer

    1999-01-01

    The Richards Barrier is one of the design features of the repository to be considered for the License Application (LA), Richards was a soil scientist who first described the diversion of moisture between two materials with different hydrologic properties. In this report, a Richards Barrier is a special type of backfill with a fine-grained material (such as sand) overlaying a coarse-grained material (such as gravel). Water that enters an emplacement drift will first encounter the fine-grained material and be transported around the coarse-grained material covering the waste package, thus protecting the waste package from contact with most of the groundwater. The objective of this report is to discuss the benefits and liabilities to the repository by the inclusion of a Richards Barrier type backfill in emplacement drifts. The Richards Barrier can act as a barrier to water flow, can reduce the waste package material dissolution rate, limit mobilization of the radionuclides, and can provide structural protection for the waste package. The scope of this report is to: (1) Analyze the behavior of barrier materials following the intrusion of groundwater for influxes of 1 to 300 mm per year. The report will demonstrate diversion of groundwater intrusions into the barrier over an extended time period when seismic activity and consolidation may cause the potential for liquefaction and settlement of the Richards Barrier. (2) Review the thermal effects of the Richards Barrier on material behavior. (3) Analyze the effect of rockfall on the performance of the Richards Barrier and the depth of the barrier required to protect waste packages under the barrier. (4) Review radiological and heating conditions on placement of multiple layers of the barrier. Subsurface Nuclear Safety personnel will perform calculations to determine the radiation reduction-time relationship and shielding capacity of the barrier. (5) Evaluate the effects of ventilation on cooling of emplacement drifts and

  20. Bridging the Knowledge Gaps between Richards' Equation and Budyko Equation

    Science.gov (United States)

    Wang, D.

    2017-12-01

    The empirical Budyko equation represents the partitioning of mean annual precipitation into evaporation and runoff. Richards' equation, based on Darcy's law, represents the movement of water in unsaturated soils. The linkage between Richards' equation and Budyko equation is presented by invoking the empirical Soil Conservation Service curve number (SCS-CN) model for computing surface runoff at the event-scale. The basis of the SCS-CN method is the proportionality relationship, i.e., the ratio of continuing abstraction to its potential is equal to the ratio of surface runoff to its potential value. The proportionality relationship can be derived from the Richards' equation for computing infiltration excess and saturation excess models at the catchment scale. Meanwhile, the generalized proportionality relationship is demonstrated as the common basis of SCS-CN method, monthly "abcd" model, and Budyko equation. Therefore, the linkage between Darcy's law and the emergent pattern of mean annual water balance at the catchment scale is presented through the proportionality relationship.

  1. Relação saque, recepção e ataque no voleibol juvenil masculino Relation service, reception and attack in male junior volleyball

    Directory of Open Access Journals (Sweden)

    Gustavo De Conti Teixeira Costa

    2011-03-01

    Full Text Available Neste texto, O objetivo do presente estudo consistiu em analisar a relação do saque e da recepção com o efeito do ataque em seleções nacionais de voleibol juvenil masculino. Recorreu-se à observação e análise de onze jogos, totalizando 781 ações de ataque. Os resultados demonstraram que o ponto no ataque ocorreu mais do que o esperado após o saque suspensão colocado e após a recepção que permitiu todas as opções de ataque. Contrariamente, este ocorreu menos do que o esperado após o saque suspensão potente e a recepção que não permitiu ataque organizado. O presente estudo permitiu inferir que o saque potente e a recepção com baixos níveis de eficácia reduzem as possibilidades de pontuar no ataque. O fato do saque potente adversário induzir menor ocorrência de ponto no ataque, pode sugerir alguma debilidade na organização ofensiva da equipa perante as dificuldades acrescidas colocadas por este tipo de saque.Tal sugere a necessidade de, desde as categorias de base, ser dada maior atenção no treinamento à capacidade das equipas organizarem as manobras ofensivas em resposta a saques agressivos como é o caso do saque suspensão potente.The purpose of this study was to analyze the relationship between serve and serve reception on the effect of the offensive system in the national junior male volleyball teams. Eleven games were analyzes, totaling 781 attack actions. The results showed that the attack point occurred more than expected after the top spin placed jump serve from the opponent and after the reception that allowed all the attack options. In contrast, to this one and the reception that did not allowed an organized attack occurred less than expected after the power jump service. This study made it possible to infer that powerful service and the reception with low levels of efficiency reduce the chances of scoring in the attack. The fact that the opponent's powerful service results lesser occurrences of the

  2. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants....

  3. In conversation with: Professor Richard James

    Directory of Open Access Journals (Sweden)

    John Clarke

    2014-03-01

    Full Text Available In 2011, Richard James wrote in the Foreword to Nelson, Clarke, Kift, and Creagh’s (2012 monograph on Australasian literature on the First Year Experience that:The trend towards universal participation will usher in dramatic changes in the character of the first year in higher education. … (p. iiiIn an interview at the University of Melbourne, Australia in July 2013 between Richard James and John Clarke, Co-editor of the International Journal of the First Year in Higher Education, these and related issues were explored.  The interview picks up where the Foreword left off:  focussing on universal participation.

  4. Quantum Man: Richard Feynman's Life in Science

    CERN Document Server

    CERN. Geneva

    2011-01-01

    It took a man who was willing to break all the rules to tame a theory that breaks all the rules. This talk will be based on my new book Quantum Man: Richard Feynman's life in science. I will try and present a scientific overview of the contributions of Richard Feynman, as seen through the arc of his fascinating life. From Quantum Mechanics to Antiparticles, from Rio de Janeiro to Los Alamos, a whirlwind tour will provide insights into the character, life and accomplishments of one of the 20th centuries most important scientists, and provide an object lesson in scientific integrity.

  5. Detection and Prevention of Denial of Service (DoS Attacks in Mobile Ad Hoc Networks using Reputation-based Incentive Schemes

    Directory of Open Access Journals (Sweden)

    Mieso, K Denko

    2005-08-01

    Full Text Available Mobile ad hoc networks (MANETs are dynamic mobile networks that can be formed in the absence of any pre-existing communication infrastructure. In addition to node mobility, a MANET is characterized by limited resources such as bandwidth, battery power, and storage space. The underlying assumption in MANETs is that the intermediate nodes cooperate in forwarding packets. However, this assumption does not hold in commercial and emerging civilian applications. MANETs are vulnerable to Denial of Service (DoS due to their salient characteristics. There is a need to provide an incentive mechanism that can provide cooperation among nodes in the network and improve overall network performance by reducing DoS attacks. In this paper, we propose a reputation-based incentive mechanism for detecting and preventing DoS attacks. DoS attacks committed by selfish and malicious nodes were investigated. Our scheme motivates nodes to cooperate and excludes them from the network only if they fail to do so. We evaluated the performance of our scheme using the packet delivery ratio, the routing and communication overhead, and misbehaving node detection in a discrete event-simulation environment. The results indicate that a reputation-based incentive mechanism can significantly reduce the effect of DoS attacks and improve performance in MANETs.

  6. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  7. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  8. Development of module for neural network identification of attacks on applications and services in multi-cloud platforms

    Science.gov (United States)

    Parfenov, D. I.; Bolodurina, I. P.

    2018-05-01

    The article presents the results of developing an approach to detecting and protecting against network attacks on the corporate infrastructure deployed on the multi-cloud platform. The proposed approach is based on the combination of two technologies: a softwareconfigurable network and virtualization of network functions. The approach for searching for anomalous traffic is to use a hybrid neural network consisting of a self-organizing Kohonen network and a multilayer perceptron. The study of the work of the prototype of the system for detecting attacks, the method of forming a learning sample, and the course of experiments are described. The study showed that using the proposed approach makes it possible to increase the effectiveness of the obfuscation of various types of attacks and at the same time does not reduce the performance of the network

  9. Obituary: Richard Joseph Elston, 1960-2004

    Science.gov (United States)

    Jannuzi, Buell Tomasson; Bechtold, Jill

    2004-12-01

    Richard Joseph Elston, known for his development of innovative astronomical instrumentation, died on 26 January 2004 in Gainesville, Florida, after a four-year battle with Hodgkin's lymphoma. A professor of astronomy at the University of Florida, Richard had an unusually broad range of interests and skills, and a willingness to share his passion for astronomy with others, which made him a highly valued member of the astronomical community. Born 1 July 1960, in Albuquerque, New Mexico, Richard was the son of a geologist father and journalist mother. His childhood interest in astronomy and instrumentation matured as he majored in physics and astronomy at the University of New Mexico (BS, 1983) under the mentorship of Michael Zeilik. Richard pursued his PhD in astronomy at the University of Arizona and earned his degree in 1988. He pioneered the use of IR arrays for deep imaging surveys of the sky to study galaxy formation, and completed his thesis Search for Rapidly Forming Galaxies at High Redshift under the direction of George Rieke. Richard's graduate work included the first detection of galaxies at intermediate redshifts with evolved populations too red to have been identifiable from optical imaging surveys alone. In the Astrophysical Journal Letters in 1988, he, George Rieke, and Marcia Rieke reported the discovery of this new class of galaxies, now known as EROs (Extremely Red Objects), important as the possible progenitors of present day elliptical galaxies. Following post-doctoral positions at Kitt Peak National Observatory from 1988 to 1991 and at the Observatories of the Carnegie Institution of Washington from 1991 to 1992, Richard joined the scientific staff of Cerro Tololo Inter-American Observatory in Chile, part of the NSF's National Optical Astronomy Observatory. By 1994, he had become head of CTIO's IR instrumentation program and was leading the development of new instruments for the US astronomical community. In 1996, Richard married astronomer

  10. Richard W. Ziolkowski Receives Honorary Doctorate

    DEFF Research Database (Denmark)

    Breinbjerg, Olav

    2012-01-01

    At the annual Commemoration of the Technical University of Denmark (DTU) on April 27, 2012, Prof. Richard W. Ziolkowski, University of Arizona (UoA), received DTU's highest academic degree, the Honorary Doctor degree: Doctor Technices Honoris Causa (Figure 1). Prof. Ziolkowski has been a close...

  11. Potshemu medved rõtshit / Richard Pipes

    Index Scriptorium Estoniae

    Pipes, Richard

    2006-01-01

    Harvardi ülikooli ajalooprofessor Richard Pipes arutleb, miks Venemaa viimase aja käitumises väljendub soovimatus koostööks, sageli ka vaenulikkus. Venemaa võimetus rahvusvahelises kontekstis oma kohta leida, selle ajaloolised juured

  12. Richard A. Werners forskning i pengeskabelse

    DEFF Research Database (Denmark)

    2016-01-01

    Hvilken rolle spiller penge i samfundsøkonomien og hvilken rolle burde penge spille i den økonomiske videnskab? Det forsker Richard Werner i. Han er professor i økonomi ved Southampton University i England, og her præsenteres fire dele af hans forskning i penge: (1) Hvad foregår der egentlig i en...

  13. Recensie "The Great Reset" : Richard Florida

    NARCIS (Netherlands)

    Roy van Dalm

    2010-01-01

    Like the Great Depression and the Long Depression before it, experts have viewed prolonged economic downturns as crises. In The Great Reset , bestselling author Richard Florida argues that we should instead see the recent recession as an opportunity to create entirely new ways of working and living

  14. Heart Attack

    Science.gov (United States)

    ... properly causes your body's blood sugar levels to rise, increasing your risk of heart attack. Metabolic syndrome. This occurs when you have obesity, high blood pressure and high blood sugar. Having metabolic ...

  15. Heart Attack

    Science.gov (United States)

    ... family history of heart attack race – African Americans, Mexican Americans, Native Americans, and native Hawaiians are at ... Your doctor will prescribe the medicines that are right for you. If you have had a heart ...

  16. Richard Florida : loovsektor on majanduskasvu mootor / Richard Florida ; interv. Argo Ideon

    Index Scriptorium Estoniae

    Florida, Richard

    2008-01-01

    USA majandus- ja ühiskonnateadlane Richard Florida loovklassi teooriast, selle osast majanduskasvu tagamisel, seosest ühiskonna tolerantsuse ja ühiskonna majandusliku edukuse vahel, sotsiaalse sidususe takistavast rollist loovuse motiveerimisel

  17. Method of lines solution of Richards` equation

    Energy Technology Data Exchange (ETDEWEB)

    Kelley, C.T.; Miller, C.T.; Tocci, M.D.

    1996-12-31

    We consider the method of lines solution of Richard`s equation, which models flow through porous media, as an example of a situation in which the method can give incorrect results because of premature termination of the nonlinear corrector iteration. This premature termination arises when the solution has a sharp moving front and the Jacobian is ill-conditioned. While this problem can be solved by tightening the tolerances provided to the ODE or DAE solver used for the temporal integration, it is more efficient to modify the termination criteria of the nonlinear solver and/or recompute the Jacobian more frequently. In this paper we continue previous work on this topic by analyzing the modifications in more detail and giving a strategy on how the modifications can be turned on and off in response to changes in the character of the solution.

  18. Richard Weaver's Untraditional Case for Federalism

    OpenAIRE

    Jeremy David Bailey

    2004-01-01

    Although Richard M. Weaver's political writings do not offer a systematic examination of federalism, they include a defense of federalist arrangements. Because Weaver's federalism is central to his conservatism, and because his argument for federalism differs from more common conservative defenses of federalism offered in the twentieth century, his writings allow students of federalism to examine possible connections between federalism and conservative political thought. Copyright 2004, Oxfor...

  19. Richard Wollheim 1923-2003 / Marek Volt

    Index Scriptorium Estoniae

    Volt, Marek

    2004-01-01

    Järelehüüe anglo-ameerika filosoofile Richard Wollheimile (5. V 1923-4. XI 2003), kes huvitus maalist ja psühhoanalüüsist ning kuulub XX sajandi analüütilist kunstifilosoofiat enim kujundanud filosoofide hulka. Tema peamised tööd: "Art and Its Objects" (1968), "Painting As an Art" (1987), "On Painting and the Self" (1992). Ilmunud ka raamatus: Volt, Marek. Esteetikast. Tallinn : Sirp, 2006

  20. Accurately Identifying New QoS Violation Driven by High-Distributed Low-Rate Denial of Service Attacks Based on Multiple Observed Features

    Directory of Open Access Journals (Sweden)

    Jian Kang

    2015-01-01

    Full Text Available We propose using multiple observed features of network traffic to identify new high-distributed low-rate quality of services (QoS violation so that detection accuracy may be further improved. For the multiple observed features, we choose F feature in TCP packet header as a microscopic feature and, P feature and D feature of network traffic as macroscopic features. Based on these features, we establish multistream fused hidden Markov model (MF-HMM to detect stealthy low-rate denial of service (LDoS attacks hidden in legitimate network background traffic. In addition, the threshold value is dynamically adjusted by using Kaufman algorithm. Our experiments show that the additive effect of combining multiple features effectively reduces the false-positive rate. The average detection rate of MF-HMM results in a significant 23.39% and 44.64% improvement over typical power spectrum density (PSD algorithm and nonparametric cumulative sum (CUSUM algorithm.

  1. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  2. Illustrated & Dissected: Professor Richard Sawdon Smith.

    Science.gov (United States)

    2015-06-01

    This Alternative Gallery feature introduces the photographic artist Professor Richard Sawdon Smith. Professor Sawdon Smith's work stems around a fascination with representations of anatomy that have been fuelled by his experience as a hospital patient. The work has allowed him to explore ideas through the use of medical illustrations which include early anatomical drawings, personal medical photography and facial modelling. The work highlights how such imagery can be used in the context of a patient seeking understanding and acceptance of ill health and disease using the body as a canvas on which to translate the experience.

  3. Richard Bright and his neurological studies.

    Science.gov (United States)

    Pearce, J M S

    2009-01-01

    Richard Bright was one of the famous triumvirate of Guy's Hospital physicians in the Victorian era. Remembered for his account of glomerulonephritis (Bright's disease) he also made many important and original contributions to medicine and neurology. These included his work on cortical epileptogenesis, descriptions of simple partial (Jacksonian) seizures, infantile convulsions, and a variety of nervous diseases. Most notable were his reports of neurological studies including papers on traumatic tetanus, syringomyelia, arteries of the brain, contractures of spinal origin, tumours of the base of the brain, and narcolepsy. His career and these contributions are outlined. Copyright 2009 S. Karger AG, Basel.

  4. Richard Feynman a life in science

    CERN Document Server

    Gribbin, John

    1998-01-01

    This text is a portrayal of one of the greatest scientists of the late 20th-century, which also provides a picture of the significant physics of the period. It combines personal anecdotes, writings and recollections with narrative. Richard Feynman's career included: war-time work on the atomic bomb at Los Alamos; a theory of quantum mechanics for which he won the Nobel prize; and major contributions to the sciences of gravity, nuclear physics and particle theory. In 1986, he was able to show that the Challenger disaster was due to the effect of cold on the booster rocket rubber sealings.

  5. Richard Feynman Quarks, Bombs, and Bongos

    CERN Document Server

    Henderson, Harry

    2010-01-01

    Described by his peers as the "finest physicist of his generation," Richard Feynman defied scientist stereotypes. This brash New York-born American physicist startled the more conservative giants of European physics with his endless ability to improvise. Indeed, later in life, Feynman became an accomplished bongo player. Feynman's legacy to physics was his ability to simplify complex equations and clarify fundamental principles through the use of graphs. He developed the theory of quantum electrodynamics, which illustrates the behavior of electrically charged particles, such as elect

  6. An appreciation of Richard Threlkeld Cox

    Science.gov (United States)

    Tribus, Myron

    2002-05-01

    Richard T. Cox's contributions to the foundations of probability theory and inductive logic are not generally appreciated or understood. This paper reviews his life and accomplishments, especially those in his book The Algebra of Probable Inference and his final publication Inference and Inquiry which, in this author's opinion, has the potential to influence in a significant way the design and analysis of self organizing systems which learn from experience. A simple application to the simulation of a neuron is presented as an example of the power of Cox's contribution.

  7. EDITORIAL: Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter Richard Palmer: celebrating 37 years with Journal of Physics: Condensed Matter

    Science.gov (United States)

    Ferry, David

    2009-01-01

    in Materials Science and Engineering. Under the new structure, journal development became an increasingly important part of his job. At about the same time, Richard was also asked to take over running Reports on Progress in Physics, which up to then had been done by the head of the IOP Journals Department, Kurt Paulus. In 1989, Journal of Physics C: Solid State Physics and Journal of Physics F: Metal Physics remerged to form JPCM. Since then, Richard has gradually shed his other journal responsibilities, except for Reports on Progress in Physics, to build up JPCM. He has worked closely with four Editors-in-Chief of Journal of Physics C: Solid State Physics, five of JPCM, five of Reports on Progress in Physics and about ten of other journals, and attended approximately 300 Editorial Board meetings. I should say that he has made my own tenure at Editor-in-Chief an easy task to learn and take on, and has been a major guiding light in the development of the journal. In 2006, Richard was honoured by the award of a Member of the British Empire (MBE) for services to science publishing. Those of us on the board were particularly pleased about this, as one is not always recognized for the effort they expend, and this award was certainly due for Richard. We are going to miss Richard a great deal, but are happy that he will remain on a part time basis to help our new Publisher, Dr Lucy Smith, and the rest of us through the transition. His retirement leaves us with a huge hole that we will have to work extremely hard to fill. Speaking for the various boards, and especially the executive board, I want to wish Richard the very best in his retirement.

  8. Richard von Volkmann: surgeon and Renaissance man.

    Science.gov (United States)

    Willy, Christian; Schneider, Peter; Engelhardt, Michael; Hargens, Alan R; Mubarak, Scott J

    2008-02-01

    Richard von Volkmann (1830-1889), one of the most important surgeons of the 19(th) century, is regarded as one of the fathers of orthopaedic surgery. He was a contemporary of Langenbeck, Esmarch, Lister, Billroth, Kocher, and Trendelenburg. He was head of the Department of Surgery at the University of Halle, Germany (1867-1889). His popularity attracted doctors and patients from all over the world. He was the lead physician for the German military during two wars. From this experience, he compared the mortality of civilian and war injuries and investigated the general poor hygienic conditions in civilian hospitals. This led him to introduce the "antiseptic technique" to Germany that was developed by Lister. His powers of observation and creativity led him to findings and achievements that to this day bear his name: Volkmann's contracture and the Hueter-Volkmann law. Additionally, he was a gifted writer; he published not only scientific literature but also books of children's fairy tales and poems under the pen name of Richard Leander, assuring him a permanent place in the world of literature as well as orthopaedics.

  9. Seeing Scale: Richard Dunn’s Structuralism

    Directory of Open Access Journals (Sweden)

    Keith Broadfoot

    2012-11-01

    Full Text Available Writing on the occasion of a retrospective of Richard Dunn’s work, Terence Maloon argued that ‘structuralism had an important bearing on virtually all of Richard Dunn’s mature works’, with ‘his modular, “crossed” formats’ being the most obvious manifestation of this. In this article I wish to reconsider this relation, withdrawing from a broad consideration of the framework of structuralism to focus on some of the quite particular ideas that Lacan proposed in response to structuralism. Beginning from a pivotal painting in the 1960s that developed out of Dunn’s experience of viewing the work of Barnett Newman, I wish to suggest a relation between the ongoing exploration of the thematic of scale in Dunn’s work and the idea of the symbolic that Lacan derives from structuralist thought. This relation, I argue, opens up a different way of understanding the art historical transition from Minimalism to Conceptual art.

  10. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank...

  11. Whispering through DDoS attack

    OpenAIRE

    Miralem Mehic; Jiri Slachta; Miroslav Voznak

    2016-01-01

    Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes o...

  12. Conoscenza e etica in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Emilia Romano

    2011-12-01

    Full Text Available The era in which we live, characterized by multiculturalism and complexity, it is a time when it is clear the difficulty of man to orient and to choose their own way. It’s the time of the fall of every certainty, is the era of “post”, after the tradition, after metaphysics, after the truth, and that requires more effort than any other constant reflection. The neopragmatismo seems to be an effective investigative tool for conducting this reflection and a vantage point to carry on a conversation around the issues of education. In particular, the author intended to refer to the work of Richard Rorty, the author who more than others reflected on the encounter between two important pragmatist tradition: that of classical pragmatism and the “continental” or responsible for the development of a new European concept of truth, understood as a critical and interpretative.

  13. El vocabulario sechurano de Richard Spruce

    Directory of Open Access Journals (Sweden)

    Matthias Urban

    2015-12-01

    Full Text Available This paper makes accesible a new transcription of Richard Spruce’s vocabulary of the Sechura language. Collected in the mid-19th century by the British botanist, it constitutes one of only two sources of data for this language of northernmost Peru. A comparison of the original with previously published versions shows serious errors in transcription, in particular in those of Otto von Buchwald and Jacinto Jijón y Camaaño. The article also discusses the probable circumstances of data collection and the publication history of the hitherto known version, and concludes with some first observations on the significance of Spruce’s wordlist for elucidating the linguistic history of the region, in particular with regard to the question of the linguistic situation at Olmos.

  14. Has Richard Rorty a moral philosophy?

    Directory of Open Access Journals (Sweden)

    Mohammad Asghari

    2015-06-01

    Full Text Available I try to show that Richard Rorty, although is not a moral philosopher like Kant, nerveless, has moral philosophy that must be taken seriously. Rorty was not engaged with moral philosophy in the systematic manner common among leading modern and contemporary moral philosophers. This paper has two parts: first part, in brief, is concerned with principles of his philosophy such as anti-essentialism, Darwinism, Freudism, and historicism. Second part which be long and detailed, considers many moral themes in Rorty's thought such as critique of Kantian morality, solidarity, moral progress, cruelty and concept of other, etc. Subsequently, I will try to answer the research question of the article namely, has Rorty a moral philosophy?

  15. 77 FR 21555 - Manning, Richard W.; Notice of Filing

    Science.gov (United States)

    2012-04-10

    ... DEPARTMENT OF ENERGY Federal Energy Regulatory Commission [Docket No. ID-6835-001] Manning, Richard W.; Notice of Filing Take notice that on April 2, 2012, Richard W. Manning submitted for filing... not serve to make protestants parties to the proceeding. Any person wishing to become a party must...

  16. Richard Avedon ja Annie Leibovitz laulsid kaanonit / Marika Alver

    Index Scriptorium Estoniae

    Alver, Marika

    2008-01-01

    Richard Avedoni (1923-2004) retrospektiivnäitusest (fotod aastatest 1946-2004) kuraator Helle Crenzien (Lousiana Kaasaegse Kunsti muuseum Taanis), millega kaasnes ka Helen Whitney film "Richard Avedon : darkness and light" ja Annie Leibovitzi (1949) suurprojektist "A photographer's life 1990-2005" Pariisis

  17. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  18. Collaborative Attack Mitigation and Response: A survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Sperotto, Anna; Baier, Harald; Pras, Aiko

    2015-01-01

    Over recent years, network-based attacks have become to one of the top causes of network infrastructure and service outages. To counteract a network-based attack, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). However, it remains

  19. Attacks on public telephone networks: technologies and challenges

    Science.gov (United States)

    Kosloff, T.; Moore, Tyler; Keller, J.; Manes, Gavin W.; Shenoi, Sujeet

    2003-09-01

    Signaling System 7 (SS7) is vital to signaling and control in America's public telephone networks. This paper describes a class of attacks on SS7 networks involving the insertion of malicious signaling messages via compromised SS7 network components. Three attacks are discussed in detail: IAM flood attacks, redirection attacks and point code spoofing attacks. Depending on their scale of execution, these attacks can produce effects ranging from network congestion to service disruption. Methods for detecting these denial-of-service attacks and mitigating their effects are also presented.

  20. Richard Murphy: a life in writing

    Directory of Open Access Journals (Sweden)

    E. Meihuizen

    2006-07-01

    Full Text Available The Irish poet Richard Murphy published his autobiography “The kick: a life among writers” in 2003. From a slightly different perspective the subtitle of this work could be rewritten as “A life in writing” since it is an account of the agencies that moulded a life devoted to creative writing which forms the book’s essential impetus. The memoir is based on notebooks which Murphy kept throughout his life “to hold the scraps of verse, elusive images, dreams, desires and revelations” to be developed into poetry. Apart from contextualising his poetry by registering the relationships, circumstances and landscapes from which it germinated, Murphy also tells of the creative process itself and the personal poetics underlying this process. This article explores what is regarded as the central determining feature of Murphy’s identity as poet, namely the relationship between the creative self and a particular place, where the concept of “place” is seen as a cultural palimpsest which represents not only physical qualities, but also the shaping and development of the landscape through time according to a certain way of life.

  1. Richard Murphy: Autobiography and the Connemara landscape

    Directory of Open Access Journals (Sweden)

    Elsa Meihuizen

    2015-08-01

    Full Text Available It could be argued that an important feature of Richard Murphy’s work, and of his identity as a poet is the relationship between the creative self and a particular place, where ‘place’ should be understood as referring not just to physical qualities of the natural environment, but in a broader sense to denote an environment in which everything is interrelated and connected, and in which there is no sharp division between the natural and the human. The landscape providing inspiration for Murphy’s poetic imagination is the landscapes and seascapes of Connemara in north-west Ireland. In 1959 he settled in this environment which was to be his base for the next 20 years and from this period and this location emanated the bulk of his poetic oeuvre. For Murphy committing to a life of writing poetry necessarily means being in the Connemara landscape. Returning to this environment in adulthood represents a quest for recovering childhood feelings, of belonging and love, as connected to particular places. Murphy’s Connemara poems could be read as an account of this process of re-placement, as a type of autobiographical text in which the artist creates a ‘double portrait’: in writing about the landscape he also writes about himself, creating a place-portrait which is, at the same time, a self-portrait.

  2. Richard Swedberg, The Art of Social Theory

    DEFF Research Database (Denmark)

    Carleheden, Mikael

    2015-01-01

    to systematic consideration. Swedberg attributes this strange absence to what he sees as the miserable state of contemporary social theory. We must, he claims, avoid two misconceptions: ‘empiricism’ and ‘abstract theory’. In the first case, theory is reduced to the task of summarizing the outcome of empirical......It is a rare event when a new general field of research opens up within sociology. However, with this book, Richard Swedberg intends to do just that. It is not just another book on social theory. It is a book on ‘theorizing’. And that makes all the difference. Swedberg has chosen the term ‘art......’, but also ‘craft’, to emphasize the practical side of doing theory. This topic has been strangely absent, not just in sociology but in the social sciences in general. In order to see this absence, we should ask ourselves how education in sociology is conventionally organized. The answer is by a taken...

  3. Heart Attack Recovery FAQs

    Science.gov (United States)

    ... recommendations to make a full recovery. View an animation of a heart attack . Heart Attack Recovery Questions ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  4. A computer network attack taxonomy and ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-01-01

    Full Text Available of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example, after the launch of a DDOS (Distributed Denial of Service) attack, zombie computers may still connect to the target...-scrap- value-of-a-hacked-pc-revisited/ . Lancor, L., & Workman, R. (2007). Using Google Hacking to Enhance Defense Strategies. ACM SIGCSE Bulletin, 39 (1), 491-495. Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed Denial of Service...

  5. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  6. Kuues väljasuremine / Richard Leakey, Roger Lewin

    Index Scriptorium Estoniae

    Leakey, Richard

    2002-01-01

    Inimtegevuse hävitavast toimest looduslikule mitmekesisusele, mis tingib loodusliku energiatootmise järsu kahanemise, millest omakorda sõltub inimese enda ellujäämine. Lühidalt Richard Leakey'st

  7. Swearing Used in Richard Wright’s Black Boy

    OpenAIRE

    Giyatmi Giyatmi; Ratih WIjayava; Nunun Tri Widarwati

    2017-01-01

    This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright's Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. Aft...

  8. Static and Dynamic 4-Way Handshake Solutions to Avoid Denial of Service Attack in Wi-Fi Protected Access and IEEE 802.11i

    Directory of Open Access Journals (Sweden)

    De Rango Floriano

    2006-01-01

    Full Text Available This paper focuses on WPA and IEEE 802.11i protocols that represent two important solutions in the wireless environment. Scenarios where it is possible to produce a DoS attack and DoS flooding attacks are outlined. The last phase of the authentication process, represented by the 4-way handshake procedure, is shown to be unsafe from DoS attack. This can produce the undesired effect of memory exhaustion if a flooding DoS attack is conducted. In order to avoid DoS attack without increasing the complexity of wireless mobile devices too much and without changing through some further control fields of the frame structure of wireless security protocols, a solution is found and an extension of WPA and IEEE 802.11 is proposed. A protocol extension with three "static" variants and with a resource-aware dynamic approach is considered. The three enhancements to the standard protocols are achieved through some simple changes on the client side and they are robust against DoS and DoS flooding attack. Advantages introduced by the proposal are validated by simulation campaigns and simulation parameters such as attempted attacks, successful attacks, and CPU load, while the algorithm execution time is evaluated. Simulation results show how the three static solutions avoid memory exhaustion and present a good performance in terms of CPU load and execution time in comparison with the standard WPA and IEEE 802.11i protocols. However, if the mobile device presents different resource availability in terms of CPU and memory or if resource availability significantly changes in time, a dynamic approach that is able to switch among three different modalities could be more suitable.

  9. On the potential of IPv6 open resolvers for DDoS attacks

    NARCIS (Netherlands)

    Hendriks, Luuk; de Oliveira Schmidt, Ricardo; van Rijswijk-Deij, Roland; Pras, Aiko; Kaafar, Mohamed Ali; Uhlig, Steve; Amann, Johanna

    2017-01-01

    Distributed Denial of Service (DDoS) attacks have become a daily problem in today’s Internet. These attacks aim at overwhelm- ing online services or network infrastrucure. Some DDoS attacks explore open services to perform reflected and amplified attacks; and the DNS is one of the most (mis)used

  10. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  11. Securing internet by eliminating DDOS attacks

    Science.gov (United States)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  12. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  13. Solidarity under Attack

    DEFF Research Database (Denmark)

    Meret, Susi; Goffredo, Sergio

    2017-01-01

    https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack......https://www.opendemocracy.net/can-europe-make-it/susi-meret-sergio-goffredo/solidarity-under-attack...

  14. Pericarditis - after heart attack

    Science.gov (United States)

    ... include: A previous heart attack Open heart surgery Chest trauma A heart attack that has affected the thickness of your heart muscle Symptoms Symptoms include: Anxiety Chest pain from the swollen pericardium rubbing on the ...

  15. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  16. 1800-IJBCS-Article-Richard Ouedraogo

    African Journals Online (AJOL)

    hp

    Conclusion : Il convient de prioriser les mesures préventives et la prise en charge précoce .... Heslop, 2006). Dans notre contexte, la faible accessibilité aux services de santé spécialisés, pourrait expliquer en partie l'importance de cette incidence. En effet, la ... contrefaçon « médicaments de la rue », se sont révélées peu ...

  17. EVFDT: An Enhanced Very Fast Decision Tree Algorithm for Detecting Distributed Denial of Service Attack in Cloud-Assisted Wireless Body Area Network

    Directory of Open Access Journals (Sweden)

    Rabia Latif

    2015-01-01

    Full Text Available Due to the scattered nature of DDoS attacks and advancement of new technologies such as cloud-assisted WBAN, it becomes challenging to detect malicious activities by relying on conventional security mechanisms. The detection of such attacks demands an adaptive and incremental learning classifier capable of accurate decision making with less computation. Hence, the DDoS attack detection using existing machine learning techniques requires full data set to be stored in the memory and are not appropriate for real-time network traffic. To overcome these shortcomings, Very Fast Decision Tree (VFDT algorithm has been proposed in the past that can handle high speed streaming data efficiently. Whilst considering the data generated by WBAN sensors, noise is an obvious aspect that severely affects the accuracy and increases false alarms. In this paper, an enhanced VFDT (EVFDT is proposed to efficiently detect the occurrence of DDoS attack in cloud-assisted WBAN. EVFDT uses an adaptive tie-breaking threshold for node splitting. To resolve the tree size expansion under extreme noise, a lightweight iterative pruning technique is proposed. To analyze the performance of EVFDT, four metrics are evaluated: classification accuracy, tree size, time, and memory. Simulation results show that EVFDT attains significantly high detection accuracy with fewer false alarms.

  18. Link-layer Jamming Attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    2004-01-01

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  19. Link-layer jamming attacks on S-MAC

    NARCIS (Netherlands)

    Law, Y.W.; Hartel, Pieter H.; den Hartog, Jeremy; Havinga, Paul J.M.

    We argue that among denial-of-service (DoS) attacks, link-layer jamming is a more attractive option to attackers than radio jamming is. By exploiting the semantics of the link-layer protocol (aka MAC protocol), an attacker can achieve better efficiency than blindly jamming the radio signals alone.

  20. An Adaptive Approach for Defending against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Muhai Li

    2010-01-01

    Full Text Available In various network attacks, the Distributed Denial-of-Service (DDoS attack is a severe threat. In order to deal with this kind of attack in time, it is necessary to establish a special type of defense system to change strategy dynamically against attacks. In this paper, we introduce an adaptive approach, which is used for defending against DDoS attacks, based on normal traffic analysis. The approach can check DDoS attacks and adaptively adjust its configurations according to the network condition and attack severity. In order to insure the common users to visit the victim server that is being attacked, we provide a nonlinear traffic control formula for the system. Our simulation test indicates that the nonlinear control approach can prevent the malicious attack packets effectively while making legitimate traffic flows arrive at the victim.

  1. Success: Richard Dyer on Diana Ross [and Beyond

    NARCIS (Netherlands)

    Kooijman, J.

    2016-01-01

    In June 1982, film scholar Richard Dyer published a two-page essay on African-American star Diana Ross in the journal Marxism Today. Part of Dyer’s essay focuses on the American conception of success and specifically on how Ross is one of the few black artists who has been "allowed" to be such a

  2. Reading 'blackface': A (narrative) introduction to Richard Kearney's ...

    African Journals Online (AJOL)

    Prominent Irish philosopher Richard Kearney's notion of 'carnal hermeneutics' is introduced by applying it to a case study of a recent event that took place at one of South Africa's university campuses. The narrative assists in illuminating some of the core principles of carnal hermeneutics and illustrates the applicability of ...

  3. To Have Been a Student of Richard Feynman

    Indian Academy of Sciences (India)

    Excerpt from Most of the Good Stuff: Memories of Richard Feynman, 1993, ... of Feynman, but while it inspired us to try for originality after we left Cornell, it also lowered our productivity to a point that at times was dangerous to our academic careers. In truth .... (However, my actual thesis topic turned out to be a different one.).

  4. Koht, kust tagasi ei tulda / Mark Jenkins ; fotod Cory Richards

    Index Scriptorium Estoniae

    Jenkins, Mark

    2015-01-01

    National Geographicu ekspeditsiooni, mille koosseisu kuulusid Renan Ozturk, Mark Jenkins, Cory Richards, Emily Harrington ja Kilaree O'Neill, püüdlustest tõusta Kagu-Aasia kõrgeima mäe Hkakabo Razi tippu ning mõõta selle täpset kõrgust GPS-i abil

  5. Whatever Happened to Richard Reid's List of First Programming Languages?

    Science.gov (United States)

    Siegfried, Robert M.; Greco, Daniel M.; Miceli, Nicholas G.; Siegfried, Jason P.

    2012-01-01

    Throughout the 1990s, Richard Reid of Michigan State University maintained a list showing the first programming language used in introductory programming courses taken by computer science and information systems majors; it was updated for several years afterwards by Frances Van Scoy of West Virginia University. However, it has been 5 years since…

  6. In memoriam: Richard (Rick) G. Harrison—benefactor for ...

    Indian Academy of Sciences (India)

    Professor Richard Harrison (1946–2016), a most influential evolutionary biologist of ... were profoundly important in my development as a scientist and a person. ... observations to infer his love of family, but I am going to risk correction by those ...

  7. Obituary: Eugene Richard Tomer, 1932-2007

    Science.gov (United States)

    Dunkl, Charles F.

    2009-01-01

    Dr. Eugene R. Tomer passed away on 2 July 2007 at his home in San Francisco, California. The cause of death was cancer. Tomer was a consulting applied mathematician with a wide range of interests in dynamical astronomy, electromagnetic theory for use in communications, and computational methods of applied mathematics. He was a member of AAS, and the Society for Applied and Industrial Mathematics [SIAM]. With K. H. Prendergast, he co-wrote the influential paper "Self-consistent Models of Elliptical Galaxies," published in the Astronomical Journal 75 (1970), 674-679. This paper has been cited over eighty times. Tomer was born on 13 June 1932. He earned the Ph.D. in Mathematics at the University of California-Berkeley in 1978 (title of dissertation: On the C*-algebra of the Hermite Operator). In 1996 he and A. F. Peterson wrote "Meeting the Challenges Presented by Computational Electromagnetics," a publication of the Naval Postgraduate School at Monterey, California. This writer met Eugene at the 1992 Annual SIAM meeting in Los Angeles in connection with the Activity Group on Orthogonal Polynomials and Special Functions, which the writer chaired at the time. Eugene volunteered to edit the Newsletter of the group, which he did from July 1992 to July 1995. Thanks to his skills and efforts, the Newsletter became a carefully edited, professional publication. Eugene not only organized a Problems Column, attracting questions in pure and applied mathematics, but he also designed the logo for the group. He gave much time and effort to this service, in an era when copy had to be physically assembled and mailed to SIAM Headquarters. Eventually he felt he had done what he could for the Activity Group. He told me that he hoped the Group would get seriously involved with applications such as in astronomy, physics, and sciences that use special function solutions of differential equations. During Tomer's editorship, we communicated mostly by e-mail, our homes being far apart. He

  8. Web server attack analyzer

    OpenAIRE

    Mižišin, Michal

    2013-01-01

    Web server attack analyzer - Abstract The goal of this work was to create prototype of analyzer of injection flaws attacks on web server. Proposed solution combines capabilities of web application firewall and web server log analyzer. Analysis is based on configurable signatures defined by regular expressions. This paper begins with summary of web attacks, followed by detection techniques analysis on web servers, description and justification of selected implementation. In the end are charact...

  9. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  10. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  11. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  12. Situational awareness of a coordinated cyber attack

    Science.gov (United States)

    Sudit, Moises; Stotz, Adam; Holender, Michael

    2005-03-01

    As technology continues to advance, services and capabilities become computerized, and an ever increasing amount of business is conducted electronically the threat of cyber attacks gets compounded by the complexity of such attacks and the criticality of the information which must be secured. A new age of virtual warfare has dawned in which seconds can differentiate between the protection of vital information and/or services and a malicious attacker attaining their goal. In this paper we present a novel approach in the real-time detection of multistage coordinated cyber attacks and the promising initial testing results we have obtained. We introduce INFERD (INformation Fusion Engine for Real-time Decision-making), an adaptable information fusion engine which performs fusion at levels zero, one, and two to provide real-time situational assessment and its application to the cyber domain in the ECCARS (Event Correlation for Cyber Attack Recognition System) system. The advantages to our approach are fourfold: (1) The complexity of the attacks which we consider, (2) the level of abstraction in which the analyst interacts with the attack scenarios, (3) the speed at which the information fusion is presented and performed, and (4) our disregard for ad-hoc rules or a priori parameters.

  13. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available various ATM's throughout South Africa. Two criminals, Motsoane and Masoleng, were arrested in February 2012 and both sentenced to 15 years in jail [36, 37]. 3.10 2013: IOL DDoS Anonymous Africa claimed responsibility for launching a Distributed Denial... of Service (DDoS) attack on the Independent Newspaper web site iol.co.za. The attack was in response to claims that the IOL group supports Zimbabwean president Robert Mugabe. The following taunt was sent to boast about the attack: “IOL bad boys bad boys...

  14. Obituary: Richard L. (Dick) Walker, Jr., 1938-2005

    Science.gov (United States)

    Pier, Jeffrey R.; Mason, Brian

    2005-12-01

    Dick Walker, 67, died 30 March 2005 in Flagstaff, AZ, following a long illness. He was born on 9 March 1938 in Hampton, Iowa and grew up in Waterloo, Iowa. As a child, Dick was fascinated with astronomy and built his own telescope. He saved his pennies and bought and read every book on the subject he could find. He also raised pigeons, naming four of them Hertzsprung, Hoyle, Gamow, and Kron. In 1957, the year Sputnik was launched, Dick began his college studies at the University of Northern Iowa in Cedar Falls. In 1959, he transferred to the State University of Iowa (subsequently renamed the University of Iowa) in Iowa City, where he earned a BA degree in astronomy and physics in 1963. He joined the staff of the U.S. Naval Observatory in Washington, DC, where he worked in the Time Service Division for a year before his assignment to the Astrometry and Astrophysics Division. Dick relocated to Flagstaff, AZ, in 1966 to continue his Naval Observatory service at the Flagstaff Station. His retirement in May 1999, ended a thirty-six-year career with USNO. Dick was first and foremost an observational astronomer. From the mid 1960s through the late 1970s, much of Dick's time was devoted to the measurement of binary stars, observing with the 12-inch and 26-inch refractors in Washington and later the 40-inch and 61-inch reflectors in Flagstaff. He also made many trips to Lick Observatory to work with the 36-inch Clark Refractor there. During this time he consulted with Charles Worley, who was observing on the 26-inch, to make sure time was well-spent examining doubles that could not be observed in Washington. This period of observing overlapped with the early years of speckle interferometry, and Dick's observations, made with the largest telescope used for micrometry at the time, were very important for ascertaining the veracity of this new technique. He was a studious and very careful observer of doubles and made over 8,000 measures, resulting in almost 3,000 mean positions

  15. Astronomical fire: Richard Carrington and the solar flare of 1859.

    Science.gov (United States)

    Clark, Stuart

    2007-09-01

    An explosion on the Sun in 1859, serendipitously witnessed by amateur astronomer Richard Carrington, plunged telegraphic communications into chaos and bathed two thirds of the Earth's skies in aurorae. Explaining what happened to the Sun and how it could affect Earth, 93 million miles away, helped change the direction of astronomy. From being concerned principally with charting the stars to aid navigation, astronomers became increasingly concerned with what the celestial objects were, how they behaved and how they might affect life on Earth.

  16. Drawings of fossils by Robert Hooke and Richard Waller

    Science.gov (United States)

    Kusukawa, Sachiko

    2013-01-01

    The drawings of fossils by Robert Hooke and Richard Waller that were the basis of the engravings in Hooke's Posthumous works (1705) are published here for the first time. The drawings show that both Hooke and Waller were proficient draftsmen with a keen eye for the details of petrified objects. These drawings provided Hooke with a polemic edge in making the case for the organic origins of ‘figured stones’.

  17. Richard Carwardine and Jay Sexton, eds., The Global Lincoln.

    Directory of Open Access Journals (Sweden)

    Hans Krabbendam

    2012-06-01

    Full Text Available Most countries have their export heroes that transcend their national origin: India has its Ghandi, South Africa its Mandela, England its Churchill, and the US has Abraham Lincoln. While particularly known for his role in the American Civil War, he has developed into an international beacon for liberalism and democracy, especially for nationals deprived of this liberties.This collection of essays, edited by Corpus Christi College (Oxford, UK colleagues Richard Carwardine and Jay Sexton, puts...

  18. When Richard Branson wants to build his own facility

    International Nuclear Information System (INIS)

    Cosnard, D.

    2005-01-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  19. Historical Investigations of the Richard B. Russell Multiple Resource Area.

    Science.gov (United States)

    1981-11-01

    period of this project as a contemporary c~lebration and a reiteration of an ancient folk construction, Stonehenge . Appropriately, as this document goes to...55, 56m, 59m, 64m, 65-68, 71- Stonehenge 216 72, 75-76, 79-84, 84m, 91, 94- Sutch, Richard 20 95, 100, lOlm, 102, 103, 121m, Swift, James Y. 195 126

  20. Response to Richard Widdess: Music, Meaning and Culture

    Directory of Open Access Journals (Sweden)

    Jerome Lewis

    2012-09-01

    Full Text Available This commentary discusses the anthropological implications of Richard Widess’ paper by summarizing some anthropological approaches to music, especially focusing on the way musical participation inculcates and transmits an aesthetic orientation that guides action across cultural domains such as politics, economics and religion. The paper ends by suggesting that the heart of human culture is more likely to be an aesthetic orientation than a script or set of rules, and traces out some reasons why music does this so well.

  1. Richard Wright, Toni Morrison, and United States book clubs

    Directory of Open Access Journals (Sweden)

    Mark Madigan

    2004-12-01

    Full Text Available This essay focuses on the influence of commercial book clubs in the United States. It will examine the country's oldest commercial book club, the Book-of-the-Month Club (BOMC, Oprah's Book Club (OBC, which bears the name of its founder, television personality Oprah Winfrey, and their roles in the careers of two African-American authors, Richard Wright and Toni Morrison.

  2. Validation Method of a Telecommunications Blackout Attack

    National Research Council Canada - National Science Library

    Amado, Joao; Nunes, Paulo

    2005-01-01

    ..., and to obtain the maximum disruptive effect over the services. The proposed method uses a top-down approach, starting on the service level and ending on the different network elements that can be identified in the end as the targets for the attack.

  3. Plants under dual attack

    NARCIS (Netherlands)

    Ponzio, C.A.M.

    2016-01-01

    Though immobile, plants are members of complex environments, and are under constant threat from a wide range of attackers, which includes organisms such as insect herbivores or plant pathogens. Plants have developed sophisticated defenses against these attackers, and include chemical responses

  4. Heart attack - discharge

    Science.gov (United States)

    ... and lifestyle Cholesterol - drug treatment Controlling your high blood pressure Deep vein thrombosis - discharge Dietary fats explained Fast food tips Heart attack - discharge Heart attack - what to ask your doctor Heart bypass ... pacemaker - discharge High blood pressure - what to ask your doctor How to read ...

  5. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  6. When Richard Branson wants to build his own facility; Quand Richard Branson veut construire son propre complexe

    Energy Technology Data Exchange (ETDEWEB)

    Cosnard, D

    2005-10-01

    The capacity of petroleum refineries is today insufficient to meet the demand. In front of this shortage, Sir Richard Branson, the owner of Virgin Atlantic Airways, has decided to invest in the building of a refinery in Europe or in Canada. His new company, Virgin Oil, is already launched. However, the setting up of a new facility is very expensive and raises important problems of permits and public contestation which remain to be solved. Short paper. (J.S.)

  7. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.; Shamma, Jeff S.; Stuber, Gordon L.

    2014-01-01

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart

  8. PREFACE: Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer Celebrating 20 years of Journal of Physics: Condensed Matter—in honour of Richard Palmer

    Science.gov (United States)

    Ferry, David; Dowben, Peter; Inglesfield, John

    2009-11-01

    we go into the future. The Executive Board decided to do this special issue, both to commemorate the 20th year of Journal of Physics: Condensed Matter and to honour Richard for his long years of service to IOP Publishing and Journal of Physics: Condensed Matter. This issue is dedicated to Richard for his many years of work and friendship with the journal board that has seen a great many changes over the years. This issue covers a very wide range of topics, since we approached all current and past members of the various boards of Journal of Physics: Condensed Matter in seeking papers for this special issue. The response has been very positive and this will be one of our larger special issues. The desire to honour Richard is widespread among these various boards, so that we have been almost overwhelmed with submissions, although many who wished to contribute could not because of other obligations. We hope that you, the readership, will enjoy these articles.

  9. Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks

    Directory of Open Access Journals (Sweden)

    Željko Gavrić

    2018-01-01

    Full Text Available Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks – the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results.

  10. Playing Attack and Defense with Trusted Storage

    DEFF Research Database (Denmark)

    Gonzalez, Javier; Bonnet, Philippe; Bouganim, Luc

    2014-01-01

    It is often convenient to assume in a data management platform that one or several computing devices are trusted, specially when the goal is to provide privacy guarantees over personal data. But what does it take for a computing device to be trusted? More specifically, how can a personal device...... provide trusted storage? This is the question we tackle in this demonstration. We describe how secure devices, equipped with a trusted execution environment, differ from general purpose devices. We illustrate with our demonstration scenario, that it is much more difficult to attack a storage service...... running on a secure device, than to attack the same service running on a general purpose device....

  11. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  12. Unreliability and the Animal Narrator in Richard Adams’s The Plague Dogs

    Directory of Open Access Journals (Sweden)

    Anja Höing

    2017-03-01

    Full Text Available Richard Adams’s talking animal story The Plague Dogs (1978, with its deeply genre-atypical mode of narration, offers a multiplicity of avenues to explore the literary animal as animal. The story draws much of its power from the psychological complexity and related unreliability of both canine narrators, two research lab escapees gone feral. Both the terrier Snitter and the black mongrel Rowf are mentally ill and experience a highly subjective, part-fantastic world. In episodes of zero focalization, a sarcastic voice comments on the plot from the off, aggressively attacking a thoroughly anthropocentric superstructure the protagonists themselves are oblivious of, and presenting all that is normally constructed as “rational” in the implied reader’s world as a carnivalesque farce. Combining these equally unreliable narratives, The Plague Dogs creates a unique mixture of what Phelan (2007 calls “estranging” and “bonding” unreliability and brings to light the devastating consequences of anthropocentrism. The Plague Dogs not only defamiliarizes a genre usually committed to conventional means of storytelling, but the dominant Western conception of the status of animals in the world, showing that once we start to read the animal as animal, this sets into motion an avalanche of other concepts in need of re-reading, among them the very ones making up the fundamental pillars of Western societies’ anthropocentric self-conception.

  13. Richard Rorty:From Anti-metaphysical Neo-Pragmatism to Rejection of Philosophy

    Directory of Open Access Journals (Sweden)

    M. Akrami

    2010-01-01

    Full Text Available Richard Rorty is a neo-Pragmatist philosopher. For three decades, he has attacked the traditional philosophy (from Plato to Kant as well as any other epistemology searching for truth or claiming to mirror the nature in his philosophical works. Rorty holds that, according to the history of philosophy in his reading, there is no final answer to the traditional questions concerning knowledge, truth, and representation. These questions, therefore, should be dissolved and denied. He maintains that knowledge is justified belief, justification, however, being not the consequence of some correspondence between the theory or the statement, but the consequence of conversation, social practice, group consensus, and social solidarity. Rorty also thinks that democracy has priority on philosophy, disagreeing with the thesis that philosophy is the foundation of the rest of culture.Despite of usefulness of some elements and implications of Rorty’s metaphilosophy (such as his emphasis on freedom, democracy, and pluralism as well as his insisting on philosophical humility and avoiding scientific pride, it is faced with several problems, including 1 ignoring the referential and realist features of language, 2 confusing interpretation and reality, 3 eliminating the border between objectivity and subjectivity, 4 interfering of public and private life, and 5 ignoring the need of science, culture, technology and, in particular, politics, in philosophy. The authors try to show and analyze some elements of these problems.

  14. Review of Richard Bausch, Hello to the Cannibals

    Directory of Open Access Journals (Sweden)

    Géraldine Chouard

    2006-03-01

    Full Text Available Richard Bausch is credited with five collections of short stories and nine novels that have received various awards in the United States. His latest work, Hello to the Cannibals, blends a historical epic and a more intimate tale. Watch out‑this is a voracious novel.Other CarnageAn ethnologist investigating cannibalistic rites in Africa asks the head of the tribe : « Do you still have cannibals in your tribe ? » « No, we ate the last one yesterday, » answers the head of the tribe. Undoubtedly,...

  15. Richard H. Thaler: Wirtschaftsnobelpreisträger 2017

    OpenAIRE

    Bruttel, Lisa Verena; Stolley, Florian

    2017-01-01

    Der diesjährige Nobelpreisträger Richard H. Thaler ist einer breiteren Öffentlichkeit vor allem durch sein mit Cass R. Sunstein gemeinsam verfasstes Buch zum Nudging bekannt geworden. Tatsächlich hat er in den vergangenen 40 Jahren die Entwicklung der Verhaltensökonomie entscheidend mitgeprägt und vorangebracht. Thaler hat die Annahmen hinter dem Modell des Homo oeconomicus untersucht und die Abweichungen menschlichen Verhaltens von den Rationalitätsannahmen auf zwei wesentliche Ursachen zurü...

  16. [Sir William Richard Gowers: author of the "bible of neurology"].

    Science.gov (United States)

    Hirose, Genjiro

    2014-11-01

    William Richard Gowers is one of the great pioneers in neurology and the author of the well-known neurology textbook, "A Manual of Diseases of the Nervous System." His concepts of neurology are based on meticulously and carefully accumulated knowledge of history, observations, and neurological examinations of patients with various neurological diseases. He is not only a great neurologist but also a great teacher who loves teaching students and physicians through well-prepared lectures. We can glean the essence of the field of neurology through his life story and numerous writings concerning neurological diseases.

  17. "Symposium" by Richard Dawkins, Gerard 't Hooft, Alain Connes

    CERN Multimedia

    Maximilien Brice

    2004-01-01

    Richard Dawkins will speak on biology, Gerard ‘t Hooft will focus on physics, and Alain Connes will discuss mathematics. CERN scientists probe ever-deeper levels of matter and their interactions, but can we say that the patterns they see are truly fundamental? Does the universe obey the same laws throughout? Since mathematical constructions can be true in the absence of any relation to the physical world, is mathematics more fundamental than physics? Extraterrestrial life would probably look much different from that on Earth, but natural selection still be fundamental to their evolution?

  18. Richard Wollheim über die Metapher in der Malerei

    OpenAIRE

    Heinrich, Richard

    1993-01-01

    Es handelt sich um den Text eines Vortrages, den ich Jänner 1993 im Rahmen einer Vortragsreihe am Institut für Kunstgeschichte der Universität Wien gehalten habe. Er ist bisher unpubliziert und nicht redigiert. Das worüber ich spreche ist ein Artikel von Richard Wollheim mit dem Titel "Die Metapher in der Malerei". Diesen Artikel habe ich herausgegeben, gemeinsam mit meinem Kollegen Helmuth Vetter, 1991 in dem Band "Bilder der Philosophie". Ursprünglich handelt es sich um einen Vortrag, d...

  19. Richard Rorty, o la posibilidad de un etnocentrismo universal

    Directory of Open Access Journals (Sweden)

    Isabel Gamero Cabrera

    2010-04-01

    Full Text Available En el presente artículo intentaremos comprender y analizar las implicaciones actuales de dos tesis del filósofo estadounidense Richard Rorty en relación con su etnocentrismo: La expansión global del sistema democrático liberal como horizonte de su teoría política y la restricción de las creencias de importancia última a la esfera privada. Compararemos esta teoría con las aportaciones de otros dos autores: una interpretación antropológica de los juegos de lenguaje de Wittgenstein y la democracia radical de Mouffe.

  20. Free as in Freedom Richard Stallman's Crusade for Free Software

    CERN Document Server

    Williams, Sam

    2011-01-01

    Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success. Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman'

  1. The Paradox of the Public Realm in Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-12-01

    Full Text Available The concepto of the public sphere in Richard Rorty's philosophy, inherited of liberal tradition, allows be treated as a part of a game of language called democratic liberalism. One of the rules for validating a move in this game consists in taking for granted the distinction between the public and the private spheres. Richard Rorty thought that democratic liberalism did not need any foundation beyond the way to play it; its only criteria would be the game's practices, according an utopia which would allow us to make more movements in the game. That is, democratic liberalism does not require foundations, but just practices for achieving a social hioe inspired on freedom and pluralism. This kind of utopia, based upon the non-cruelty principle, would make possible an inclusive society where everyone would have a place for their own private vocabulary. In this way, Rorty would have linked freedom and solidarity. However, this language-game reveals the paradox of the link which implies the meaning of the public shere. Herein, freedom is not a sufficient condition of solidarity; hence, there is no place for social inclusion in Rorty's language game.

  2. Argument from Design in Richard Baxter's Natural Theology

    Directory of Open Access Journals (Sweden)

    Igor Koshelev

    2017-12-01

    Full Text Available The article deals with the teleological argument, or argument from design, as expounded by a famous English Protestant theologian Richard Baxter, one of the leading 17-th century English Puritans, in his work “The Reasons of the Christian Religion”. Natural theology, providing arguments for the existence of God based on reason and without appeal to the Revelation, has always played a vital role throughout the entire history of theological thought. The most popular was the so called teleological argument, or the argument from design, which stands out among all rational arguments for the existence of the Creator. It is mostly known from the “Fifth Way” of the medieval Scholastic philosopher Thomas Aquinas and a famous work “Natural Theology” by an English 19-th century theologian William Paley. The foundation for the modern research in the area was laid during the age of the Scientific Revolution of the 17th century English nature philosophers and theologians, especially Robert Boyle, who believed the teleological argument to be the key element of Natural Theology. His friend and confessor, Richard Baxter, a prominent representative of the Puritan Natural Theology, mostly known by his theological works, paved the way for Natural Theology both in his own time and the following centuries. His work was thought to be the best collection of the evidences for Christianity.

  3. Prof. Richard Mattessich at 95. His Research Methodology

    Directory of Open Access Journals (Sweden)

    Giuseppe Galassi

    2017-12-01

    Full Text Available This paper is presented as a tribute to prof. Richard Mattessich. It is written “through the eyes” of a researcher who has worked closely with him over a period of 42 years, starting attending his courses of “Income Determination Theory” and “Research Methodology” at the University of British Columbia in 1975. Among his huge scientific research and publications, I intend to underline these three major contributions: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii. The preparation of accountants for information economics by means of analytical methods; and (iii The proposition of the “onion model of reality” to distinguish different Kind of reality. Este trabajo se presenta como un tributo al profesor Richard Mattessich. Está escrito “con los ojos” de un investigador que ha trabajado estrechamente con él durante un período de 42 años, comenzando a asistir a sus cursos de " Income Determination Theory" y "Research Methodology" en la Universidad de British Columbia en 1975. Entre su investigación y publicaciones, más importantes pretendo subrayar estas tres contribuciones principales: (i Accounting metrics and other mathematical instruments which anticipated computer spreadsheet by 30 years; (ii The preparation of accountants for information economics by means of analytical methods; y (iii The proposition of the “onion model of reality” to distinguish different Kind of reality.

  4. Swearing Used in Richard Wright’s Black Boy

    Directory of Open Access Journals (Sweden)

    Giyatmi Giyatmi

    2017-07-01

    Full Text Available This research aims at finding the types of swearing expressions and linguistic forms of English swearing used in Richard Wright’s Black Boy. This is a descriptive qualitative research since it describes the phenomena of swearing used in the novel. The data of the research are all the conversations or sentences used swearing in the novel written by Richard Wright namely Black Boy as the main data source. The method of collecting data in this research is observation and teknik lanjut catat. After all the data had been collected then they are coded using the coding system such as data number/title of novel/chapter/page/data. There is no data reduction since all the data are analyzed in this research. This research used theory triangulation. Kind of swearing expressions found in this novel dealing with God and religion terms, name of  animals and plants, part of body, racial terms, stupidity terms, name of occupation, sexual terms, family terms. The linguistic forms of English swearing used in this novel are word, phrase, and clause. The swearing in the form of words consists of (1 noun referring to place, person, occupation, animal, and idea (2 verb and (3 adjective. Phrase consists of (1 noun phrase with swearing functioning as headword, modifier, and both headword and modifier, (2 adjective phrase with swearing functioning as modifier. Swearing expression is also found in the form of sentence.

  5. Review: Lyn Richards (2005. Handling Qualitative Data: A Practical Guide

    Directory of Open Access Journals (Sweden)

    Robert L. Miller

    2006-03-01

    Full Text Available Handling Qualitative Data: A Practical Guide is an introductory textbook covering all stages of qualitative research from the initial conceptualisation of a project, through data collection and analysis, to writing up. The author, Lyn RICHARDS, is a well-known developer of two key qualitative software analysis packages, NUD*IST and NVivo. While RICHARDS clearly advocates the use of qualitative analysis software, the text is "generic" and could be used in tandem with any qualitative software package. The book concentrates on practical advice about the use of software to manage and analyse qualitative data, and provides insights in these areas. The consideration of issues around team-based qualitative research is another strong point. However, due in part to its short length, the overall coverage of topics tends to be superficial. In itself, the book does not provide sufficient detailed support for a student who would like to use it as her/his main source of guidance for carrying out a qualitative research project. URN: urn:nbn:de:0114-fqs0602244

  6. Active Shooters: Is Law Enforcement Ready for a Mumbai Style Attack?

    Science.gov (United States)

    2013-09-01

    Postgraduate School and for their support while I was away from work. To Dr. Sean Malinowski , thank you for your friendship and encouragement. To Dr...shooter attacks. Lieutenant Michelle Richards is responsible for LAPD’s tactical training. Captain Sean Malinowski provided information as the in...supporting roles such as detective functions, narcotics investigations, vice investigations, etc. (S. Malinowski , personal communication, July 11

  7. A Framework for Attack-Resilient Industrial Control Systems : Attack Detection and Controller Reconfiguration

    OpenAIRE

    Paridari, Kaveh; O'Mahony, Niamh; Mady, Alie El-Din; Chabukswar, Rohan; Boubekeur, Menouer; Sandberg, Henrik

    2017-01-01

    Most existing industrial control systems (ICSs), such as building energy management systems (EMSs), were installed when potential security threats were only physical. With advances in connectivity, ICSs are now, typically, connected to communications networks and, as a result, can be accessed remotely. This extends the attack surface to include the potential for sophisticated cyber attacks, which can adversely impact ICS operation, resulting in service interruption, equipment damage, safety c...

  8. Cyber Attacks, Information Attacks, and Postmodern Warfare

    Directory of Open Access Journals (Sweden)

    Valuch Jozef

    2017-06-01

    Full Text Available The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war. Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well can only be perceived as “war” if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived “only” as a non-linear warfare (postmodern conflict, this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly a crime under national laws, unless this type of conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense.

  9. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  10. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  11. A fatal elephant attack.

    Science.gov (United States)

    Hejna, Petr; Zátopková, Lenka; Safr, Miroslav

    2012-01-01

    A rare case of an elephant attack is presented. A 44-year-old man working as an elephant keeper was attacked by a cow elephant when he tripped over a foot chain while the animal was being medically treated. The man fell down and was consequently repeatedly attacked with elephant tusks. The man sustained multiple stab injuries to both groin regions, a penetrating injury to the abdominal wall with traumatic prolapse of the loops of the small bowel, multiple defects of the mesentery, and incomplete laceration of the abdominal aorta with massive bleeding into the abdominal cavity. In addition to the penetrating injuries, the man sustained multiple rib fractures with contusion of both lungs and laceration of the right lobe of the liver, and comminuted fractures of the pelvic arch and left femoral body. The man died shortly after he had been received at the hospital. The cause of death was attributed to traumatic shock. © 2011 American Academy of Forensic Sciences.

  12. Sequential and Parallel Attack Tree Modelling

    NARCIS (Netherlands)

    Arnold, Florian; Guck, Dennis; Kumar, Rajesh; Stoelinga, Mariëlle Ida Antoinette; Koornneef, Floor; van Gulijk, Coen

    The intricacy of socio-technical systems requires a careful planning and utilisation of security resources to ensure uninterrupted, secure and reliable services. Even though many studies have been conducted to understand and model the behaviour of a potential attacker, the detection of crucial

  13. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND... issues of public importance, an attack is made upon the honesty, character, integrity, or like personal qualities of an identified person or group, the cable television system operator shall, within a reasonable...

  14. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions

    OpenAIRE

    Somani, Gaurav; Gaur, Manoj Singh; Sanghi, Dheeraj; Conti, Mauro; Buyya, Rajkumar

    2015-01-01

    Security issues related to the cloud computing are relevant to various stakeholders for an informed cloud adoption decision. Apart from data breaches, the cyber security research community is revisiting the attack space for cloud-specific solutions as these issues affect budget, resource management, and service quality. Distributed Denial of Service (DDoS) attack is one such serious attack in the cloud space. In this paper, we present developments related to DDoS attack mitigation solutions i...

  15. Naturalismo e existencialismo na teoria moral de Richard Hare

    Directory of Open Access Journals (Sweden)

    Marco Antônio Oliveira de Azevedo

    2009-08-01

    Full Text Available http://dx.doi.org/10.5007/1677-2954.2009v8n2p247 Em um artigo de 1966, Amartya Sen procurou mostrar que mesmo Richard Hare, um devoto explícitodo antinaturalismo em ética, ainda que inadvertidamente, incorreu num tipo de naturalismo que Senintitulou de existencial. Neste breve artigo, traço um resumo dessa crítica à teoria de Hare, em especial,da chamada “Lei de Hume”, a qual Sen preferiu apropriadamente intitular “Regra de Hare”. Pretendomostrar como esse tipo peculiar de “existencialismo” nos conduz, ainda que sob o possível protesto deHare e seus seguidores, a conclusões subjetivistas e relativistas sobre a moralidade.

  16. RICHARD WAGNER E O ROMANTISMO ALEMÃO

    Directory of Open Access Journals (Sweden)

    Rainer Câmara Patriota

    2015-07-01

    Full Text Available A cultura musical romântica encontra em Richard Wagner– em sua obra musical e teórica – um de seus maiores protagonistas.A rejeição da Aufklärung e a exaltação da supremacia germânica –elementos constituidores da Weltanschauung romântica alemã –caracterizam fortemente o pensamento e a atitude de Wagner frenteà vida, assumindo conotações ainda mais radicais através de seucontumaz antissemitismo. De modo que pensar Wagner por ocasiãode seu bicentenário também significa retomar uma discussão crucialsobre o romantismo alemão e suas implicações políticas eideológicas.

  17. La paradoja de lo público en Richard Rorty

    Directory of Open Access Journals (Sweden)

    Martha Palacio Avendaño

    2008-01-01

    Full Text Available El concepto de lo público en Richard Rorty, heredero de la tradición liberal, admite ser tratado como parte de un juego del lenguaje denominado liberalismo democrático. En ese sentido, una de las reglas de este juego para saber si una jugada es válida consiste en asumir la distinción entre esfera pública y privada. Richard Rorty pensó que este juego no requería fundamentación más allá de la forma de jugarlo, que el criterio en que se apoyaría estaba en las prácticas que tienen lugar dentro del mismo con arreglo a sostener una utopía que permitiera hacer cada vez más jugadas. Esto es, el liberalismo democrático no requería basarse en algo más allá de las prácticas conducentes a lograr una esperanza social alentada por la libertad en defensa del pluralismo. Su utopía liberal, guiada por el principio de la no-crueldad, haría posible una sociedad inclusiva en la que todos tuvieran espacio para su léxico privado. De este modo, Rorty habría vinculado libertad y solidaridad, pero su juego del lenguaje permite advertir la paradoja del vínculo que implicaría el sentido de lo público. Aquí, la libertad no es condición suficiente de la solidaridad, de modo que la inclusión social no tiene cabida en su juego del lenguaje.

  18. Attacker Model Lab

    OpenAIRE

    2006-01-01

    tut quiz present Tutorial Quiz Presentation Interactive Media Element This interactive tutorial the two sub-classes of computer attackers: amateurs and professionals. It provides valuable insight into the nature of necessary protection measure for information assets. CS3600 Information Assurance: Introduction to Computer Security Course

  19. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... major stroke. It's important to call 9-1-1 immediately for any stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2018, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this ...

  20. Temporal Cyber Attack Detection.

    Energy Technology Data Exchange (ETDEWEB)

    Ingram, Joey Burton [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Draelos, Timothy J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Galiardi, Meghan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Doak, Justin E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-11-01

    Rigorous characterization of the performance and generalization ability of cyber defense systems is extremely difficult, making it hard to gauge uncertainty, and thus, confidence. This difficulty largely stems from a lack of labeled attack data that fully explores the potential adversarial space. Currently, performance of cyber defense systems is typically evaluated in a qualitative manner by manually inspecting the results of the system on live data and adjusting as needed. Additionally, machine learning has shown promise in deriving models that automatically learn indicators of compromise that are more robust than analyst-derived detectors. However, to generate these models, most algorithms require large amounts of labeled data (i.e., examples of attacks). Algorithms that do not require annotated data to derive models are similarly at a disadvantage, because labeled data is still necessary when evaluating performance. In this work, we explore the use of temporal generative models to learn cyber attack graph representations and automatically generate data for experimentation and evaluation. Training and evaluating cyber systems and machine learning models requires significant, annotated data, which is typically collected and labeled by hand for one-off experiments. Automatically generating such data helps derive/evaluate detection models and ensures reproducibility of results. Experimentally, we demonstrate the efficacy of generative sequence analysis techniques on learning the structure of attack graphs, based on a realistic example. These derived models can then be used to generate more data. Additionally, we provide a roadmap for future research efforts in this area.

  1. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  2. Blocking of Brute Force Attack

    OpenAIRE

    M.Venkata Krishna Reddy

    2012-01-01

    A common threat Web developers face is a password-guessing attack known as a brute-force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. If your Web site requires user authentication, you are a good target for a brute-force attack. An attacker can always discover a password through a brute-force attack, but the downside is that it co...

  3. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  4. 78 FR 43093 - Richard C. Theuer; Filing of Food Additive Petition and Citizen Petition

    Science.gov (United States)

    2013-07-19

    ... [Docket Nos. FDA-2013-F-0700 and FDA-2013-P-0472] Richard C. Theuer; Filing of Food Additive Petition and... proposing that the food additive regulations be amended to prohibit the use of carrageenan and salts of... that Richard C. Theuer, Ph.D., 7904 Sutterton Ct., Raleigh, NC 27615, has filed a food additive...

  5. 76 FR 10936 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Serra Drawing: A...

    Science.gov (United States)

    2011-02-28

    ... DEPARTMENT OF STATE [Public Notice: 7348] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Serra Drawing: A Retrospective'' SUMMARY: Notice is hereby given of the following... objects to be included in the exhibition ``Richard Serra Drawing: A Retrospective,'' imported from abroad...

  6. Travelling wave solutions for the Richards equation incorporating non-equilibrium effects in the capillarity pressure

    NARCIS (Netherlands)

    van Duijn, C. J.; Mitra, K.; Pop, I. S.

    2018-01-01

    The Richards equation is a mathematical model for unsaturated flow through porous media. This paper considers an extension of the Richards equation, where non-equilibrium effects like hysteresis and dynamic capillarity are incorporated in the relationship that relates the water pressure and the

  7. H.E. Mr Richard J. Fredericks, Ambassador of the United States of America to Switzerland

    CERN Document Server

    Patrice Loïez

    2001-01-01

    Photo 01 : Prof. L. Maiani, CERN Director-General, gives a piece of LHC super conducting wire to H.E. Mr. Richard J. Fredericks; Photo 02 : Prof. L. Maiani, CERN Director-General, Mr. Jan van der Boon, CERN Director of Administration and H.E. Mr. J. Richard Fredericks

  8. W. Richard Scott, Institutions and Organizations: Ideas, Interests, and Identities

    DEFF Research Database (Denmark)

    Jakobsen, Michael

    2014-01-01

    Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp.......Book review of: W. Richard Scott: Institutions and Organizations: Ideas, Interests, and Identities. 4th edition. Thousand Oaks, CA: SAGE Publications, 2014. xiii, 345 pp....

  9. Attacks on Bluetooth Security Architecture and Its Countermeasures

    Science.gov (United States)

    Iqbal, Mian Muhammad Waseem; Kausar, Firdous; Wahla, Muhammad Arif

    WPANs compliment the traditional IEEE 802.11 wireless networks by facilitating the clients with flexibility in network topologies, higher mobility and relaxed configuration/hardware requirements. Bluetooth, a WPAN technology, is an open standard for short-range radio frequency (RF) communication. However, it is also susceptible to typical security threats found in wireless LANs. This paper discuses some of the attack scenarios against the bluetooth network such as hostile intrusion, active Man-in-the-Middle (MITM) attack using unit key and various forms of denial of service (DoS) attacks. These threats and attacks compromise the confidentiality and availability of bluetooth data and services. This paper proposes an improved security architecture for bluetooth device which provides protection against the above mentioned attacks.

  10. Modeling attacking of high skills volleyball players

    Directory of Open Access Journals (Sweden)

    Vladimir Gamaliy

    2014-12-01

    Full Text Available Purpose: to determine the model indicators of technical and tactical actions in the attack highly skilled volleyball players. Material and Methods: the study used statistical data of major international competitions: Olympic Games – 2012 World Championships – 2010, World League – 2010–2014 European Championship – 2010–2014. A total of 130 analyzed games. Methods were used: analysis and generalization of scientific and methodological literature, analysis of competitive activity highly skilled volleyball players, teacher observation, modeling technical and tactical actions in attacking highly skilled volleyball players. Results: it was found that the largest volume application of technical and tactical actions in the attack belongs to the group tactics «supple movement», whose indicator is 21,3%. The smallest amount of application belongs to the group tactics «flight level» model whose indicators is 5,4%, the efficiency of 3,4%, respectively. It is found that the power service in the jump from model parameters used in 51,6% of cases, the planning targets – 21,7% and 4,4% planning to reduce. Attacks performed with the back line, on model parameters used in the amount of 20,8% efficiency –13,7%. Conclusions: we prove that the performance of technical and tactical actions in the attack can be used as model in the control system of training and competitive process highly skilled volleyball players

  11. Automated Discovery of Mimicry Attacks

    National Research Council Canada - National Science Library

    Giffin, Jonathon T; Jha, Somesh; Miller, Barton P

    2006-01-01

    .... These systems are useful only if they detect actual attacks. Previous research developed manually-constructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model...

  12. Heart Attack Symptoms in Women

    Science.gov (United States)

    ... fat, cholesterol and other substances (plaque). Watch an animation of a heart attack . Many women think the ... Support Network Popular Articles 1 Understanding Blood Pressure Readings 2 Sodium and Salt 3 Heart Attack Symptoms ...

  13. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  14. Blood, politics, and social science. Richard Titmuss and the Institute of Economic Affairs, 1957-1973.

    Science.gov (United States)

    Fontaine, Philippe

    2002-09-01

    Long before his last book, The Gift Relationship: From Human Blood to Social Policy, was published in early 1971, Richard M. Titmuss (1907-1973), a professor of social administration at the London School of Economics, had been a major figure in the debates over the welfare state. The Gift Relationship was the culmination of an eventful relationship with the Institute of Economic Affairs, a think tank that advocated the extension of rational pricing to social services. By arguing that the British system of blood procurement and distribution, based on free giving within the National Health Service, was more efficient than the partly commercialized American system, Titmuss intended to signal the dangers of the increasing commercialization of society. What made for the impact of his book, however, was not merely its argument that transfusion-transmitted infections were much more common with paid than with voluntary donors, but also its reflections on what it is that holds a society together. And here Titmuss argued that a "socialist" social policy, by encouraging the sense of community, played a central role. The eclecticism of Titmuss's work, together with its strong ethical and political flavor, makes it a rich and original account of the "social" at a time when heated debated over social policy, both in Britain and in the United States, raised the question of the division of labor among the social sciences.

  15. Transcendence, Taxis, Trust: Richard Kearney and Jacques Derrida

    Directory of Open Access Journals (Sweden)

    Ulrich Schmiedel

    2017-03-01

    Full Text Available Whatever else it takes to drive a taxi, it takes trust. Day after day, the driver has to decide whether the other is or is not trustworthy. I take the taxi as a test case to analyze and assess Richard Kearney’s diacritical hermeneutics of the other. I argue that Kearney functionalizes the concept of transcendence in order to connect the transcendence of the finite other to the transcendence of the infinite other. However, in his central critique of the deconstructionists following Jacques Derrida, Kearney counters his connection. While Kearney’s critique of Derrida’s account of absolute alterity is correct and compelling, I argue that Derrida’s critique of a distinction between the trustworthy other and the non-trustworthy other might be more crucial than Kearney contends. Insisting on openness to the other’s otherness, Derrida provokes any hermeneutic of the other to trust in transcendence. The taxi is taken as a test to illustrate the implications which diacritical and deconstructive drivers might have for evaluating the entanglement of ethics and eschatology—inside and outside the taxi.

  16. Forjando nuestras democracias: entre Richard Rorty y Vladimiro Montesinos

    Directory of Open Access Journals (Sweden)

    Miguel Giusti

    2001-07-01

    Full Text Available This article aims at explaining the recent history of Peru, in an exercise in which it is possible to extract lessons about the way Latin American democracies have been(or have not been forged. The text draws a parallel between the ideas developed by Richard Rorty in his recently published book, Forjar nuestro país. El pensamiento de izquierdas en los Estados Unidos del siglo XX, and the events in Fugimori's and Montesinos' Peru. If, according to what Rorty believes, "national pride is for the countries what self esteem is for individuals ... " how would it be possible to narrate a history in which there are few motives to be proud of? Trying to escape fatalism and sarcasm, the text tries to show that Montesino's political course is, symbolically, a summary of the decomposition process of Peruvian democracy. Secondly, the text analyses the movements of the political left wing and deals with the support the regimen received from inside and outside the country, a support that was largely based on the illusion of political stability. Finally, it states, as Rorty does, that in order to forge democracies it is necessary for us to be deeply committed to the defense of the State of Right.

  17. Juvenile Cosmology; Or Richard Powers’ Post-Global Doughnut

    Directory of Open Access Journals (Sweden)

    Judith Roof

    2010-02-01

    Full Text Available Le roman de Richard Powers, Operation Wandering Soul (1993, présente le lien subtil qui associe un mondialisme déjà usé et vieillissant à l’enfant perçu comme catégorie dominante. Comme les faces serpentines d’un ruban de Möbius lové autour de l’illimité et de l’intemporel, le texte, tendu entre ses deux infinis – l’univers et l’enfant – révise la portée, la conception, la structure et le style du genre romanesque. Délaissant Aristote pour Einstein, Operation Wandering Soul se place sur le terrain de la cosmologie. Le récit, qui rassemble la kyrielle des grands ralliements juvéniles et leurs vains pèlerinages, concentre l’espace-temps dans une présentation qui évoque la « somme des histoires » de Richard Feynman. La contraction de l’espace-temps opérée par le roman ne fait pas de celui-ci un hymne simpliste au global (catégorie déjà aussi datée que celle des malheureux vétérans du Vietnam, mais capte au contraire la conscience grandissante d’une existence sans origine qui s’étend à perte de vue au-delà de ses coordonnées supposées. Le roman s’enroule sur lui-même tout en s’épanchant au dehors, boucle ses cadres et ses détours tout en desserrant leur emprise. Il fait tourner la roue de ses récits comme des planètes en rotation, la ronde d’un système solaire, le tourbillon d’une galaxie. La conscience que présente Operation Wandering Soul ne se résume donc pas au seul point de vue de l’âme errante qu’est le personnage de Kraft, mais consiste en la somme de tous les temps et de tous les lieux, de leurs strates accumulées comme une conscience en acte, complexe et tissée de réseaux, qui n’appartient à personne et est partagée par tous. Cette accumulation organise le jeu des perspectives multiples qui instaurent l’acte de lecture et sont instaurées par lui. À cet égard, lire constitue ici une physique des oubliés.Richard Powers’ novel Operation Wandering

  18. PolyRES: A polygon-based Richards equation solver

    International Nuclear Information System (INIS)

    Hills, R.G.

    1995-12-01

    This document describes the theory, implementation, and use of a software package designed to solve the transient, two-dimensional, Richards equation for water flow in unsaturated-saturated soils. This package was specifically designed to model complex geometries with minimal input from the user and to simulate groundwater flow related to assessment of low-level radioactive waste disposal sites and engineered facilities. The spatial variation of the hydraulic properties can be defined across individual polygon-shaped subdomains, called objects. These objects combine to form a polygon-shaped model domain. Each object can have its own distribution of hydraulic parameters. The resulting model domain and polygon-shaped internal objects are mapped onto a rectangular, finite-volume, computational grid by a preprocessor. This allows the user to specify model geometry independently of the underlying grid and greatly simplifies user input for complex geometries. In addition, this approach significantly reduces the computational requirements since complex geometries are actually modeled on a rectangular grid. This results in well-structured, finite difference-like systems of equations that require minimal storage and are very efficient to solve. The documentation for this software package includes a user's manual, a detailed description of the underlying theory, and a detailed discussion of program flow. Several example problems are presented that show the use and features of the software package. The water flow predictions for several of these example problems are compared to those of another algorithm to test for prediction equivalency

  19. [Richard Koch's life in national socialism and in Soviet emigration].

    Science.gov (United States)

    Boltres, Daniela; Töpfer, Frank; Wiesing, Urban

    2006-01-01

    The Jewish historian and theorist of medicine, Richard Koch, teaching in Frankfurt/Main, fled in 1936 from National Socialist Germany to the USSR where he lived in the Caucasian spa Essentuki until his death in 1949. Here he worked as a doctor and continued his scientific work, especially on the foundations of medicine in natural philosophy. None of his works of this time were published. Koch was a scientific outsider in the USSR, and he was aware of this. However, he tried to make his views compatible with official doctrines. In 1947 he lost his employment at the medical clinic of Essentuki, and his material situation grew worse. It is still an open question whether this development was related to an increasingly anti-Jewish atmosphere in the USSR that was linked with the Stalinist "purges", as Koch himself appeared to believe. Before his flight from Germany Koch did not show any tendency towards communism or the political left at all. His attitude towards Soviet society and Stalin was mixed: cautious criticism was accompanied by strong expressions of commitment to Stalin and Koch's new Socialist home. The question to what extent Koch's comments showed his true convictions must remain without a definite answer. At least in part they can be understood as precautions in threatening circumstances. The opportunity of a remigration to Germany after 1945, however, was turned down by Koch.

  20. Perception of Leitmotives in Richard Wagner's Der Ring des Nibelungen

    Directory of Open Access Journals (Sweden)

    David J. Baker

    2017-05-01

    Full Text Available The music of Richard Wagner tends to generate very diverse judgments indicative of the complex relationship between listeners and the sophisticated musical structures in Wagner's music. This paper presents findings from two listening experiments using the music from Wagner's Der Ring des Nibelungen that explores musical as well as individual listener parameters to better understand how listeners are able to hear leitmotives, a compositional device closely associated with Wagner's music. Results confirm findings from a previous experiment showing that specific expertise with Wagner's music can account for a greater portion of the variance in an individual's ability to recognize and remember musical material compared to measures of generic musical training. Results also explore how acoustical distance of the leitmotives affects memory recognition using a chroma similarity measure. In addition, we show how characteristics of the compositional structure of the leitmotives contributes to their salience and memorability. A final model is then presented that accounts for the aforementioned individual differences factors, as well as parameters of musical surface and structure. Our results suggest that that future work in music perception may consider both individual differences variables beyond musical training, as well as symbolic features and audio commonly used in music information retrieval in order to build robust models of musical perception and cognition.

  1. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  2. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud; Nieuwenhuis, Lambert J.M.

    2017-01-01

    Distributed denial of service (DDoS) attacks are responsible for creating unavailability of online resources. Botnets based on internet of things (IOT) devices are now being used to conduct DDoS attacks. The estimation of direct and indirect economic damages caused by these attacks is a complex

  3. Analysing the Impact of a DDoS Attack Announcement on Victim Stock Prices

    NARCIS (Netherlands)

    Abhishta,; Joosten, Reinoud A.M.G.; Nieuwenhuis, Lambertus Johannes Maria

    2017-01-01

    DDoS attacks are increasingly used by 'hackers' and 'hacktivists' for various purposes. A number of on-line tools are available to launch an attack of significant intensity. These attacks lead to a variety of losses at the victim's end. We analyse the impact of Distributed Denial-of-Service (DDoS)

  4. A statistical and distributed packet filter against DDoS attacks in ...

    Indian Academy of Sciences (India)

    VIKASH C PANDEY

    2018-03-14

    Mar 14, 2018 ... Distributed Denial of Service (DDoS) attacks are a serious threat to Cloud. These attacks ... packet filtering model is proposed against DDoS attacks in Cloud. The key idea of this .... generates alerts or logs. If a deviation from ...

  5. Detecting SYN flood attacks via statistical monitoring charts: A comparative study

    KAUST Repository

    Bouyeddou, Benamar; Harrou, Fouzi; Sun, Ying; Kadri, Benamar

    2017-01-01

    Accurate detection of cyber-attacks plays a central role in safeguarding computer networks and information systems. This paper addresses the problem of detecting SYN flood attacks, which are the most popular Denial of Service (DoS) attacks. Here, we

  6. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  7. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  8. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  9. Failed Mothers, Monster Sons. Reading Shakespeare’S Richard Iii as a Fairy Tale

    Directory of Open Access Journals (Sweden)

    Percec Dana

    2014-03-01

    Full Text Available The paper looks at Shakespeare’s historical play Richard III and its fairy tale-like character given by the configuration of the main character as an arch-villain and the presence of motifs and patterns typically associated with the fairy tale genre. More specifically, it considers the mother-son relationship between the Duchess of York and Richard in the light of the motif of monstrous birth. It is not a coincidence that the emergence of such motifs coincides with the historical contexts of the early modern period. Reading Richard III in this key is related to the revisionist approach to chronicle plays.

  10. Stand diameter distribution modelling and prediction based on Richards function.

    Directory of Open Access Journals (Sweden)

    Ai-guo Duan

    Full Text Available The objective of this study was to introduce application of the Richards equation on modelling and prediction of stand diameter distribution. The long-term repeated measurement data sets, consisted of 309 diameter frequency distributions from Chinese fir (Cunninghamia lanceolata plantations in the southern China, were used. Also, 150 stands were used as fitting data, the other 159 stands were used for testing. Nonlinear regression method (NRM or maximum likelihood estimates method (MLEM were applied to estimate the parameters of models, and the parameter prediction method (PPM and parameter recovery method (PRM were used to predict the diameter distributions of unknown stands. Four main conclusions were obtained: (1 R distribution presented a more accurate simulation than three-parametric Weibull function; (2 the parameters p, q and r of R distribution proved to be its scale, location and shape parameters, and have a deep relationship with stand characteristics, which means the parameters of R distribution have good theoretical interpretation; (3 the ordinate of inflection point of R distribution has significant relativity with its skewness and kurtosis, and the fitted main distribution range for the cumulative diameter distribution of Chinese fir plantations was 0.4∼0.6; (4 the goodness-of-fit test showed diameter distributions of unknown stands can be well estimated by applying R distribution based on PRM or the combination of PPM and PRM under the condition that only quadratic mean DBH or plus stand age are known, and the non-rejection rates were near 80%, which are higher than the 72.33% non-rejection rate of three-parametric Weibull function based on the combination of PPM and PRM.

  11. AD-1 with research pilot Richard E. Gray

    Science.gov (United States)

    1982-01-01

    Standing in front of the AD-1 Oblique Wing research aircraft is research pilot Richard E. Gray. Richard E. Gray joined National Aeronautics and Space Administration's Johnson Space Center, Houston, Texas, in November 1978, as an aerospace research pilot. In November 1981, Dick joined the NASA's Ames-Dryden Flight Research Facility, Edwards, California, as a research pilot. Dick was a former Co-op at the NASA Flight Research Center (a previous name of the Ames-Dryden Flight Research Facility), serving as an Operations Engineer. At Ames-Dryden, Dick was a pilot for the F-14 Aileron Rudder Interconnect Program, AD-1 Oblique Wing Research Aircraft, F-8 Digital Fly-By-Wire and Pilot Induced Oscillations investigations. He also flew the F-104, T-37, and the F-15. On November 8, 1982, Gray was fatally injured in a T-37 jet aircraft while making a pilot proficiency flight. Dick graduated with a Bachelors degree in Aeronautical Engineering from San Jose State University in 1969. He joined the U.S. Navy in July 1969, becoming a Naval Aviator in January 1971, when he was assigned to F-4 Phantoms at Naval Air Station (NAS) Miramar, California. In 1972, he flew 48 combat missions in Vietnam in F-4s with VF-111 aboard the USS Coral Sea. After making a second cruise in 1973, Dick was assigned to Air Test and Evaluation Squadron Four (VX-4) at NAS Point Mugu, California, as a project pilot on various operational test and evaluation programs. In November 1978, Dick retired from the Navy and joined NASA's Johnson Space Center. At JSC Gray served as chief project pilot on the WB-57F high-altitude research projects and as the prime television chase pilot in a T-38 for the landing portion of the Space Shuttle orbital flight tests. Dick had over 3,000 hours in more than 30 types of aircraft, an airline transport rating, and 252 carrier arrested landings. He was a member of the Society of Experimental Test Pilots serving on the Board of Directors as Southwest Section Technical Adviser in

  12. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  13. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  14. Richard Kelly: Pioneirismo na iluminação da arquitetura moderna

    Directory of Open Access Journals (Sweden)

    Fernanda Brito Bandeira

    2018-04-01

    Full Text Available Livros resenhado: NEUMANN, Dietrich; STERN, Robert A. M. The structure of light: Richard Kelly and the illumination of modern architecture. New York: Yale University Press, 2010, 214 p. ISBN: 978-0-300-16370-4

  15. Providing the physical basis of SCS curve number method and its proportionality relationship from Richards' equation

    Science.gov (United States)

    Hooshyar, M.; Wang, D.

    2016-12-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: 1) the soil is saturated at the land surface; and 2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  16. Vulnerability of water supply systems to cyber-physical attacks

    Science.gov (United States)

    Galelli, Stefano; Taormina, Riccardo; Tippenhauer, Nils; Salomons, Elad; Ostfeld, Avi

    2016-04-01

    The adoption of smart meters, distributed sensor networks and industrial control systems has largely improved the level of service provided by modern water supply systems. Yet, the progressive computerization exposes these critical infrastructures to cyber-physical attacks, which are generally aimed at stealing critical information (cyber-espionage) or causing service disruption (denial-of-service). Recent statistics show that water and power utilities are undergoing frequent attacks - such as the December power outage in Ukraine - , attracting the interest of operators and security agencies. Taking the security of Water Distribution Networks (WDNs) as domain of study, our work seeks to characterize the vulnerability of WDNs to cyber-physical attacks, so as to conceive adequate defense mechanisms. We extend the functionality of EPANET, which models hydraulic and water quality processes in pressurized pipe networks, to include a cyber layer vulnerable to repeated attacks. Simulation results on a medium-scale network show that several hydraulic actuators (valves and pumps, for example) can be easily attacked, causing both service disruption - i.e., water spillage and loss of pressure - and structural damages - e.g., pipes burst. Our work highlights the need for adequate countermeasures, such as attacks detection and reactive control systems.

  17. Cyber Attacks and Combat Behavior

    Directory of Open Access Journals (Sweden)

    Carataș Maria Alina

    2017-01-01

    Full Text Available Cyber terrorism is an intangible danger, a real over the corner threat in the life of individuals,organizations, and governments and is getting harder to deal with its damages. The motivations forthe cyber-attacks are different, depending on the terrorist group, from cybercrime to hacktivism,attacks over the authorities’ servers. Organizations constantly need to find new ways ofstrengthening protection against cyber-attacks, assess their cyber readiness, expand the resiliencecapacity and adopts international security regulations.

  18. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  19. Novel Method For Low-Rate Ddos Attack Detection

    Science.gov (United States)

    Chistokhodova, A. A.; Sidorov, I. D.

    2018-05-01

    The relevance of the work is associated with an increasing number of advanced types of DDoS attacks, in particular, low-rate HTTP-flood. Last year, the power and complexity of such attacks increased significantly. The article is devoted to the analysis of DDoS attacks detecting methods and their modifications with the purpose of increasing the accuracy of DDoS attack detection. The article details low-rate attacks features in comparison with conventional DDoS attacks. During the analysis, significant shortcomings of the available method for detecting low-rate DDoS attacks were found. Thus, the result of the study is an informal description of a new method for detecting low-rate denial-of-service attacks. The architecture of the stand for approbation of the method is developed. At the current stage of the study, it is possible to improve the efficiency of an already existing method by using a classifier with memory, as well as additional information.

  20. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  1. VTAC: virtual terrain assisted impact assessment for cyber attacks

    Science.gov (United States)

    Argauer, Brian J.; Yang, Shanchieh J.

    2008-03-01

    Overwhelming intrusion alerts have made timely response to network security breaches a difficult task. Correlating alerts to produce a higher level view of intrusion state of a network, thus, becomes an essential element in network defense. This work proposes to analyze correlated or grouped alerts and determine their 'impact' to services and users of the network. A network is modeled as 'virtual terrain' where cyber attacks maneuver. Overlaying correlated attack tracks on virtual terrain exhibits the vulnerabilities exploited by each track and the relationships between them and different network entities. The proposed impact assessment algorithm utilizes the graph-based virtual terrain model and combines assessments of damages caused by the attacks. The combined impact scores allow to identify severely damaged network services and affected users. Several scenarios are examined to demonstrate the uses of the proposed Virtual Terrain Assisted Impact Assessment for Cyber Attacks (VTAC).

  2. Crony Attack: Strategic Attack’s Silver Bullet

    Science.gov (United States)

    2006-11-01

    physical assets or financial assets. The form of crony attack that most closely resembles classic strategic attack is to deny, degrade, or destroy a money...February 1951. Reprinted in Airpower Studies Coursebook , Air Command and Staff College, Maxwell AFB, AL, 2002, 152–58. Hirsch, Michael. “NATO’s Game of

  3. Establishing an Effective Combat Strategy for Prevalent Cyber- Attacks

    OpenAIRE

    Vivian Ogochukwu Nwaocha; Inyiama H.C.

    2011-01-01

    As organisations continue to incorporate the Internet as a key component of their operations, the global cyber-threat level is increasing. One of the most common types of cyber-threats is known as the Distributed Denial of Service (DDoS) attack – an attack preventing users from accessing a system for a period of time. Recent DDoS attacks have left large corporate and government networks inaccessible to customers, partners and users for hours or days, resulting in significant financial, reputa...

  4. AMC Model for Denial of Sleep Attack Detection

    OpenAIRE

    Bhattasali, Tapalina; Chaki, Rituparna

    2012-01-01

    Due to deployment in hostile environment, wireless sensor network is vulnerable to various attacks. Exhausted sensor nodes in sensor network become a challenging issue because it disrupts the normal connectivity of the network. Affected nodes give rise to denial of service that resists to get the objective of sensor network in real life. A mathematical model based on Absorbing Markov Chain (AMC)is proposed for Denial of Sleep attack detection in sensor network. In this mechanism, whether sens...

  5. Thinking through war: the social thought of Richard T. Ely, John R. Commons, and Edward A. Ross during the First World War.

    Science.gov (United States)

    Herzberg, D L

    2001-01-01

    This paper examines the social thought of University of Wisconsin professors Richard T. Ely, John R. Commons, and Edward A. Ross during World War I. Like many of their fellow scholars, these three were actively involved in the pro-war effort. Although their support for the war was strongly conditioned by personal and occupational considerations, the impact of their wartime service was not restricted to those realms. Their social thought, which they impressed into service explaining and justifying the war, was itself altered in subtle and sometimes surprising ways by the forceful positions they took on the political, economic, and racial significance of the conflict. Copyright 2001 John Wiley & Sons, Inc.

  6. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.; Shamma, Jeff S.; Stuber, Gordon L.

    2015-01-01

    communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel

  7. Invisible Trojan-horse attack

    DEFF Research Database (Denmark)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin

    2017-01-01

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance...

  8. When Sinuses Attack! (For Kids)

    Science.gov (United States)

    ... First Aid & Safety Doctors & Hospitals Videos Recipes for Kids Kids site Sitio para niños How the Body Works ... Search English Español When Sinuses Attack! KidsHealth / For Kids / When Sinuses Attack! What's in this article? What ...

  9. On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Wei Gao

    2014-03-01

    Full Text Available Industrial control system communication networks are vulnerable to reconnaissance, response injection, command injection, and denial of service attacks.  Such attacks can lead to an inability to monitor and control industrial control systems and can ultimately lead to system failure. This can result in financial loss for control system operators and economic and safety issues for the citizens who use these services.  This paper describes a set of 28 cyber attacks against industrial control systems which use the MODBUS application layer network protocol. The paper also describes a set of standalone and state based intrusion detection system rules which can be used to detect cyber attacks and to store evidence of attacks for post incident analysis. All attacks described in this paper were validated in a laboratory environment. The detection rate of the intrusion detection system rules presented by attack class is also presented.

  10. Research About Attacks Over Cloud Environment

    Directory of Open Access Journals (Sweden)

    Li Jie

    2017-01-01

    Full Text Available Cloud computing is expected to continue expanding in the next few years and people will start to see some of the following benefits in their real lives. Security of cloud computing environments is the set of control-based technologies and policies absolute to adhere regulatory compliance rules and protect information data applications and infrastructure related with cloud use. In this paper we suggest a model to estimating the cloud computing security and test the services provided to users. The simulator NG-Cloud Next Generation Secure Cloud Storage is used and modified to administer the proposed model. This implementation achieved security functions potential attacks as defined in the proposed model. Finally we also solve some attacks over cloud computing to provide the security and safety of the cloud.

  11. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  12. Metrics for Assessment of Smart Grid Data Integrity Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  13. Studies on sulfate attack: Mechanisms, test methods, and modeling

    Science.gov (United States)

    Santhanam, Manu

    concentration of the solution were seen to change the rate and mechanism of the attack in both sodium and magnesium sulfate solutions. The test results from these experiments were used to generate models for prediction of physical properties such as expansion and mass change, which could be used either for service life predictions, or for designing more reliable laboratory tests. Lastly, mechanisms for the attack by sodium and magnesium sulfate were proposed, based on the observations in the various studies. These mechanisms were able to simplify the understanding of the sulfate attack phenomenon.

  14. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  15. Shark Attack Project - Marine Attack at Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Adrianus J

    2005-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  16. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  17. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  18. Forensics Investigation of Web Application Security Attacks

    OpenAIRE

    Amor Lazzez; Thabet Slimani

    2015-01-01

    Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the sec...

  19. Viral haemorrhagic fevers in South Africa | Richards | South African ...

    African Journals Online (AJOL)

    As has been demonstrated during the Ebola virus disease outbreak in West Africa, the consequences of VHFs are not limited to specific countries – they may become epidemic, and may have considerable economic impact and disrupt local public health and social service structures. Intensive public health intervention is ...

  20. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  1. Trochanteric fractures. Classification and mechanical stability in McLaughlin, Ender and Richard osteosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Herrlin, K.; Stroemberg, T.; Lidgren, L.; Walloee, A.; Pettersson, H.

    Four hundred and thirty trochanteric factures operated upon with McLaughlin, Ender or Richard's osteosynthesis were divided into 6 different types based on their radiographic appearance before and immediately after reposition with special reference to the medial cortical support. A significant correlation was found between the fracture type and subsequent mechanical complications where types 1 and 2 gave less, and types 4 and 5 more complications. A comparison of the various osteosyntheses showed that Richard's had significantly fewer complications than either the Ender or McLaughlin types. For Richard's osteosynthesis alone no correlation to fracture type could be made because of the small number of complications in this group.

  2. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  3. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. Panic Attacks and Panic Disorder

    Science.gov (United States)

    ... Major changes in your life, such as a divorce or the addition of a baby Smoking or ... quality of life. Complications that panic attacks may cause or be linked to include: Development of specific ...

  5. Genetic attack on neural cryptography

    International Nuclear Information System (INIS)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-01-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size

  6. Genetic attack on neural cryptography

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  7. What Is a Heart Attack?

    Science.gov (United States)

    ... medical center. Support from family and friends also can help relieve stress and anxiety. Let your loved ones know how you feel and what they can do to help you. Risk of a Repeat Heart Attack Once ...

  8. Software-based Microarchitectural Attacks

    OpenAIRE

    Gruss, Daniel

    2017-01-01

    Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leakage even persists across all common isolation boundaries, such as processes, containers, and virtual ...

  9. OPERATION COBRA. Deliberate Attack, Exploitation

    Science.gov (United States)

    1984-05-25

    to attack Sens, then continue to Troyes , on the Seine River. CCA was in the north, crossing the Loing River at Souppes against light resistance and...advanced from Troyes and prepared positions close to Sens. Under strong artillery support, a task force from CCA (TF Oden) attacked the enemy frontally...movement towards the Seine River on 24 August with an advance toward Troyes . Facing the combat command were what remained of the 51st SS Brigade, light

  10. Contagion in cybersecurity attacks

    OpenAIRE

    Baldwin, Adrian; Gheyas, Iffat; Ioannidis, Christos; Pym, David; Willams, Julian

    2017-01-01

    Systems security is essential for the efficient operation of all organizations. Indeed, most large firms employ a designated ‘Chief Information Security Officer’ to coordinate the operational aspects of the organization’s information security. Part of this role is in planning investment responses to information security threats against the firm’s corporate network infrastructure. To this end, we develop and estimate a vector equation system of threats to 10 important IP services, using indust...

  11. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Xiaohui [ORNL; Beaver, Justin M [ORNL; Treadwell, Jim N [ORNL

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  12. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error......-prone and impracticable for large systems. Nonetheless, the automated generation of attack trees has only been explored in connection to computer networks and levering rich models, whose analysis typically leads to an exponential blow-up of the state space. We propose a static analysis approach where attack trees...... are automatically inferred from a process algebraic specification in a syntax-directed fashion, encompassing a great many application domains and avoiding incurring systematically an exponential explosion. Moreover, we show how the standard propositional denotation of an attack tree can be used to phrase...

  13. Quasi-constitutional change without intent : A response to Richard Albert

    NARCIS (Netherlands)

    Passchier, Reijer

    2017-01-01

    Recently, Buffalo Law Review published Richard Albert’s article on “quasi-constitutional amendments.” These are, in Albert’s words, “sub-constitutional changes that do not possess the same legal status as a constitutional amendment, that are formally susceptible to statutory repeal or revision, but

  14. Ripples from a Passing Ship: Memories; and a Legacy of Richard Peters

    Science.gov (United States)

    Harris, Kevin

    2013-01-01

    This paper outlines aspects and dimensions of my "relationship" with Richard Peters from 1966 onward. The underlying suggestion is that, while Peters' contribution to philosophy of education was undeniably of major proportions, both that contribution and his legacy are institutional rather than substantive. (Contains 15 notes.)

  15. Racial Shame and the Pleasure of Transformation: Richard Rodriguez's Queer Aesthetics of Assimilation

    Science.gov (United States)

    Beltran, Cristina

    2012-01-01

    This essay analyzes Latino conservative thought by rethinking the logics of assimilation through a simultaneous exploration of aesthetic possibility and negative affect. Focusing on the writings of Richard Rodriguez, the essay considers how creative forms of self-individuation and political agency cannot easily be decoupled from negative forms of…

  16. Richard Rorty's Conception of Philosophy of Education Revisited

    Science.gov (United States)

    Noaparast, Khosrow Bagheri

    2014-01-01

    In this essay Khosrow Bagheri Noaparast argues that, by focusing on acculturation and edification, Richard Rorty has provided a promising view for education because without acculturation, education turns into a destructive endeavor, and without edification, education risks the danger of being repetitive and reproductive. However, Rorty's view…

  17. Richard Wright's Thematic Treatment of Women in "Uncle Tom's Children,""Black Boy," and "Native Son."

    Science.gov (United States)

    Brewton, Butler E.

    Richard Wright's literary work emphasizes a contrast between black women and white women. Although both are "givers" to black boys, the nature of what they give is different. The black woman gives physical life, feeds it, and protects it at the expense of spiritual or creative vitality. Her goal is to survive bodily, to breathe, to have…

  18. Understanding Richard Wright's "Black Boy": A Student Casebook to Issues, Sources, and Historical Documents.

    Science.gov (United States)

    Felgar, Robert

    In "Black Boy," Richard Wright triumphs over an ugly, racist world by fashioning an inspiring, powerful, beautiful, and fictionalized autobiography. To help students understand and appreciate his story in the cultural, political, racial, social, and literary contexts of its time, this casebook provides primary historical documents,…

  19. Süütuse kaotamine / Richard Branson ; intervjueerinud Peter Fisk ; tõlkinud Endrik Randoja

    Index Scriptorium Estoniae

    Branson, Richard

    2009-01-01

    Turunduskirjanik Peter Fiski intervjuu Suurbritannia ärimagnaadi Sir Richard Bransoniga, milles arutletakse ettevõtja suurimate saavutuste ja suurimate pettuste üle, uuritakse Bransoni võimet juhtida oma 450 ettevõtet, tema suhtumist konkurentsi ning uutesse äriideedesse, samuti tema ajakasutust

  20. Transforming Faith: H. Richard Niebuhr and Paulo Freire on Moral Education

    Science.gov (United States)

    Daniel, Joshua Leonard

    2013-01-01

    Through a contextual comparison of the theological ethics of H. Richard Niebuhr and the educational theory of Paulo Freire, I argue that socialization, while an essential task of moral education, is an insufficient aim. The proper aim of moral education is individual development. The intention of my argument is address tendencies towards…

  1. Resisting Biopolitics through “Diaphanous Wonder”: Richard Flanagan's Gould's Book of Fish

    NARCIS (Netherlands)

    Wiese, Doro|info:eu-repo/dai/nl/304842699

    2014-01-01

    In Gould's Book of Fish (2003), author Richard Flanagan manages to invent a format in which content and style account for historical events on Sarah Island, Tasmania in the 1820s, yet he does so in a manner that is not in the least objective, disinterested or fact-orientated. The perspective of

  2. Somaesthetic Training, Aesthetics, Ethics, and the Politics of Difference in Richard Shusterman's "Body Consciousness"

    Science.gov (United States)

    Powell, Kimberly

    2010-01-01

    In this essay, the author first addresses the theme of disciplined somatic training and its relationship to self-awareness and transformation. Her attention is focused specifically on the chapter on Ludwig Wittgenstein, in which Richard Shusterman presents and then elaborates upon the philosopher's connections between conscious bodily feelings and…

  3. Astronaut Richard H. Truly in training session RMS for STS-2 bldg 9A

    Science.gov (United States)

    1981-01-01

    Astronaut Richard H. Truly in training session with the Remote Manipulator System (RMS) for STS-2 bldg 9A. Views show Truly working at the command console while watching out the windows. Karen Ehlers, an RMS procedures specialist, can be seen at left side of frame (34314); view from behind Truly as he trains at the RMS console (34315).

  4. Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus / Michel Parouty

    Index Scriptorium Estoniae

    Parouty, Michel

    1995-01-01

    Uuest heliplaadist "Strauss, Richard. Ariane a Naxos: opera seulement, integrale. Miliza Korjus (Najade). Orchestre de l'Opea l'Efat de Vienne" Arlecchino ARL 14-16, distribution Dante (3 CD: 390 F). 1935, 1944. TT: 3h 46'17"

  5. Fluid flow in porous media using image-based modelling to parametrize Richards' equation.

    Science.gov (United States)

    Cooper, L J; Daly, K R; Hallett, P D; Naveed, M; Koebernick, N; Bengough, A G; George, T S; Roose, T

    2017-11-01

    The parameters in Richards' equation are usually calculated from experimentally measured values of the soil-water characteristic curve and saturated hydraulic conductivity. The complex pore structures that often occur in porous media complicate such parametrization due to hysteresis between wetting and drying and the effects of tortuosity. Rather than estimate the parameters in Richards' equation from these indirect measurements, image-based modelling is used to investigate the relationship between the pore structure and the parameters. A three-dimensional, X-ray computed tomography image stack of a soil sample with voxel resolution of 6 μm has been used to create a computational mesh. The Cahn-Hilliard-Stokes equations for two-fluid flow, in this case water and air, were applied to this mesh and solved using the finite-element method in COMSOL Multiphysics. The upscaled parameters in Richards' equation are then obtained via homogenization. The effect on the soil-water retention curve due to three different contact angles, 0°, 20° and 60°, was also investigated. The results show that the pore structure affects the properties of the flow on the large scale, and different contact angles can change the parameters for Richards' equation.

  6. Making the Road While Walking It: A Conversation with Richard Simpson

    Science.gov (United States)

    Zabel, Robert H.; Kaff, Marilyn; Teagarden, James

    2016-01-01

    Richard Simpson is professor of special education at the University of Kansas (KU). Dr. Simpson's duties at KU have included roles of staff psychologist, teaching associate, assistant professor, project director, associate professor, professor, and chairperson for the Department of Special Education. He has directed numerous University of Kansas…

  7. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  8. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  9. 75 FR 53730 - Culturally Significant Objects Imported for Exhibition Determinations: “Richard Hawkins-Third Mind”

    Science.gov (United States)

    2010-09-01

    ... DEPARTMENT OF STATE [Public Notice 7148] Culturally Significant Objects Imported for Exhibition Determinations: ``Richard Hawkins--Third Mind'' SUMMARY: Notice is hereby given of the following determinations... the exhibition ``Richard Hawkins--Third Mind,'' imported from abroad for temporary exhibition within...

  10. Virgin Finance: Sir Richard Brandson’s pursuit of a significant presence in retail financial services

    OpenAIRE

    Batiz-Lazo, Bernardo; Kase, Kimio

    2010-01-01

    This teaching case study tells of the foundation and growth of the Virgin Group over the forty years to 2010. The creation of over 300 business interests in parts as far afield as the UK, South Africa, Australia and the USA resulted from a unique management style. Branson and the Virgin brand often associate with music (such as records and music stores) and travel (airlines, trains and booked holidays) but between August 2007 and February 2008 they were involved in a failed takeover of North...

  11. An Analysis of Attacks on Blockchain Consensus

    OpenAIRE

    Bissias, George; Levine, Brian Neil; Ozisik, A. Pinar; Andresen, Gavin

    2016-01-01

    We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacke...

  12. Deep Attack Weapons Mix Study (DAWMS) Case Study

    National Research Council Canada - National Science Library

    Bexfield, James

    2001-01-01

    .... This report describes the process used to conduct the Deep Attack Weapons Mix Study (DAWMS) in 1995-1997. This case study focuses on the weapons being procured by the Services and whether a joint viewpoint would result in a more effective mix...

  13. Technical realization of a closure concept for a chamber-system in the underground Richard repository in the Czech Republic

    International Nuclear Information System (INIS)

    Kucerka, Miroslav

    2006-01-01

    The Phare project CZ 632.02.04 'Realization of closure of a chamber in the Richard repository as input for establishing a safety case' is a follow up implementation phase of the Phare project, CZ 01.14.03 'Solution for closure of a chamber in the Richard repository'. Main objective of both projects is to propose and realize a disposal system in selected chambers of the Richard repository, which will eliminate burden from the past practices in waste management during the first phase of the Richard repository operation (1965 - 1980) and which will improve its overall long term safety. This objective will be assured by realization of the concept of so called 'hydraulic cage', which technical solution was developed by DBE Technology within the Phare project CZ 01.14.03. The solution is described in the previous presentation 'Hydraulic Cage Concept for Waste Chambers and its Technical Implementation for the Underground Richard Repository, Litomerice, Czech Republic'. (author)

  14. Recurrent spontaneous attacks of dizziness.

    Science.gov (United States)

    Lempert, Thomas

    2012-10-01

    This article describes the common causes of recurrent vertigo and dizziness that can be diagnosed largely on the basis of history. Ninety percent of spontaneous recurrent vertigo and dizziness can be explained by six disorders: (1) Ménière disease is characterized by vertigo attacks, lasting 20 minutes to several hours, with concomitant hearing loss, tinnitus, and aural fullness. Aural symptoms become permanent during the course of the disease. (2) Attacks of vestibular migraine may last anywhere from minutes to days. Most patients have a previous history of migraine headaches, and many experience migraine symptoms during the attack. (3) Vertebrobasilar TIAs affect older adults with vascular risk factors. Most attacks last less than 1 hour and are accompanied by other symptoms from the posterior circulation territory. (4) Vestibular paroxysmia is caused by vascular compression of the eighth cranial nerve. It manifests itself with brief attacks of vertigo that recur many times per day, sometimes with concomitant cochlear symptoms. (5) Orthostatic hypotension causes brief episodes of dizziness lasting seconds to a few minutes after standing up and is relieved by sitting or lying down. In older adults, it may be accompanied by supine hypertension. (6) Panic attacks usually last minutes, occur in specific situations, and are accompanied by choking, palpitations, tremor, heat, and anxiety. Less common causes of spontaneous recurrent vertigo and dizziness include perilymph fistula, superior canal dehiscence, autoimmune inner ear disease, otosclerosis, cardiac arrhythmia, and medication side effects. Neurologists need to venture into otolaryngology, internal medicine, and psychiatry to master the differential diagnosis of recurrent dizziness.

  15. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.

    2013-01-01

    Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill-Whitham- Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for some decision variable. We use this fact to pose the problem of detecting spoofing cyber-attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offline. A numerical implementation is performed on a cyber-attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © 2013 IEEE.

  16. Spoofing cyber attack detection in probe-based traffic monitoring systems using mixed integer linear programming

    KAUST Repository

    Canepa, Edward S.

    2013-09-01

    Traffic sensing systems rely more and more on user generated (insecure) data, which can pose a security risk whenever the data is used for traffic flow control. In this article, we propose a new formulation for detecting malicious data injection in traffic flow monitoring systems by using the underlying traffic flow model. The state of traffic is modeled by the Lighthill- Whitham-Richards traffic flow model, which is a first order scalar conservation law with concave flux function. Given a set of traffic flow data generated by multiple sensors of different types, we show that the constraints resulting from this partial differential equation are mixed integer linear inequalities for a specific decision variable. We use this fact to pose the problem of detecting spoofing cyber attacks in probe-based traffic flow information systems as mixed integer linear feasibility problem. The resulting framework can be used to detect spoofing attacks in real time, or to evaluate the worst-case effects of an attack offliine. A numerical implementation is performed on a cyber attack scenario involving experimental data from the Mobile Century experiment and the Mobile Millennium system currently operational in Northern California. © American Institute of Mathematical Sciences.

  17. Mitigating DDoS Attacks using OpenFlow-based Software Defined Networking

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna; Latré, Steven; Charalambides, Marinos; François, Jérôme; Schmitt, Corinna; Stiller, Burkhard

    Over the last years, Distributed Denial-of-Service (DDoS) attacks have become an increasing threat on the Internet, with recent attacks reaching traffic volumes of up to 500 Gbps. To make matters worse, web-based facilities that offer “DDoS-as-a-service‿ (i.e., Booters) allow for the layman to

  18. Depletion-of-Battery Attack: Specificity, Modelling and Analysis.

    Science.gov (United States)

    Shakhov, Vladimir; Koo, Insoo

    2018-06-06

    The emerging Internet of Things (IoT) has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  19. Depletion-of-Battery Attack: Specificity, Modelling and Analysis

    Directory of Open Access Journals (Sweden)

    Vladimir Shakhov

    2018-06-01

    Full Text Available The emerging Internet of Things (IoT has great potential; however, the societal costs of the IoT can outweigh its benefits. To unlock IoT potential, there needs to be improvement in the security of IoT applications. There are several standardization initiatives for sensor networks, which eventually converge with the Internet of Things. As sensor-based applications are deployed, security emerges as an essential requirement. One of the critical issues of wireless sensor technology is limited sensor resources, including sensor batteries. This creates a vulnerability to battery-exhausting attacks. Rapid exhaustion of sensor battery power is not only explained by intrusions, but can also be due to random failure of embedded sensor protocols. Thus, most wireless sensor applications, without tools to defend against rash battery exhausting, would be unable to function during prescribed times. In this paper, we consider a special type of threat, in which the harm is malicious depletion of sensor battery power. In contrast to the traditional denial-of-service attack, quality of service under the considered attack is not necessarily degraded. Moreover, the quality of service can increase up to the moment of the sensor set crashes. We argue that this is a distinguishing type of attack. Hence, the application of a traditional defense mechanism against this threat is not always possible. Therefore, effective methods should be developed to counter the threat. We first discuss the feasibility of rash depletion of battery power. Next, we propose a model for evaluation of energy consumption when under attack. Finally, a technique to counter the attack is discussed.

  20. LAN attack detection using Discrete Event Systems.

    Science.gov (United States)

    Hubballi, Neminath; Biswas, Santosh; Roopa, S; Ratti, Ritesh; Nandi, Sukumar

    2011-01-01

    Address Resolution Protocol (ARP) is used for determining the link layer or Medium Access Control (MAC) address of a network host, given its Internet Layer (IP) or Network Layer address. ARP is a stateless protocol and any IP-MAC pairing sent by a host is accepted without verification. This weakness in the ARP may be exploited by malicious hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in the literature to circumvent these attacks; however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose a Discrete Event System (DES) approach for Intrusion Detection System (IDS) for LAN specific attacks which do not require any extra constraint like static IP-MAC, changing the ARP etc. A DES model is built for the LAN under both a normal and compromised (i.e., spoofed request/response) situation based on the sequences of ARP related packets. Sequences of ARP events in normal and spoofed scenarios are similar thereby rendering the same DES models for both the cases. To create different ARP events under normal and spoofed conditions the proposed technique uses active ARP probing. However, this probing adds extra ARP traffic in the LAN. Following that a DES detector is built to determine from observed ARP related events, whether the LAN is operating under a normal or compromised situation. The scheme also minimizes extra ARP traffic by probing the source IP-MAC pair of only those ARP packets which are yet to be determined as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of service etc. The scheme is successfully validated in a test bed. Copyright © 2010 ISA. Published by Elsevier Ltd. All rights reserved.

  1. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  2. Detection of complex cyber attacks

    Science.gov (United States)

    Gregorio-de Souza, Ian; Berk, Vincent H.; Giani, Annarita; Bakos, George; Bates, Marion; Cybenko, George; Madory, Doug

    2006-05-01

    One significant drawback to currently available security products is their inabilty to correlate diverse sensor input. For instance, by only using network intrusion detection data, a root kit installed through a weak username-password combination may go unnoticed. Similarly, an administrator may never make the link between deteriorating response times from the database server and an attacker exfiltrating trusted data, if these facts aren't presented together. Current Security Information Management Systems (SIMS) can collect and represent diverse data but lack sufficient correlation algorithms. By using a Process Query System, we were able to quickly bring together data flowing from many sources, including NIDS, HIDS, server logs, CPU load and memory usage, etc. We constructed PQS models that describe dynamic behavior of complicated attacks and failures, allowing us to detect and differentiate simultaneous sophisticated attacks on a target network. In this paper, we discuss the benefits of implementing such a multistage cyber attack detection system using PQS. We focus on how data from multiple sources can be combined and used to detect and track comprehensive network security events that go unnoticed using conventional tools.

  3. AntibIoTic: Protecting IoT Devices Against DDoS Attacks

    DEFF Research Database (Denmark)

    De Donno, Michele; Dragoni, Nicola; Giaretta, Alberto

    2018-01-01

    The 2016 is remembered as the year that showed to the world how dangerous Distributed Denial of Service attacks can be. Gauge of the disruptiveness of DDoS attacks is the number of bots involved: the bigger the botnet, the more powerful the attack. This character, along with the increasing...... availability of connected and insecure IoT devices, makes DDoS and IoT the perfect pair for the malware industry. In this paper we present the main idea behind AntibIoTic, a palliative solution to prevent DDoS attacks perpetrated through IoT devices....

  4. Detecting SYN flood attacks via statistical monitoring charts: A comparative study

    KAUST Repository

    Bouyeddou, Benamar

    2017-12-14

    Accurate detection of cyber-attacks plays a central role in safeguarding computer networks and information systems. This paper addresses the problem of detecting SYN flood attacks, which are the most popular Denial of Service (DoS) attacks. Here, we compare the detection capacity of three commonly monitoring charts namely, a Shewhart chart, a Cumulative Sum (CUSUM) control chart and exponentially weighted moving average (EWMA) chart, in detecting SYN flood attacks. The comparison study is conducted using the publicly available benchmark datasets: the 1999 DARPA Intrusion Detection Evaluation Datasets.

  5. Heavy-tailed distribution of the SSH Brute-force attack duration in a multi-user environment

    Science.gov (United States)

    Lee, Jae-Kook; Kim, Sung-Jun; Park, Chan Yeol; Hong, Taeyoung; Chae, Huiseung

    2016-07-01

    Quite a number of cyber-attacks to be place against supercomputers that provide highperformance computing (HPC) services to public researcher. Particularly, although the secure shell protocol (SSH) brute-force attack is one of the traditional attack methods, it is still being used. Because stealth attacks that feign regular access may occur, they are even harder to detect. In this paper, we introduce methods to detect SSH brute-force attacks by analyzing the server's unsuccessful access logs and the firewall's drop events in a multi-user environment. Then, we analyze the durations of the SSH brute-force attacks that are detected by applying these methods. The results of an analysis of about 10 thousands attack source IP addresses show that the behaviors of abnormal users using SSH brute-force attacks are based on human dynamic characteristics of a typical heavy-tailed distribution.

  6. "LUDO" - Kids playing Distributed Denial of Service

    NARCIS (Netherlands)

    Steinberger, Jessica; Cardoso de Santanna, José Jair; Spatharas, E.; Amler, H.; Breuer, N.; Graul, K.; Kuhnert, B.; Piontek, U.; Sperotto, Anna; Baier, H.; Pras, Aiko; Bergström, Johan; Hórvath, Gyöngyi; Schofield, Brook

    2016-01-01

    Distributed denial of service attacks pose a serious threat to the availability of the network infrastructures and services. GE̿ANT, the pan-European network with terabit capacities witnesses close to hundreds of DDoS attacks on a daily basis. The reason is that DDoS attacks are getting larger, more

  7. SYN Flood Attack Detection in Cloud Computing using Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zerina Mašetić

    2017-11-01

    Full Text Available Cloud computing is a trending technology, as it reduces the cost of running a business. However, many companies are skeptic moving about towards cloud due to the security concerns. Based on the Cloud Security Alliance report, Denial of Service (DoS attacks are among top 12 attacks in the cloud computing. Therefore, it is important to develop a mechanism for detection and prevention of these attacks. The aim of this paper is to evaluate Support Vector Machine (SVM algorithm in creating the model for classification of DoS attacks and normal network behaviors. The study was performed in several phases: a attack simulation, b data collection, cfeature selection, and d classification. The proposedmodel achieved 100% classification accuracy with true positive rate (TPR of 100%. SVM showed outstanding performance in DoS attack detection and proves that it serves as a valuable asset in the network security area.

  8. A DoS/DDoS Attack Detection System Using Chi-Square Statistic Approach

    Directory of Open Access Journals (Sweden)

    Fang-Yie Leu

    2010-04-01

    Full Text Available Nowadays, users can easily access and download network attack tools, which often provide friendly interfaces and easily operated features, from the Internet. Therefore, even a naive hacker can also launch a large scale DoS or DDoS attack to prevent a system, i.e., the victim, from providing Internet services. In this paper, we propose an agent based intrusion detection architecture, which is a distributed detection system, to detect DoS/DDoS attacks by invoking a statistic approach that compares source IP addresses' normal and current packet statistics to discriminate whether there is a DoS/DDoS attack. It first collects all resource IPs' packet statistics so as to create their normal packet distribution. Once some IPs' current packet distribution suddenly changes, very often it is an attack. Experimental results show that this approach can effectively detect DoS/DDoS attacks.

  9. Services

    International Nuclear Information System (INIS)

    Hardeman, F.

    1998-01-01

    The objectives of the services section is (1) to offer complete services in health-physics measurements according to international quality standards, (2) to improve continuously these measurement techniques and to follow up international recommendations and legislation concerning the surveillance of workers, (3) to support and advise nuclear and non-nuclear industry on problems of radioactive contamination. Achievements related to gamma spectrometry, whole-body counting, beta and alpha spectrometry, dosimetry, radon measurements, calibration, instrumentation, and neutron activation analysis are described

  10. Resilience of LTE networks against smart jamming attacks: Wideband model

    KAUST Repository

    Aziz, Farhan M.

    2015-12-03

    LTE/LTE-A networks have been successfully providing advanced broadband services to millions of users worldwide. Lately, it has been suggested to use LTE networks for mission-critical applications like public safety, smart grid and military communications. We have previously shown that LTE networks are vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers. In this paper, we extend our previous work on resilience of LTE networks to wideband multipath fading channel, SINR estimation in frequency domain and computation of utilities based on observable parameters under the framework of single-shot and repeated games with asymmetric information. In a single-shot game formulation, network utility is severely compromised at its solutions, i.e. at the Nash Equilibria (NE). We propose evolved repeated-game strategy algorithms to combat smart jamming attacks that can be implemented in existing deployments using current technology. © 2015 IEEE.

  11. Richard III in Russian Theatre at the Twilight of the "Thaw"

    OpenAIRE

    Sokolyansky, Mark

    2007-01-01

    Richard III was very rarely staged in Russian theatre in tsarist and Stalin’s times, because the story of inhuman tyranny provoked associations with Russian political reality. In the period of the so-called “Thaw” (1954ß1964) the play became very popular in the USSR and several scenic productions of it were real events in Russian (and Soviet) theatrical life. In the essay three most original and successful performances (in Kujbyshev, Gorkij and Erevan) are discussed and compare...

  12. Missing Kettles and Too Few Toasters: The Forecasting Methodology at Morphy Richards

    OpenAIRE

    Lane, D; Hughes, D

    2002-01-01

    Faced with problems in forecasting at Morphy Richards, this research represents an investigation into their forecasting methodology following the hypothesis that the current forecasting system was no longer sufficient to ensure guaranteed supply to customers, or to enable forward planning.\\ud \\ud The purpose of the research was to identify any requirements for change within the forecasting system and to identify the ‘best practice’ within the industry. Primary research was carried out using a...

  13. Richard J. Bernstein on Ethics and Philosophy between the Linguistic and the Pragmatic Turn

    OpenAIRE

    Marchetti, Sarin

    2017-01-01

    1. In his compelling article American Pragmatism: The Conflict of Narratives, Richard Bernstein quotes a perceptive line by Alasdair MacIntyre that goes [A] tradition not only embodies the narrative of an argument, but is only recovered by an argumentative retelling of that narrative which will itself be in conflict with other argumentative retellings. Bernstein, in the essay mentioned, works through MacIntyre’s passage in order to “engage in the ‘argumentative retelling’ of a metanarrative –...

  14. Il concetto di medium artistico: Richard Wollheim interprete di Ludwig Wittgenstein

    OpenAIRE

    Maistrello, Andrea

    2016-01-01

    The aim of the dissertation is twofold: (i) analyzing the notion (well known by aestheticians, but not so intensively studied) of artistic medium; (ii) showing the relevance of such notion for aesthetics through the examination of some relevant aspects of Richard Wollheim’s philosophy of art, maybe the main figure in Anglo-American philosophy as for considering artistic medium central in art-theorizing. Artistic media, according to Wollheim, can develop only if properly connected to a cultura...

  15. Selfish memes: An update of Richard Dawkins’ bibliometric analysis of key papers in sociobiology

    OpenAIRE

    Aaen-Stockdale, Craig

    2017-01-01

    This is an Open Access journal available from http://www.mdpi.com/ In the second edition of The Selfish Gene, Richard Dawkins included a short bibliometric analysis of key papers instrumental to the sociobiological revolution, the intention of which was to support his proposal that ideas spread within a population in an epidemiological manner. In his analysis, Dawkins primarily discussed the influence of an article by British evolutionary biologist William Donald Hamilton which had introdu...

  16. Metaforos populiarojo mokslo literatūroje: Richard Dawkins knygos analizė

    OpenAIRE

    Urbanavičiūtė, Dovilė

    2017-01-01

    The following paper discusses metaphor usage in the genre of popular science. The object of this analysis is a chapter called ‘Immortal coils’ taken from Richard Dawkins’ book The Selfish Gene. The study discusses the impact of creative conceptual metaphors on the construction of the overall meaning of the text, as well as the significance of their linguistic manifestations and context. In focusing on the genre of popular science, it also makes an attempt at defining potential difficulties of...

  17. Pimping climate change: Richard Branson, global warming, and the performance of green capitalism

    OpenAIRE

    Scott Prudham

    2009-01-01

    On 21 September 2006 UK über-entrepreneur and Virgin Group Chairman Richard Branson pledged approximately £1.6 billion, the equivalent of all the profits from Virgin Atlantic and Virgin Trains for the next ten years, to fighting climate change. Since then, Branson has restated his commitment to action on global warming, including investment in technologies for sequestering carbon dioxide from the atmosphere. In this paper, I critically examine and engage with Branson’s announcements as a spec...

  18. Cryptographic Puzzles and Game Theory against DoS and DDoS attacks in Networks

    DEFF Research Database (Denmark)

    Mikalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2008-01-01

    In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In the _rst part, we describe client puzzle techniques that are based on the idea of computationally exhausting a malicious user when he attempts to launch an attack. In the ......In this chapter, we present techniques to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. In the _rst part, we describe client puzzle techniques that are based on the idea of computationally exhausting a malicious user when he attempts to launch an attack....... In the second part we are introducing some basic principles of game theory and we discuss how game theoretical frameworks can protect computer networks. Finally, we show techniques that combine client puzzles with game theory in order to provide DoS and DDoS resilience....

  19. On-Line Detection of Distributed Attacks from Space-Time Network Flow Patterns

    National Research Council Canada - National Science Library

    Baras, J. S; Cardenas, A. A; Ramezani, V

    2003-01-01

    .... The directionality of the change in a network flow is assumed to have an objective or target. The particular problem of detecting distributed denial of service attacks from distributed observations is presented as a working framework...

  20. Peacetime Use of Computer Network Attack

    National Research Council Canada - National Science Library

    Busby, Daniel

    2000-01-01

    .... PDD-63 alerts the nation to prepare for impending cyber attacks. This paper examines the nature, scale, and likelihood of cyber attacks posited in PDD-63 and finds that the country does not face an imminent "electronic Pearl Harbor...

  1. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... of this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter ... most common heart attack symptom in men and women is chest pain or discomfort. However, women also ...

  2. Robust Detection of Stepping-Stone Attacks

    National Research Council Canada - National Science Library

    He, Ting; Tong, Lang

    2006-01-01

    The detection of encrypted stepping-stone attack is considered. Besides encryption and padding, the attacker is capable of inserting chaff packets and perturbing packet timing and transmission order...

  3. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  4. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  5. Attack Graph Construction for Security Events Analysis

    Directory of Open Access Journals (Sweden)

    Andrey Alexeevich Chechulin

    2014-09-01

    Full Text Available The paper is devoted to investigation of the attack graphs construction and analysis task for a network security evaluation and real-time security event processing. Main object of this research is the attack modeling process. The paper contains the description of attack graphs building, modifying and analysis technique as well as overview of implemented prototype for network security analysis based on attack graph approach.

  6. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  7. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  8. Richard Watson.

    Science.gov (United States)

    Wright, Ian; Bevin, William

    2017-11-25

    An inspirational equine veterinary surgeon with a keen interest in racing, to whom horses were a way of life. He took much pride in the success of his homebred racehorses. British Veterinary Association.

  9. Richard Rorty

    DEFF Research Database (Denmark)

    Hjermitslev, Hans Henrik

    2016-01-01

    dekonstruktion forlod han Princeton og blev han i 1982 udnævnt til professor i humaniora ved University of Virginia. Her skrev han i 1989 sit andet hovedværk Contingency, Irony, and Solidarity, der med originale læsninger af Heidegger, Derrida, Orwell, Nabokov, Freud og andre blev modtaget med stor interesse...

  10. Mitigate DoS and DDoS attacks in Mobile Ad Hoc Networks

    DEFF Research Database (Denmark)

    Michalas, Antonis; Komninos, Nikos; Prasad, Neeli R.

    2011-01-01

    This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks...... in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly....

  11. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    Directory of Open Access Journals (Sweden)

    Marye O'Reilly-Knapp

    2015-12-01

    Full Text Available Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  12. Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine

    OpenAIRE

    Marye O'Reilly-Knapp

    2015-01-01

    Book Review of Relational Patterns, Therapeutic Presence: Concepts and practice of Integrative Psychotherapy by Richard G. Erskine. Published by Karnac Books: London, 2015 Paperback, Pages 366, ISBN 13: 978-1-78220-190-8

  13. An analytical solution of Richards' equation providing the physical basis of SCS curve number method and its proportionality relationship

    Science.gov (United States)

    Hooshyar, Milad; Wang, Dingbao

    2016-08-01

    The empirical proportionality relationship, which indicates that the ratio of cumulative surface runoff and infiltration to their corresponding potentials are equal, is the basis of the extensively used Soil Conservation Service Curve Number (SCS-CN) method. The objective of this paper is to provide the physical basis of the SCS-CN method and its proportionality hypothesis from the infiltration excess runoff generation perspective. To achieve this purpose, an analytical solution of Richards' equation is derived for ponded infiltration in shallow water table environment under the following boundary conditions: (1) the soil is saturated at the land surface; and (2) there is a no-flux boundary which moves downward. The solution is established based on the assumptions of negligible gravitational effect, constant soil water diffusivity, and hydrostatic soil moisture profile between the no-flux boundary and water table. Based on the derived analytical solution, the proportionality hypothesis is a reasonable approximation for rainfall partitioning at the early stage of ponded infiltration in areas with a shallow water table for coarse textured soils.

  14. Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers

    NARCIS (Netherlands)

    Pieters, Wolter; Davarynejad, Mohsen

    2015-01-01

    Attack trees are a well-known formalism for quantitative analysis of cyber attacks consisting of multiple steps and alternative paths. It is possible to derive properties of the overall attacks from properties of individual steps, such as cost for the attacker and probability of success. However, in

  15. Script-viruses Attacks on UNIX OS

    Directory of Open Access Journals (Sweden)

    D. M. Mikhaylov

    2010-06-01

    Full Text Available In this article attacks on UNIX OS are considered. Currently antivirus developers are concentrated on protecting systems from viruses that are most common and attack popular operating systems. If the system or its components are not often attacked then the antivirus products are not protecting these components as it is not profitable. The same situation is with script-viruses for UNIX OS as most experts consider that it is impossible for such viruses to get enough rights to attack. Nevertheless the main conclusion of this article is the fact that such viruses can be very powerful and can attack systems and get enough rights.

  16. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  17. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based......Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....

  18. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  19. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...... AES or similar algorithms in virtualized environments. This paper applies variants of this cache timing attack to Intel's latest generation of microprocessors. It enables a spy-process to recover cryptographic keys, interacting with the victim processes only over TCP. The threat model is a logically...... separated but CPU co-located attacker with root privileges. We report successful and practically verified applications of this attack against a wide range of microarchitectures, from a two-core Nehalem processor (i5-650) to two-core Haswell (i7-4600M) and four-core Skylake processors (i7-6700). The attack...

  20. Attack-Resistant Trust Metrics

    Science.gov (United States)

    Levien, Raph

    The Internet is an amazingly powerful tool for connecting people together, unmatched in human history. Yet, with that power comes great potential for spam and abuse. Trust metrics are an attempt to compute the set of which people are trustworthy and which are likely attackers. This chapter presents two specific trust metrics developed and deployed on the Advogato Website, which is a community blog for free software developers. This real-world experience demonstrates that the trust metrics fulfilled their goals, but that for good results, it is important to match the assumptions of the abstract trust metric computation to the real-world implementation.

  1. Resilience of LTE networks against smart jamming attacks

    KAUST Repository

    Aziz, Farhan M.

    2014-12-08

    Commercial LTE networks are being studied for mission-critical applications, such as public safety and smart grid communications. In this paper, LTE networks are shown vulnerable to Denial-of-Service (DOS) and loss of service attacks from smart jammers, who may employ simple narrowband jamming techniques to attack without any need to hack the network or its users. We modeled the utilities of jamming and anti-jamming actions played by the jammer and the network under the framework of single-shot and repeated Bayesian games. In a single-shot game formulation the only Nash Equilibria (NE) are pure strategy equilibria at which network utility is severely compromised. We propose a repeated-game learning and strategy algorithm for the network that outperforms single-shot games by a significant margin. Furthermore, all of our proposed actions and algorithms can be implemented with current technology.

  2. Mining known attack patterns from security-related events

    Directory of Open Access Journals (Sweden)

    Nicandro Scarabeo

    2015-10-01

    Full Text Available Managed Security Services (MSS have become an essential asset for companies to have in order to protect their infrastructure from hacking attempts such as unauthorized behaviour, denial of service (DoS, malware propagation, and anomalies. A proliferation of attacks has determined the need for installing more network probes and collecting more security-related events in order to assure the best coverage, necessary for generating incident responses. The increase in volume of data to analyse has created a demand for specific tools that automatically correlate events and gather them in pre-defined scenarios of attacks. Motivated by Above Security, a specialized company in the sector, and by National Research Council Canada (NRC, we propose a new data mining system that employs text mining techniques to dynamically relate security-related events in order to reduce analysis time, increase the quality of the reports, and automatically build correlated scenarios.

  3. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  4. Prospective Vigilance: Assessing Complex Coordinated Attack Preparedness Programs

    Science.gov (United States)

    2017-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF ACRONYMS AND ABBREVIATIONS CCA complex coordinate attack EMS emergency medical services FBI Federal Bureau...the Bombings in London on 7th July 2005, vol. HC 1087 (London: The Stationery Office, 2006), https://www.gov.uk/government/uploads/system/uploads...School Center for Homeland Defense and Security Mobile Education Team, DHS Office of Bombing Prevention, and DHS Active Shooter training. 55 NCTC, DHS

  5. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. Richard Rufus's theory of mixture: a medieval explanation of chemical combination.

    Science.gov (United States)

    Weisberg, Michael; Wood, Rega

    2003-05-01

    Richard Rufus of Cornwall offered a novel solution to the problem of mixture raised by Aristotle. The puzzle is that mixts or mixed bodies (blood, flesh, wood, etc.) seem to be unexplainable through logic, even though the world is full of them. Rufus's contribution to this long-standing theoretical debate is the development of a modal interpretation of certain Averroistic doctrines. Rufus's account, which posits that the elemental forms in a mixt are in accidental potential, avoids many of the problems that plagued non-atomistic medieval theories of mixture. This paper is an initial examination of Rufus' account.

  8. An experimental ‘Life’ for an experimental life : Richard Waller's biography of Robert Hooke (1705)

    OpenAIRE

    Moxham, Noah

    2016-01-01

    Richard Waller's ‘Life of Dr Robert Hooke’, prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting thi...

  9. Of poetics and possibility: Richard Kearney’s post-metaphysical God

    Directory of Open Access Journals (Sweden)

    Yolande Steenkamp

    2017-11-01

    Full Text Available This article provides an overview of Richard Kearney’s attempt at re-imagining God post-metaphysically. In the context of a continental dialogue on the topic, Kearney has responded to onto-theology with a hermeneutic and phenomenologically informed attempt to rethink God post-metaphysically. This eschatological understanding of God is expounded in the article and is placed in relation to Kearney’s more recent concept of Anatheism. The article closes with a few remarks on what may be gained by Kearney’s work, as well as outlining a few critical questions.

  10. Popular science - common ground. A literary critique of Richard Dawkins's The Selfish Gene

    OpenAIRE

    Nilsen, Helene

    2012-01-01

    This thesis aims to perform a literary reading of Richard Dawkins's The Selfish Gene from a perspective situated outside of the 'battle of the two cultures'. Chapter 1 takes Foucault's article What is an author?" as its point of departure. After discussing how Dawkins may be seen as a reader of Darwin, I will go on to discuss Foucault's concept of the author-function, before I move on to consider some different readings of and approaches to The Selfish Gene. With reference to a polemic bet...

  11. Diagnosis and treatment of polycystic ovary syndrome (PCOS): an interview with Richard Legro.

    Science.gov (United States)

    Legro, Richard

    2015-03-27

    In this podcast, we talk to Professor Richard Legro about the recommendations for the diagnosis and treatment of polycystic ovary syndrome (PCOS) based on clinical practice guidelines and discuss the challenges of diagnosis PCOS at specific age groups. The controversies associated with treatment of PCOS, including therapies for infertility as this is a problem commonly observed in PCOS subjects, are highlighted together with future directions on the topic. The podcast for this interview is available at. http://www.biomedcentral.com/content/supplementary/s12916-015-0299-2-s1.mp3.

  12. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    OpenAIRE

    Han, Biao; Yang, Xiangrui; Sun, Zhigang; Huang, Jinfeng; Su, Jinshu

    2018-01-01

    Distributed Denial of Service (DDoS) attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN), it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS a...

  13. Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

    Directory of Open Access Journals (Sweden)

    Tongguang Ni

    2013-01-01

    Full Text Available Distributed denial of service (DDoS attacks are one of the major threats to the current Internet, and application-layer DDoS attacks utilizing legitimate HTTP requests to overwhelm victim resources are more undetectable. Consequently, neither intrusion detection systems (IDS nor victim server can detect malicious packets. In this paper, a novel approach to detect application-layer DDoS attack is proposed based on entropy of HTTP GET requests per source IP address (HRPI. By approximating the adaptive autoregressive (AAR model, the HRPI time series is transformed into a multidimensional vector series. Then, a trained support vector machine (SVM classifier is applied to identify the attacks. The experiments with several databases are performed and results show that this approach can detect application-layer DDoS attacks effectively.

  14. 76 FR 56471 - Membership of the Senior Executive Service Standing Performance Review Boards

    Science.gov (United States)

    2011-09-13

    ... DIRECTOR, PROCUREMENT SERVICES STAFF. JORDAN, WYEVETRA APPROPRIATION LIAISON OFFICER. MORGAN, MELINDA B... ETHICS OFFICE. TOSCANO JR., RICHARD A DIRECTOR, EQUAL EMPLOYMENT OPPORTUNITY STAFF. National Drug..., APPELLATE UNIT. EVANS, STUART DEPUTY CHIEF, OPERATIONS SECTION. KAYE, JANICE A ETHICS OFFICER. KEEGAN...

  15. Toward Exposing Timing-Based Probing Attacks in Web Applications.

    Science.gov (United States)

    Mao, Jian; Chen, Yue; Shi, Futian; Jia, Yaoqi; Liang, Zhenkai

    2017-02-25

    Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users' browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  16. Toward Exposing Timing-Based Probing Attacks in Web Applications

    Directory of Open Access Journals (Sweden)

    Jian Mao

    2017-02-01

    Full Text Available Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.

  17. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  18. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  19. A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

    Directory of Open Access Journals (Sweden)

    S.Seetha

    2010-06-01

    Full Text Available Distributed Denial of service is a major threat to the availability of internet services. Due to the distributed, large scale nature of the Internet makes DDoS (Distributed Denial-of-Service attacks stealthy and difficult to counter. Defense against Distributed Denial- of -Service attacks is one of the hardest security problems on the Internet. Recently these network attacks have been increasing. Therefore more effective countermeasures are required to counter the threat. This requirement has motivated us to propose a novel mechanism against DDoS attack. This paper presents the design details of a distributed defense mechanism against DDoS attack. In our approach, the egress routers of the intermediate network coordinate with each other to provide the information necessary to detect and respond to the attack. Thus, a detection system based on single site will have either high positive or high negative rates. Unlike the traditional IDSs (Intrusion Detection System this method has the potential to achieve high true positive ratio. This work has been done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.

  20. The rudiments of an Internet-based health plan for consumers: an interview with John Danaher, MD, MBA. Interview by Richard L. Reece.

    Science.gov (United States)

    Danaher, J

    2000-01-01

    Richard L. Reece, MD, interviewed John Danaher, MD, MBA, on August 16, 2000, to discuss how his new company is preparing for the perfect storm--the looming convergence of demanding consumers, defined contributions, and Internet-based health plans. He describes how his firm is putting financial and clinical tools in the hands of consumers and physicians, so consumers can be more enlightened in their health care choices. Danaher says, "We're not about buying goods and services online. We are transforming the way consumers buy health care and seek insurance. We're trying to be a 401 k where people get on, knowing their risk profile and return horizons. We aim to motivate consumers to be proactive in making health care choices. How do we make consumers responsible and motivated enough to take control of managing their health care costs? How well we articulate this call to consumer action will be the key to our success."

  1. Leachate flow around a well in MSW landfill: Analysis of field tests using Richards model.

    Science.gov (United States)

    Slimani, R; Oxarango, L; Sbartai, B; Tinet, A-J; Olivier, F; Dias, D

    2017-05-01

    During the lifespan of a Municipal Solid Waste landfill, its leachate drainage system may get clogged. Then, as a consequence of rainfall, leachate generation and possibly leachate injection, the moisture content in the landfill increases to the point that a leachate mound could be created. Therefore, pumping the leachate becomes a necessary solution. This paper presents an original analysis of leachate pumping and injection in an instrumented well. The water table level around the well is monitored by nine piezometers which allow the leachate flow behaviour to be captured. A numerical model based on Richards equation and an exponential relationship between saturated hydraulic conductivity and depth is used to analyze the landfill response to pumping and injection. Decreasing permeability with depth appears to have a major influence on the behaviour of the leachate flow. It could have a drastic negative impact on the pumping efficiency with a maximum quasi-stationary pumping rate limited to approximately 1m 3 /h for the tested well and the radius of influence is less than 20m. The numerical model provides a reasonable description of both pumping and injection tests. However, an anomalous behaviour observed at the transition between pumping and recovery phases is observed. This could be due to a limitation of the Richards model in that it neglects the gas phase behaviour and other double porosity heterogeneous effects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Wooing-Scenes in “Richard III”: A Parody of Courtliness?

    Directory of Open Access Journals (Sweden)

    Agnieszka Stępkowska

    2009-11-01

    Full Text Available In the famous opening soliloquy of Shakespeare’s Richard III, Richard mightily voices his repugnance to “fair well-spoken days” and their “idle pleasures”. He realizes his physical deformity and believes that it sets him apart from others. He openly admits that he is “not shaped for sportive tricks, nor made to court an amorous looking-glass”. Yet, his monstrosity constitutes more perhaps of his aggressive masculine exceptionality rather than of his deformity. Richard’s bullying masculinity manifests itself in his contempt for women. In the wooing scenes we clearly see his pugnacious pursuit of power over effeminate contentment by reducing women to mere objects. Additionally, those scenes are interesting from a psychological viewpoint as they brim over with conflicting emotions. Therefore, the paper explores two wooing encounters of the play, which belong the best examples of effective persuasion and also something we may refer to as ‘the power of eloquence’.

  3. Construction of Fluid - solid Coupling Model with Improved Richards - BP & Its Engineering Application

    Science.gov (United States)

    Xie, Chengyu; Jia, Nan; Shi, Dongping; Lu, Hao

    2017-10-01

    In order to study the slurry diffusion law during grouting, Richards unsaturated-saturated model was introduced, the definition of the grouting model is clear, the Richards model control equation was established, And the BP neural network was introduced, the improved fluid-solid coupling model was constructed, Through the use of saturated - unsaturated seepage flow model, As well as the overflow boundary iterative solution of the mixed boundary conditions, the free surface is calculated. Engineering practice for an example, with the aid of multi - field coupling analysis software, the diffusion law of slurry was simulated numerically. The results show that the slurry diffusion rule is affected by grouting material, initial pressure and other factors. When the slurry starts, it flows in the cracks along the upper side of the grouting hole, when the pressure gradient is reduced to the critical pressure, that is, to the lower side of the flow, when the slurry diffusion stability, and ultimately its shape like an 8. The slurry is spread evenly from the overall point of view, from the grouting mouth toward the surrounding evenly spread, it gradually reaches saturation by non-saturation, and it is not a purely saturated flow, when the slurry spread and reach a saturated state, the diffusion time is the engineering grouting time.

  4. Gamma radiation and radon concentration levels at the radioactive waste repositories 'Richard' and 'Bratrstvi'

    International Nuclear Information System (INIS)

    Berka, Z.; Sabol, J.; Janu, M.

    1998-01-01

    Owing to the fact that cosmic rays are shielded off, the photon equivalent dose rates in the corridors of the Richard repository are usually slightly lower than outside. However, in points close to barrels containing radioactive waste, the dose rates can reach values as high as tens of μSv/h. Because of high concentrations of natural radionuclides, the dose rates in the Bratrstvi repository is generally considerably higher, as much as 5 times the normal background value. Radon concentrations exhibit specific time variations which are modified by ventilation. Where ventilation is poor or absent, the radon concentrations are extremely high, viz. up to 30 and 300 kBq/m 3 in the Richard and Bratrstvi repositories, respectively. Personal exposure of workers depend on the total time spent underground and on the ventilation rate. While the contribution from photons can be kept below the relevant limits, the radon-related doses may be significant and even exceed the professional limits if no precautions are taken. (P.A.)

  5. The 1D Richards' equation in two layered soils: a Filippov approach to treat discontinuities

    Science.gov (United States)

    Berardi, Marco; Difonzo, Fabio; Vurro, Michele; Lopez, Luciano

    2018-05-01

    The infiltration process into the soil is generally modeled by the Richards' partial differential equation (PDE). In this paper a new approach for modeling the infiltration process through the interface of two different soils is proposed, where the interface is seen as a discontinuity surface defined by suitable state variables. Thus, the original 1D Richards' PDE, enriched by a particular choice of the boundary conditions, is first approximated by means of a time semidiscretization, that is by means of the transversal method of lines (TMOL). In such a way a sequence of discontinuous initial value problems, described by a sequence of second order differential systems in the space variable, is derived. Then, Filippov theory on discontinuous dynamical systems may be applied in order to study the relevant dynamics of the problem. The numerical integration of the semidiscretized differential system will be performed by using a one-step method, which employs an event driven procedure to locate the discontinuity surface and to adequately change the vector field.

  6. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...

  7. Transient ischemic attack: diagnostic evaluation.

    Science.gov (United States)

    Messé, Steven R; Jauch, Edward C

    2008-08-01

    A transient ischemic attack portends significant risk of a stroke. Consequently, the diagnostic evaluation in the emergency department is focused on identifying high-risk causes so that preventive strategies can be implemented. The evaluation consists of a facilitated evaluation of the patient's metabolic, cardiac, and neurovascular systems. At a minimum, the following tests are recommended: fingerstick glucose level, electrolyte levels, CBC count, urinalysis, and coagulation studies; noncontrast computed tomography (CT) of the head; electrocardiography; and continuous telemetry monitoring. Vascular imaging studies, such as carotid ultrasonography, CT angiography, or magnetic resonance angiography, should be performed on an urgent basis and prioritized according to the patient's risk stratification for disease. Consideration should be given for echocardiography if no large vessel abnormality is identified.

  8. Integrating cyber attacks within fault trees

    International Nuclear Information System (INIS)

    Nai Fovino, Igor; Masera, Marcelo; De Cian, Alessio

    2009-01-01

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  9. Visualizing Risks: Icons for Information Attack Scenarios

    National Research Council Canada - National Science Library

    Hosmer, Hilary

    2000-01-01

    .... Visual attack scenarios help defenders see system ambiguities, imprecision, vulnerabilities and omissions, thus speeding up risk analysis, requirements gathering, safeguard selection, cryptographic...

  10. Classifying network attack scenarios using an ontology

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2012-03-01

    Full Text Available ) or to the target?s reputation. The Residue sub-phase refers to damage or artefacts of the attack that occur after the attack goal has been achieved, and occurs because the attacker loses control of some systems. For example after the launch of a DDOS..., A. (1995). Hacking theft of $10 million from citibank revealed. Retrieved 10/10, 2011, from http://articles.latimes.com/1995-08-19/business/fi-36656_1_citibank-system Hurley, E. (2004). SCO site succumbs to DDoS attack. Retrieved 10/10, 2011, from...

  11. Integrating cyber attacks within fault trees

    Energy Technology Data Exchange (ETDEWEB)

    Nai Fovino, Igor [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy)], E-mail: igor.nai@jrc.it; Masera, Marcelo [Joint Research Centre - EC, Institute for the Protection and Security of the Citizen, Ispra, VA (Italy); De Cian, Alessio [Department of Electrical Engineering, University di Genova, Genoa (Italy)

    2009-09-15

    In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is presented.

  12. On the effectiveness of XML schema validation for countering XML signature wrapping attacks

    DEFF Research Database (Denmark)

    Jensen, Meiko; Meyer, Christopher; Somorovsky, Juraj

    2011-01-01

    In the context of security of Web Services, the XML Signature Wrapping attack technique has lately received increasing attention. Following a broad range of real-world exploits, general interest in applicable countermeasures rises. However, few approaches for countering these attacks have been...... investigated closely enough to make any claims about their effectiveness. In this paper, we analyze the effectiveness of the specific countermeasure of XML Schema validation in terms of fending Signature Wrapping attacks. We investigate the problems of XML Schema validation for Web Services messages......, and discuss the approach of Schema Hardening, a technique for strengthening XML Schema declarations. We conclude that XML Schema validation with a hardened XML Schema is capable of fending XML Signature Wrapping attacks, but bears some pitfalls and disadvantages as well....

  13. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  14. Resistance against brute-force attacks on stateless forwarding in information centric networking

    OpenAIRE

    Alzahrani, Bander A.; Reed, Martin J.; Vassilakis, Vassilios G.

    2015-01-01

    Line Speed Publish/Subscribe Inter-networking (LIPSIN) is one of the proposed forwarding mechanisms in Information Centric Networking (ICN). It is a stateless source-routing approach based on Bloom filters. However, it has been shown that LIPSIN is vulnerable to brute-force attacks which may lead to distributed denial-of-service (DDoS) attacks and unsolicited messages. In this work, we propose a new forwarding approach that maintains the advantages of Bloom filter based forwarding while allow...

  15. Cloud-Based DDoS HTTP Attack Detection Using Covariance Matrix Approach

    Directory of Open Access Journals (Sweden)

    Abdulaziz Aborujilah

    2017-01-01

    Full Text Available In this era of technology, cloud computing technology has become essential part of the IT services used the daily life. In this regard, website hosting services are gradually moving to the cloud. This adds new valued feature to the cloud-based websites and at the same time introduces new threats for such services. DDoS attack is one such serious threat. Covariance matrix approach is used in this article to detect such attacks. The results were encouraging, according to confusion matrix and ROC descriptors.

  16. Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0

    NARCIS (Netherlands)

    Gadyatskaya, Olga; Jhawar, Ravi; Kordy, P.T.; Lounis, Karim; Mauw, Sjouke; Trujillo-Rasua, Rolando

    2016-01-01

    In this tool demonstration paper we present the ADTool2.0: an open-source software tool for design, manipulation and analysis of attack trees. The tool supports ranking of attack scenarios based on quantitative attributes entered by the user; it is scriptable; and it incorporates attack trees with

  17. The work-averse cyber attacker model : theory and evidence from two million attack signatures

    NARCIS (Netherlands)

    Allodi, L.; Massacci, F.; Williams, J.

    The typical cyber attacker is assumed to be all powerful and to exploit all possible vulnerabilities. In this paper we present, and empirically validate, a novel and more realistic attacker model. The intuition of our model is that an attacker will optimally choose whether to act and weaponize a new

  18. Attack Tree Generation by Policy Invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identi﬿cation. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identi﬿ed

  19. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  20. Drammer : Deterministic Rowhammer attacks on mobile platforms

    NARCIS (Netherlands)

    Van Der Veen, Victor; Fratantonio, Yanick; Lindorfer, Martina; Gruss, Daniel; Maurice, Clémentine; Vigna, Giovanni; Bos, Herbert; Razavi, Kaveh; Giuffrida, Cristiano

    2016-01-01

    Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks and completely subvert a system. However, existing efforts either describe probabilistic (and thus unreliable) attacks or rely on special (and often unavailable) memory management features to place victim objects

  1. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...

  2. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  3. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  4. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  5. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  6. Quantum mechanics in the cold war; Quantenmechanik im Kalten Krieg. David Bohm und Richard Feynman

    Energy Technology Data Exchange (ETDEWEB)

    Forstner, C.

    2007-07-01

    In the middle of the 20th century David Bohm and Richard Feynman developed two fundamentally different approaches of modern quantum mechanics: Bohm a realistic interpretation by means of hidden parameters and Feynman the path-integral formalism. This is by this more remarakable, because both physicists started from similar conditions and originated from similar connections. By its comparing approach this study presents more than a contribution to the history of the quantum theory. By the question for the social and cultural conditions of the formation of theories it is furthermore of science-sociological and science-theoretical interest. The in the beginning similar and later different binding of both scientists into the scientific community allows furthermore to study, which adapting pressure each group puts on the individual scientist and the fundamental parts of his research, and which new degrees of freedom in the formation of theories arise, when this constraint is cancelled.

  7. Richard Arwed Pfeifer - a pioneer of 'medical pedagogy' and an opponent of Paul Schroder.

    Science.gov (United States)

    Steinberg, Holger; Carius, Dirk; Himmerich, Hubertus

    2013-12-01

    Richard Arwed Pfeifer (1877-1957) was one of the initiators and foster fathers of the renowned child-psychiatric and special needs education workgroup at Leipzig University under Paul Schröder (1873-1941) in the 1920s and 1930s. This paper is an account of their dispute concerning the interrelations between child and adolescent psychiatry and special needs education, as well as their disagreement about whether adolescent psychopaths should be admitted to specialized child psychiatric wards or elsewhere. Moreover, Pfeifer questioned the practical relevance of the separation of constitutional and environmentally-based psychopathy and fought eugenic research, which he found incompatible with the ethics of his profession as a remedial teacher and child psychiatrist.

  8. Destruction of the Phoenix/Hibiscus and Barringtonia racemosa Communities at Richards Bay, Natal, South Africa

    Directory of Open Access Journals (Sweden)

    P. J. Weisser

    1982-10-01

    Full Text Available The destruction of the Phoenix!Hibiscus and Barringtonia racemosa Communities described by Venter in 1972 on the southern shores of Richards Bay is reported. The cause was the artificial openingof a new mouth about 5,5 km south of the original mouth, which increased tidal range and salinity. These swamp communities occupied a narrow band about 6 ha in area behind the Bruguiera gymnorrhiza Community. An estimated 95 % of the communities was affected and only on the landward border were some isolated remnants of species such as Acrostichum aureum, Hibiscus tiliaceus and Phoenix reclinata detected .Young stands of  Phragmites australis, seedlings of  Bruguiera gymnorrhiza and Avicennia marina and epipelic algae are recoIonizing the affected area.

  9. Marie-Christine Agosto. Richard Brautigan. Les fleurs de néant.

    Directory of Open Access Journals (Sweden)

    Jean-Bernard Basse

    2006-04-01

    Full Text Available Richard Brautigan, si on lui reconnaît un certain humour, est souvent associé avec condescendance au phénomène hippy et considéré comme un auteur démodé, superficiel. Celui qui écrivait dans Cahier d’un Retour de Troie : « Les mots sont des fleurs de néant » est pourtant l’un de ces écrivains que l’on pourrait qualifier de mineurs essentiels, et seuls ceux qui l’ont peu ou mal lu s’étonneront de ce que Marie-Christine Agosto ait choisi de donner comme sous-titre « Les fleurs de néant » au pet...

  10. Harmonic analysis, partial differential equations and applications in honor of Richard L. Wheeden

    CERN Document Server

    Franchi, Bruno; Lu, Guozhen; Perez, Carlos; Sawyer, Eric

    2017-01-01

    This is a collection of contributed papers by many eminent Harmonic Analysts and specialists of Partial Differential equations. The papers focus on weighted norm equalities for singular integrals, focusing wave equations, degenerate elliptic equations, Navier-Stokes flow in two dimensions and Poincare-Sobolev inequalities in the setting of metric spaces equipped with measures among others. Many topics considered in this volume stem from the interests of Richard L. Wheeden whose contributions to Potential Theory, singular integral theory and degenerate elliptic PDE theory this volume honors. Luis Caffarelli, Sagun Chanillo, Bruno Franchi, Cristian Guttierez, Xiaojun Huang, Carlos Kenig, Ermanno Lanconelli, Eric Sawyer and Alexander Volberg, are some of the many contributors to this volume. .

  11. A critical review of Richard Lynn's reports on reaction time and race.

    Science.gov (United States)

    Thomas, Drew M

    2011-01-01

    In the early 1990s, psychologist Richard Lynn published papers documenting average reaction times and decision times in samples of nine-year-olds taken from across the world. After summarizing these data, Lynn interpreted his results as evidence of national and racial differences in decision time and general intelligence. Others have also interpreted Lynn's data as evidence of racial differences in decision time and intelligence. However, comparing Lynn's summaries with his original reports shows that Lynn misreported and omitted some of his own data. Once these errors are fixed the rankings of nations in Lynn's datasets are unstable across different decision time measures. This instability, as well as within-race heterogeneity and between-race overlap in decision times, implies that Lynn's reaction time data do not permit generalizations about the decision times and intelligence of people of different races.

  12. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré , Pierre Emmanuel; Dehwah, Ahmad H.; Claudel, Christian G.; Bayen, Alexandre M.

    2011-01-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  13. Richard Wrangham. Catching fire. How cooking made us Human. Basic Books (Perseus Books Group

    Directory of Open Access Journals (Sweden)

    Claude-Marcel Hladik

    2009-11-01

    Full Text Available L’histoire de l’émergence de l’homme est remise en cause par cet ouvrage puisque jusqu’à présent la plupart des anthropologues et des paléontologues s’accordaient pour faire remonter à environ 500.000 ans les premières utilisations du feu pour la cuisson des aliments par le genre Homo. Les arguments présentés par Richard Wrangham dans son dernier ouvrage nous font remonter aux deux derniers millions d’années. Wrangham et ses collègues avaient publié, dès 1999, les résultats de fouilles au cou...

  14. Analytical and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model

    KAUST Repository

    Mazaré, Pierre Emmanuel

    2011-12-01

    In this article, we propose a computational method for solving the Lighthill-Whitham-Richards (LWR) partial differential equation (PDE) semi-analytically for arbitrary piecewise-constant initial and boundary conditions, and for arbitrary concave fundamental diagrams. With these assumptions, we show that the solution to the LWR PDE at any location and time can be computed exactly and semi-analytically for a very low computational cost using the cumulative number of vehicles formulation of the problem. We implement the proposed computational method on a representative traffic flow scenario to illustrate the exactness of the analytical solution. We also show that the proposed scheme can handle more complex scenarios including traffic lights or moving bottlenecks. The computational cost of the method is very favorable, and is compared with existing algorithms. A toolbox implementation available for public download is briefly described, and posted at http://traffic.berkeley.edu/project/downloads/lwrsolver. © 2011 Elsevier Ltd.

  15. Book review: Unholy trinity: The IMF, World Bank and WTO Richard Peet

    Directory of Open Access Journals (Sweden)

    M Breitenbach

    2014-05-01

    Full Text Available In this timely book Richard Peet and his team lay the foundation with an excellent analysis of the process of globalisation and the resultant emergence of the global economy. The authors are especially critical of the increasing influence of institutions like the International Monetary Fund (IMF, World Bank and World Trade Organisation (WTO on the economy and the consequences experienced by peoples, cultures and the environment. The single ideology of neo-liberalism is blamed for the undesirable outcomes. This book considers concepts of power, political interest, hegemony, discourse, responsibility and the power of practicality, in critically examining the IMF, World Bank and WTO. The conclusion is reached that “all three institutions play roles greatly different from those originally agreed to under the charters that set them up”.

  16. Femineidad y ficción en la obra operística de Richard Strauss

    Directory of Open Access Journals (Sweden)

    María José Sánchez Usón

    2014-01-01

    Full Text Available Tras la muerte de Wagner y Brahms, Richard Straussemergió como uno de los compositores más importantesy populares de la música del siglo XX. Su trayectoria vitaly profesional, azarosa y turbulenta, al igual que las décadasque vivió, estuvo marcada por la realidad femenina.Es innegable que las mujeres de la vida de Strauss, todasde fuerte y distintiva personalidad, dejaron en él huellastan hondas que fue necesario llevarlas a escena, no sólocomo una aportación valiosa a la tipología caracterológicafemenina, sino también como un ejercicio terapéuticopersonal. Así, mujeres reales y mujeres ficticias se confundenen sus obras en un proceso creativo único: el delhombre-artista.

  17. BACK TO THE ORIGINS OF THE REPUDIATION OF WUNDT: OSWALD KÜLPE AND RICHARD AVENARIUS.

    Science.gov (United States)

    Russo Krauss, Chiara

    2017-01-01

    This essay provides a fresh account of the break between Oswald Külpe and his master Wilhelm Wundt. Kurt Danziger's reconstruction of the "repudiation" of Wundt, which has become the canon for this significant episode of history of psychology, focused on the supposed influence of Ernst Mach on this set of events, overshadowing the other exponent of Empiriocriticism: Richard Avenarius. Analyzing archival documents and examining anew the primary sources, the paper shows that Avenarius was himself a member of Wundt's circle, and that his "repudiation" of the master paved the way for Külpe. The essay points out the original anti-Wundtian aspects of Avenarius' notion of psychology, thus showing how they were then adopted by Külpe. © 2016 Wiley Periodicals, Inc.

  18. Lucien Cuénot, Richard Goldschmidt y Miquel Crusafont Pairó

    Directory of Open Access Journals (Sweden)

    Casinos, Adrià

    2016-06-01

    Full Text Available An unpublished text, corresponding to a communication done by Crusafont Pairó is analysed. The communication is strongly critical with Cuénot’s necrology published previously by Goldschmidt, where he regrets the teleological ideas on evolution that Cuénot maintained in the last years of his life.Se analiza un texto inédito de Miquel Crusafont Pairó, correspondiente a comunicación que llevó a cabo en la Fundació Bosch i Cardellach, sobre la necrológica de Lucien Cuénot publicada por Richard Goldschmidt. La comunicación es un fuerte ataque a Goldschmidt por sus críticas a la deriva teleológica de Cuénot en los últimos años de su vida.

  19. The confused world of sulfate attack on concrete

    International Nuclear Information System (INIS)

    Neville, Adam

    2004-01-01

    External sulfate attack is not completely understood. Part I identifies the issues involved, pointing out disagreements, and distinguishes between the mere occurrence of chemical reactions of sulfates with hydrated cement paste and the damage or deterioration of concrete; only the latter are taken to represent sulfate attack. Furthermore, sulfate attack is defined as deleterious action involving sulfate ions; if the reaction is physical, then, it is physical sulfate attack that takes place. The discussion of the two forms of sulfate attack leads to a recommendation for distinct nomenclature. Sulfate attack on concrete structures in service is not widespread, and the amount of laboratory-based research seems to be disproportionately large. The mechanisms of attack by different sulfates--sodium, calcium, and magnesium--are discussed, including the issue of topochemical and through-solution reactions. The specific aspects of the action of magnesium sulfate are discussed, and the differences between laboratory conditions and field exposure are pointed out. Part II discusses the progress of sulfate attack and its manifestations. This is followed by a discussion of making sulfate-resisting concrete. One of the measures is to use Type V cement, and this topic is extensively discussed. Likewise, the influence of w/c on sulfate resistance is considered. The two parameters are not independent of one another. Moreover, the cation in the sulfate salt has a strong bearing on the efficiency of the Type V cement. Recent interpretations of the Bureau of Reclamation tests, both long term and accelerated, are evaluated, and it appears that they need reworking. Part III reviews the standards and guides for the classification of the severity of exposure of structures to sulfates and points out the lack of calibration of the various classes of exposure. A particular problem is the classification of soils because much depends on the extraction ratio of sulfate in the soil: there is a

  20. Nothing Risked, Nothing Gained: Richard Powers' Gain and the Horizon of Risk

    Directory of Open Access Journals (Sweden)

    Aaron Jaffe

    2010-02-01

    Full Text Available Cet article interprète Gain, sixième roman de Richard Powers, à la lumière du concept de « seconde modernité » proposé par le sociologue allemand Ulrich Beck. Ce concept souligne la dissémination du risque et la manière dont celle-ci invalide les marchés conclus par la « première modernité » entre l’avenir et le présent, entre l’intérieur du corps et l’extérieur. Cet article entend montrer que Beck fournit un cadre interprétatif utile à la compréhension de ces rapports, hors des impasses catégorielles que suscite l’opposition entre les deux régimes narratifs à l’œuvre dans le texte : le récit biographique, local et individuel, de la maladie de Laura Rowen Bodey, et l’histoire collective de l’entreprise Clare devenue conglomérat.This essay interprets Richard Powers' sixth novel Gain with reference to the German sociologist Ulrich Beck's concept of “second modernity.” The concept underscores the dispersal of risk and how it shreds promissory notes understood in “first modernity” between the future and present and the insides and outsides of the body. It argues that Beck supplies an apt interpretive framework for understanding these relationships and overcoming the categorical impasses between the two narrative words at work in Power's novel, the biographical situatedness of Laura Rowen Bodey's illness and the corporate history of the Clare conglomerate.

  1. Newtonian nudging for a Richards equation-based distributed hydrological model

    Science.gov (United States)

    Paniconi, Claudio; Marrocu, Marino; Putti, Mario; Verbunt, Mark

    The objective of data assimilation is to provide physically consistent estimates of spatially distributed environmental variables. In this study a relatively simple data assimilation method has been implemented in a relatively complex hydrological model. The data assimilation technique is Newtonian relaxation or nudging, in which model variables are driven towards observations by a forcing term added to the model equations. The forcing term is proportional to the difference between simulation and observation (relaxation component) and contains four-dimensional weighting functions that can incorporate prior knowledge about the spatial and temporal variability and characteristic scales of the state variable(s) being assimilated. The numerical model couples a three-dimensional finite element Richards equation solver for variably saturated porous media and a finite difference diffusion wave approximation based on digital elevation data for surface water dynamics. We describe the implementation of the data assimilation algorithm for the coupled model and report on the numerical and hydrological performance of the resulting assimilation scheme. Nudging is shown to be successful in improving the hydrological simulation results, and it introduces little computational cost, in terms of CPU and other numerical aspects of the model's behavior, in some cases even improving numerical performance compared to model runs without nudging. We also examine the sensitivity of the model to nudging term parameters including the spatio-temporal influence coefficients in the weighting functions. Overall the nudging algorithm is quite flexible, for instance in dealing with concurrent observation datasets, gridded or scattered data, and different state variables, and the implementation presented here can be readily extended to any of these features not already incorporated. Moreover the nudging code and tests can serve as a basis for implementation of more sophisticated data assimilation

  2. The NACA Exceptional Service Medal presented at the NACA High Speed Flight Station. L-R: Hugh Dryden

    Science.gov (United States)

    1956-01-01

    The NASA exceptional Service Medal presented at the NACA High Speed Flight Station. L-R: Hugh Dryden, Joe Walker (X-1A research pilot), Stan Butchart (pilot of the B-29 mothership), Richard Payne (X-1A crew chief).

  3. Kitchenette: Hell or Home? Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks%Kitchenette:Hell or Home?Different"Kitchenette"Images Created by Richard Wright and Gwendolyn Brooks

    Institute of Scientific and Technical Information of China (English)

    肖志宏

    2017-01-01

    How the southern black migrants navigate and survive the northern urban space is a question profoundly explored and realistically documented in many migration narratives in African American literature. This paper concentrates on the image of Chicago"kitchenette"in the works of Richard Wright and Gwendolyn Brooks, in an attempt to demonstrate the different inter-pretations of migrant spaces on the urban landscape.

  4. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  5. Radiological attacks and accidents. Medical consequences

    International Nuclear Information System (INIS)

    Sakuta, Hidenari

    2007-01-01

    Probability of the occurrence of radiological attacks appears to be elevated after the terrorist attacks against the United States on September 11 in 2001. There are a lot of scenarios of radiological attack: simple radiological device, radiological disperse device (RDD or dirty bomb), attacks against nuclear reactor, improvised nuclear device, and nuclear weapons. Of these, RDD attack is the most probable scenario, because it can be easily made and can generate enormous psychological and economic damages. Radiological incidents are occurring to and fro in the world, including several cases of theft to nuclear facilities and unsuccessful terrorist attacks against them. Recently, a former Russian spy has allegedly been killed using polonium-210. In addition, serious radiological accidents have occurred in Chernobyl, Goiania, and Tokai-mura. Planning, preparation, education, and training exercise appear to be essential factors to cope with radiological attacks and accidents effectively without feeling much anxiety. Triage and psychological first aid are prerequisite to manage and provide effective medial care for mass casualties without inducing panic. (author)

  6. Investigation Model for DDoS Attack Detection in Real-Time

    Directory of Open Access Journals (Sweden)

    Abdulghani Ali Ahmed

    2015-02-01

    Full Text Available Investigating traffic of distributed denial of services (DDoS attack requires extra overhead which mostly results in network performance degradation. This study proposes an investigation model for detecting DDoS attack in real-time without causing negative degradation against network performance. The model investigates network traffic in a scalable way to detect user violations on quality of service regulations. Traffic investigation is triggered only when the network is congested; at that exact moment, burst gateways actually generate a congestion notification to misbehaving users. The misbehaving users are thus further investigated by measuring their consumption ratios of bandwidth. By exceeding the service level agreement bandwidth ratio, user traffic is filtered as DDoS traffic. Simulation results demonstrate that the proposed model efficiently monitors intrusive traffic and precisely detects DDoS attack.

  7. Attacks and Intrusion Detection in Cloud Computing Using Neural Networks and Particle Swarm Optimization Algorithms

    Directory of Open Access Journals (Sweden)

    Ahmad Shokuh Saljoughi

    2018-01-01

    Full Text Available Today, cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major issues facing cloud service providers and their customers. Since cloud computing is a virtual pool of resources provided in an open environment (Internet, cloud-based services entail security risks. Detection of intrusions and attacks through unauthorized users is one of the biggest challenges for both cloud service providers and cloud users. In the present study, artificial intelligence techniques, e.g. MLP Neural Network sand particle swarm optimization algorithm, were used to detect intrusion and attacks. The methods were tested for NSL-KDD, KDD-CUP datasets. The results showed improved accuracy in detecting attacks and intrusions by unauthorized users.

  8. GA-DoSLD: Genetic Algorithm Based Denial-of-Sleep Attack Detection in WSN

    Directory of Open Access Journals (Sweden)

    Mahalakshmi Gunasekaran

    2017-01-01

    Full Text Available Denial-of-sleep (DoSL attack is a special category of denial-of-service attack that prevents the battery powered sensor nodes from going into the sleep mode, thus affecting the network performance. The existing schemes used for the DoSL attack detection do not provide an optimal energy conservation and key pairing operation. Hence, in this paper, an efficient Genetic Algorithm (GA based denial-of-sleep attack detection (GA-DoSLD algorithm is suggested for analyzing the misbehaviors of the nodes. The suggested algorithm implements a Modified-RSA (MRSA algorithm in the base station (BS for generating and distributing the key pair among the sensor nodes. Before sending/receiving the packets, the sensor nodes determine the optimal route using Ad Hoc On-Demand Distance Vector Routing (AODV protocol and then ensure the trustworthiness of the relay node using the fitness calculation. The crossover and mutation operations detect and analyze the methods that the attackers use for implementing the attack. On determining an attacker node, the BS broadcasts the blocked information to all the other sensor nodes in the network. Simulation results prove that the suggested algorithm is optimal compared to the existing algorithms such as X-MAC, ZKP, and TE2P schemes.

  9. Low-Rate DDoS Attack Detection Using Expectation of Packet Size

    Directory of Open Access Journals (Sweden)

    Lu Zhou

    2017-01-01

    Full Text Available Low-rate Distributed Denial-of-Service (low-rate DDoS attacks are a new challenge to cyberspace, as the attackers send a large amount of attack packets similar to normal traffic, to throttle legitimate flows. In this paper, we propose a measurement—expectation of packet size—that is based on the distribution difference of the packet size to distinguish two typical low-rate DDoS attacks, the constant attack and the pulsing attack, from legitimate traffic. The experimental results, obtained using a series of real datasets with different times and different tolerance factors, are presented to demonstrate the effectiveness of the proposed measurement. In addition, extensive experiments are performed to show that the proposed measurement can detect the low-rate DDoS attacks not only in the short and long terms but also for low packet rates and high packet rates. Furthermore, the false-negative rates and the adjudication distance can be adjusted based on the detection sensitivity requirements.

  10. Attacker Modelling in Ubiquitous Computing Systems

    DEFF Research Database (Denmark)

    Papini, Davide

    in with our everyday life. This future is visible to everyone nowadays: terms like smartphone, cloud, sensor, network etc. are widely known and used in our everyday life. But what about the security of such systems. Ubiquitous computing devices can be limited in terms of energy, computing power and memory...... attacker remain somehow undened and still under extensive investigation. This Thesis explores the nature of the ubiquitous attacker with a focus on how she interacts with the physical world and it denes a model that captures the abilities of the attacker. Furthermore a quantitative implementation...

  11. Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel.

    Directory of Open Access Journals (Sweden)

    Jacqueline Irene Cannata

    2012-10-01

    Full Text Available Richard J. Hill, Picturing Scotland through the Waverley Novels: Walter Scott and the Origins of the Victorian Illustrated Novel . Farnham, Surrey, and Burlington, VT: Ashgate, 2010. Pp. 236. ISBN 978-0-7546-6806-0. US$99.99.

  12. Dr. Richard J. Whelan: Seeing the Field of Emotional and Behavior Disorders through the Lens of a Pioneer

    Science.gov (United States)

    Kaff, Marilyn S.; Teagarden, Jim; Zabel, Robert H.

    2011-01-01

    Dr. Richard J. Whelan is a distinguished professor emeritus at the University of Kansas. His earliest professional experiences were at the Children's Hospital (Southard School) of the Menninger Clinic, where he served as a recreational therapist, teacher, and director of education. During his career at the University of Kansas and the KU Medical…

  13. A soil moisture accounting-procedure with a Richards' equation-based soil texture-dependent parameterization

    Science.gov (United States)

    Given a time series of potential evapotranspiration and rainfall data, there are at least two approaches for estimating vertical percolation rates. One approach involves solving Richards' equation (RE) with a plant uptake model. An alternative approach involves applying a simple soil moisture accoun...

  14. Richards Bay Mesometeorological Data – Vertical profiles of air temperature and wind velocity and surface wind statistics.

    CSIR Research Space (South Africa)

    Scholtz, MT

    1978-03-01

    Full Text Available This report details the experimental methods and data obtained in the course of a study of the movement of stable air over a complex region. The field work was carried out in the Richards Bay area on the Natal Coast during the period May to August...

  15. Muusikamaailm : Suur klaveripidu Ruhrimaal. Kissingeni festival tippudega. Sulasoli 80. aastapäev. Richard Rodgers 100 / Priit Kuusk

    Index Scriptorium Estoniae

    Kuusk, Priit, 1938-

    2002-01-01

    6. juuni-17. augustini Ruhrimaal toimuvast klaverifestivalist. Bad Kissingenis toimuvatest suvepidustustest. Soome Lauljate ja Mängijate Liit tähistab asutamise 80. aastapäeva. Helilooja Richard Rodgersi sünnist möödub 100 aastat

  16. Adaptive EWMA Method Based on Abnormal Network Traffic for LDoS Attacks

    Directory of Open Access Journals (Sweden)

    Dan Tang

    2014-01-01

    Full Text Available The low-rate denial of service (LDoS attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For their concealed performance, it is more difficult for traditional DoS detection methods to detect LDoS attacks; at the same time the accuracy of the current detection methods for LDoS attacks is relatively low. As the fact that LDoS attacks led to abnormal distribution of the ACK traffic, LDoS attacks can be detected by analyzing the distribution characteristics of ACK traffic. Then traditional EWMA algorithm which can smooth the accidental error while being the same as the exceptional mutation may cause some misjudgment; therefore a new LDoS detection method based on adaptive EWMA (AEWMA algorithm is proposed. The AEWMA algorithm which uses an adaptive weighting function instead of the constant weighting of EWMA algorithm can smooth the accidental error and retain the exceptional mutation. So AEWMA method is more beneficial than EWMA method for analyzing and measuring the abnormal distribution of ACK traffic. The NS2 simulations show that AEWMA method can detect LDoS attacks effectively and has a low false negative rate and a false positive rate. Based on DARPA99 datasets, experiment results show that AEWMA method is more efficient than EWMA method.

  17. Efficacy Quotient Tindakan ESWL Piezolith Richard Wolf 3000 pada Penderita Batu Ureter di RSUPN Dr. Cipto Mangunkusumo, 2008–2011

    Directory of Open Access Journals (Sweden)

    Vinny Verdini

    2017-01-01

    Full Text Available Extracorporeal shockwave lithotripsy (ESWL saat ini telah menjadi metode yang paling umum dalam tatalaksana aktif batu ureter. Sejak Maret 2008, RSCM telah menggunakan mesin ESWL piezolith 3000 richard wolf dan belum diketahui nilai efficacy quotient (EQ. Penelitian ini bertujuan untuk menentukan nilai EQ dari tindakan ESWL menggunakan mesin piezolith richard wolf 3000 pada batu ureter dan hubungan angka bebas batu dengan lokasi batu, jumlah batu, beban batu, opasitas batu, obstruksi, dan fungsi ginjal. Studi cross sectional ini dilakukan pada bulan Januari 2008-Desember 2011 dan data dianalisis dengan statistik multivariat. Terdapat 113 (95 % dari 119 pasien yang dinyatakan bebas batu setelah tindakan ESWL pertama. Didapatkan nilai EQ 0,89. Hanya ukuran batu yang mempengaruhi angka bebas batu dalam penelitian ini (p<0,05. Disimpulkan bahwa prosedur ESWL menggunakan mesin richard wolf piezolith 3000 memiliki nilai EQ dan angka bebas batu yang lebih baik daripada mesin-mesin sebelumnya dan mesin lain yang sejenis. Faktor yang mempengaruhi keberhasilan adalah ukuran batu ureter yang ditatalaksana.Kata Kunci: batu ureter, ESWL, efficacy quotient, angka bebas batu. Efficacy Quotient of ESWL Piezolith Richard Wolf 3000 Machine in Patientswith Ureteral Stones in Dr. Cipto MangunkusumoNational Hospital 2008 - 2011AbstractExtracorporeal shockwave lithotripsy (ESWL is the most common method of ureteral stone management. Since 2008, RSCM has ben using ESWL piezolith 3000 richard wolf and efficacy quotient (EQ value have not yet studied. The study aims was to determine the efficacy quotient (EQ of ESWL using piezolith richard wolf 3000 machine for ureteral stone by analyzing free-stone rate with location of stones, number of stones, stone burden, stone opacity, obstruction and kidney function. This cross sectional study was carried out in January 2008-December 2011, with multivariate analytical study. Ninety five percent (n=113 of 119 patients were

  18. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  19. Using DNS amplification DDoS attack for hiding data

    Science.gov (United States)

    Mehić, M.; Voznak, M.; Safarik, J.; Partila, P.; Mikulec, M.

    2014-05-01

    This paper concerns available steganographic techniques that can be used for sending hidden data through public network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are most popular network attacks currently represented in the world. Apart from characterizing existing steganographic methods we provide new insights by presenting two new techniques. The first one is network steganography solution which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis, is included in this paper.

  20. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  1. Face Spoof Attack Recognition Using Discriminative Image Patches

    Directory of Open Access Journals (Sweden)

    Zahid Akhtar

    2016-01-01

    Full Text Available Face recognition systems are now being used in many applications such as border crossings, banks, and mobile payments. The wide scale deployment of facial recognition systems has attracted intensive attention to the reliability of face biometrics against spoof attacks, where a photo, a video, or a 3D mask of a genuine user’s face can be used to gain illegitimate access to facilities or services. Though several face antispoofing or liveness detection methods (which determine at the time of capture whether a face is live or spoof have been proposed, the issue is still unsolved due to difficulty in finding discriminative and computationally inexpensive features and methods for spoof attacks. In addition, existing techniques use whole face image or complete video for liveness detection. However, often certain face regions (video frames are redundant or correspond to the clutter in the image (video, thus leading generally to low performances. Therefore, we propose seven novel methods to find discriminative image patches, which we define as regions that are salient, instrumental, and class-specific. Four well-known classifiers, namely, support vector machine (SVM, Naive-Bayes, Quadratic Discriminant Analysis (QDA, and Ensemble, are then used to distinguish between genuine and spoof faces using a voting based scheme. Experimental analysis on two publicly available databases (Idiap REPLAY-ATTACK and CASIA-FASD shows promising results compared to existing works.

  2. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  3. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2010-04-01

    Full Text Available To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector, and a conventional JAM (Jammed Area Mapping service with one reroute.

  4. DMP: detouring using multiple paths against jamming attack for ubiquitous networking system.

    Science.gov (United States)

    Kim, Mihui; Chae, Kijoon

    2010-01-01

    To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.

  5. YET ANOTHER ATTACK ON WAGES AND CONDITIONS.

    Science.gov (United States)

    McCarthy, Andrew

    2016-10-01

    An unobjectionable-sounding title obscures the real intent of the latest in a series of Bills which the federal Coalition government is attempting to legislate in its ongoing attempts to undermine employee wages and conditions and attack unions.

  6. A Unique Fatal Moose Attack Mimicking Homicide.

    Science.gov (United States)

    Gudmannsson, Petur; Berge, Johan; Druid, Henrik; Ericsson, Göran; Eriksson, Anders

    2018-03-01

    Fatalities caused by animal attacks are rare, but have the potential to mimic homicide. We present a case in which a moose attacked and killed a woman who was walking her dog in a forest. Autopsy showed widespread blunt trauma with a large laceration on one leg in which blades of grass were embedded. Flail chest was the cause of death. The case was initially conceived as homicide by means of a riding lawn mower. A review of the case by moose experts and analyses of biological trace material that proved to originate from moose, established the true source of injury. The dog probably provoked a moose, which, in response, stomped and gored the victim to death. The injuries resembled those previously reported from attacks by cattle and water buffalo. Fatal moose attacks constitute an extremely rare threat in boreal areas, but can be considered in traumatic deaths of unknown cause. © 2017 American Academy of Forensic Sciences.

  7. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  8. Marine Attack on Towed Hydrophone Arrays

    National Research Council Canada - National Science Library

    Kalmijn, Ad

    2002-01-01

    The original objective of the SIO Marine Attack project was to identify the electric and magnetic fields causing sharks to inflict serious damage upon the towed hydrophone arrays of US Navy submarines...

  9. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  10. On localization attacks against cloud infrastructure

    Science.gov (United States)

    Ge, Linqiang; Yu, Wei; Sistani, Mohammad Ali

    2013-05-01

    One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.

  11. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  12. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication...

  13. Compiling symbolic attacks to protocol implementation tests

    Directory of Open Access Journals (Sweden)

    Michael Rusinowitch

    2013-07-01

    Full Text Available Recently efficient model-checking tools have been developed to find flaws in security protocols specifications. These flaws can be interpreted as potential attacks scenarios but the feasability of these scenarios need to be confirmed at the implementation level. However, bridging the gap between an abstract attack scenario derived from a specification and a penetration test on real implementations of a protocol is still an open issue. This work investigates an architecture for automatically generating abstract attacks and converting them to concrete tests on protocol implementations. In particular we aim to improve previously proposed blackbox testing methods in order to discover automatically new attacks and vulnerabilities. As a proof of concept we have experimented our proposed architecture to detect a renegotiation vulnerability on some implementations of SSL/TLS, a protocol widely used for securing electronic transactions.

  14. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  15. ATTACK WARNING: Costs to Modernize NORAD's Computer System Significantly Understated

    National Research Council Canada - National Science Library

    Cross, F

    1991-01-01

    ...) Integrated Tactical Warning and Attack Assessment (ITW/AA) system. These subsystems provide critical strategic surveillance and attack warning and assessment information to United States and Canadian leaders...

  16. The art of survival after an atomic attack

    International Nuclear Information System (INIS)

    Haarland, C.M.; Chester, C.V.; Wigner, E.P.

    1978-01-01

    Carsten M. Haarland, Conrad V. Chester and Eugene P. Wigner have been appointed by the American civil protection service to look into the question of how one may protect the providently evacuated population and supply the latter with food, water and other essential goods after a nuclear attack on military and industrial targets, as well as on living areas. The report of the three US scientists is over 200 pages long. Extracts from the concluding chapter are given here whose translation first appeared in the information leaflet Nr. 268/77 of the International Organisation for Civil Defence, Geneva. (orig.) [de

  17. RAPTOR: Ransomware Attack PredicTOR

    OpenAIRE

    Quinkert, Florian; Holz, Thorsten; Hossain, KSM Tozammel; Ferrara, Emilio; Lerman, Kristina

    2018-01-01

    Ransomware, a type of malicious software that encrypts a victim's files and only releases the cryptographic key once a ransom is paid, has emerged as a potentially devastating class of cybercrimes in the past few years. In this paper, we present RAPTOR, a promising line of defense against ransomware attacks. RAPTOR fingerprints attackers' operations to forecast ransomware activity. More specifically, our method learns features of malicious domains by looking at examples of domains involved in...

  18. Attack Helicopter Operations: Art or Science

    Science.gov (United States)

    1991-05-13

    ATTACK HELICOPTER OPERATIONS: ART OR SCIENCE ? BY LIEUTENANT COLONEL JAN CALLEN United States Army DISTRIBUTION STATEMENT A: Approved for public release...TASK IWORK UNIT ELEMENT NO. NO. NO. ACCESSION NC 11. TITLE (Include Socurity Classification) Attack Helicopter Operations: Art or Science ? 12. PERSONAL...OPERATIONS: ART OR SCIENCE ? AN INDIVIDUAL STUDY PROJECT by Lieutenant Colonel Jan Callen United States Army Colonel Greg Snelgrove Project Adviser U.S

  19. Protecting mobile agents from external replay attacks

    OpenAIRE

    Garrigues Olivella, Carles; Migas, Nikos; Buchanan, William; Robles, Sergi; Borrell Viader, Joan

    2014-01-01

    Peer-reviewed This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solut...

  20. Semantic Identification Attacks on Web Browsing

    OpenAIRE

    Guha, Neel

    2016-01-01

    We introduce a Semantic Identification Attack, in which an adversary uses semantic signals about the pages visited in one browsing session to identify other browsing sessions launched by the same user. This attack allows an adver- sary to determine if two browsing sessions originate from the same user regardless of any measures taken by the user to disguise their browser or network. We use the MSNBC Anonymous Browsing data set, which contains a large set of user visits (labeled by category) t...

  1. Consciousness in Non-Epileptic Attack Disorder

    OpenAIRE

    Reuber, M.; Kurthen, M.

    2011-01-01

    Non-epileptic attack disorder (NEAD) is one of the most important differential diagnoses of epilepsy. Impairment of\\ud consciousness is the key feature of non-epileptic attacks (NEAs). The first half of this review summarises the clinical research\\ud literature featuring observations relating to consciousness in NEAD. The second half places this evidence in the wider context\\ud of the recent discourse on consciousness in neuroscience and the philosophy of mind. We argue that studies of consci...

  2. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  3. [Vocal cord functions in patients with asthma attack].

    Science.gov (United States)

    Oktay, Burcu; Selçuk, Omer Tarik; Ardiç, Sadik; Saylam, Güleser; Yüceege, Melike; Bilgin, Esra; Korkmaz, Hakan

    2009-01-01

    This study was planned to evaluate vocal cord functions and to establish underlying vocal cord dysfunctions (VCD) in patients with asthma attack. All patients admitted to emergency service of our hospital with asthma attack between February 01, 2007 and June 01, 2007 were included in the evaluation. After the evaluation, all patients regarded to have asthma attacks based on GINA 2006 guide were enrolled in the study. After first intervention, patients underwent endoscopic larynx examination for the evaluation of vocal cord functions. Twenty four (65.7%) male and 11 female (31.4%), overall 35 patients diagnosed with asthma and who did not have the history of another disease were included in the study. At endoscopic larynx examination carried out after first medical examination, at the moment of asthma attack, tongue, tongue base, epiglottis and arytenoid were observed to be within normal limits. In 9 (25.7%) patients, upper respiratory tract was hyperemic and in 2 (5.7%) odematous. One patient had nasal polyposis (p> 0.05). In the evaluation of vocal cord functions, restriction in adduction was observed in merely one patient. All other functions were normal. Rima opening width was established to be mean 8.34 + or - 0.725. VCD was deteced in none of the patients included in the study. Although we did not detect VCD in any patient, VCD should be borne in mind in cases which presents with the clinical picture of asthma and responds weakly to the treatment or in cases of unexplained shortness of breath. This may prevent many unnecessary procedures such as medication, entubation, tracheostomy and iatrogenic mortality. Further longutudial studies are required in order to shed light on the assocation of asthma with VCD.

  4. Distinguishing attack and second-preimage attack on encrypted message authentication codes (EMAC)

    Science.gov (United States)

    Ariwibowo, Sigit; Windarta, Susila

    2016-02-01

    In this paper we show that distinguisher on CBC-MAC can be applied to Encrypted Message Authentication Code (EMAC) scheme. EMAC scheme in general is vulnerable to distinguishing attack and second preimage attack. Distinguishing attack simulation on AES-EMAC using 225 message modifications, no collision have been found. According to second preimage attack simulation on AES-EMAC no collision found between EMAC value of S1 and S2, i.e. no second preimage found for messages that have been tested. Based on distinguishing attack simulation on truncated AES-EMAC we found collision in every message therefore we cannot distinguish truncated AES-EMAC with random function. Second-preimage attack is successfully performed on truncated AES-EMAC.

  5. Combined Heuristic Attack Strategy on Complex Networks

    Directory of Open Access Journals (Sweden)

    Marek Šimon

    2017-01-01

    Full Text Available Usually, the existence of a complex network is considered an advantage feature and efforts are made to increase its robustness against an attack. However, there exist also harmful and/or malicious networks, from social ones like spreading hoax, corruption, phishing, extremist ideology, and terrorist support up to computer networks spreading computer viruses or DDoS attack software or even biological networks of carriers or transport centers spreading disease among the population. New attack strategy can be therefore used against malicious networks, as well as in a worst-case scenario test for robustness of a useful network. A common measure of robustness of networks is their disintegration level after removal of a fraction of nodes. This robustness can be calculated as a ratio of the number of nodes of the greatest remaining network component against the number of nodes in the original network. Our paper presents a combination of heuristics optimized for an attack on a complex network to achieve its greatest disintegration. Nodes are deleted sequentially based on a heuristic criterion. Efficiency of classical attack approaches is compared to the proposed approach on Barabási-Albert, scale-free with tunable power-law exponent, and Erdős-Rényi models of complex networks and on real-world networks. Our attack strategy results in a faster disintegration, which is counterbalanced by its slightly increased computational demands.

  6. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  7. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    Directory of Open Access Journals (Sweden)

    Biao Han

    2018-01-01

    Full Text Available Distributed Denial of Service (DDoS attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN, it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS attack defense framework in SDN, called OverWatch, which exploits collaborative intelligence between data plane and control plane with high defense efficiency. Attack detection and reaction are two key procedures of the proposed framework. We develop a collaborative DDoS attack detection mechanism, which consists of a coarse-grained flow monitoring algorithm on the data plane and a fine-grained machine learning based attack classification algorithm on the control plane. We propose a novel defense strategy offloading mechanism to dynamically deploy defense applications across the controller and switches, by which rapid attack reaction and accurate botnet location can be achieved. We conduct extensive experiments on a real-world SDN network. Experimental results validate the efficiency of our proposed OverWatch framework with high detection accuracy and real-time DDoS attack reaction, as well as reduced communication overhead on SDN southbound interface.

  8. A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2018-01-01

    Full Text Available The application-layer distributed denial of service (AL-DDoS attack makes a great threat against cyberspace security. The attack detection is an important part of the security protection, which provides effective support for defense system through the rapid and accurate identification of attacks. According to the attacker’s different URL of the Web service, the AL-DDoS attack is divided into three categories, including a random URL attack and a fixed and a traverse one. In order to realize identification of attacks, a mapping matrix of the joint entropy vector is constructed. By defining and computing the value of EUPI and jEIPU, a visual coordinate discrimination diagram of entropy vector is proposed, which also realizes data dimension reduction from N to two. In terms of boundary discrimination and the region where the entropy vectors fall in, the class of AL-DDoS attack can be distinguished. Through the study of training data set and classification, the results show that the novel algorithm can effectively distinguish the web server DDoS attack from normal burst traffic.

  9. A UNIFIED APPROACH FOR DETECTION AND PREVENTION OF DDOS ATTACKS USING ENHANCED SUPPORT VECTOR MACHINES AND FILTERING MECHANISMS

    Directory of Open Access Journals (Sweden)

    T. Subbulakshmi

    2014-10-01

    Full Text Available Distributed Denial of Service (DDoS attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack against one host or a network victim, which cause denial of service to legitimate users. The existing techniques suffer from more number of false alarms and more human intervention for attack detection. The objective of this paper is to monitor the network online which automatically initiates detection mechanism if there is any suspicious activity and also defense the hosts from being arrived at the network. Both spoofed and non spoofed IP’s are detected in this approach. Non spoofed IP’s are detected using Enhanced Support Vector Machines (ESVM and spoofed IP’s are detected using Hop Count Filtering (HCF mechanism. The detected IP’s are maintained separately to initiate the defense process. The attack strength is calculated using Lanchester Law which initiates the defense mechanism. Based on the calculated attack strength any of the defense schemes such as Rate based limiting or History based IP filtering is automatically initiated to drop the packets from the suspected IP. The integrated online monitoring approach for detection and defense of DDoS attacks is deployed in an experimental testbed. The online approach is found to be obvious in the field of integrated DDoS detection and defense.

  10. ECONOMIC DENIAL OF SUSTAINABILITY (EDOS ATTACK ON CLOUD – A SURVEY

    Directory of Open Access Journals (Sweden)

    A. Somasundaram

    2016-12-01

    Full Text Available Cloud computing is a promising technology aims to provide reliable, customized and quality of service computation environments for cloud users in terms of Software as a Service-SaaS , Plat- form as a Service-PaaS and Infrastructure as Service-IaaS, which is provided on the pay per use basis. Cloud computing enables services to be deployed and accessed globally on demand with little maintenance by providing QoS as per service level agreement (SLA of customer. However, due to elasticity of resources, cloud systems are facing severe security problems. One of the most serious threats to cloud computing is EDoS (economic Distributed Denial of Service aims to consume the cloud resource by attacker and impose financial burden to the legitimate user, where integrity, availability and confidentiality of the cloud services are never compromised but affects the accountability which leads to inaccurate billing. Since the billing models of cloud services may not be mature enough to properly account for an EDoS attack. These paper surveys, the different techniques that generate, detect and mitigate the EDoS Attack on Cloud.

  11. Richards growth model and viability indicators for populations subject to interventions

    Directory of Open Access Journals (Sweden)

    Selene Loibel

    2010-12-01

    Full Text Available In this work we study the problem of modeling identification of a population employing a discrete dynamic model based on the Richards growth model. The population is subjected to interventions due to consumption, such as hunting or farming animals. The model identification allows us to estimate the probability or the average time for a population number to reach a certain level. The parameter inference for these models are obtained with the use of the likelihood profile technique as developed in this paper. The identification method here developed can be applied to evaluate the productivity of animal husbandry or to evaluate the risk of extinction of autochthon populations. It is applied to data of the Brazilian beef cattle herd population, and the the population number to reach a certain goal level is investigated.Neste trabalho estudamos o problema de identificação do modelo de uma população utilizando um modelo dinâmico discreto baseado no modelo de crescimento de Richards. A população é submetida a intervenções devido ao consumo, como no caso de caça ou na criação de animais. A identificação do modelo permite-nos estimar a probabilidade ou o tempo médio de ocorrência para que se atinja um certo número populacional. A inferência paramétrica dos modelos é obtida através da técnica de perfil de máxima verossimilhança como desenvolvida neste trabalho. O método de identificação desenvolvido pode ser aplicado para avaliar a produtividade de criação animal ou o risco de extinção de uma população autóctone. Ele foi aplicado aos dados da população global de gado de corte bovino brasileiro, e é utilizado na investigação de a população atingir um certo número desejado de cabeças.

  12. Predicting Factors of Zone 4 Attack in Volleyball.

    Science.gov (United States)

    Costa, Gustavo C; Castro, Henrique O; Evangelista, Breno F; Malheiros, Laura M; Greco, Pablo J; Ugrinowitsch, Herbert

    2017-06-01

    This study examined 142 volleyball games of the Men's Super League 2014/2015 seasons in Brazil from which we analyzed 24-26 games of each participating team, identifying 5,267 Zone 4 attacks for further analysis. Within these Zone 4 attacks, we analyzed the association between the effect of the attack carried out and the separate effects of serve reception, tempo and type of attack. We found that the reception, tempo of attack, second tempo of attack, and power of diagonal attack were predictors of the attack effect in Zone 4. Moreover, placed attacks showed a tendency to not yield a score. In conclusion, winning points in high-level men's volleyball requires excellent receptions, a fast attack tempo and powerfully executed of attacks.

  13. Who invented the dichotomous key? Richard Waller's watercolors of the herbs of Britain.

    Science.gov (United States)

    Griffing, Lawrence R

    2011-12-01

    On 27 March 1689, Richard Waller, Fellow and Secretary of the Royal Society presented his "Tables of the English Herbs reduced to such an order, as to find the name of them by their external figures and shapes" to his assembled colleagues at a meeting of the Royal Society. These tables were developed for the novice by being color images, composed in pencil and watercolor, of selected plants and their distinguishing characteristics. The botanical watercolors for the tables are now a Turning-the-Pages document online on the website of the Royal Society. However, for the past 320 years, the scientific context for the creation of these outstanding botanical watercolors has remained obscure. These tables were developed by Waller as an image-based dichotomous key, pre-dating by almost 100 years the text-based dichotomous keys in the first edition of Flora Française (1778) by Jean Baptiste Lamarck, who is generally given priority for the development of the dichotomous key. How these large folio images were arranged to illustrate a dichotomous key is unknown, but an arrangement based on Waller's description is illustrated here as leaf-ordering for the separate hierarchical clusters (tables). Although only 24 species of watercolored dicot herbs out of a total of 65 in the set of watercolors (the others being monocots) are used in these tables, they are a "proof of concept", serving as models upon which a method is based, that of using a key composed of dichotomous choices for aiding identification.

  14. Símbolo y forma: los hermanos Grimm en Richard Wagner

    Directory of Open Access Journals (Sweden)

    Miguel Salmerón Infante

    2015-05-01

    Full Text Available Este escrito estudia el cómo y el porqué de la presencia de los Cuentos de los Hermanos Grimm en la obra de Richard Wagner. Para dar un enfoque más concreto a esta reflexión el análisis se centra en Sigfrido, el drama musical de Wagner con más atmósfera de cuento, y las influencias y préstamos temáticos, formales y lingüísticos que le aportan los KHM. El artículo entiende que hay dos elementos que aprovecha Wagner de los Grimm para sus dramas musicales. El símbolo para su proyecto de tejido de la identidad alemana. Y la forma del cuento con sus temas y fórmulas recurrentes que el aplicó a su música y muy concretamente al Leitmotiv. Todo ello sin olvidar la muy frecuente presencia de la figura del huérfano tanto en Wagner como en los Grimm.  

  15. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  16. Meeting to honor F. Richard Stephenson on his 70th birthday

    CERN Document Server

    Green, David; Strom, Richard

    2015-01-01

    This book contains papers from a conference held to celebrate the 70th birthday of one of the world’s foremost astronomical historians, Professor F. Richard Stephenson, the latest recipient of the American Astronomical Society’s highest award for research in astronomical history, the LeRoy Doggett Prize. Reflecting Professor Stephenson’s extensive research portfolio, this book brings together under one cover papers on four different areas of scholarship: applied historical astronomy (which Stephenson founded); Islamic astronomy; Oriental astronomy; and amateur astronomy.  These papers are penned by astronomers from Canada, China, England, France, Georgia, Iran, Japan, Lebanon, the Netherlands, Portugal, Thailand and the USA. Its diverse coverage represents a wide cross-section of the history of astronomy community.  Under discussion are ways in which recent research using historical data has provided new insights into auroral and solar activity, supernovae and changes in the rotation rate of the E...

  17. Against the Nihilism of Suffering and Death: Richard E. K. Kim and His Works

    Directory of Open Access Journals (Sweden)

    Jooyeon Rhee

    2016-03-01

    Full Text Available This article examines the life and works of Richard E. K. Kim (1932–2009, a first-generation Korean diasporic writer in the United States. It focuses on how Kim struggled to overcome the nihilism of suffering and death that derived from colonialism and the Korean War through his literary works. Kim witnessed firsthand these two major historical events, which caused irrevocable psychological and physical damage to many people of his generation. In his autobiographical fiction, he conveys painful memories of the events by reviving the voices of people in that era. What his works offer us goes beyond vivid memories of the past, however; they also present the power of forgiveness as a condition to overcome the nihilism of suffering and death. Remembrance and forgiveness are, therefore, two major thematic pillars of his works that enable us to connect to these difficult and traumatic times. These themes are portrayed in such a gripping way mainly because Kim tried to maintain a certain distance—an emotional and linguistic distance—from the familiar, in order to elucidate the reality of the human condition: an ontological position of the exile from which he produced his works. This article argues that Kim’s works provide us the possibility to transcend the nihilism of historical trauma through articulating the meaning of remembrance and forgiveness from his self-assumed position of exile.

  18. Perbandingan antara Etika Jürgen Habermas dan Richard Rorty sebagai Prinsip Dasar Bertindak Manusia

    Directory of Open Access Journals (Sweden)

    Dominique Rio Adiwijaya

    2010-10-01

    Full Text Available Ethics without doubt is an issue in every scientific field. Questions on ethics are not merely questions on the responsibility of one or two specific individuals, but rather as what have been defined accurately by Immanuel Kant in Critique of Practical Reason – as question of all humanity as a thinking creature and the freedom of choice on, “what should I do”. From Kant’s definition, we may infer that if human can not think and not free in determining their choice, it would be almost impossible to hope for moral responsibility. However this article does not mean to give a full and historical description on ethics, but a sketch on discourse of contemporary ethics which is represented by two famous philosophers, Jürgen Habermas from the tradition of  Critical Theory from Frankfurt School, dan Richard Rorty with “Neo-Pragmatism”. Habermas proposes “discourse ethics” while Rorty proposes ethic concepts through his “liberal-ironists”. It is hoped that the assembly of readers may gain an insight of the unavoidable ethics problems since every ethical position must be theory laden and the theory itself has historical characteristics (the characteristics, origin and historical context of the schools behind it. Therefore ethics is a neverending reflection although it has been started from 2500 years ago. Ethics invites us from specific sciences to enter its general discourse which unavoidably all-encompassing in its nature. 

  19. Has David Howden Vindicated Richard von Mises’s Definition of Probability?

    Directory of Open Access Journals (Sweden)

    Mark R. Crovelli

    2009-11-01

    Full Text Available In my recent article on these pages (Crovelli 2009 I argued that members of the Austrian School of economics have adopted and defended a faulty definition of probability. I argued that the definition of probability necessarily depends upon the nature of the world in which we live. I claimed that if the nature of the world is such that every event and phenomenon which occurs has a cause of some sort, then probability must be defined subjectively; that is, “as a measure of our uncertainty about the likelihood of occurrence of some event or phenomenon, based upon evidence that need not derive solely from past frequencies of ‘collectives’ or ‘classes.’” I further claimed that the nature of the world is indeed such that all events and phenomena have prior causes, and that this fact compels us to adopt a subjective definition of probability.David Howden has recently published what he claims is a refutation of my argument in his article “Single Trial Probability Applications: Can Subjectivity Evade Frequency Limitations” (Howden 2009. Unfortunately, Mr. Howden appears to not have understood my argument, and his purported refutation of my subjective definition consequently amounts to nothing more than a concatenation of confused and fallacious ideas that are completely irrelevant to my argument. David Howden has thus failed in his attempt to vindicate Richard von Mises’s definition of probability.

  20. First record of the Asian diaptomid Neodiaptomus schmackeri (Poppe & Richard, 1892 (Crustacea: Copepoda: Calanoida in Europe

    Directory of Open Access Journals (Sweden)

    Giuseppe Alfonso

    2014-06-01

    Full Text Available Albania, as well as a great part of the Balkan area in general, still suffers a lack of environmental studies especially in limnological research. The Dumre plateau, in Central Albania, is characterized by an extraordinary high number of karst lakes in a small geographic area. Despite their environmental peculiarity, very few biological data are to date available for these lakes, none on the zooplankton. For this reason, 15 water bodies located in the central area of the plateau were selected for a preliminary limnological survey carried out in the years 2008-2011. Neodiaptomus schmackeri (Poppe & Richard, 1892, a diaptomid calanoid copepod characterized by a South-Eastern Palearctic - Oriental distribution, and the most widely spread Neodiaptomus species in Asia, was found in 8 lakes of the Dumre area. This finding represents the first record of the species, and of the entire genus Neodiaptomus, for Europe. Several environmental variables were measured to characterize the lakes, and the co-occurring planktonic crustaceans were also identified. Taxonomical drawings and descriptions of the main morphological features of both sexes are herein provided in order to compare the Albanian populations of N. schmackeri with those of the native distribution area of the species. The possible causes which determined the occurrence of this non-indigenous species in several Dumre lakes are discussed.

  1. Health Effects Due to Radionuclides Content of Solid Minerals within Port of Richards Bay, South Africa

    Directory of Open Access Journals (Sweden)

    Felix B. Masok

    2016-11-01

    Full Text Available This study assessed the radiological health hazards to various body organs of workers working within Transnet Precinct in Richards Bay in Kwazulu-Natal, South Africa due to radionuclide content of mineral ores often stored within the facility. Thirty samples were collected from five mineral ores (rock phosphate, rutile, zircon, coal and hematite and analyzed for 238U, 234U, 226Ra, 210Pb, 235U, 232Th, 228Ra, 228Th and 40K using delayed neutron activation analysis and low energy gamma spectroscopy. Rutile was found to be the most radioactive mineral ore within the facility with 210Pb concentration of 759.00 ± 106.00 Bq·kg−1. Effective annual dose rate in (mSv·y−1 delivered to different organs of the body: testes, bone marrow, whole body, lungs and ovaries from mineral ores were such that dose from mineral ores decreased in the order coal > rutile > rock phosphate > hematite > zircon. The organs with the highest received dose rate were the testes and this received dose was from coal. However, all of the calculated absorbed dose rates to organs of the body were below the maximum permissible safety limits.

  2. “This World Is Not My Home”: Richard Mouw and Christian Nationalism

    Directory of Open Access Journals (Sweden)

    Aaron Pattillo-Lunt

    2016-12-01

    Full Text Available American evangelicalism has often been punctuated by dual commitments to the United States and to God. Those commitments were strongest within politically conservative evangelicalism. Though representing a solid majority among professing evangelicals, conservatives could not speak for the movement as a whole. Politically progressive evangelicals, beginning in the 1960s, formed a dissenting opinion of the post-World War II revival of Christian nationalism. They dared to challenge American action abroad, noticeably during the Vietnam War. Their critique of Christian nationalism and conservative evangelicals’ close ties to the Republican Party led them to seek refuge in either progressive policies or the Democratic Party. A third, underexplored subgroup of evangelicalism rooted in reformed theology becomes important to consider in this regard. These reformed evangelicals sought to contextualize nationalism in biblical rather than partisan or political terms. This goal is championed well by Richard Mouw, resulting in a nuanced look at evangelical Christians’ difficult dual role as both citizens of the Kingdom of God and the United States.

  3. Poets/Trump/Philosophers: Reflections on Richard Rorty’s Liberalism, Ten Years after His Death

    Directory of Open Access Journals (Sweden)

    Giorgio Baruchello

    2017-08-01

    Full Text Available Starting with a prescient 1998 quote on the impending decline of US liberal democracy into right-wing, strong-man-based demagogy, this paper outlines Richard Rorty’s political philosophy, which I believe can help us understand perplexing political trends in today’s political reality well beyond the US alone. Specifically, I tackle three key-terms encapsulating the thrust of Rorty’s political philosophy, i.e. “liberalism of fear”, “bourgeois” and “postmodernism”. Also, I address a contraposition that explains how Rorty would approach and attempt to defend liberal democracy from contemporary right-wing, strong-man-based degenerations, namely the priority of “poetry” over “philosophy”. Essentially, if one wishes to win in the political arena, she must be armed with the most effective rhetorical weaponry, however good, solid and well-argued her political views may be. Finally, some remarks are offered on the role that “philosophy” can still play within the same arena.

  4. Arctic observers: Richard King, monogenism and the historicisation of Inuit through travel narratives.

    Science.gov (United States)

    Sera-Shriar, Efram

    2015-06-01

    In 1848 the ethnologist, surgeon and Arctic explorer Richard King (1810-1876) published a three-part series on Inuit in the Journal of the Ethnological Society of London. This series provided a detailed history of Inuit from the eleventh century to the early nineteenth century. It incorporated a mixture of King's personal observations from his experience travelling to the Arctic as a member of George Back's expedition (1833-1835), and the testimonies of other contemporary and historical actors who had written on the subject. The aim was to historicise Inuit through the use of travel reports and show persistent features among the race. King was a monogenist and his sensitive recasting of Inuit was influenced by his participation in a research community actively engaged in humanitarian and abolitionist causes. The physician and ethnologist Thomas Hodgkin (1798-1866) argued that King's research on Inuit was one of the best ethnological approaches to emulate and that it set the standard for the nascent discipline. If we are to take seriously Hodgkin's claim, we should look at how King constructed his depiction of Inuit. There is much to be gained by investigating the practices of nineteenth-century ethnologists because it strengthens our knowledge of the discipline's past and shows how modern understandings of races were formed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  5. Nonepileptic attack disorder among married women.

    Science.gov (United States)

    Dhanaraj, M; Rangaraj, R; Arulmozhi, T; Vengatesan, A

    2005-06-01

    To study the clinical features, precipitating stressful life events and prognosis of nonepileptic attack disorder (NEAD) among married women. Prospective cohort study with 1-year follow-up. A tertiary care teaching hospital. Of the 1020 patients with epilepsy referred to the epilepsy clinic during 2002-2003, 30 were married women with NEAD. The diagnostic criteria for NEAD included normal EEG during ictal and post-ictal phase of the generalized 'attack.' The data collected included clinical characteristics, semiology of the attacks, precipitating stressful events, and co-morbid psychiatric disorders. The control group included 30 age-matched married women with generalized tonic-clonic seizures. The long-term outcome and factors influencing the outcomes were analyzed. The mean duration of illness was 18 months, and the pattern of the attack was 'fall and lying still' in 53% and 'fall with generalized motor movements' in 47%. The frequency was one or more per week in 57% and occasionally in 43%. The important stressful events were matrimonial discord following illegal relationship of the husband with another woman (chi2 = 9.02, P = 0.003) and constant quarrel with other family members (chi2 = 5.19, P = 0.02). The prevalence of sexual abuse was low (7%). Co-morbid psychiatric disorder was observed in 70%. At the end of 1 year, 39% were free from the attack. Resolution of the stressful life events (chi2 = 4.52, P = 0.03) and lower frequency of attack at the time of reporting (chi2 = 3.88, P = 0.05) correlated with good outcomes. Among patients with NEAD in India, the major precipitating factors were matrimonial discord following illegal relationship of the husband with another woman and constant quarrel with other family members and not sexual abuse. Women with low frequency of attack at the time of reporting and the remission of the stressful events had better outcomes.

  6. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jean Caminha

    2018-01-01

    Full Text Available Internet of Things (IoT resources cooperate with themselves for requesting and providing services. In heterogeneous and complex environments, those resources must trust each other. On-Off attacks threaten the IoT trust security through nodes performing good and bad behaviors randomly, to avoid being rated as a menace. Some countermeasures demand prior levels of trust knowledge and time to classify a node behavior. In some cases, a malfunctioning node can be mismatched as an attacker. In this paper, we introduce a smart trust management method, based on machine learning and an elastic slide window technique that automatically assesses the IoT resource trust, evaluating service provider attributes. In simulated and real-world data, this method was able to identify On-Off attackers and fault nodes with a precision up to 96% and low time consumption.

  7. 12 CFR 263.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding... Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is brought in... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  8. 12 CFR 509.17 - Collateral attacks on adjudicatory proceeding.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Collateral attacks on adjudicatory proceeding....17 Collateral attacks on adjudicatory proceeding. If an interlocutory appeal or collateral attack is... shall be excused based on the pendency before any court of any interlocutory appeal or collateral attack. ...

  9. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  10. Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2010-01-01

    Full Text Available In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.

  11. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  12. Subclinical endophthalmitis following a rooster attack.

    Science.gov (United States)

    Lekse Kovach, Jaclyn; Maguluri, Srilakshmi; Recchia, Franco M

    2006-12-01

    Ocular injury resulting from rooster attacks is rarely reported in the literature. Sadly, the target of these attacks is most often children younger than 3 years old, whose naiveté of the aggressive, territorial behavior of birds can place them at risk. Acute sequelae of these attacks can result in a lifetime of visual impairment. The possibility of a subacute or occult infection is an unusual occurrence that must always be considered. In an effort to prevent future attacks and ocular casualties, we present a case of a 12-month-old boy who suffered an open globe following a rooster attack. The open globe was emergently repaired. One week later, a white cataract was noticed on examination in the absence of systemic or ocular signs of inflammation. Traumatic endophthalmitis and lenticular abscess were suspected during examination under anesthesia. Vitrectomy, lensectomy, and injection of intravitreal antibiotics were performed. Culture of lenticular and vitreous aspirates grew alpha-streptococcus. Alpha-streptococcal endophthalmitis can result from ocular injuries caused by rooster pecking. The infection may present insidiously and without typical ocular or systemic symptoms or signs. Management is challenging and may require surgery.

  13. On the anatomy of social engineering attacks : A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing

  14. Security attack detection algorithm for electric power gis system based on mobile application

    Science.gov (United States)

    Zhou, Chao; Feng, Renjun; Wang, Liming; Huang, Wei; Guo, Yajuan

    2017-05-01

    Electric power GIS is one of the key information technologies to satisfy the power grid construction in China, and widely used in power grid construction planning, weather, and power distribution management. The introduction of electric power GIS based on mobile applications is an effective extension of the geographic information system that has been widely used in the electric power industry. It provides reliable, cheap and sustainable power service for the country. The accurate state estimation is the important conditions to maintain the normal operation of the electric power GIS. Recent research has shown that attackers can inject the complex false data into the power system. The injection attack of this new type of false data (load integrity attack LIA) can successfully bypass the routine detection to achieve the purpose of attack, so that the control center will make a series of wrong decision. Eventually, leading to uneven distribution of power in the grid. In order to ensure the safety of the electric power GIS system based on mobile application, it is very important to analyze the attack mechanism and propose a new type of attack, and to study the corresponding detection method and prevention strategy in the environment of electric power GIS system based on mobile application.

  15. SDN Based Collaborative Scheme for Mitigation of DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Sufian Hameed

    2018-02-01

    Full Text Available Software Defined Networking (SDN has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to program and monitor our networks but it also helps in mitigating some key network problems. Distributed denial of service (DDoS attack is among them. In this paper we propose a collaborative DDoS attack mitigation scheme using SDN. We design a secure controller-to-controller (C-to-C protocol that allows SDN-controllers lying in different autonomous systems (AS to securely communicate and transfer attack information with each other. This enables efficient notification along the path of an ongoing attack and effective filtering of traffic near the source of attack, thus saving valuable time and network resources. We also introduced three different deployment approaches i.e., linear, central and mesh in our testbed. Based on the experimental results we demonstrate that our SDN based collaborative scheme is fast and reliable in efficiently mitigating DDoS attacks in real time with very small computational footprints.

  16. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  17. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    International Nuclear Information System (INIS)

    Hubbell, J.H.

    2000-01-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3 rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this 'global radiation physics family' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  18. X-ray cross-sections and crossroads (The International Radiation Physics Society) - Richard Pratt's contributions to both

    Science.gov (United States)

    Hubbell, J. H.

    2000-08-01

    Some examples of the impact of the theoretical contributions by Richard Pratt and his collaborators on photon cross section compilations at NBS/NIST and elsewhere over the past several decades are presented. Both the theoretical and measurement works which combine to provide this data base, and the contact with the varied user groups in medical applications, nuclear engineering, crystallography and X-ray astronomy, have formed a global crossroads of researchers now embodied in the International Radiation Physics Society (IRPS). Since the founding of the IRPS at the 3rd International Symposium on Radiation Physics (ISRP-3) in Ferrara, Italy, in 1985, the Secretariat for this ``global radiation physics family'' (the IRPS) has resided at the University of Pittsburgh under the direction of Richard Pratt. A brief account of the origins and history of the IRPS, beginning with ISRP-1 in Calcutta in 1974, is presented.

  19. Why Was General Richard O’Connor’s Command in Northwest Europe Less Effective Than Expected?

    Science.gov (United States)

    2011-03-01

    Commander of 7 Division and Military Governor of Jerusalem , September 1938- August 1939. ______. Papers of General Sir Richard O’Connor KT, GCB, DSO, MC...Montgomery, Brian. A Field Marshall in the Family: A Personal Biography of Montgomery of Alamein. New York: Taplinger, 1973. Montgomery, Field...Commanders: A Composite Biography . Combat Studies Institute publications, Fort Leavenworth, Kansas: U.S. Army Command and General Staff College, 1989

  20. Counteracting Power Analysis Attacks by Masking

    Science.gov (United States)

    Oswald, Elisabeth; Mangard, Stefan

    The publication of power analysis attacks [12] has triggered a lot of research activities. On the one hand these activities have been dedicated toward the development of secure and efficient countermeasures. On the other hand also new and improved attacks have been developed. In fact, there has been a continuous arms race between designers of countermeasures and attackers. This chapter provides a brief overview of the state-of-the art in the arms race in the context of a countermeasure called masking. Masking is a popular countermeasure that has been extensively discussed in the scientific community. Numerous articles have been published that explain different types of masking and that analyze weaknesses of this countermeasure.

  1. The WOMBAT Attack Attribution Method: Some Results

    Science.gov (United States)

    Dacier, Marc; Pham, Van-Hau; Thonnard, Olivier

    In this paper, we present a new attack attribution method that has been developed within the WOMBAT project. We illustrate the method with some real-world results obtained when applying it to almost two years of attack traces collected by low interaction honeypots. This analytical method aims at identifying large scale attack phenomena composed of IP sources that are linked to the same root cause. All malicious sources involved in a same phenomenon constitute what we call a Misbehaving Cloud (MC). The paper offers an overview of the various steps the method goes through to identify these clouds, providing pointers to external references for more detailed information. Four instances of misbehaving clouds are then described in some more depth to demonstrate the meaningfulness of the concept.

  2. Resilient control under Denial-of-Service: Robust design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  3. Resilient Control under Denial-of-Service:Robust Design

    NARCIS (Netherlands)

    Feng, Shuai; Tesi, Pietro

    2016-01-01

    In this paper, we study networked control systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. The control objective is to maximize frequency and duration of the DoS attacks under which closed-loop stability is not

  4. Polymorphic Attacks and Network Topology: Application of Concepts from Natural Systems

    Science.gov (United States)

    Rangan, Prahalad

    2010-01-01

    The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one. As our dependence on the services provided by computing networks grows, so does our investment in such technology. In this situation, there is a greater risk of occurrence of targeted malicious attacks on computers…

  5. The effects of DDoS attacks on flow monitoring applications

    NARCIS (Netherlands)

    Sadre, R.; Sperotto, Anna; Pras, Aiko

    Flow-based monitoring has become a popular approach in many areas of network management. However, flow monitoring is, by design, susceptible to anomalies that generate a large number of flows, such as Distributed Denial-Of-Service attacks. This paper aims at getting a better understanding on how a

  6. A novel proposed network security management approach for cyber attacks

    International Nuclear Information System (INIS)

    Ahmed, Z.; Nazir, B.; Zafar, M.F.; Anwar, M.M.; Azam, K.; Asar, A.U.

    2007-01-01

    Network security is a discipline that focuses on securing networks from unauthorized access. Given the Escalating threats of malicious cyber attacks, modern enterprises employ multiple lines of defense. A comprehensive defense strategy against such attacks should include (I) an attack detection component that deter- mines the fact that a program is compromised, (2) an attack identification and prevention component that identifies attack packets so that one can block such packets in the future and prevents the attack from further propagation. Over the last decade, a significant amount of research has been vested in the systems that can detect cyber attacks either statically at compile time or dynamically at run time, However, not much effort is spent on automated attack packet identification or attack prevention. In this paper we present a unified solution to the problems mentioned above. We implemented this solution after the forward engineering of Open Source Security Information Management (OSSIM) system called Preventive Information Security management (PrISM) system that correlates input from different sensors so that the resulting product can automatically detect any cyber attack against it and prevents by identifying the actual attack packet(s). The PrISM was always able to detect the attacks, identify the attack packets and most often prevent by blocking the attacker's IP address to continue normal execution. There is no additional run-time performance overhead for attack prevention. (author)

  7. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...... number of rounds. We also use neutral bits and message modification methods from the practice of collision search in MD5 and SHA-1 hash functions. These methods push the rotational property through more rounds than previous analysis suggested, and eventually establish a distinguishing property...

  8. A Distinguish Attack on COSvd Cipher

    OpenAIRE

    Mohammad Ali Orumiehchi ha; R. Mirghadri

    2007-01-01

    The COSvd Ciphers has been proposed by Filiol and others (2004). It is a strengthened version of COS stream cipher family denoted COSvd that has been adopted for at least one commercial standard. We propose a distinguish attack on this version, and prove that, it is distinguishable from a random stream. In the COSvd Cipher used one S-Box (10×8) on the final part of cipher. We focus on S-Box and use weakness this S-Box for distinguish attack. In addition, found a leak on HNLL that the sub s-bo...

  9. Attacks and infections in percolation processes

    International Nuclear Information System (INIS)

    Janssen, Hans-Karl; Stenull, Olaf

    2017-01-01

    We discuss attacks and infections at propagating fronts of percolation processes based on the extended general epidemic process. The scaling behavior of the number of the attacked and infected sites in the long time limit at the ordinary and tricritical percolation transitions is governed by specific composite operators of the field-theoretic representation of this process. We calculate corresponding critical exponents for tricritical percolation in mean-field theory and for ordinary percolation to 1-loop order. Our results agree well with the available numerical data. (paper)

  10. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  11. Sufi, Christian or Buddhist? Richard Francis Burton’s “Parameters of Belief”

    Directory of Open Access Journals (Sweden)

    John Wallen

    2013-09-01

    Full Text Available Richard Burton has been interpreted and misinterpreted by literary critics as eminent as Edward Said and Louisa Pratt as well as by others such as Rana Kabbani and Reina Lewis. Biographers like Fawn Brody, Edward Rice, Mary Lovell and Jon Godsall have also had their say. Burton has been variously described as imperialist, sexist, gay, obssessed with pornography, racist, plagiarist, sexual libertine, scatologist, expert sociologist, profoundly deceitful and impotent. In spite of this negative press, interest in Burton is always high as his life and times are relevant to many scholars interested in the 19th century origins of modern thought and postcolonial ideas. In this paper presentation I will attempt to get beyond the confused and contradictory portrayals of Burton over the last 50 or so years by looking in some detail at Burton’s two long poems: Stone Talk and The Kasidah. In these works, published 15 years apart, Burton writes under pseudonyms and, as I will argue, is able to express many of his deepest beliefs, especially in The Kasidah where he is playing the part of Hadji Abu Al Yezid, a Sufi like-wise man who possesses some startling similarities to Burton himself. What emerges from this close examination of the texts is a sensitive relativist who, while adhering to the scientific method in all his practical dealings, is yet able to consider the possibility that everything we see around us and all our experience of the world might be, finally, nothing more than Maya and illusion.

  12. The Effect of Richard Wagner's Music and Beliefs on Hitler's Ideology

    Directory of Open Access Journals (Sweden)

    Carolyn S. Ticker

    2016-09-01

    Full Text Available The Holocaust will always be remembered as one of the most horrific and evil events in all of history. One question that has been so pervasive in regards to this historical event is the question of why. Why exactly did Hitler massacre the Jewish people? Why did he come to the conclusion that the Jews were somehow lesser than him, and that it was okay to kill them? What and who were his influences and how did they help form Hitler’s opinions leading up to the Holocaust? Although more than one situation or person influenced Hitler, I believe that one man in particular really helped contribute to Hitler’s ideas, especially about the Jewish people. This man is the famous musician Richard Wagner. While musicologists admit that Wagner was a musical genius, one aspect of his career that is hard to ignore is his strong antisemitism. In addition to speaking about his hatred for the Jews, he also wrote about it in his music, making it hard to glance over. Hitler had been close to the Wagner family, and had an obsessive, cult-like infatuation with Wagner’s music beginning in his childhood. This infatuation with Wagner’s music and his closeness to his later family helped facilitate and solidify his negative views about the Jewish people. In this paper I will explore the antisemitism that is within Wagner’s music and writing, and then I will discuss how Wagner’s antisemitism helped inform, influence, and shape Hitler’s ideas, indirectly assisting in the propagation of the Holocaust.

  13. Visiting Richard Serra’s Promenade sculpture improves postural control and judgment of subjective visual vertical.

    Directory of Open Access Journals (Sweden)

    Zoï eKapoula

    2014-12-01

    Full Text Available Body sway while maintaining an upright quiet stance reflects an active process of balance based on the integration of visual, vestibular, somatosensory and proprioceptive inputs. Richard Serra’s Promenade sculpture featured in the 2008 Monumenta exhibition at the Grand Palais in Paris, France is herein hypothesised to have stimulated the body’s vertical and longitudinal axes as it showcased 5 monumental rectangular solids pitched at a 1.69° angle.Using computerised dynamic posturography we measured the body sway of 23 visitors when fixating a cross, or when observing the artwork (fixating it or actively exploring it with eye movements before and after walking around and alongside the sculpture (i.e., before and after a promenade. A first fixation at the sculpture increased medio-lateral stability (in terms of spectral power of body sway. Eye movement exploration in the depth of the sculpture increased antero-posterior stability (in terms of spectral power and cancelling time of body sway at the expense of medio-lateral stability (in terms of cancelling time. Moreover, a medio-lateral instability associated with eye movement exploration before the promenade (in terms of body sway sensu stricto was cancelled after the promenade. Finally, the overall medio-lateral stability (in terms of spectral power increased after the promenade.Fourteen additional visitors were asked to sit in a dark room and adjust a luminous line to what they considered to be the earth-vertical axis. The promenade executed within the sculpted environment afforded by Serra’s monumental statuary works resulted in significantly improved performances on the subjective visual vertical test.We attribute these effects to the sculpted environment provided by the exhibition which may have acted as a kind of physiologic training ground thereby improving the visitors’ overall sense of visual perspective, equilibrium and gravity.

  14. Staging Unincorporated Power: Richard Harding Davis and the Critique of Imperial News

    Directory of Open Access Journals (Sweden)

    Nirmal Trivedi

    2011-12-01

    Full Text Available This essay contextualizes the work of war correspondent Richard Harding Davis within an evolving “imperial news apparatus” that would culminate in his reporting of the Spanish-American War. Critics have conventionally framed Davis squarely within the imperial cause, associating him with his admirer Roosevelt and naval admiral Alfred T. Mahan. Contrary to readings of Davis as an apologist for US imperialism, Trivedi contends that Davis understood how US imperial power relied on an information apparatus to communicate to an increasingly media-conscious American public through culture, that is, via familiar narratives, symbols, and objects—what Trivedi calls “imperial news.” The essay follows Davis’s development from his fictional representation of the new war correspondent in “The Reporter Who Made Himself King” to his own war correspondence before and after the Spanish-American War as collected in the memoirs A Year from a Reporter’s Notebook (1897, Cuba in War Time (1897, and Notes of a War Correspondent (1912. Davis’s war correspondence and fictional work effectively stage US imperialism as “unincorporated power”: that is, as power reliant on a developing news-making apparatus that deploys particular discursive strategies to validate its political claims. This staging critiques strategies of US imperial sovereignty—specifically its “privatization of knowledge” and its promotion of the war correspondent as nothing more than a spectator and purveyor of massacres.

  15. Charles Darwin, Richard Owen, and Natural Selection: A Question of Priority.

    Science.gov (United States)

    Johnson, Curtis N

    2018-05-03

    No single author presented Darwin with a more difficult question about his priority in discovering natural selection than the British comparative anatomist and paleontologist Richard Owen. Owen was arguably the most influential biologist in Great Britain in Darwin's time. Darwin wanted his approbation for what he believed to be his own theory of natural selection. Unfortunately for Darwin, when Owen first commented in publication about Darwin's theory of descent he was openly hostile (Edinb. Rev. vol. 111, Article VIII, 1860, pp. 487-533, anonymous). Darwin was taken off-guard. In private meetings and correspondence prior to 1860 Owen had been nothing but polite and friendly, even helping Darwin in cataloguing and analyzing Darwin's zoological specimens from the Beagle voyage. Every early indication predicted a life-long friendship and collaboration. But that was not to be. Owen followed his slashing review with a mounting campaign in the 1860s to denounce and discredit both Darwin and his small but ascendant circle of friends and supporters. But that was not enough for Owen. Starting in 1866, perhaps by now realizing Darwin had landed the big fish, Owen launched a new campaign, to claim the discovery of "Darwin's theory" for himself. Darwin naturally fought back, mainly in the "Historical Sketch" that he prefaced to Origin starting in 1861. But when we peel back the layers of personal animus and escalating vituperation we discover in fact their quarrel was generated more by mutual misunderstanding than scientific disagreement. The battle ended only when Darwin finally penetrated to the crux of the matter and put an end to the rivalry in 1872, in the final version of the Sketch.

  16. Morrow, Reiff, Receive 2013 Space Physics and Aeronomy Richard Carrington Awards: Response

    Science.gov (United States)

    Reiff, Patricia H.

    2014-08-01

    It is a special privilege to receive this award honoring Richard Carrington's discovery of what we now call space weather. It is particularly appropriate that this award also recognizes Cherilynn Morrow, who 20 years ago made a presentation to the Space Science Advisory Committee on Jeff Rosendhal's idea of mission-based E/PO. We worked together, bringing that idea to the successful, but threatened, network it is today. For me, learning and teaching go hand in hand—as we publish our findings for our peers, we should also repay the public investment in our research with accurate, understandable results. My interest in space science was sparked by a father-daughter course in astronomy sponsored by the Brownies at the Oklahoma City Planetarium and kindled by the Bell Labs production The Strange Case of the Cosmic Rays directed by Frank Capra. Knowing that planetarium shows and educational movies can change lives, I have devoted a large portion of my last 25 years to creating software, shows, and portable planetariums to inspire and engage youth. This has not been a one-person effort, of course. My work Cherilynn Ann Morrow would have been impossible without the collaboration of Carolyn Sumners, vice president of the Houston Museum of Natural Science. Our museum kiosk and planetarium control software would not have happened without the skill and perseverance of my chief programmer, Colin Law. Jim Burch has been first a mentor and then a colleague on both the research and outreach sides of my career. I share this honor with a long line of highly talented students and postdocs who have contributed science content and outreach efforts. Most importantly, without the support of my husband, Tom Hill, I would not have had the time and freedom to build an educational network while continuing research and raising a family. I thank AGU for bestowing this honor.

  17. The reliability of the German version of the Richards Campbell Sleep Questionnaire.

    Science.gov (United States)

    Krotsetis, Susanne; Richards, Kathy C; Behncke, Anja; Köpke, Sascha

    2017-07-01

    The assessment of sleep quality in critically ill patients is a relevant factor of high-quality care. Despite the fact that sleep disturbances and insufficient sleep management contain an increased risk of severe morbidity for these patients, a translated and applicable instrument to evaluate sleep is not available for German-speaking intensive care settings. This study aimed to translate the Richards Campbell Sleep Questionnaire (RCSQ), a simple and validated instrument eligible for measuring sleep quality in critically ill patients, and subsequently to evaluate the internal consistency of the German version of the RCSQ. Furthermore, it also aimed to inquire into the perception of sleep in a sample of critically ill patients. The RCSQ was translated following established methodological standards. Data were collected cross-sectionally in a sample of 51 patients at 3 intensive care units at a university hospital in Germany. The German version of the RCSQ showed an overall internal consistency (Cronbach's alpha) of 0·88. The mean of the RSCQ in the sample was 47·00 (SD ± 27·57). Depth of sleep was rated the lowest and falling asleep again the highest of the RCSQ sleep items. The study demonstrated very good internal consistency of the German version of the RCSQ, allowing for its application in practice and research in German-speaking countries. Quality of sleep perception was generally low in this sample, emphasizing the need for enhanced care concepts regarding the sleep management of critically ill patients. Relevance to clinical practice Assessment of self-perception of sleep is crucial in order to plan an individually tailored care process. © 2017 British Association of Critical Care Nurses.

  18. An Enlightenment proposal for music therapy: Richard Brocklesby on music, spirit, and the passions.

    Science.gov (United States)

    Gouk, Penelope

    2015-01-01

    In 1749, the London physician Richard Brocklesby (1722-1797) published his Reflections on Antient [sic] and Modern Musick, an essay that not only sought to compare these practices in terms of their effects, but also to gather evidence supporting the use of music in treating mania and other mental diseases. As might be expected, Brocklesby's discussion of music therapy has already received attention by authors looking back to the origins of this practice, not least because he offers an account of a successful musical cure that took place in his own time (Rorke, 2001). My chapter, however, seeks to broaden the discussion of the Reflections, in order to show how Brocklesby's projected musical cures fit into his larger worldview, one that was influenced as much by Plato and other ancient philosophers as it was by modern thinkers such as Isaac Newton and his followers. Brocklesby's argument was essentially that music acted as a link between the mind and body and therefore could restore their intrinsic harmony, a connection that was mediated by the animal spirits, which also served as the vehicle of the passions. The movements and proportions of music could arouse or quell the passions by their effect on these (imaginary) spirits, which flowed through the nerves and brain and acted as the agent for the mind or soul. I show how his account of music in antiquity led him to reflect on the way that music was perceived and responded to in his own time, both as a stimulus to mental and bodily action, and as a source of esthetic pleasure through the cultivation of musical taste. © 2015 Elsevier B.V. All rights reserved.

  19. An experimental 'Life' for an experimental life: Richard Waller's biography of Robert Hooke (1705).

    Science.gov (United States)

    Moxham, Noah

    2016-03-01

    Richard Waller's 'Life of Dr Robert Hooke', prefixed to his edition of Hooke's Posthumous Works (1705), is an important source for the life of one of the most eminent members of the early Royal Society. It also has the distinction of being one of the earliest biographies of a man of science to be published in English. I argue that it is in fact the first biography to embrace the subject's natural-philosophical work as the centre of his life, and I investigate Waller's reasons for adopting this strategy and his struggle with the problem of how to represent an early experimental philosopher in print. I suggest that Waller eschews the 'Christian philosopher' tradition of contemporary biography - partly because of the unusually diverse and fragmentary nature of Hooke's intellectual output - and draws instead upon the structure of the Royal Society's archive as a means of organizing and understanding Hooke's life. The most quoted phrase from Waller's biography is that Hooke became 'to a crime close and reserved' in later life; this essay argues that Waller's biographical sketch was fashioned in order to undo the effects of that reserve. In modelling his approach very closely on the structure of the society's records he was principally concerned with making Hooke's work and biography accessible, intelligible and useful to the fellowship in a context familiar to them, a context which had provided the institutional framework for most of Hooke's adult life. I argue that Waller's 'Life' was also intended to make the largest claims for Hooke's intellectual standing that the author dared in the context of the enmity between Hooke and Isaac Newton once the latter became president of the Royal Society. However, I also adduce fresh manuscript evidence that Waller actually compiled, but did not publish, a defence of Hooke's claim to have discovered the inverse square law of gravity, allowing us to glimpse a much more assertive biography of Hooke than the published version.

  20. Timothy Leary, Richard Alpert (Ram Dass) and the changing definition of psilocybin.

    Science.gov (United States)

    Wark, Colin; Galliher, John F

    2010-05-01

    This research focuses on the events leading to the 1968 U.S. federal prohibition of psilocybin. It is a study of duelling moral entrepreneurs-Timothy Leary and Richard Alpert vs. the Harvard University Administration. The goal is to show how the primary active compound in an ostensibly harmless fungus (the psilocybin mushroom) became controversial in less than a decade. We used books, newspapers, magazine articles and previously unpublished materials (including documents from the Harvard Archives) to analyze Leary and Alpert's lives and careers through the early 1970s. The prohibition of psilocybin in the U.S. was largely a product of Leary and Alpert's involvement in the "Harvard drug scandal" and their transformation from Harvard professors to countercultural icons. They tested the substance on a variety of human subjects and in doing so piqued the interest of Harvard undergraduates while drawing condemnation from other faculty and Harvard administrators. This case is theoretically interesting because unlike most illegal drugs, psilocybin was never linked to a threatening minority group, but to some of the nation's most privileged youth. The Harvard administrators were not really moral entrepreneurs but Leary and Alpert clearly were. Although they were far from being prohibitionists, they were self-righteous crusaders on different but equally holy missions for the good of young and minority Americans. Ironically, due to their successes the possession of psilocybin was criminalized under United States federal law in 1968 (Pub. L. No. 90-639, Stat. 1361 1968 and Boire, 2002). This case study demonstrates that crusaders can be successful in changing culture even when laws are passed in futile attempts to control their behaviour, just as Leary predicted. Copyright 2009 Elsevier B.V. All rights reserved.

  1. Richard Doll and Alice Stewart: reputation and the shaping of scientific "truth".

    Science.gov (United States)

    Greene, Gayle

    2011-01-01

    As the world watched the Fukushima reactors release radionuclides into the ocean and atmosphere, the warnings of Dr. Alice Stewart about radiation risk and the reassurances of Sir Richard Doll assumed renewed relevance. Doll and Stewart, pioneer cancer epidemiologists who made major contributions in the 1950s-he by demonstrating the link between lung cancer and smoking, she by discovering that fetal X-rays double the chance of a childhood cancer-were locked into opposition about low-dose radiation risk. When she went public with the discovery that radiation at a fraction of the dose "known" to be dangerous could kill a child, her reputation plummeted, whereas Doll, foremost among her detractors, was knighted and lauded as "the world's most distinguished medical epidemiologist" for his work. Their lives and careers, so closely intertwined, took contrary courses, he becoming "more of the establishment" (as he said), while she became more oppositional. When it was discovered, after his death, that he'd been taking large sums of money from industries whose chemicals he was clearing of cancer risk, his reputation remained unscathed; it is now enshrined in the "Authorized Biography" (2009) commissioned by the Wellcome Institute, along with Doll's denigration of Stewart as an "embittered" woman and biased scientist. Stewart lived long enough to see radiation science move her way, to see international committees affirm, in the 1990s, that there is no threshold beneath which radiation ceases to be dangerous; recent evidence from Chernobyl is bearing out her warnings. But a look at the making and breaking of these reputations reveals the power of status, position, and image to shape scientific "knowledge" and social policy.

  2. Measuring exposure in DDoS protection services

    NARCIS (Netherlands)

    Jonker, Mattijs; Sperotto, Anna

    2017-01-01

    Denial-of-Service attacks have rapidly gained in popularity over the last decade. The increase in frequency, size, and complexity of attacks has made DDoS Protection Services (DPS) an attractive mitigation solution to which the protection of services can be outsourced. Despite a thriving market and

  3. Service Modeling for Service Engineering

    Science.gov (United States)

    Shimomura, Yoshiki; Tomiyama, Tetsuo

    Intensification of service and knowledge contents within product life cycles is considered crucial for dematerialization, in particular, to design optimal product-service systems from the viewpoint of environmentally conscious design and manufacturing in advanced post industrial societies. In addition to the environmental limitations, we are facing social limitations which include limitations of markets to accept increasing numbers of mass-produced artifacts and such environmental and social limitations are restraining economic growth. To attack and remove these problems, we need to reconsider the current mass production paradigm and to make products have more added values largely from knowledge and service contents to compensate volume reduction under the concept of dematerialization. Namely, dematerialization of products needs to enrich service contents. However, service was mainly discussed within marketing and has been mostly neglected within traditional engineering. Therefore, we need new engineering methods to look at services, rather than just functions, called "Service Engineering." To establish service engineering, this paper proposes a modeling technique of service.

  4. Investigating the Possibility to Individualize Asthma Attack Therapy Based on Attack Severity and Patient Characteristics

    Directory of Open Access Journals (Sweden)

    Sárkány Zoltán

    2016-03-01

    Full Text Available Introduction: The objective of this study was to investigate with the help of a computerized simulation model whether the treatment of an acute asthma attack can be individualized based on the severity of the attack and the characteristics of the patient. Material and Method: A stochastic lung model was used to simulate the deposition of 1 nm - 10 μm particles during a mild and a moderate asthma attack. Breathing parameters were varied to maximize deposition, and simulation results were compared with those obtained in the case of a severe asthma attack. In order to investigate the effect of height on the deposition of inhaled particles, another series of simulations was carried out with identical breathing parameters, comparing patient heights of 155 cm, 175 cm and 195 cm. Results: The optimization process yielded an increase in the maximum deposition values of around 6-7% for each type of investigated asthma attack, and the difference between attacks of different degree of severity was around 5% for both the initial and the optimized values, a higher degree of obstruction increasing the amount of deposited particles. Conclusions: Our results suggest that the individualization of asthma attack treatment cannot be based on particles of different size, as the highest deposited fraction in all three types of attacks can be obtained using 0.01 μm particles. The use of a specific set of breathing parameters yields a difference between a mild and a moderate, as well as a moderate and a severe asthma attack of around 5%.

  5. An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2016-01-01

    Full Text Available DDoS attacks can prevent legitimate users from accessing the service by consuming resource of the target nodes, whose availability of network and service is exposed to a significant threat. Therefore, DDoS traffic perception is the premise and foundation of the whole system security. In this paper the method of DDoS traffic perception for SOA network based on time united conditional entropy was proposed. According to many-to-one relationship mapping between the source IP address and destination IP addresses of DDoS attacks, traffic characteristics of services are analyzed based on conditional entropy. The algorithm is provided with perception ability of DDoS attacks on SOA services by introducing time dimension. Simulation results show that the novel method can realize DDoS traffic perception with analyzing abrupt variation of conditional entropy in time dimension.

  6. Exact and grid-free solutions to the Lighthill-Whitham-Richards traffic flow model with bounded acceleration for a class of fundamental diagrams

    KAUST Repository

    Qiu, Shanwen; Abdelaziz, Mohamed Ewis; Abdel Latif, Fadl Hicham Fadl; Claudel, Christian G.

    2013-01-01

    In this article, we propose a new exact and grid-free numerical scheme for computing solutions associated with an hybrid traffic flow model based on the Lighthill-Whitham-Richards (LWR) partial differential equation, for a class of fundamental

  7. Süüme sundis vabrikujuhti palgatööliseks jääma / Richard Mutso ; interv. Jüri Saar

    Index Scriptorium Estoniae

    Mutso, Richard, 1933-

    2003-01-01

    Intervjuu Võru mööblitehase Wermo peadirektorina töötanud, praeguse tehase nõukogu liikme Richard Mutsoga tehase juhtimisest, euroreferendumist, eraelust. Kommenteerivad: Silva Mutso, Veljo Ipits

  8. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  9. Network overload due to massive attacks

    Science.gov (United States)

    Kornbluth, Yosef; Barach, Gilad; Tuchman, Yaakov; Kadish, Benjamin; Cwilich, Gabriel; Buldyrev, Sergey V.

    2018-05-01

    We study the cascading failure of networks due to overload, using the betweenness centrality of a node as the measure of its load following the Motter and Lai model. We study the fraction of survived nodes at the end of the cascade pf as a function of the strength of the initial attack, measured by the fraction of nodes p that survive the initial attack for different values of tolerance α in random regular and Erdös-Renyi graphs. We find the existence of a first-order phase-transition line pt(α ) on a p -α plane, such that if p pt , pf is large and the giant component of the network is still present. Exactly at pt, the function pf(p ) undergoes a first-order discontinuity. We find that the line pt(α ) ends at a critical point (pc,αc) , in which the cascading failures are replaced by a second-order percolation transition. We find analytically the average betweenness of nodes with different degrees before and after the initial attack, we investigate their roles in the cascading failures, and we find a lower bound for pt(α ) . We also study the difference between localized and random attacks.

  10. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  11. Intrusion-Tolerant Replication under Attack

    Science.gov (United States)

    Kirsch, Jonathan

    2010-01-01

    Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…

  12. Strengthening Crypto-1 Cipher Against Algebraic Attacks

    Directory of Open Access Journals (Sweden)

    Farah Afianti

    2015-08-01

    Full Text Available In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.

  13. Wrap-Attack Pack: Product Packaging Exercise

    Science.gov (United States)

    Lee, Seung Hwan; Hoffman, K. Douglas

    2016-01-01

    Although many marketing courses discuss traditional concepts pertaining to product strategy, concepts specifically relating to packaging are often glossed over. This exercise, "Wrap-Attack Pack," teaches students about the utilitarian and hedonic design elements of packaging. More specifically, the primary objective is to creatively…

  14. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  15. Algebraic Side-Channel Attack on Twofish

    Directory of Open Access Journals (Sweden)

    Chujiao Ma

    2017-05-01

    Full Text Available While algebraic side-channel attack (ASCA has been successful in breaking simple cryptographic algorithms, it has never been done on larger or more complex algorithms such as Twofish. Compared to other algorithms that ASCA has been used on, Twofish is more difficult to attack due to the key-dependent S-boxes as well as the complex key scheduling. In this paper, we propose the first algebraic side-channel attack on Twofish, and examine the importance of side-channel information in getting past the key-dependent S-boxes and the complex key scheduling. The cryptographic algorithm and side-channel information are both expressed as boolean equations and a SAT solver is used to recover the key. While algebraic attack by itself is not sufficient to break the algorithm, with the help of side-channel information such as Hamming weights, we are able to correctly solve for 96 bits of the 128 bits key in under 2 hours with known plaintext/ciphertext.

  16. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    offer no security. With over 17,430 such geographically separated military sites across the United States, these fatal shootings by a Kuwaiti- born ...increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant

  17. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Stux, DuQu, Nitro, Luckycat, Exploit Kits, FLAME. ADSL/SoHo Router Compromise. Botnets of compromised ADSL/SoHo Routers; User Redirection via malicious DNS entry. Web Application attacks. SQL Injection, RFI etc. More and more Webshells. More utility to hackers; Increasing complexity and evading mechanisms.

  18. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  19. Association between Terror Attacks and Suicide Attempts

    Science.gov (United States)

    Weizman, Tal; Yagil, Yaron; Schreiber, Shaul

    2009-01-01

    Based on Durkheim's "Control theory," we explored the association between frequency of terror attacks in Israel and the frequency of suicide attempts admitted to the Emergency Room of a major general hospital in Tel-Aviv (1999-2004). Analysis of the six-year study period as a whole revealed no significant correlation between the…

  20. Rising Trend: Complex and sophisticated attack methods

    Indian Academy of Sciences (India)

    Increased frequency and intensity of DoS/DDoS. Few Gbps is now normal; Anonymous VPNs being used; Botnets being used as a vehicle for launching DDoS attacks. Large scale booking of domain names. Hundred thousands of domains registered in short duration via few registrars; Single registrant; Most of the domains ...