WorldWideScience

Sample records for surveillance target attack

  1. Use of outcomes to evaluate surveillance systems for bioterrorist attacks

    Directory of Open Access Journals (Sweden)

    Abrams Allyson M

    2010-05-01

    Full Text Available Abstract Background Syndromic surveillance systems can potentially be used to detect a bioterrorist attack earlier than traditional surveillance, by virtue of their near real-time analysis of relevant data. Receiver operator characteristic (ROC curve analysis using the area under the curve (AUC as a comparison metric has been recommended as a practical evaluation tool for syndromic surveillance systems, yet traditional ROC curves do not account for timeliness of detection or subsequent time-dependent health outcomes. Methods Using a decision-analytic approach, we predicted outcomes, measured in lives, quality adjusted life years (QALYs, and costs, for a series of simulated bioterrorist attacks. We then evaluated seven detection algorithms applied to syndromic surveillance data using outcomes-weighted ROC curves compared to simple ROC curves and timeliness-weighted ROC curves. We performed sensitivity analyses by varying the model inputs between best and worst case scenarios and by applying different methods of AUC calculation. Results The decision analytic model results indicate that if a surveillance system was successful in detecting an attack, and measures were immediately taken to deliver treatment to the population, the lives, QALYs and dollars lost could be reduced considerably. The ROC curve analysis shows that the incorporation of outcomes into the evaluation metric has an important effect on the apparent performance of the surveillance systems. The relative order of performance is also heavily dependent on the choice of AUC calculation method. Conclusions This study demonstrates the importance of accounting for mortality, morbidity and costs in the evaluation of syndromic surveillance systems. Incorporating these outcomes into the ROC curve analysis allows for more accurate identification of the optimal method for signaling a possible bioterrorist attack. In addition, the parameters used to construct an ROC curve should be given careful

  2. Armed Deterrence: Countering Soft Target Attacks

    Science.gov (United States)

    2016-02-06

    increasing trend and the carnage 4 that IS sympathizers can unleash. This coordinated attack on a concert hall, a soccer stadium, and restaurant...have campus police departments located on the university grounds, a preferred option would be to utilize the police department’s secured facility to

  3. The current state of bioterrorist attack surveillance and preparedness in the US

    OpenAIRE

    Grundmann O

    2014-01-01

    Oliver Grundmann Department of Medicinal Chemistry, College of Pharmacy, University of Florida, Gainesville, FL, USA Abstract: The use of biological agents as weapons to disrupt established structures, such as governments and especially larger urban populations, has been prevalent throughout history. Following the anthrax letters sent to various government officials in the fall of 2001, the US has been investing in prevention, surveillance, and preparation for a potential bioterrorism attack...

  4. Identifying optimal targets of network attack by belief propagation

    CERN Document Server

    Mugisha, Salomon

    2016-01-01

    For a network formed by nodes and undirected links between pairs of nodes, the network optimal attack problem aims at deleting a minimum number of target nodes to break the network down into many small components. This problem is intrinsically related to the feedback vertex set problem that was successfully tackled by spin glass theory and an associated belief propagation-guided decimation (BPD) algorithm [H.-J. Zhou, Eur.~Phys.~J.~B 86 (2013), 455]. In the present work we apply a slightly adjusted version of the BPD algorithm to the network optimal attack problem, and demonstrate that it has much better performance than a recently proposed Collective Information algorithm [F. Morone and H. A. Makse, Nature 524 (2015), 63--68] for different types of random networks and real-world network instances. The BPD-guided attack scheme often induces an abrupt collapse of the whole network, which may make it very difficult to defend.

  5. The current state of bioterrorist attack surveillance and preparedness in the US

    Directory of Open Access Journals (Sweden)

    Grundmann O

    2014-10-01

    Full Text Available Oliver Grundmann Department of Medicinal Chemistry, College of Pharmacy, University of Florida, Gainesville, FL, USA Abstract: The use of biological agents as weapons to disrupt established structures, such as governments and especially larger urban populations, has been prevalent throughout history. Following the anthrax letters sent to various government officials in the fall of 2001, the US has been investing in prevention, surveillance, and preparation for a potential bioterrorism attack. Additional funding authorized since 2002 has assisted the Centers for Disease Control and Prevention, the Department of Health and Human Services, and the Environmental Protection Agency to invest in preventative research measures as well as preparedness programs, such as the Laboratory Response Network, Hospital Preparedness Program, and BioWatch. With both sentinel monitoring systems and epidemiological surveillance programs in place for metropolitan areas, the immediate threat of a large-scale bioterrorist attack may be limited. However, early detection is a crucial factor to initiate immediate response measures to prevent further spread following dissemination of a biological agent. Especially in rural areas, an interagency approach to train health care workers and raise awareness for the general public remain primary tasks, which is an ongoing challenge. Risk-management approaches in responding to dissemination of biological agents, as well as appropriate decontamination measures that reduce the probability of further contamination, have been provided, and suggest further investments in preparedness and surveillance. Ongoing efforts to improve preparedness and response to a bioterrorist attack are crucial to further reduce morbidity, mortality, and economic impact on public health. Keywords: bioterrorism, public health policy, risk management, community preparedness

  6. Effect of target change during the simple attack in fencing.

    Science.gov (United States)

    Gutiérrez-Dávila, Marcos; Rojas, F Javier; Caletti, Matteo; Antonio, Raquel; Navarro, Enrique

    2013-01-01

    The aim of this study was to test the effect that changing targets during a simple long lunge attack in fencing exerts on the temporal parameters of the reaction response, the execution speed, and the precision and the coordination of the movement pattern. Thirty fencers with more than 10 years of experience participated in this study. Two force platforms were used to record the horizontal components of the reaction forces and thereby to determine the beginning of the movement. A three-dimensional (3D) system recorded the spatial positions of the 9 markers situated on the fencer plus the epee, while a moving target was projected on a screen, enabling the control of the target change. The results indicated that when a target change is provoked the reaction time (RT), movement time (MT), and the time used in the acceleration phase of the centre of mass (CM) increases significantly with respect to the attack executed with a straight thrust. The speed and horizontal distance reached by the CM at the end of the acceleration phase (VX(CM) and SX(CM), respectively) significantly decreased, while the errors increased. However, the temporal sequence of the movement pattern did not appreciably change.

  7. Identifying optimal targets of network attack by belief propagation

    Science.gov (United States)

    Mugisha, Salomon; Zhou, Hai-Jun

    2016-07-01

    For a network formed by nodes and undirected links between pairs of nodes, the network optimal attack problem aims at deleting a minimum number of target nodes to break the network down into many small components. This problem is intrinsically related to the feedback vertex set problem that was successfully tackled by spin-glass theory and an associated belief propagation-guided decimation (BPD) algorithm [Zhou, Eur. Phys. J. B 86, 455 (2013), 10.1140/epjb/e2013-40690-1]. In the present work we apply the BPD algorithm (which has approximately linear time complexity) to the network optimal attack problem and demonstrate that it has much better performance than a recently proposed collective information algorithm [Morone and Makse, Nature 524, 65 (2015), 10.1038/nature14604] for different types of random networks and real-world network instances. The BPD-guided attack scheme often induces an abrupt collapse of the whole network, which may make it very difficult to defend.

  8. Robustness of Dengue Complex Network under Targeted versus Random Attack

    Directory of Open Access Journals (Sweden)

    Hafiz Abid Mahmood Malik

    2017-01-01

    Full Text Available Dengue virus infection is one of those epidemic diseases that require much consideration in order to save the humankind from its unsafe impacts. According to the World Health Organization (WHO, 3.6 billion individuals are at risk because of the dengue virus sickness. Researchers are striving to comprehend the dengue threat. This study is a little commitment to those endeavors. To observe the robustness of the dengue network, we uprooted the links between nodes randomly and targeted by utilizing different centrality measures. The outcomes demonstrated that 5% targeted attack is equivalent to the result of 65% random assault, which showed the topology of this complex network validated a scale-free network instead of random network. Four centrality measures (Degree, Closeness, Betweenness, and Eigenvector have been ascertained to look for focal hubs. It has been observed through the results in this study that robustness of a node and links depends on topology of the network. The dengue epidemic network presented robust behaviour under random attack, and this network turned out to be more vulnerable when the hubs of higher degree have higher probability to fail. Moreover, representation of this network has been projected, and hub removal impact has been shown on the real map of Gombak (Malaysia.

  9. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  10. Deubiquitinases: Novel Therapeutic Targets in Immune Surveillance?

    Directory of Open Access Journals (Sweden)

    Gloria Lopez-Castejon

    2016-01-01

    Full Text Available Inflammation is a protective response of the organism to tissue injury or infection. It occurs when the immune system recognizes Pathogen-Associated Molecular Patterns (PAMPs or Damage-Associated Molecular Pattern (DAMPs through the activation of Pattern Recognition Receptors. This initiates a variety of signalling events that conclude in the upregulation of proinflammatory molecules, which initiate an appropriate immune response. This response is tightly regulated since any aberrant activation of immune responses would have severe pathological consequences such as sepsis or chronic inflammatory and autoimmune diseases. Accumulative evidence shows that the ubiquitin system, and in particular ubiquitin-specific isopeptidases also known as deubiquitinases (DUBs, plays crucial roles in the control of these immune pathways. In this review we will give an up-to-date overview on the role of DUBs in the NF-κB pathway and inflammasome activation, two intrinsically related events triggered by activation of the membrane TLRs as well as the cytosolic NOD and NLR receptors. Modulation of DUB activity by small molecules has been proposed as a way to control dysregulation or overactivation of these key players of the inflammatory response. We will also discuss the advances and challenges of a potential use of DUBs as therapeutic targets in inflammatory pathologies.

  11. Understanding trade pathways to target biosecurity surveillance

    Directory of Open Access Journals (Sweden)

    Manuel Colunga-Garcia

    2013-09-01

    Full Text Available Increasing trends in global trade make it extremely difficult to prevent the entry of all potential invasive species (IS. Establishing early detection strategies thus becomes an important part of the continuum used to reduce the introduction of invasive species. One part necessary to ensure the success of these strategies is the determination of priority survey areas based on invasion pressure. We used a pathway-centred conceptual model of pest invasion to address these questions: what role does global trade play in invasion pressure of plant ecosystems and how could an understanding of this role be used to enhance early detection strategies? We concluded that the relative level of invasion pressure for destination ecosystems can be influenced by the intensity of pathway usage (import volume and frequency, the number and type of pathways with a similar destination, and the number of different ecological regions that serve as the source for imports to the same destination. As these factors increase, pressure typically intensifies because of increasing a propagule pressure, b likelihood of transporting pests with higher intrinsic invasion potential, and c likelihood of transporting pests into ecosystems with higher invasibility. We used maritime containerized imports of live plants into the contiguous U.S. as a case study to illustrate the practical implications of the model to determine hotspot areas of relative invasion pressure for agricultural and forest ecosystems (two ecosystems with high potential invasibility. Our results illustrated the importance of how a pathway-centred model could be used to highlight potential target areas for early detection strategies for IS. Many of the hotspots in agricultural and forest ecosystems were within major U.S. metropolitan areas. Invasion ecologists can utilize pathway-centred conceptual models to a better understand the role of human-mediated pathways in pest establishment, b enhance current

  12. Impact modeling and prediction of attacks on cyber targets

    Science.gov (United States)

    Khalili, Aram; Michalk, Brian; Alford, Lee; Henney, Chris; Gilbert, Logan

    2010-04-01

    In most organizations, IT (information technology) infrastructure exists to support the organization's mission. The threat of cyber attacks poses risks to this mission. Current network security research focuses on the threat of cyber attacks to the organization's IT infrastructure; however, the risks to the overall mission are rarely analyzed or formalized. This connection of IT infrastructure to the organization's mission is often neglected or carried out ad-hoc. Our work bridges this gap and introduces analyses and formalisms to help organizations understand the mission risks they face from cyber attacks. Modeling an organization's mission vulnerability to cyber attacks requires a description of the IT infrastructure (network model), the organization mission (business model), and how the mission relies on IT resources (correlation model). With this information, proper analysis can show which cyber resources are of tactical importance in a cyber attack, i.e., controlling them enables a large range of cyber attacks. Such analysis also reveals which IT resources contribute most to the organization's mission, i.e., lack of control over them gravely affects the mission. These results can then be used to formulate IT security strategies and explore their trade-offs, which leads to better incident response. This paper presents our methodology for encoding IT infrastructure, organization mission and correlations, our analysis framework, as well as initial experimental results and conclusions.

  13. Target tracking and surveillance by fusing stereo and RFID information

    Science.gov (United States)

    Raza, Rana H.; Stockman, George C.

    2012-06-01

    Ensuring security in high risk areas such as an airport is an important but complex problem. Effectively tracking personnel, containers, and machines is a crucial task. Moreover, security and safety require understanding the interaction of persons and objects. Computer vision (CV) has been a classic tool; however, variable lighting, imaging, and random occlusions present difficulties for real-time surveillance, resulting in erroneous object detection and trajectories. Determining object ID via CV at any instance of time in a crowded area is computationally prohibitive, yet the trajectories of personnel and objects should be known in real time. Radio Frequency Identification (RFID) can be used to reliably identify target objects and can even locate targets at coarse spatial resolution, while CV provides fuzzy features for target ID at finer resolution. Our research demonstrates benefits obtained when most objects are "cooperative" by being RFID tagged. Fusion provides a method to simplify the correspondence problem in 3D space. A surveillance system can query for unique object ID as well as tag ID information, such as target height, texture, shape and color, which can greatly enhance scene analysis. We extend geometry-based tracking so that intermittent information on ID and location can be used in determining a set of trajectories of N targets over T time steps. We show that partial-targetinformation obtained through RFID can reduce computation time (by 99.9% in some cases) and also increase the likelihood of producing correct trajectories. We conclude that real-time decision-making should be possible if the surveillance system can integrate information effectively between the sensor level and activity understanding level.

  14. Gray Matter Is Targeted in First-Attack Multiple Sclerosis

    Energy Technology Data Exchange (ETDEWEB)

    Schutzer, Steven E.; Angel, Thomas E.; Liu, Tao; Schepmoes, Athena A.; Xie, Fang; Bergquist, Jonas P.; Vecsei, Lazlo' ; Zadori, Denes; Camp, David G.; Holland, Bart K.; Smith, Richard D.; Coyle, Patricia K.

    2013-09-10

    The cause of multiple sclerosis (MS), its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF) of first-attack MS patients (two independent groups) compared to established relapsing remitting (RR) MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse). Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  15. Gray matter is targeted in first-attack multiple sclerosis.

    Directory of Open Access Journals (Sweden)

    Steven E Schutzer

    Full Text Available The cause of multiple sclerosis (MS, its driving pathogenesis at the earliest stages, and what factors allow the first clinical attack to manifest remain unknown. Some imaging studies suggest gray rather than white matter may be involved early, and some postulate this may be predictive of developing MS. Other imaging studies are in conflict. To determine if there was objective molecular evidence of gray matter involvement in early MS we used high-resolution mass spectrometry to identify proteins in the cerebrospinal fluid (CSF of first-attack MS patients (two independent groups compared to established relapsing remitting (RR MS and controls. We found that the CSF proteins in first-attack patients were differentially enriched for gray matter components (axon, neuron, synapse. Myelin components did not distinguish these groups. The results support that gray matter dysfunction is involved early in MS, and also may be integral for the initial clinical presentation.

  16. Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks

    OpenAIRE

    2015-01-01

    With the convergence of Internet and telephony, new applications (e.g., WhatsApp) have emerged as an important means of communication for billions of users. These applications are becoming an attractive medium for attackers to deliver spam and carry out more targeted attacks. Since such applications rely on phone numbers, we explore the feasibility, automation, and scalability of phishing attacks that can be carried out by abusing a phone number. We demonstrate a novel system that takes a pot...

  17. Variable structure guidance law for attacking surface maneuver targets

    Institute of Scientific and Technical Information of China (English)

    Han Yanhua; Xu Bo

    2008-01-01

    The characteristics of surface maneuver targets are analyzed and a 3-D relative motion model for missiles and targets is established. A variable structure guidance law is designed considering the characteristics of targets. In the guidance law, the distance between missiles and targets as well as the missile-target relative velocity are all substituted by estimation values. The estimation errors, the target's velocity, and the maneuver acceleration are all treated as bounded disturbance. The guidance law proposed can be implemented conveniently in engineering with little target information. The performance of the guidance system is analyzed theoretically and the numerical simulation result shows the effectiveness of the guidance law.

  18. Finding new drug targets for the treatment of migraine attacks

    DEFF Research Database (Denmark)

    Olesen, J; Olesen, Jes; Tfelt-Hansen, P

    2009-01-01

    No new preventive drugs specific to migraine have appeared for the last 20 years and existing acute therapies need improvement. Unfortunately, no animal models can predict the efficacy of new therapies for migraine. Because migraine attacks are fully reversible and can be aborted by therapy......, the headache- or migraine-provoking property of naturally occurring signalling molecules can be tested in a human model. This model has predicted efficacy of nitric oxide synthase inhibition and calcitonin gene-related peptide receptor blockade. The pharmaceutical industry should pay more attention to human...

  19. A mathematical model for a distributed attack on targeted resources in a computer network

    Science.gov (United States)

    Haldar, Kaushik; Mishra, Bimal Kumar

    2014-09-01

    A mathematical model has been developed to analyze the spread of a distributed attack on critical targeted resources in a network. The model provides an epidemic framework with two sub-frameworks to consider the difference between the overall behavior of the attacking hosts and the targeted resources. The analysis focuses on obtaining threshold conditions that determine the success or failure of such attacks. Considering the criticality of the systems involved and the strength of the defence mechanism involved, a measure has been suggested that highlights the level of success that has been achieved by the attacker. To understand the overall dynamics of the system in the long run, its equilibrium points have been obtained and their stability has been analyzed, and conditions for their stability have been outlined.

  20. Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks

    Science.gov (United States)

    Shafi, Rehan; Rahim, Aneel; Bin Muhaya, Fahad; Ashraf, Shehzad; Sher, Muhammad

    Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount of energy etc. so this situation can lead to targeted attacks. An Internet connected node can easily generate flood over a node of sensor network. So to handle these types of attacks we in this paper introduced a new secure authentication mechanism that works when a potential of attack is detected. Moreover we also authorized the nodes of the wireless mesh network to demand data according to their capacity by using pull data traffic control mechanism. We applied this solution first on mesh routers to discourage targeted attacks and secondly we applied the solution on an individual node that lies in between a node and mesh router.

  1. $k$-core percolation on complex networks: Comparing random, localized and targeted attacks

    CERN Document Server

    Yuan, Xin; Stanley, H Eugene; Havlin, Shlomo

    2016-01-01

    The type of malicious attack inflicting on networks greatly influences their stability under ordinary percolation in which a node fails when it becomes disconnected from the giant component. Here we study its generalization, $k$-core percolation, in which a node fails when it loses connection to a threshold $k$ number of neighbors. We study and compare analytically and by numerical simulations of $k$-core percolation the stability of networks under random attacks (RA), localized attacks (LA) and targeted attacks (TA), respectively. By mapping a network under LA or TA into an equivalent network under RA, we find that in both single and interdependent networks, TA exerts the greatest damage to the core structure of a network. We also find that for Erd\\H{o}s-R\\'{e}nyi (ER) networks, LA and RA exert equal damage to the core structure whereas for scale-free (SF) networks, LA exerts much more damage than RA does to the core structure.

  2. Surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders; Coeckelbergh, Mark; Matzner, Tobias;

    Studying surveillance involves raising questions about the very nature of concepts such as information, technology, identity, space and power. Besides the maybe all too obvious ethical issues often discussed with regard to surveillance, there are several other angles and approaches that we should...... like to encourage. Therefore, our panel will focus on the philosophical, yet non-ethical issues of surveillance in order to stimulate an intense debate with the audience on the ethical implications of our enquiries. We also hope to provide a broader and deeper understanding of surveillance....

  3. Targeting the Human Complement Membrane Attack Complex to Selectively Kill Prostate Cancer Cells

    Science.gov (United States)

    2012-10-01

    Kill Prostate Cancer Cells PRINCIPAL INVESTIGATOR: Samuel R. Denmeade, MD CONTRACTING ORGANIZATION: Johns Hopkins University...Annual 3. DATES COVERED t 2011- 29 2012 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER . Targeting the Human Complement Membrane Attack Complex to...Support: DOD Idea Award W81XWH-10-PCRP-IDA to SRD; DOD Predoctoral Fellowship W81XWH-09-1-0219 to MLM ; DOD Post-Doctoral Fellowship to MBK; Prostate

  4. Maritime target and sea clutter measurements with a coherent Doppler polarimetric surveillance radar

    NARCIS (Netherlands)

    Smith, A.J.E.; Gelsema, S.J.; Kester, L.J.H.M.; Melief, H.W.; Premel Cabic, G.; Theil, A.; Woudenberg, E.

    2002-01-01

    Doppler polarimetry in a surveillance radar for the maritime surface picture is considered. This radar must be able to detect low-RCS targets in littoral environments. Measurements on such targets have been conducted with a coherent polarimetric measurement radar in March 2001 and preliminary

  5. Maritime target and sea clutter measurements with a coherent Doppler polarimetric surveillance radar

    NARCIS (Netherlands)

    Smith, A.J.E.; Gelsema, S.J.; Kester, L.J.H.M.; Melief, H.W.; Premel Cabic, G.; Theil, A.; Woudenberg, E.

    2002-01-01

    Doppler polarimetry in a surveillance radar for the maritime surface picture is considered. This radar must be able to detect low-RCS targets in littoral environments. Measurements on such targets have been conducted with a coherent polarimetric measurement radar in March 2001 and preliminary result

  6. The human functional brain network demonstrates structural and dynamical resilience to targeted attack.

    Directory of Open Access Journals (Sweden)

    Karen E Joyce

    Full Text Available In recent years, the field of network science has enabled researchers to represent the highly complex interactions in the brain in an approachable yet quantitative manner. One exciting finding since the advent of brain network research was that the brain network can withstand extensive damage, even to highly connected regions. However, these highly connected nodes may not be the most critical regions of the brain network, and it is unclear how the network dynamics are impacted by removal of these key nodes. This work seeks to further investigate the resilience of the human functional brain network. Network attack experiments were conducted on voxel-wise functional brain networks and region-of-interest (ROI networks of 5 healthy volunteers. Networks were attacked at key nodes using several criteria for assessing node importance, and the impact on network structure and dynamics was evaluated. The findings presented here echo previous findings that the functional human brain network is highly resilient to targeted attacks, both in terms of network structure and dynamics.

  7. The human functional brain network demonstrates structural and dynamical resilience to targeted attack.

    Science.gov (United States)

    Joyce, Karen E; Hayasaka, Satoru; Laurienti, Paul J

    2013-01-01

    In recent years, the field of network science has enabled researchers to represent the highly complex interactions in the brain in an approachable yet quantitative manner. One exciting finding since the advent of brain network research was that the brain network can withstand extensive damage, even to highly connected regions. However, these highly connected nodes may not be the most critical regions of the brain network, and it is unclear how the network dynamics are impacted by removal of these key nodes. This work seeks to further investigate the resilience of the human functional brain network. Network attack experiments were conducted on voxel-wise functional brain networks and region-of-interest (ROI) networks of 5 healthy volunteers. Networks were attacked at key nodes using several criteria for assessing node importance, and the impact on network structure and dynamics was evaluated. The findings presented here echo previous findings that the functional human brain network is highly resilient to targeted attacks, both in terms of network structure and dynamics.

  8. Stability of Dominating Sets in Complex Networks against Random and Targeted Attacks

    Science.gov (United States)

    Molnar, F.; Derzsy, N.; Szymanski, B. K.; Korniss, G.

    2014-03-01

    Minimum dominating sets (MDS) are involved in efficiently controlling and monitoring many social and technological networks. However, MDS influence over the entire network may be significantly reduced when some MDS nodes are disabled due to random breakdowns or targeted attacks against nodes in the network. We investigate the stability of domination in scale-free networks in such scenarios. We define stability as the fraction of nodes in the network that are still dominated after some nodes have been removed, either randomly, or by targeting the highest-degree nodes. We find that although the MDS is the most cost-efficient solution (requiring the least number of nodes) for reaching every node in an undamaged network, it is also very sensitive to damage. Further, we investigate alternative methods for finding dominating sets that are less efficient (more costly) than MDS but provide better stability. Finally we construct an algorithm based on greedy node selection that allows us to precisely control the balance between domination stability and cost, to achieve any desired stability at minimum cost, or the best possible stability at any given cost. Analysis of our method shows moderate improvement of domination cost efficiency against random breakdowns, but substantial improvements against targeted attacks. Supported by DARPA, DTRA, ARL NS-CTA, ARO, and ONR.

  9. Factors affecting ambulance utilization for asthma attack treatment: understanding where to target interventions.

    Science.gov (United States)

    Raun, L H; Ensor, K B; Campos, L A; Persse, D

    2015-05-01

    Asthma is a serious, sometimes fatal condition, in which attacks vary in severity, potentially requiring emergency medical services (EMS) ambulance treatment. A portion of asthma attacks requiring EMS ambulance treatment may be prevented with improved education and access to care. The aim of this study was to identify areas of the city with high rates of utilization of EMS ambulance for treatment, and the demographics, socio-economic status, and time of day associated with these rates, to better target future interventions to prevent emergencies and reduce cost. A cross-sectional study was conducted on individuals in Houston, TX (USA) requiring ambulance treatment for asthma attacks from 2004 to 2011. 12,155 EMS ambulance-treated asthma attack cases were linked to census tracts. High rate treatment areas were identified with geospatial mapping. Census tract demographic characteristics of these high rate areas were compared with the remainder of the city using logistic regression. The association between case level demographics and the time of day of asthma attack within the high rate area was also assessed with logistic regression. EMS ambulance-treated high rate areas were identified and found to have a utilization incidence rate over six times higher per 100,000 people than the remainder of the city. There is an increased risk of location in this high rate area with a census tract level increase of percent of population: earning less than $10,000 yearly income (RR 1.21, 1.16-1.26), which is black (RR 1.08, 1.07-1.10), which is female (RR 1.34, 1.20-1.49) and have obtained less than a high school degree (RR 1.02, 1.01-1.03). Within the high rate area, case level data indicates an increased risk of requiring an ambulance after normal doctor office hours for men compared with women (RR 1.13, 1.03-1.22), for black compared with Hispanic ethnicity (RR 1.31, 1.08-1.59), or for adults (less than 41 and greater than 60) compared with children. Interventions to prevent

  10. Numerical simulation of radar surveillance for the ship target in oceanic clutters

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A fast iterative approach of generalized forward-backward method with the spectrum acceleration algorithm (GFBM/SAA) is developed for solving electromagnetic field integral equation and is applied to numerical simulation of radar surveillance of the ship target in oceanic clutters. Randomly rough surface is realized by the Monte Carlo method using the Pierson-Moskowitz spectrum. Numerical results of bistatic and back-scattering from the ship target and oceanic clutters demonstrate the functional dependencies upon the situation of radar surveillance such as the incidence and observation angles, radar altitude, ship RCS and other oceanic conditions.

  11. Targeted CWD surveillance mule deer HD 600 February 2015

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — February 2015 Progress report for Targeted Chronic Wasting Disease Project in Montana Hunting District 600. From February 5-6th, 25 mule deer were captured in...

  12. Selecting Targeted Symptoms/Syndromes for Syndromic Surveillance in Rural China

    Science.gov (United States)

    Tan, Li; Zhang, Jie; Cheng, Liwei; Yan, Weirong; Diwan, Vinod K.; Long, Lu; Nie, Shaofa

    2013-01-01

    Objective To select the potential targeted symptoms/syndromes as early warning indicators for epidemics or outbreaks detection in rural China. Introduction Patients’ chief complaints (CCs) as a common data source, has been widely used in syndromic surveillance due to its timeliness, accuracy and availability (1). For automated syndromic surveillance, CCs always classified into predefined syndromic categories to facilitate subsequent data aggregation and analysis. However, in rural China, most outpatient doctors recorded the information of patients (e.g. CCs) into clinic logs manually rather than computers. Thus, more convenient surveillance method is needed in the syndromic surveillance project (ISSC). And the first and important thing is to select the targeted symptoms/syndromes. Methods Epidemiological analysis was conducted on data from case report system in Jingmen City (one study site in ISSC) from 2004 to 2009. Initial symptoms/syndromes were selected by literature reviews. And finally expert consultation meetings, workshops and field investigation were held to confirm the targeted symptoms/syndromes. Results 10 kinds of infectious diseases, 6 categories of emergencies, and 4 bioterrorism events (i.e. plague, anthrax, botulism and hemorrhagic fever) were chose as specific diseases/events for monitoring (Table 1). Two surveillance schemes were developed by reviewing on 565 literatures about clinical conditions of specific diseases/events and 14 literatures about CCs based syndromic surveillance. The former one was to monitor symptoms (19 initial symptoms), and then aggregation or analysis on single or combined symptom(s); and the other one was to monitor syndromes (9 initial syndromes) directly (Table 2). The consultation meeting and field investigation identified three issues which should be considered: 1) the abilities of doctors especially village doctors to understand the definitions of symptoms/syndromes; 2) the workload of data collection; 3) the

  13. Error Analysis of Fast Moving Target Geo-location in Wide Area Surveillance Ground Moving Target Indication Mode

    Directory of Open Access Journals (Sweden)

    Zheng Shi-chao

    2013-12-01

    Full Text Available As an important mode in airborne radar systems, Wide Area Surveillance Ground Moving Target Indication (WAS-GMTI mode has the ability of monitoring a large area in a short time, and then the detected moving targets can be located quickly. However, in real environment, many factors introduce considerable errors into the location of moving targets. In this paper, a fast location method based on the characteristics of the moving targets in WAS-GMTI mode is utilized. And in order to improve the location performance, those factors that introduce location errors are analyzed and moving targets are relocated. Finally, the analysis of those factors is proved to be reasonable by simulation and real data experiments.

  14. Estimating infection attack rates and severity in real time during an influenza pandemic: analysis of serial cross-sectional serologic surveillance data.

    Directory of Open Access Journals (Sweden)

    Joseph T Wu

    2011-10-01

    Full Text Available BACKGROUND: In an emerging influenza pandemic, estimating severity (the probability of a severe outcome, such as hospitalization, if infected is a public health priority. As many influenza infections are subclinical, sero-surveillance is needed to allow reliable real-time estimates of infection attack rate (IAR and severity. METHODS AND FINDINGS: We tested 14,766 sera collected during the first wave of the 2009 pandemic in Hong Kong using viral microneutralization. We estimated IAR and infection-hospitalization probability (IHP from the serial cross-sectional serologic data and hospitalization data. Had our serologic data been available weekly in real time, we would have obtained reliable IHP estimates 1 wk after, 1-2 wk before, and 3 wk after epidemic peak for individuals aged 5-14 y, 15-29 y, and 30-59 y. The ratio of IAR to pre-existing seroprevalence, which decreased with age, was a major determinant for the timeliness of reliable estimates. If we began sero-surveillance 3 wk after community transmission was confirmed, with 150, 350, and 500 specimens per week for individuals aged 5-14 y, 15-19 y, and 20-29 y, respectively, we would have obtained reliable IHP estimates for these age groups 4 wk before the peak. For 30-59 y olds, even 800 specimens per week would not have generated reliable estimates until the peak because the ratio of IAR to pre-existing seroprevalence for this age group was low. The performance of serial cross-sectional sero-surveillance substantially deteriorates if test specificity is not near 100% or pre-existing seroprevalence is not near zero. These potential limitations could be mitigated by choosing a higher titer cutoff for seropositivity. If the epidemic doubling time is longer than 6 d, then serial cross-sectional sero-surveillance with 300 specimens per week would yield reliable estimates when IAR reaches around 6%-10%. CONCLUSIONS: Serial cross-sectional serologic data together with clinical surveillance data

  15. Fragmentation properties of two-dimensional Proximity Graphs considering random failures and targeted attacks

    CERN Document Server

    Norrenbrock, Christoph; Hartmann, Alexander K

    2015-01-01

    The pivotal quality of proximity graphs is connectivity, i.e. all nodes in the graph are connected to one another either directly or via intermediate nodes. These types of graphs are robust, i.e., they are able to function well even if they are subject to limited removal of elementary building blocks, as it may occur for random failures or targeted attacks. Here, we study how the structure of these graphs is affected when nodes get removed successively until an extensive fraction is removed such that the graphs fragment. We study different types of proximity graphs for various node removal strategies. We use different types of observables to monitor the fragmentation process, simple ones like number and sizes of connected components, and more complex ones like the hop diameter and the backup capacity, which is needed to make a network N-1 resilient. The actual fragmentation turns out to be described by a second order phase transition. Using finite-size scaling analyses we numerically assess the threshold frac...

  16. Supervisory controlled operations of UAVs for tracking and surveillance of vehicle targets (SCOUTS)

    Science.gov (United States)

    Fischer, Amber; Denny, Nathan

    2008-04-01

    In this paper, we present SCOUTS, an autonomous system for the allocation of multiple small UAVs equipped with video sensors specifically geared to tracking and reacquisition of vehicle targets in urban environments. To demonstrate SCOUTS performance, we test our system in a simulation incorporating the key challenges encountered by real-time UAV tracking scenarios, including unreliable reports from poor image quality, disruption latency in communication, and temporary gaps in persistent surveillance requiring target re-acquisition strategies. The results provided in this paper establish SCOUTS as a robust approach to this challenging problem.

  17. An information potential approach for tracking and surveilling multiple moving targets using mobile sensor agents

    Science.gov (United States)

    Lu, W.; Zhang, G.; Ferrari, S.; Fierro, R.; Palunko, I.

    2011-05-01

    The problem of surveilling moving targets using mobile sensor agents (MSAs) is applicable to a variety of fields, including environmental monitoring, security, and manufacturing. Several authors have shown that the performance of a mobile sensor can be greatly improved by planning its motion and control strategies based on its sensing objectives. This paper presents an information potential approach for computing the MSAs' motion plans and control inputs based on the feedback from a modified particle filter used for tracking moving targets. The modified particle filter, as presented in this paper implements a new sampling method (based on supporting intervals of density functions), which accounts for the latest sensor measurements and adapts, accordingly, a mixture representation of the probability density functions (PDFs) for the target motion. It is assumed that the target motion can be modeled as a semi-Markov jump process, and that the PDFs of the Markov parameters can be updated based on real-time sensor measurements by a centralized processing unit or MSAs supervisor. Subsequently, the MSAs supervisor computes an information potential function that is communicated to the sensors, and used to determine their individual feedback control inputs, such that sensors with bounded field-of-view (FOV) can follow and surveil the target over time.

  18. The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets.

    Science.gov (United States)

    Rose, Adam; Avetisyan, Misak; Rosoff, Heather; Burns, William J; Slovic, Paul; Chan, Oswin

    2017-07-01

    U.S. airports and airliners are prime terrorist targets. Not only do the facilities and equipment represent high-value assets, but the fear and dread that is spread by such attacks can have tremendous effects on the U.S. economy. This article presents the methodology, data, and estimates of the macroeconomic impacts stemming from behavioral responses to a simulated terrorist attack on a U.S. airport and on a domestic airliner. The analysis is based on risk-perception surveys of these two scenarios. The responses relate to reduced demand for airline travel, shifts to other modes, spending on nontravel items, and savings of potential travel expenditures by U.S. resident passengers considering flying domestic routes. We translate these responses to individual spending categories and feed these direct impact results into a computable general equilibrium (CGE) model of the U.S. economy to ascertain the indirect and total impacts on both the airline industry and the economy as a whole. Overall, the estimated impacts on GDP of both types of attacks exceed $10B. We find that the behavioral economic impacts are almost an order of magnitude higher than the ordinary business interruption impacts for the airliner attack and nearly two orders of magnitude higher for the airport attack. The results are robust to sensitivity tests on the travel behavior of U.S. residents in response to terrorism. © 2016 Society for Risk Analysis.

  19. Proportional navigation law design of plane-symmetrical vehicle with terminal attack angle constraint for over target flight

    Science.gov (United States)

    Wu, Bin; Ji, Denggao; Guo, Zhenxi; Shen, Haibin; Zhang, Jianfei

    2016-11-01

    This article proposes a type of proportional navigation law design of plane-symmetrical vehicle with terminal attack angle constraint for over target flight. Firstly, the line of sight rotating rate and the velocity rotating rate model of the vehicle are expressed. Then, the attitude of the vehicle is constructed by the acceleration vector requirement of proportional navigation law. Accordingly, the guidance command uncertain issue can be avoided for plane-symmetrical vehicle over target flight. It guarantees high precision to hit the target. The effect and efficiency of the guidance law are shown by simulations of characteristic trajectories.

  20. SURVEILLANCE OF MOVING TARGET BEHIND PARTITIONS USING A UWB-TWDR

    Institute of Scientific and Technical Information of China (English)

    Li Yu; Huang Chunlin; Su Yi

    2005-01-01

    This paper firstly analyzes the property of the low frequency electromagnetic wave,which can penetrate many types of non-metallic materials, and the ability of Ultra-Wide Band (UWB) impulse signal which has high range resolution. Then the methods are discussed for conducting surveillance through walls, detecting and locating the moving persons behind the partitions. The schematic diagram of Through-Wall Detecting Radar (TWDR) and the models of moving target are shown and the principle of detecting the moving target is also proyided with coherent superimposing technique on a range gate. Finally an algorithm for estimating the location of targets is given. The performance of TWDR is validated by the experiments of penetrating a wood block, a red brick wall and a reinforced concrete wall.

  1. A pilot study for targeted surveillance of bovine spongiform encephalopathy in Nigeria.

    Science.gov (United States)

    Nwankiti, O O; Ikeh, E I; Asala, O; Seuberlich, T

    2013-06-01

    Bovine spongiform encephalopathy (BSE), popularly known as 'mad cow disease', led to an epidemic in Europe that peaked in the mid-1990s. Its impact on developing countries, such as Nigeria, has not been fully established as information on livestock and surveillance has eluded those in charge of this task. The BSE risk to Nigeria's cattle population currently remains undetermined, which has resulted in international trade restrictions on commodities from the cattle population. This is mainly because of a lack of updated BSE risk assessments and disease surveillance data. To evaluate the feasibility of BSE surveillance in Nigeria, we carried out a pilot study targeting cattle that were presented for emergency or casualty slaughter. In total, 1551 cattle of local breeds, aged 24 months and above were clinically examined. Ataxia, recumbency and other neurological signs were topmost on our list of criteria. A total of 96 cattle, which correspond to 6.2%, presented clinical signs that supported a suspect of BSE. The caudal brainstem tissues of these animals were collected post-mortem and analysed for the disease-specific form of the prion protein using a rapid test approved by the International Animal Health Organization (OIE). None of the samples were positive for BSE. Although our findings do not exclude the presence of BSE in Nigeria, they do demonstrate that targeted sampling of clinically suspected cases of BSE is feasible in developing countries. In addition, these findings point to the possibility of implementing clinical monitoring schemes for BSE and potentially other diseases with grave economic and public health consequences.

  2. Multi-modal target detection for autonomous wide area search and surveillance

    Science.gov (United States)

    Breckon, Toby P.; Gaszczak, Anna; Han, Jiwan; Eichner, Marcin L.; Barnes, Stuart E.

    2013-10-01

    Generalised wide are search and surveillance is a common-place tasking for multi-sensory equipped autonomous systems. Here we present on a key supporting topic to this task - the automatic interpretation, fusion and detected target reporting from multi-modal sensor information received from multiple autonomous platforms deployed for wide-area environment search. We detail the realization of a real-time methodology for the automated detection of people and vehicles using combined visible-band (EO), thermal-band (IR) and radar sensing from a deployed network of multiple autonomous platforms (ground and aerial). This facilities real-time target detection, reported with varying levels of confidence, using information from both multiple sensors and multiple sensor platforms to provide environment-wide situational awareness. A range of automatic classification approaches are proposed, driven by underlying machine learning techniques, that facilitate the automatic detection of either target type with cross-modal target confirmation. Extended results are presented that show both the detection of people and vehicles under varying conditions in both isolated rural and cluttered urban environments with minimal false positive detection. Performance evaluation is presented at an episodic level with individual classifiers optimized for maximal each object of interest (vehicle/person) detection over a given search path/pattern of the environment, across all sensors and modalities, rather than on a per sensor sample basis. Episodic target detection, evaluated over a number of wide-area environment search and reporting tasks, generally exceeds 90%+ for the targets considered here.

  3. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  4. Prevention of Attacks under DDoS Using Target Customer Behavior

    Directory of Open Access Journals (Sweden)

    S.Malathi

    2012-09-01

    Full Text Available The possibility of sharing information through networking has been growing in geometrical progression. In this connection it is to be noted network attacks, in other words, DDoS attacks also are growing in equal proportion. Sharing of information is being carried out by means of server and client. The client requests for the data from the server and the server provides the response for the client-request. Here the client can violate the server performance by sending continuous or anomaly requests. The result is the server performance becomes degraded. This paper discusses how best the degradation of the performance can be prevented using some algorithm proposed in the methodology. In this work the blocking is done using a different mechanism based on the category of the client.

  5. Target-tracking and identity management algorithms for air traffic surveillance

    Science.gov (United States)

    Balakrishnan, Hamsa

    The air traffic control system of the United States is responsible for managing traffic in the National Airspace System; safety is a paramount concern. The air traffic surveillance network has the task of collecting and processing information on the positions, velocities and identities of the aircraft in the system, before presenting it to air traffic controllers to use in maintaining an orderly flow of traffic. This dissertation attempts to design techniques that provide controllers with high-fidelity information about the aircraft in their controlled airspace, using the observations of the air traffic surveillance network. We propose algorithms for the efficient tracking of aircraft, as well as for maintaining beliefs of their identities. Such methods would improve the processing of aircraft situation data, particularly in a congested airspace with general aviation. In this thesis, we propose an algorithmic framework for the simultaneous tracking and identity management of multiple maneuvering targets. We design an algorithm that efficiently tracks the positions, velocities, flight modes, and identities of multiple aircraft in cluttered environments. We tackle the challenges of data association, identity management and state estimation of aircraft trajectories by proposing a modification of the Joint Probabilistic Data Association algorithm, an algorithm based on identity-mass flow, and a state estimation algorithm for tracking hybrid systems, respectively. The identity of each aircraft, an essential feature of aircraft situation data, is often not available but needs to be inferred from radar observations, and maintained in terms of probabilities. We present an algorithm to update the probabilistic matrices that represent the belief of aircraft identities, in the presence of intermittent measurements. We demonstrate the performance of the framework using examples drawn from air traffic surveillance. We also consider the problem of identifying stochastic hybrid

  6. Social engineering attack framework

    CSIR Research Space (South Africa)

    Mouton, F

    2014-07-01

    Full Text Available link. A social engineering attack targets this weakness by; using various manipulation techniques in order to elicit sensitive; information. The field of social engineering is still in its infancy; stages with regards to formal definitions and attack...

  7. Risk-targeted selection of agricultural holdings for post-epidemic surveillance: estimation of efficiency gains.

    Directory of Open Access Journals (Sweden)

    Ian G Handel

    Full Text Available Current post-epidemic sero-surveillance uses random selection of animal holdings. A better strategy may be to estimate the benefits gained by sampling each farm and use this to target selection. In this study we estimate the probability of undiscovered infection for sheep farms in Devon after the 2001 foot-and-mouth disease outbreak using the combination of a previously published model of daily infection risk and a simple model of probability of discovery of infection during the outbreak. This allows comparison of the system sensitivity (ability to detect infection in the area of arbitrary, random sampling compared to risk-targeted selection across a full range of sampling budgets. We show that it is possible to achieve 95% system sensitivity by sampling, on average, 945 farms with random sampling and 184 farms with risk-targeted sampling. We also examine the effect of ordering samples by risk to expedite return to a disease-free status. Risk ordering the sampling process results in detection of positive farms, if present, 15.6 days sooner than with randomly ordered sampling, assuming 50 farms are tested per day.

  8. Bistatic weak target detection method using non-cooperative air surveillance radar

    Institute of Scientific and Technical Information of China (English)

    Zengping Chen

    2015-01-01

    At present, most of the passive radar system re-searches utilize FM radios, TV broadcasts, navigation satel ites, etc. as il uminators. The transmitted signals are not specifical y de-signed radar waveforms. In this work, the frequency agile, phased array air surveil ance radar (ASR) is used as the il uminator of opportunity to detect the weak target. The phased array tech-nology can help realize beam agility to track targets from diffe-rent aspects simultaneously. The frequency agility technology is widely employed in radar system design to increase the ability of anti-jamming and increase the detection probability. While the fre-quency bandwidth of radar signals is usual y wide and the range resolution is high, the range cel migration effect is obvious during the long time integration of non-cooperative bistatic radar. In this context, coherent integration methods are not applicable. In this work, a parametric non-coherent integration algorithm based on task de-interweaving is proposed. Numerical experiments verify that this is effective in weak target detection.

  9. Fast pattern recognizer for autonomous target recognition and tracking for advanced naval attack missiles

    Science.gov (United States)

    Hastbacka, Al

    2001-10-01

    A FPR System under development for the Naval Air Warfare Center, China Lake, CA is funded under a SBIR, Phase II contract as an automatic target recognizer and tracker candidate for Navy fast-reaction, subsonic and supersonic, stand-off weapons. The FPR will autonomously detect, identify, correlate, and track complex surface ship and land based targets in hostile, high-clutter environments in real time. The novel FPR system is proven technology that uses an electronic implementation analogous to an optical correlator system, where the Fourier transform of the incoming image is compared against known target images stored as matched filter templates. FPR demonstrations show that unambiguous target identification is achievable in a ninety-five percent fog obscuration for over ninety-percent of target images tested. The FPR technology employs an acoustic dispersive delay line (DDL) to achieve ultra-fast image correlations in 90 microseconds or 11,000 correlations per second. The massively scalable FPR design is capable of achieving processing speeds of an order of magnitude faster using available ASIC technology. Key benefits of the FPR are dramatically reduced power, size, weight, and cost with increased durability, robustness, and performance - which makes the FPR ideal for onboard missile applications.

  10. Mitochondria: 3-bromopyruvate vs. mitochondria? A small molecule that attacks tumors by targeting their bioenergetic diversity.

    Science.gov (United States)

    Galina, Antonio

    2014-09-01

    Enhanced glycolysis, the classic bioenergetic phenotype of cancer cells was described by Otto Warburg approximately 90 years ago. However, the Warburg hypothesis does not necessarily imply mitochondrial dysfunction. The alkyl-halogen, 3-bromopyruvate (3BP), would not be expected to have selective targets for cancer therapy due to its high potential reactivity toward many SH side groups. Contrary to predictions, 3BP interferes with glycolysis and oxidative phosphorylation in cancer cells without side effects in normal tissues. The mitochondrial hexokinase II has been claimed as the main target. This "Organelle in focus" article presents a historical view of the use of 3BP in biochemistry and its effects on ATP-producing pathways of cancer cells. I will discuss how the alkylated enzymes contribute to the cooperative collapse of mitochondria and apoptosis. Perspectives for targeting 3BP to bioenergetics enzymes for cancer treatment will be considered.

  11. The Air Force Needs to Improve Cost-Effectiveness and Availability of the Joint Surveillance Target Attack Radar System (Redacted)

    Science.gov (United States)

    2016-11-01

    Introduction Objective We determined whether the Air Force made cost-effective purchases on the performance-based logistics ( PBL ) contract to support...logistics ( PBL ) contract to support JSTARS. Specifically, the JSTARS contracting officer did not establish adequate oversight procedures to validate the...must develop and implement PBL strategies that improve total system availability while minimizing cost and the size of spare parts inventory

  12. Myeloperoxidase targets oxidative host attacks to Salmonella and prevents collateral tissue damage.

    Science.gov (United States)

    Schürmann, Nura; Forrer, Pascal; Casse, Olivier; Li, Jiagui; Felmy, Boas; Burgener, Anne-Valérie; Ehrenfeuchter, Nikolaus; Hardt, Wolf-Dietrich; Recher, Mike; Hess, Christoph; Tschan-Plessl, Astrid; Khanna, Nina; Bumann, Dirk

    2017-01-23

    Host control of infections crucially depends on the capability to kill pathogens with reactive oxygen species (ROS). However, these toxic molecules can also readily damage host components and cause severe immunopathology. Here, we show that neutrophils use their most abundant granule protein, myeloperoxidase, to target ROS specifically to pathogens while minimizing collateral tissue damage. A computational model predicted that myeloperoxidase efficiently scavenges diffusible H2O2 at the surface of phagosomal Salmonella and converts it into highly reactive HOCl (bleach), which rapidly damages biomolecules within a radius of less than 0.1 μm. Myeloperoxidase-deficient neutrophils were predicted to accumulate large quantities of H2O2 that still effectively kill Salmonella, but most H2O2 would leak from the phagosome. Salmonella stimulation of neutrophils from normal and myeloperoxidase-deficient human donors experimentally confirmed an inverse relationship between myeloperoxidase activity and extracellular H2O2 release. Myeloperoxidase-deficient mice infected with Salmonella had elevated hydrogen peroxide tissue levels and exacerbated oxidative damage of host lipids and DNA, despite almost normal Salmonella control. These data show that myeloperoxidase has a major function in mitigating collateral tissue damage during antimicrobial oxidative bursts, by converting diffusible long-lived H2O2 into highly reactive, microbicidal and locally confined HOCl at pathogen surfaces.

  13. Targeted surveillance for highly pathogenic avian influenza in migratory waterfowl across the conterminous United States: chapter 12

    Science.gov (United States)

    Farnsworth, Matthew L.; Kendall, William L.; Doherty, Paul F.; Miller, Ryan S.; White, Gary C.; Nichols, James D.; Burnham, Kenneth P.; Franklin, Alan B.; Majumdar, S.; Brenner, F.J.; Huffman, J.E.; McLean, R.G.; Panah, A.I.; Pietrobon, P.J.; Keeler, S.P.; Shive, S.

    2011-01-01

    Introduction of Asian strain H5N1 Highly Pathogenic avian influenca via waterfowl migration is one potential route of entry into the United States. In conjunction with state, tribe, and laboratory partners, the United States Department of Agriculture collected and tested 124,603 wild bird samples in 2006 as part of a national surveillance effort. A sampling plan was devised to increase the probability fo detecting Asian strain H5N1 at a national scale. Band recovery data were used to identify and prioritize sampling for wild migratory waterfowl, resulting in spatially targeted sampling recommendations focused on reads with high numbers of recoveries. We also compared the spatial and temporal distribution of the 2006 cloacal and fecal waterfowl sampling effort to the bird banding recovery data and found concordance between the two .Finally, we present improvements made to the 2007 fecal sampling component of the surveillance plan and suggest further improvements for future sampling.

  14. Network analysis of translocated Takahe populations to identify disease surveillance targets.

    Science.gov (United States)

    Grange, Zoë L; VAN Andel, Mary; French, Nigel P; Gartrell, Brett D

    2014-04-01

    network in 2011. Likewise, the wild Murchison Mountains population was consistently the sink of the network. Other nodes, such as the offshore islands and the wildlife hospital, varied in importance over time. Common network descriptors and measures of centrality identified key locations for targeting disease surveillance. The visual representation of movements of animals in a population that this technique provides can aid decision makers when they evaluate translocation proposals or attempt to control a disease outbreak. © 2014 Society for Conservation Biology.

  15. A memetic algorithm for path planning of curvature-constrained UAVs performing surveillance of multiple ground targets

    Institute of Scientific and Technical Information of China (English)

    Zhang Xing; Chen Jie; Xin Bin; Peng Zhihong

    2014-01-01

    The problem of generating optimal paths for curvature-constrained unmanned aerial vehicles (UAVs) performing surveillance of multiple ground targets is addressed in this paper. UAVs are modeled as Dubins vehicles so that the constraints of UAVs’ minimal turning radius can be taken into account. In view of the effective surveillance range of the sensors equipped on UAVs, the problem is formulated as a Dubins traveling salesman problem with neighborhood (DTSPN). Considering its prohibitively high computational complexity, the Dubins paths in the sense of terminal heading relaxation are introduced to simplify the calculation of the Dubins distance, and a boundary-based encoding scheme is proposed to determine the visiting point of every target neighborhood. Then, an evolutionary algorithm is used to derive the optimal Dubins tour. To further enhance the quality of the solutions, a local search strategy based on approximate gradient is employed to improve the visiting points of target neighborhoods. Finally, by a minor modification to the individual encoding, the algorithm is easily extended to deal with other two more sophisticated DTSPN variants (multi-UAV scenario and multiple groups of targets scenario). The performance of the algorithm is demonstrated through comparative experiments with other two state-of-the-art DTSPN algorithms identified in literature. Numerical simulations exhibit that the algorithm proposed in this paper can find high-quality solutions to the DTSPN with lower computational cost and produce significantly improved performance over the other algorithms.

  16. A memetic algorithm for path planning of curvature-constrained UAVs performing surveillance of multiple ground targets

    Directory of Open Access Journals (Sweden)

    Zhang Xing

    2014-06-01

    Full Text Available The problem of generating optimal paths for curvature-constrained unmanned aerial vehicles (UAVs performing surveillance of multiple ground targets is addressed in this paper. UAVs are modeled as Dubins vehicles so that the constraints of UAVs’ minimal turning radius can be taken into account. In view of the effective surveillance range of the sensors equipped on UAVs, the problem is formulated as a Dubins traveling salesman problem with neighborhood (DTSPN. Considering its prohibitively high computational complexity, the Dubins paths in the sense of terminal heading relaxation are introduced to simplify the calculation of the Dubins distance, and a boundary-based encoding scheme is proposed to determine the visiting point of every target neighborhood. Then, an evolutionary algorithm is used to derive the optimal Dubins tour. To further enhance the quality of the solutions, a local search strategy based on approximate gradient is employed to improve the visiting points of target neighborhoods. Finally, by a minor modification to the individual encoding, the algorithm is easily extended to deal with other two more sophisticated DTSPN variants (multi-UAV scenario and multiple groups of targets scenario. The performance of the algorithm is demonstrated through comparative experiments with other two state-of-the-art DTSPN algorithms identified in literature. Numerical simulations exhibit that the algorithm proposed in this paper can find high-quality solutions to the DTSPN with lower computational cost and produce significantly improved performance over the other algorithms.

  17. Directional R-Loop Formation by the CRISPR-Cas Surveillance Complex Cascade Provides Efficient Off-Target Site Rejection

    Directory of Open Access Journals (Sweden)

    Marius Rutkauskas

    2015-03-01

    Full Text Available CRISPR-Cas systems provide bacteria and archaea with adaptive immunity against foreign nucleic acids. In type I CRISPR-Cas systems, invading DNA is detected by a large ribonucleoprotein surveillance complex called Cascade. The crRNA component of Cascade is used to recognize target sites in foreign DNA (protospacers by formation of an R-loop driven by base-pairing complementarity. Using single-molecule supercoiling experiments with near base-pair resolution, we probe here the mechanism of R-loop formation and detect short-lived R-loop intermediates on off-target sites bearing single mismatches. We show that R-loops propagate directionally starting from the protospacer-adjacent motif (PAM. Upon reaching a mismatch, R-loop propagation stalls and collapses in a length-dependent manner. This unambiguously demonstrates that directional zipping of the R-loop accomplishes efficient target recognition by rapidly rejecting binding to off-target sites with PAM-proximal mutations. R-loops that reach the protospacer end become locked to license DNA degradation by the auxiliary Cas3 nuclease/helicase without further target verification.

  18. Command and Control Modes for Attack of Time-Sensitive Targets%时间敏感目标打击指挥控制模式

    Institute of Scientific and Technical Information of China (English)

    端木竹筠; 闫晶晶

    2012-01-01

    An attack chain model of time-sensitive target based on several decision variables and constrains is developed. Three command and control modes for the attack of time-sensitive targets, including decider-led mode, sensor-led mode and shooter-led mode are discussed based on optimization of the attack chain model. Then, the battle condition and factors affecting the efficiency for each mode are analyzed.%通过引入决策变量和约束条件对时间敏感目标(简称时敏目标)打击链进行了模型描述,并根据模型的优化问题引入了时敏目标打击的指挥控制模式,包括决策者主导模式、传感器主导模式以及射手主导模式,分析了每种模式适合的作战情形以及作战效能的影响因素。

  19. 'It's not like you just had a heart attack': decision-making about active surveillance by men with localized prostate cancer.

    Science.gov (United States)

    Volk, Robert J; McFall, Stephanie L; Cantor, Scott B; Byrd, Theresa L; Le, Yen-Chi L; Kuban, Deborah A; Mullen, Patricia Dolan

    2014-04-01

    Growing recognition that active surveillance (AS) is a reasonable management option for many men diagnosed with localized prostate cancer led us to describe patients' conceptualizations of AS and reasons for their treatment decisions. Men were patients of a multidisciplinary prostate cancer clinic at a large tertiary cancer center where patients are routinely briefed on treatment options, including AS. We conducted a thematic analysis of interviews with 15 men who had chosen AS and 15 men who received radiation or surgery. Men who chose AS described it as an organized process with a rigorous and reassuring protocol of periodic testing, with potential for subsequent and timely decision-making about treatment. AS was seen as prolonging their current good health and function with treatment still possible later. Rationales for choosing AS included trusting their physician's monitoring, 'buying time' without experiencing adverse effects of treatment, waiting for better treatments, and seeing their cancer as very low risk. Men recognized the need to justify their choice to others because it seemed contrary to the impulse to immediately treat cancer. Descriptions of AS by men who chose surgery or radiation were less specific about the testing regimen. Getting rid of the cancer and having a cure were paramount for them. Men fully informed of their treatment options for localized prostate cancer have a comprehensive understanding of the purpose of AS. Slowing the decision-making process may enhance the acceptability of AS. Copyright © 2013 John Wiley & Sons, Ltd.

  20. 医院感染目标性监测报告分析%Target surveillance report of nosocomial infections

    Institute of Scientific and Technical Information of China (English)

    刘卫平; 闫志刚; 苏日娜; 邢慧敏; 杨旭

    2012-01-01

    OBJECTIVE To develop the surveillance of high risk population and infection sites as well as the risk factors so as to control the prevalence of nosocomial infections. METHODS According to the standards for nosocomial infection surveillance, the surveillance of nosocomial infections was performed by reviewing the medical records in combination with clinical ward rounds. RESULTS The nosocomial infection rate was 10. 70% in ICU, the utilization rate of the catheter was 53. 56%, the daily incidence rate of the urinary tract catheter-related infections was 2. 73‰; the utilization rate of central venous catheterization was 99. 09% , the daily infection rate of central venous catheter-related bloodstream infections was 1. ll‰;the utilization rate of ventilator was 46. 25%, the daily incidence rate of ventilator-associated pneumonia was 13. 44‰; the total equipment utilization rate was 198. 90% ; the incidence of nosocomial infections was 0. 86% in the neonates with the daily infection rate of 1. 76‰ ; the incidence of the class Ⅰ surgical incision infections was 1. 02% , class Ⅱ surgical incision infections 2. 35% , class Ⅲ surgical incision infections 20. 00%. CONCLUSION The target surveillance. as a scientific surveillance of nosocomial infections, is flexible and can predict the sources of infections in early stage as well as control the outbreak and prevalence of nosocomial infections.%目的 针对高危人群、高发感染部位等开展医院感染及其危险因素的监测,及时控制医院感染暴发流行.方法 2011年1-6月根据《医院感染监测规范》,采用查看病历与临床查房相结合进行感染监测.结果 ICU医院感染率10.70%,导尿管使用率53.56%,导尿管相关泌尿道感染日感染率2.73‰;中心静脉插管使用率99.09%,中心静脉插管相关血流日感染率1.11‰;呼吸机使用率46.25%,呼吸机相关肺炎日感染率13.44%;总器械使用率198.90%;新生儿医院感染发生率为0

  1. The 2008 Okuda lecture: Management of hepatocellular carcinoma: from surveillance to molecular targeted therapy.

    Science.gov (United States)

    Kudo, Masatoshi

    2010-03-01

    Hepatocellular carcinoma (HCC) is responsible for approximately 600,000-700,000 deaths worldwide. It is highly prevalent in the Asia-Pacific region and Africa, and is increasing in Western countries. Alpha fetoprotein (AFP) alone is insufficient for HCC screening. A combination with other tumor markers, such as PIVKA-II and AFP-L3, and periodical ultrasound surveillance is necessary. Sensitivity of AFP in depicting HCC is highest, followed by PIVKA-II and AFP-L3, but the order of the specificity is inverse, AFP-L3, PIVKA-II, and AFP. Sonazoid-enhanced ultrasound (US) is extremely useful to characterize hepatic tumors equal to or more than multidetector row computed tomography (MDCT). Sonazoid-enhanced US with defect re-perfusion imaging is a breakthrough technique in the treatment of HCC. Defect re-perfusion imaging will markedly change the therapeutic strategy for liver cancer. Gd-EOB-DTPA-magnetic resonance imaging is a newly developed imaging technique in the detection and diagnosis of HCC. It is the most sensitive tool in the differentiation of early HCC from dysplastic nodules. Regarding the treatment strategy, there has been no established systemic chemotherapy for advanced HCC, except for Sorafenib. Empirically, intrahepatic arterial infusion chemotherapy using implanted reservoir port is known to be effective in response rate and overall survival for advanced HCC with vascular invasion. Sorafenib in combination with transcatheter arterial chemoembolization or adjuvant use after ablation or resection will significantly prolong the life expectancy if ongoing clinical trials provide positive results. In conclusion, it is expected that readers will gain deeper insight into the latest progress and updated diagnosis and treatment of HCC described in this review.

  2. NEWTONIAN IMPERIALIST COMPETITVE APPROACH TO OPTIMIZING OBSERVATION OF MULTIPLE TARGET POINTS IN MULTISENSOR SURVEILLANCE SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. Afghan-Toloee

    2013-09-01

    Full Text Available The problem of specifying the minimum number of sensors to deploy in a certain area to face multiple targets has been generally studied in the literatures. In this paper, we are arguing the multi-sensors deployment problem (MDP. The Multi-sensor placement problem can be clarified as minimizing the cost required to cover the multi target points in the area. We propose a more feasible method for the multi-sensor placement problem. Our method makes provision the high coverage of grid based placements while minimizing the cost as discovered in perimeter placement techniques. The NICA algorithm as improved ICA (Imperialist Competitive Algorithm is used to decrease the performance time to explore an enough solution compared to other meta-heuristic schemes such as GA, PSO and ICA. A three dimensional area is used for clarify the multiple target and placement points, making provision x, y, and z computations in the observation algorithm. A structure of model for the multi-sensor placement problem is proposed: The problem is constructed as an optimization problem with the objective to minimize the cost while covering all multiple target points upon a given probability of observation tolerance.

  3. Newtonian Imperialist Competitve Approach to Optimizing Observation of Multiple Target Points in Multisensor Surveillance Systems

    Science.gov (United States)

    Afghan-Toloee, A.; Heidari, A. A.; Joibari, Y.

    2013-09-01

    The problem of specifying the minimum number of sensors to deploy in a certain area to face multiple targets has been generally studied in the literatures. In this paper, we are arguing the multi-sensors deployment problem (MDP). The Multi-sensor placement problem can be clarified as minimizing the cost required to cover the multi target points in the area. We propose a more feasible method for the multi-sensor placement problem. Our method makes provision the high coverage of grid based placements while minimizing the cost as discovered in perimeter placement techniques. The NICA algorithm as improved ICA (Imperialist Competitive Algorithm) is used to decrease the performance time to explore an enough solution compared to other meta-heuristic schemes such as GA, PSO and ICA. A three dimensional area is used for clarify the multiple target and placement points, making provision x, y, and z computations in the observation algorithm. A structure of model for the multi-sensor placement problem is proposed: The problem is constructed as an optimization problem with the objective to minimize the cost while covering all multiple target points upon a given probability of observation tolerance.

  4. radR: an open-source platform for acquiring and analysing data on biological targets observed by surveillance radar.

    Science.gov (United States)

    Taylor, Philip D; Brzustowski, John M; Matkovich, Carolyn; Peckford, Michael L; Wilson, Dave

    2010-10-26

    Radar has been used for decades to study movement of insects, birds and bats. In spite of this, there are few readily available software tools for the acquisition, storage and processing of such data. Program radR was developed to solve this problem. Program radR is an open source software tool for the acquisition, storage and analysis of data from marine radars operating in surveillance mode. radR takes time series data with a two-dimensional spatial component as input from some source (typically a radar digitizing card) and extracts and retains information of biological relevance (i.e. moving targets). Low-level data processing is implemented in "C" code, but user-defined functions written in the "R" statistical programming language can be called at pre-defined steps in the calculations. Output data formats are designed to allow for future inclusion of additional data items without requiring change to C code. Two brands of radar digitizing card are currently supported as data sources. We also provide an overview of the basic considerations of setting up and running a biological radar study. Program radR provides a convenient, open source platform for the acquisition and analysis of radar data of biological targets.

  5. Heart Attack

    Science.gov (United States)

    ... a million people in the U.S. have a heart attack. About half of them die. Many people have permanent heart damage or die because they don't get ... It's important to know the symptoms of a heart attack and call 9-1-1 if someone ...

  6. Attack surfaces

    DEFF Research Database (Denmark)

    Gruschka, Nils; Jensen, Meiko

    2010-01-01

    The new paradigm of cloud computing poses severe security risks to its adopters. In order to cope with these risks, appropriate taxonomies and classification criteria for attacks on cloud computing are required. In this work-in-progress paper we present one such taxonomy based on the notion...... of attack surfaces of the cloud computing scenario participants. © 2010 IEEE....

  7. An IL12-IL2-antibody fusion protein targeting Hodgkin's lymphoma cells potentiates activation of NK and T cells for an anti-tumor attack.

    Directory of Open Access Journals (Sweden)

    Tobias Jahn

    Full Text Available Successful immunotherapy of Hodgkin's disease is so far hampered by the striking unresponsiveness of lymphoma infiltrating immune cells. To mobilize both adoptive and innate immune cells for an anti-tumor attack we fused the pro-inflammatory cytokines IL2 and IL12 to an anti-CD30 scFv antibody in a dual cytokine fusion protein to accumulate both cytokines at the malignant CD30(+ Hodgkin/Reed-Sternberg cells in the lymphoma lesion. The tumor-targeted IL12-IL2 fusion protein was superior in activating resting T cells to amplify and secrete pro-inflammatory cytokines compared to targeted IL2 or IL12 alone. NK cells were also activated by the dual cytokine protein to secrete IFN-γ and to lyse target cells. The tumor-targeted IL12-IL2, when applied by i.v. injection to immune-competent mice with established antigen-positive tumors, accumulated at the tumor site and induced tumor regression. Data demonstrate that simultaneous targeting of two cytokines in a spatial and temporal simultaneous fashion to pre-defined tissues is feasible by a dual-cytokine antibody fusion protein. In the case of IL12 and IL2, this produced superior anti-tumor efficacy implying the strategy to muster a broader immune cell response in the combat against cancer.

  8. A multispectral automatic target recognition application for maritime surveillance, search, and rescue

    Science.gov (United States)

    Schoonmaker, Jon; Reed, Scott; Podobna, Yuliya; Vazquez, Jose; Boucher, Cynthia

    2010-04-01

    Due to increased security concerns, the commitment to monitor and maintain security in the maritime environment is increasingly a priority. A country's coast is the most vulnerable area for the incursion of illegal immigrants, terrorists and contraband. This work illustrates the ability of a low-cost, light-weight, multi-spectral, multi-channel imaging system to handle the environment and see under difficult marine conditions. The system and its implemented detecting and tracking technologies should be organic to the maritime homeland security community for search and rescue, fisheries, defense, and law enforcement. It is tailored for airborne and ship based platforms to detect, track and monitor suspected objects (such as semi-submerged targets like marine mammals, vessels in distress, and drug smugglers). In this system, automated detection and tracking technology is used to detect, classify and localize potential threats or objects of interest within the imagery provided by the multi-spectral system. These algorithms process the sensor data in real time, thereby providing immediate feedback when features of interest have been detected. A supervised detection system based on Haar features and Cascade Classifiers is presented and results are provided on real data. The system is shown to be extendable and reusable for a variety of different applications.

  9. UCAV协同攻击多目标的任务分配技术研究%Research on Task Allocation for UCAVs Cooperatively Attacking Multiple Targets

    Institute of Scientific and Technical Information of China (English)

    程聪; 吴庆宪; 刘敏; 陈谋

    2012-01-01

    Task allocation model based on single objective function can not provide more useful information for the fire-control decision makers. In order to make up the deficiency, the wastage cost of UCAV (Unmanned Combat Aerial Vehicle) and damage value of target are treated as two optimization objective functions of the task allocation for Multi-UCAV cooperatively attacking multiple targets, and a new task allocation model is established. Based on the optimization model, an improved NSGA-Ⅱ(Nondominated Sorting Genetic Algorithm Ⅱ) with elitist strategy is adopted for searching the Pareto optimal solutions of the task allocation of cooperative attacking multiple targets for Multi-UCAV. The decision makers select the best task allocation scheme according to their preferences. Simulation results demonstrate that the algorithm of task allocation is convergent and effective.%为解决单目标函数构建的任务分配模型不能给火控决策者提供更多有用信息的问题,将无人机(UCAV:Unmanned Combat Aerial Vehicle)损耗代价和目标毁伤价值作为UCAV协同攻击任务分配的两个目标函数,对其进行多目标优化,建立新型任务分配模型.在此基础上,采用一种改进带精英策略的快速非支配排序遗传算法(NSGA-Ⅱ:Nondominated Sorting Genetic Algorithm Ⅱ)进行求解,得到多目标协同攻击任务分配的Pareto最优解集,然后根据决策者的偏好选取最佳的任务分配方案.最后通过仿真算例,验证了该算法的收敛性及有效性.

  10. Protocol for Past BP: a randomised controlled trial of different blood pressure targets for people with a history of stroke of transient ischaemic attack (TIA in primary care

    Directory of Open Access Journals (Sweden)

    Greenfield Sheila

    2010-08-01

    Full Text Available Abstract Background Blood pressure (BP lowering in people who have had a stroke or transient ischaemic attack (TIA leads to reduced risk of further stroke. However, it is not clear what the target BP should be, since intensification of therapy may lead to additional adverse effects. PAST BP will determine whether more intensive BP targets can be achieved in a primary care setting, and whether more intensive therapy is associated with adverse effects on quality of life. Methods/Design This is a randomised controlled trial (RCT in patients with a past history of stroke or TIA. Patients will be randomised to two groups and will either have their blood pressure (BP lowered intensively to a target of 130 mmHg systolic, (or by 10 mmHg if the baseline systolic pressure is between 125 and 140 mmHg compared to a standard group where the BP will be reduced to a target of 140 mmHg systolic. Patients will be managed by their practice at 1-3 month intervals depending on level of BP and followed-up by the research team at six monthly intervals for 12 months. 610 patients will be recruited from approximately 50 general practices. The following exclusion criteria will be applied: systolic BP The primary outcome will be change in systolic BP over twelve months. Secondary outcomes include quality of life, adverse events and cardiovascular events. In-depth interviews with 30 patients and 20 health care practitioners will be undertaken to investigate patient and healthcare professionals understanding and views of BP management. Discussion The results of this trial will inform whether intensive blood pressure targets can be achieved in people who have had a stroke or TIA in primary care, and help determine whether or not further research is required before recommending such targets for this population. Trial Registration ISRCTN29062286

  11. Social engineering attack examples, templates and scenarios

    CSIR Research Space (South Africa)

    Mouton, Francois

    2016-06-01

    Full Text Available link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks...

  12. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  13. Shark attack.

    Science.gov (United States)

    Guidera, K J; Ogden, J A; Highhouse, K; Pugh, L; Beatty, E

    1991-01-01

    Shark attacks are rare but devastating. This case had major injuries that included an open femoral fracture, massive hemorrhage, sciatic nerve laceration, and significant skin and muscle damage. The patient required 15 operative procedures, extensive physical therapy, and orthotic assistance. A review of the literature pertaining to shark bites is included.

  14. 潜艇攻击多目标条件下的占位机动研究%Study of Getting-to-the-firing-position Maneuver for Submarine Attacking Multiple Targets

    Institute of Scientific and Technical Information of China (English)

    夏佩伦; 武志东; 李博

    2016-01-01

    对潜艇攻击多个目标条件下射击阵位选择及占领射击阵位机动的有关问题进行了探讨。指出了多目标战场态势及攻击模式对占位机动的影响。将多目标战场态势分为编队多目标和一般多目标两种情况,将多目标攻击分为同时攻击和连续攻击两种模式,分别研究了射击阵位选择的基本原则以及潜艇占领射击阵位的机动策略。%This paper studies issues concerning weapon firing position determination and getting-to-the-firing-position maneuver for submarine attacking multiple targets. It emphasizes the influence of multitarget combat scenario and multitarget attack mode on the aforementioned maneuver. It classifies multitarget combat scenario into two categories,formation multitarget and general multitarget. It also divides multitarget attack into two modes,simultaneous attack and sequential attack. Principles for determine weapon firing position and getting-to-the-firing-position maneuver scheme are presented for each combination of the combat scenario categories and the attack modes.

  15. Performance of attack strategies on modular networks

    CERN Document Server

    da Cunha, Bruno Requião

    2016-01-01

    Vulnerabilities of complex networks have became a trend topic in complex systems recently due to its real world applications. Most real networks tend to be very fragile to high betweenness adaptive attacks. However, recent contributions have shown the importance of interconnected nodes in the integrity of networks and module-based attacks have appeared promising when compared to traditional malicious non-adaptive attacks. In the present work we deeply explore the trade-off associated with attack procedures, introducing a generalized robustness measure and presenting an attack performance index that takes into account both robustness of the network against the attack and the run-time needed to obtained the list of targeted nodes for the attack. Besides, we introduce the concept of deactivation point aimed to mark the point at which the network stops to function properly. We then show empirically that non-adaptive module-based attacks perform better than high degree and betweenness adaptive attacks in networks ...

  16. Framework of Shipboard UAV Coordinated Surface to Sea Attack Based on Target-Centric Warfare Theory%基于目标中心战的舰载UAV协同对海突击作战构想

    Institute of Scientific and Technical Information of China (English)

    韩玉龙; 严建钢; 陈榕

    2016-01-01

    Aiming at the characteristics of shipboard UAV formationcoordinated surface to sea attack,absorbing target-centric warfare theory,a framework of shipboard UAV formationcoordinated surface to sea attack is put forward and the application feasibility of the theory is demonstrated. Then the conception and characteristics of shipboard UAV formationcoordinated surface to sea attack based on target-centric warfare theory are advanced. Moreover,this paper reconstructs the’Reconnaissance-Regulation-Attack-Evaluation’operation flow of target-centric warfare theory and establishes five steps for shipboard UAV coordinated surface to sea attack based on target-centric warfare theory, including situation evaluation, target selection and allocation, path planning and effectiveness evaluation.%针对舰载无人机编队协同对海突击作战的特点,在充分吸收目标中心战理论的基础上,提出了基于目标中心战的舰载无人机编队协同对海突击作战构想,论证了目标中心战应用于舰载无人机编队协同对海突击作战的可行性,并对其概念和特征进行了界定和分析,着重对目标中心战理论中的“侦-控-打-评”作战过程进行适应性改造,提出了基于目标中心战的舰载无人机编队协同对海突击作战的主要环节,包括态势评估,目标选择与分配,航路规划,协同打击和效能评估等。

  17. Syndromic surveillance: A local perspective

    OpenAIRE

    2003-01-01

    The promise of syndromic surveillance extends beyond early warning for bioterrorist attacks. Even if bioterrorism is first detected by an astute clinician, syndromic surveillance can help delineate the size, location, and tempo of the epidemic or provide reassurance that a large outbreak is not occurring when a single case or a small, localized cluster of an unusual illness is detected. More broadly, however, as public health and medicine proceed in our information age, the use of existing el...

  18. Perfection of Recent Attacks using IP

    Directory of Open Access Journals (Sweden)

    A. RENGARAJAN

    2012-02-01

    Full Text Available The Internet threat monitoring (ITM systems have been deployed to detect widespread attacks on the Internet in recent years. However, the effectiveness of ITM systems critically depends on the confidentiality of the location of their monitors. If adversaries learn the monitor locations of an ITM system, they can bypass the monitors and focus on the uncovered IP address space without being detected. In this paper, we study a new class of attacks, the invisible LOCalization (iLOC attack. The iLOC attack can accurately and invisibly localize monitors of ITM systems. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with a selected pseudo noise code (PN-code, to targeted networks. While the secret PN-code is invisible to others, the attacker can accurately determine the existence of monitors in the targeted networks based on whether the PN-code is embedded in the report data queried from the data center of the ITM system. We formally analyze the impact of various parameters on attack effectiveness. We implement the iLOC attack and conduct the performance evaluation on a real-world ITM system to demonstrate the possibility of such attacks. We also conduct extensive simulations on the iLOC attack using real-world traces. Our data show that the iLOC attack can accurately identify monitors while being invisible to ITM systems. Finally, we present a set of guidelines to counteract the iLOC attack.

  19. Does the Joint Surveillance Target Attack Radar System (JSTARS) Support Military Peace Operations? A Case Study of JSTARS Support to Operation JOINT ENDEAVOR.

    Science.gov (United States)

    2007-11-02

    Socialist Republics (Bosnia-Herzegovina, Croatia, Macedonia, Montenegro , Serbia, and Slovenia) and two Socialist Autonomous Provinces (Kosovo and...Europe (USAREUR) as well. 21 Roberto Corsini, Colonel, Italian Air Force, "The Balkan War, What Role for Airpower?" Air Power Journal, (Winter 95...Cappacio, Tony. "An Army Bosnia Review Rates JSTARS a White Elephant." Defense Week. (25 October 1996). Corsini, Roberto , COL, Italian Air Force

  20. Bio-inspired diversity for increasing attacker workload

    Science.gov (United States)

    Kuhn, Stephen

    2014-05-01

    Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-toclient. As a result, servers represent a high-value target for collection and analysis of network traffic. As they reside at a single network location (i.e. IP/MAC address) for long periods of time. Servers present a static target for surveillance, and a unique opportunity to observe the network traffic. Although servers present a heightened value for attackers, the security community as a whole has shifted more towards protecting clients in recent years leaving a gap in coverage. In addition, servers typically remain active on networks for years, potentially decades. This paper builds on previous work that demonstrated a proof of concept leveraging existing technology for increasing attacker workload. Here we present our clean slate approach to increasing attacker workload through a novel hypervisor and micro-kernel, utilizing next generation virtualization technology to create synthetic diversity of the server's presence including the hardware components.

  1. Additive attacks on speaker recognition

    Science.gov (United States)

    Farrokh Baroughi, Alireza; Craver, Scott

    2014-02-01

    Speaker recognition is used to identify a speaker's voice from among a group of known speakers. A common method of speaker recognition is a classification based on cepstral coefficients of the speaker's voice, using a Gaussian mixture model (GMM) to model each speaker. In this paper we try to fool a speaker recognition system using additive noise such that an intruder is recognized as a target user. Our attack uses a mixture selected from a target user's GMM model, inverting the cepstral transformation to produce noise samples. In our 5 speaker data base, we achieve an attack success rate of 50% with a noise signal at 10dB SNR, and 95% by increasing noise power to 0dB SNR. The importance of this attack is its simplicity and flexibility: it can be employed in real time with no processing of an attacker's voice, and little computation is needed at the moment of detection, allowing the attack to be performed by a small portable device. For any target user, knowing that user's model or voice sample is sufficient to compute the attack signal, and it is enough that the intruder plays it while he/she is uttering to be classiffed as the victim.

  2. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  3. Anomaly detection for internet surveillance

    NARCIS (Netherlands)

    Bouma, H.; Raaijmakers, S.A.; Halma, A.H.R.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming

  4. Multiple Partial Attacks on Complex Networks

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We numerically investigate the effect of four kinds of partial attacks of multiple targets on the Barabási-Albert (BA) scale-free network and the Erd(o)s-Rényi (ER) random network.Comparing with the effect of single target complete knockout we find that partial attacks of multiple targets may produce an effect higher than the complete knockout of a single target on both BA scale-free network and ER random network.We also find that the BA ecale-free network seems to be more susceptible to multi-target partial attacks than the ER random network.

  5. 3-Dimensional trajectory planning for single UCAV attacking multiple targets%UCAV空面多目标攻击三维轨迹规划技术

    Institute of Scientific and Technical Information of China (English)

    张煜; 陈璟; 沈林成

    2012-01-01

    研究了单架无人作战飞机(UCAV)攻击多个地面目标的三维轨迹规划问题.首先,将问题形式化为一类特殊的旅行商问题(TSP),即带动力学约束的邻域访问TSP问题(DCTSPN).其次,针对规划空间维度过高、搜索代价过大的问题,提出了一种基于概率路标图(PRM)的方法.该方法借鉴了基于采样的运动规划方法的思想,并结合多种组合优化技术,将原本连续状态空间中的轨迹规划问题转化为离散拓扑图上的路由问题.求解过程分为离线预处理和在线查询两个阶段.离线阶段采用Halton拟随机采样算法及Noon-Bean转换方法,将原问题转化为经典的非对称旅行商问题(ATSP);在线阶段根据战场态势的实时变化,快速更新路标图,然后采用LKH算法在线求解问题的近似最优解.为了保证生成的飞行轨迹满足平台的运动学/动力学约束,算法基于Gauss伪谱法构建了局部轨迹规划器.最后,以攻击时间最短为优化指标对算法进行了仿真实验.结果表明,本文提出的方法能够以较高的精度和在线收敛速度生成真实可行的、较优的多目标攻击轨迹.%A trajectory planning problem for a single unmanned combat aerial vehicle ( UCAV) performing an air-to-surface multi-target attack mission was studied. First, this problem was mathematically formulated as a variant of the traveling salesman problem ( TSP) , called the dynamic-constrained TSP with Neighborhoods (DCTSPN). A novel planning algorithm based on an updatable probabilistic road map ( PRM) was then presented to solve the DCTSPN. This algorithm blends the sampling-based motion planning ideas with combinatorial optimization, and can reduce the complicated trajectory planning problem in high-dimensional continuous state space to a routing problem on a finite discrete graph, while maintaining completeness guarantees (in a probabilistic sense). The entire planning procedure was divided into two phases: 1) In

  6. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    -technical system, the attack navigator identifies routes to an attacker goal. Specific attacker properties such as skill or resources can be included through attacker profiles. This enables defenders to explore attack scenarios and the effectiveness of defense alternatives under different threat conditions....

  7. 基于多专家权重的空对地多目标攻击决策%Decision-Making for Air to Surface Multi-Target Attacking Based on Multi-Expert Weights

    Institute of Scientific and Technical Information of China (English)

    陈挚; 姜长生

    2011-01-01

    Based on fusion of the weights given by multiple experts, a method was proposed for decision-making in air to surface attacking of multi-aircraft against multi-target. Considering the features of actual air to surface attacking, the anti-air capability and the battle value of the target were evaluated, and the situation of air to surface attacking was analyzed. Then,a threat index model was established. A synthesized weight was obtained by fusion of the weights given by multiple experts, from which a synthesized threat evaluation list was obtained. And finally the target assignment scheme was obtained. Simulation was made by use of Matlab, and the rationality and validity of the threat index model and decision-making method for attacking were verified.%基于融合多专家权重的算法,提出了一种多机协同空对地多目标攻击决策方法.针对实际空对地攻击中的问题,利用评估地面的防空能力及目标的战役价值,分析对地攻击态势,并在此基础上建立威胁指数模型;通过多专家权重得到一个融合多专家权重的权值,以此得到综合威胁评估表,进而得到目标的分配方案.通过Matlab仿真验证了威胁指数模型和攻击决策方法的合理性和有效性.

  8. Hantaan virus surveillance targeting small mammals at Dagmar North Training Area, Gyeonggi Province, Republic of Korea, 2001-2005.

    Science.gov (United States)

    Klein, Terry A; Kang, Hae Ji; Gu, Se Hun; Moon, Sungsil; Shim, So-Hee; Park, Yon Mi; Lee, Sook-Young; Kim, Heung-Chul; Chong, Sung-Tae; O'Guinn, Monica; Lee, John S; Turell, Michael J; Song, Jin-Won

    2011-12-01

    In response to a hemorrhagic fever with renal syndrome case in November 2000, a seasonal rodent-borne disease surveillance program was initiated at Dagmar North Training Area (DNTA), Gyeonggi Province, Republic of Korea. From April 2001-December 2005, 1,848 small mammals were captured. Apodemus agrarius accounted for 92.5%, followed by Mus musculus (3.6%), Crocidura lasiura (2.1%), and Microtus fortis (1.1%). Three species of rodents were found to be antibody-positive (Ab+) for Hantaan virus (HTNV): A. agrarius (22.3%), M. musculus (9.1%), and M. fortis (5.0%). Ab+ rates for A. agrarius increased with increasing weight (age), except for those weighing <10 g. The peak HTNV transmission period in Korea coincided with the peak reproductive potential of A. agrarius during the fall (August/September) surveys. HTNV strains from DNTA were distinct from HTNV strains from the People's Republic of China. From these studies, more accurate risk assessments can be developed to better protect personnel from rodent-borne diseases.

  9. Percolation of localized attack on complex networks

    CERN Document Server

    Shao, Shuai; Stanley, H Eugene; Havlin, Shlomo

    2014-01-01

    The robustness of complex networks against node failure and malicious attack has been of interest for decades, while most of the research has focused on random attack or hub-targeted attack. In many real-world scenarios, however, attacks are neither random nor hub-targeted, but localized, where a group of neighboring nodes in a network are attacked and fail. In this paper we develop a percolation framework to analytically and numerically study the robustness of complex networks against such localized attack. In particular, we investigate this robustness in Erd\\H{o}s-R\\'{e}nyi networks, random-regular networks, and scale-free networks. Our results provide insight into how to better protect networks, enhance cybersecurity, and facilitate the design of more robust infrastructures.

  10. Crystal structure of a CRISPR RNA-guided surveillance complex bound to a ssDNA target

    Science.gov (United States)

    Mulepati, Sabin; Héroux, Annie; Bailey, Scott

    2015-01-01

    In prokaryotes, RNA derived from type I and type III CRISPR loci direct large ribonucleoprotein complexes to destroy invading bacteriophage and plasmids. In Escherichia coli, this 405-kDa complex is called Cascade. Here we report the 3.03Å crystal structure of Cascade bound to a single-stranded DNA target. The structure reveals that the CRISPR RNA and target strands do not form a double helix but instead adopt an underwound ribbon-like structure. This non-canonical structure is facilitated by rotation of every sixth nucleotide out of the RNA-DNA hybrid and is stabilized by the highly interlocked organization of protein subunits. These studies provide insight into both the assembly and the activity of this complex and suggest a mechanism to enforce fidelity of target binding. PMID:25123481

  11. Crystal Structure of a CRISPR RNA-guided Surveillance Complex Bound to a ssDNA Target

    Energy Technology Data Exchange (ETDEWEB)

    Mulepati, Sabin [Johns Hopkins Univ., Baltimore, MD (United States); Heroux, Annie; Bailey, Scott [Johns Hopkins Univ., Baltimore, MD (United States)

    2014-09-19

    In prokaryotes, RNA derived from type I and type III CRISPR loci direct large ribonucleoprotein complexes to destroy invading bacteriophage and plasmids. In Escherichia coli, this 405-kilodalton complex is called Cascade. We report the crystal structure of Cascade bound to a single-stranded DNA (ssDNA) target at a resolution of 3.03 angstroms. The structure reveals that the CRISPR RNA and target strands do not form a double helix but instead adopt an underwound ribbon-like structure. This noncanonical structure is facilitated by rotation of every sixth nucleotide out of the RNA-DNA hybrid and is stabilized by the highly interlocked organization of protein subunits. These studies provide insight into both the assembly and the activity of this complex and suggest a mechanism to enforce fidelity of target binding.

  12. Structural biology. Crystal structure of a CRISPR RNA-guided surveillance complex bound to a ssDNA target.

    Science.gov (United States)

    Mulepati, Sabin; Héroux, Annie; Bailey, Scott

    2014-09-19

    In prokaryotes, RNA derived from type I and type III CRISPR loci direct large ribonucleoprotein complexes to destroy invading bacteriophage and plasmids. In Escherichia coli, this 405-kilodalton complex is called Cascade. We report the crystal structure of Cascade bound to a single-stranded DNA (ssDNA) target at a resolution of 3.03 angstroms. The structure reveals that the CRISPR RNA and target strands do not form a double helix but instead adopt an underwound ribbon-like structure. This noncanonical structure is facilitated by rotation of every sixth nucleotide out of the RNA-DNA hybrid and is stabilized by the highly interlocked organization of protein subunits. These studies provide insight into both the assembly and the activity of this complex and suggest a mechanism to enforce fidelity of target binding.

  13. Introduction to surveillance studies

    CERN Document Server

    Petersen, JK

    2012-01-01

    Introduction & OverviewIntroduction Brief History of Surveillance Technologies & TechniquesOptical SurveillanceAerial Surveillance Audio Surveillance Radio-Wave SurveillanceGlobal Positioning Systems Sensors Computers & the Internet Data Cards Biochemical Surveillance Animal Surveillance Biometrics Genetics Practical ConsiderationsPrevalence of Surveillance Effectiveness of Surveillance Freedom & Privacy IssuesConstitutional Freedoms Privacy Safeguards & Intrusions ResourcesReferences Glossary Index

  14. Forward Scatter Radar for Air Surveillance: Characterizing the Target-Receiver Transition from Far-Field to Near-Field Regions

    Directory of Open Access Journals (Sweden)

    Marta Tecla Falconi

    2017-01-01

    Full Text Available A generalized electromagnetic model is presented in order to predict the response of forward scatter radar (FSR systems for air-target surveillance applications in both far-field and near-field conditions. The relevant scattering problem is tackled by developing the Helmholtz–Kirchhoff formula and Babinet’s principle to express the scattered and the total fields in typical FSR configurations. To fix the distinctive features of this class of problems, our approach is applied here to metallic targets with canonical rectangular shapes illuminated by a plane wave, but the model can straightforwardly be used to account for more general scenarios. By exploiting suitable approximations, a simple analytical formulation is derived allowing us to efficiently describe the characteristics of the FSR response for a target transitioning with respect to the receiver from far-field to near-field regions. The effects of different target electrical sizes and detection distances on the received signal, as well as the impact of the trajectory of the moving object, are evaluated and discussed. All of the results are shown in terms of quantities normalized to the wavelength and can be generalized to different configurations once the carrier frequency of the FSR system is set. The range of validity of the proposed closed-form approach has been checked by means of numerical analyses, involving comparisons also with a customized implementation of a full-wave commercial CAD tool. The outcomes of this study can pave the way for significant extensions on the applicability of the FSR technique.

  15. Surveillance Pleasures

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    and leisure have not been studied with the same intensity as e.g. policing, civil liberties and social sorting. This paper offers a study of trends in surveillance pleasures, i.e. watching and eavesdropping in popular culture. My focus is the existential aspects and ethical dilemmas of surveillance...

  16. Diagnostics and surveillance methods

    Science.gov (United States)

    Detection and diagnosis of influenza A virus (IAV) infection in animals requires a laboratory test since disease from IAV presents no pathognomonic signs. Diagnosis and surveillance of animal influenza focuses on the detection of virus or type specific antibodies. Whether one targets the virus or ...

  17. The influence of scoring targets and outer-floaters on attacking and defending team dispersion, shape and creation of space during small-sided soccer games

    Directory of Open Access Journals (Sweden)

    Castellano Julen

    2016-06-01

    Full Text Available The effect of altered game formats on team performances during soccer practice can be harnessed by coaches to stimulate specific tactical behaviours. The aim of the present study was to analyse the influence of using (i small goals [SG], (ii goalkeepers [7G] and (iii floaters [7GF] on the dispersion, shape and available space of teams during small-sided games (SSGs. Twenty-four male soccer players were distributed into four teams composed of five players, two goalkeepers and two floaters that performed six SSG bouts of 6 min, interspersed with 6 min of passive recovery. Offensive and defensive phases were also analysed separately in order to verify the preservation of basic principles of attacking (teams more stretched to create free space and defending (teams more compact to tie-up space during SSGs. The variables used to characterize the collective behaviour were: length [L], width [W], team shape [Sh], and team separateness [TS]. Results revealed that the teams showed different collective behaviours depending on SSG format and a playing phase: a L and W were higher in attack than in defence in all SSGs; b team shapes were more elongated in defence in all SSGs except SG; c the space separating players from their closest opponents (TS was shorter in 7G; and d SG and 7GF elicited greater defensive openness due to increased team width. The results suggest that manipulating task constraints, such as goal size, presence or absence of goalkeepers and floaters can be harnessed by coaches to shape distinct team tactical behaviours in SSGs while preserving the basic principles of attacking and defending.

  18. A LocationGuard Approach: An Efficacious Scheme to Alleviate DoS Attacks

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2011-01-01

    from a denial-of- service (DoS) attack or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein a n adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents Location Guard—a...

  19. Generating IDS Attack Pattern Automatically Based on Attack Tree

    Institute of Scientific and Technical Information of China (English)

    向尕; 曹元大

    2003-01-01

    Generating attack pattern automatically based on attack tree is studied. The extending definition of attack tree is proposed. And the algorithm of generating attack tree is presented. The method of generating attack pattern automatically based on attack tree is shown, which is tested by concrete attack instances. The results show that the algorithm is effective and efficient. In doing so, the efficiency of generating attack pattern is improved and the attack trees can be reused.

  20. Targeted sequencing reveals TP53 as a potential diagnostic biomarker in the post-treatment surveillance of head and neck cancer.

    Science.gov (United States)

    van Ginkel, Joost H; de Leng, Wendy W J; de Bree, Remco; van Es, Robert J J; Willems, Stefan M

    2016-09-20

    Head and neck squamous cell carcinomas (HNSCC) form a large heterogeneous group of tumors and have a relatively poor outcome in advanced cases. Revealing the underlying genetic mutations in HNSCC facilitates the development of diagnostic biomarkers, which might lead to improved diagnosis and post treatment surveillance. We retrospectively analyzed mutational hotspots using targeted next-generation sequencing (NGS) of 239 HNSCC tumor samples in order to examine the mutational profile of HNSCC. Furthermore, we assessed prevalence, co-occurrence, and synonymy of gene mutations in (matched) tumor samples. TP53 was found mutated the most frequent with mutation rates of up to 83% in all tumors, compared to mutation rates of between 0 and 21% of CDKN2A, PIK3CA, HRAS, CDK4, FBXW7 and RB1. Mutational co-occurrence predominantly existed between TP53 and PIK3CA, TP53 and CDKN2A, and HRAS and PIK3CA. Mutational synonymy between primary tumor and associated metastasis and recurrence was present in respectively 88% and 89%. TP53 mutations were concordantly mutated in 95% of metastases and in 91% of recurrences. This indicates TP53 mutations to be highly prevalent and concordant in primary tumors and associated locoregional metastases and recurrences. In turn, this provides ground for further investigating the use of TP53 mutations as diagnostic biomarkers in HNSCC patients.

  1. Individuals with a family history of ESRD are a high-risk population for CKD: implications for targeted surveillance and intervention activities.

    Science.gov (United States)

    McClellan, William M; Satko, Scott G; Gladstone, Elisa; Krisher, Jenna O; Narva, Andrew S; Freedman, Barry I

    2009-03-01

    Activities intended to improve the detection, treatment, and control of chronic kidney disease (CKD) should be incorporated into existing health care systems and targeted to high-risk populations to avoid redundancy and waste of resources. One high-risk population consists of first- or second-degree family members of patients with end-stage renal disease (ESRD), who are 2 to 3 times as likely to have incident ESRD, have high rates of impaired kidney function and undetected and uncontrolled high blood pressure, and are more likely to be obese. These individuals usually are unaware of their underlying CKD and may discount their own risk of ESRD. The ESRD Network 6 Family History Project shows that the ESRD Networks, which constitute a national CKD surveillance system for patients with stage 5 CKD, may be an existing resource that can be used to identify relatives of incident patients with ESRD and provide these families with information about CKD. Nationally available resources have been developed by the National Kidney Disease Education Program for use with these at-risk families. Individuals interested in population-based CKD control activities should be aware of and use these resources.

  2. Heart attack first aid

    Science.gov (United States)

    First aid - heart attack; First aid - cardiopulmonary arrest; First aid - cardiac arrest ... A heart attack occurs when the blood flow that carries oxygen to the heart is blocked. The heart muscle ...

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available Transient Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood ... The only difference between a stroke and TIA is that with TIA the blockage is transient (temporary). ...

  4. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Ischemic Attack TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an artery for a short time. The only difference between a stroke ...

  5. Watermark copy attack

    OpenAIRE

    Kutter, Martin; Voloshynovskyy, Svyatoslav; Herrigel, Alexander

    2000-01-01

    Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy theembedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack doesnot destroy anembedded watermark, but copies it from one image to a di erent ...

  6. The Watermark Template Attack

    OpenAIRE

    Herrigel, Alexander; Voloshynovskyy, Svyatoslav; Rytsar, Yuriy

    2001-01-01

    This paper presents a new attack, called the watermark template attach, for watermarked images. In contrast to the Stirmark benchmark, this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches, it is not the aim of the attack to change the statistics of embedded watermarks fooling the detection process but to utilize specific concepts that have been recently developed for m...

  7. Analysis of the SYN Flood DoS Attack

    Directory of Open Access Journals (Sweden)

    Mitko Bogdanoski

    2013-06-01

    Full Text Available The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol segments when SYN flag is ON, which gives space for a DoS (Denial of Service attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection algorithms as an effective mechanism against this type of attack. Finally, practical approaches against SYN flood attack for Linux and Windows environment which are followed by are shown.

  8. Composite Dos Attack Model

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2012-04-01

    Full Text Available Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system settings, etc. In cyber-attack cases, executing real experiments can be difficult for many reasons. However, mathematical or programming models can be used instead of conducting experiments in a real environment. This work proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering and memory depletion models for a more real representation of similar cyber-attacks. On the basis of the introduced model, different experiments were done. They showed the main dependencies of the influence of attacker and victim’s properties on the success probability of denial of service attack. In the future, this model can be used for the denial of service attack or countermeasure optimization.

  9. Crypto and empire: the contradictions of counter-surveillance advocacy

    NARCIS (Netherlands)

    Gürses, S.; Kundnani, A.; Van Hoboken, J.

    2016-01-01

    Since Edward Snowden’s revelations of US and UK surveillance programs, privacy advocates, progressive security engineers, and policy makers have been seeking to win majority support for countering surveillance. The problem is framed as the replacement of targeted surveillance with mass surveillance

  10. Field application of a combined pig and poultry market chain and risk pathway analysis within the Pacific Islands region as a tool for targeted disease surveillance and biosecurity.

    Science.gov (United States)

    Brioudes, Aurélie; Gummow, Bruce

    2016-07-01

    Limited resources are one of the major constraints in effective disease monitoring and control in developing countries. This paper examines the pig and poultry market chains of four targeted Pacific Island countries and territories (PICTs): Fiji, Papua New Guinea, Solomon Islands and Vanuatu and combines them with a risk pathway analysis to identify the highest risk areas (risk hotspots) and risky practices and behaviours (risk factors) of animal disease introduction and/or spread, using highly pathogenic avian influenza (HPAI) and foot-and-mouth disease (FMD) as model diseases because of their importance in the region. The results show that combining a market chain analysis with risk pathways is a practical way of communicating risk to animal health officials and improving biosecurity. It provides a participatory approach that helps officials to better understand the trading regulations in place in their country and to better evaluate their role as part of the control system. Common risk patterns were found to play a role in all four PICTs. Legal trade pathways rely essentially on preventive measures put in place in the exporting countries while no or only limited control measures are undertaken by the importing countries. Legal importations of animals and animal products are done mainly by commercial farms which then supply local smallholders. Targeting surveillance on these potential hotspots would limit the risk of introduction and spread of animal diseases within the pig and poultry industry and better rationalize use of skilled manpower. Swill feeding is identified as a common practice in the region that represents a recognized risk factor for dissemination of pathogens to susceptible species. Illegal introduction of animals and animal products is suspected, but appears restricted to small holder farms in remote areas, limiting the risk of spread of transboundary animal diseases along the market chain. Introduction of undeclared goods hidden within a legal

  11. Return of ambiguity attacks

    Science.gov (United States)

    Craver, Scott A.

    2002-04-01

    The ambiguity attack, or invertibility attack, was described several years ago as a potential threat to digital watermarking systems. By manipulating the invertibility of watermark embedding, one could negate or subvert the meaning of a copyright mark. These attacks were easily prevented, however, with the appropriate application of one-way functions and cryptographic hashes in watermarking protocols. New research in watermarking, however, has caused the ambiguity attack to resurface as a threat, and this time it will not be as easy averted. Recent work in public-key watermarking create scenarios in which one-way functions may be ineffective against this threat. Furthermore, there are also positive uses for ambiguity attacks, as components in watermarking protocols. This paper provides an overview of the past and possible future of these unusual attacks.

  12. Target Value Evaluation of the Mechanized Infantry Division Joint Fires Attack Based on Optimization Theory%基于最优化理论的机步师联合火力打击目标价值评估

    Institute of Scientific and Technical Information of China (English)

    邹进; 许劲松

    2012-01-01

    According to the characteristics of the mechanized infantry division joint fires attack in city offensive combat under informa tion condition, by the means of optimization theory decision-making, and an example is used for demonstrating the effectiveness and feasibili ty of the model, the paper analyzes and prioritizes battlefield target value for artillery commanders.%根据信息化条件下机步师城市进攻战斗联合火力打击特点,以最优化理论为基础,对战场联合火力打击目标价值进行了分析和排序,并通过实例对该模型的有效性和实用性进行了验证,为指挥员的决策行为提供了理论依据。

  13. Rezultati modeliranja borbenog manevra napada aviona na zemaljski cilj iz oštrog obrušavanja / The results of combat attack maneuver modelling on ground target using aircraft steep diving

    Directory of Open Access Journals (Sweden)

    Nikola Pekić

    2005-11-01

    Full Text Available U ovom radu prikazani su rezultati matematičkog modeliranja kretanja aviona u borbenom manevru pri napadu na zemaljski cilj iz oštrog obrušavanja. Kretanje aviona razmatrano je kao kretanje materijalne tačke u prostoru. Takođe, prikazane su prednosti aviona sa otklonom vektora potiska i njegove primene u manevru u odnosu na avion sa klasičnom pogonskom grupom i klasičnim aerodinamičkim upravljačkim površinama. / This paper presents the results of mathematical modeling of aircraft movement in combat maneuver during attack on ground target using steep diving. Aircraft movement is considered as movement of a material point in space. Also, the advantages of aircraft with thrust vector deflection and its applications during maneuver when compared to the aircraft with classical engines and classical aerodynamic controls.

  14. Surveillance of Autism.

    Science.gov (United States)

    Boyle, Coleen A.; Bertrand, Jacquelyn; Yeargin-Allsopp, Marshalyn

    1999-01-01

    This article describes the autism surveillance activities of the Center for Disease Control and Prevention. It considers why surveillance to track prevalence of autistic disorders is needed, how such surveillance is conducted, and the special challenges of autism surveillance. (DB)

  15. Drugs targeting 5-hydroxytryptamine receptors in acute treatments of migraine attacks. A review of new drugs and new administration forms of established drugs

    DEFF Research Database (Denmark)

    Tfelt-Hansen, Peer C; Pihl, Thomas Peter Boye; Hougaard, Anders

    2014-01-01

    of migraines. Areas covered: This evaluation reviews the recent advances in acute migraine therapy targeting the 5-HT receptor. Specifically, the authors review the pharmacokinetics, pharmacodynamics, clinical efficacy and safety of 5-HT1F receptor agonists and new formulations of sumatriptan...

  16. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the

  17. Surveillance Angels

    NARCIS (Netherlands)

    Rothkrantz, L.J.M.

    2014-01-01

    The use of sensor networks has been proposed for military surveillance and environmental monitoring applications. Those systems are composed of a heterogeneous set of sensors to observe the environment. In centralised systems the observed data will be conveyed to the control room to process the data

  18. An Analytical Calculation Method of Damage Area on Missile Attacking Triangle Target%导弹打击三角形目标毁伤面积的一种解析计算方法

    Institute of Scientific and Technical Information of China (English)

    郝辉; 李雪瑞; 舒健生; 李亚雄

    2013-01-01

    It is always discussed in missile firepower use that the damage area on missile attacking triangle target.The calculation of damage area on missile attacking triangle target is the basis for the research of damage problems in firepower use.The precondition is the quick and correct calculation of it.Based on Stewart theorem,the algorithm of intersected area with circle and triangle is deduced,complex calculation is avoided with the help of multiplication scalar and multiplication cross.Based on the intersection area of a triangle and a circle with its center as a vertex of the triangle,different conditions of intersected area is analyzed and specific calculation steps are presented.The correctness and feasibility of this algorithm is verified with an example.%导弹火力运用研究中常常需要进行导弹打击面目标的毁伤面积计算,而三角形目标的毁伤面积计算是火力运用中诸多毁伤问题研究的基础,快速准确地完成其运算是前提.以斯特瓦尔特定理为基础,推导了圆与三角形相交部分面积的计算方法,通过点乘和叉乘有效回避了复杂计算,以圆心为三角形一个顶点时的三角形与圆相交部分面积计算为研究对象,分析了两者相交面积计算的各种情况,并给出具体计算步骤.算例表明,该算法运算量小,计算结果准确可靠.

  19. Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack

    OpenAIRE

    2014-01-01

    We have introduced a novel adversary model in Chosen-Ciphertext Attack with Timing Attack (CCA2-TA) and it was a practical model because the model incorporates the timing attack. This paper is an extended paper for 'A Secure TFTP Protocol with Security Proofs'. Keywords - Timing Attack, Random Oracle Model, Indistinguishabilit, Chosen Plaintext Attack, CPA, Chosen Ciphertext Attack, IND-CCA1, Adaptive Chosen Ciphertext Attack, IND-CCA2, Trivial File Transfer Protocol, TFTP, Security, Trust, P...

  20. Seven Deadliest Microsoft Attacks

    CERN Document Server

    Kraus, Rob; Borkin, Mike; Alpern, Naomi

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Windows Operating System-Password AttacksActive Directory-Escalat

  1. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... stroke symptoms. Popular Topics TIA Cardiac Catheter Cholesterol Heart Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. ...

  2. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  3. Seven deadliest USB attacks

    CERN Document Server

    Anderson, Brian

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device Overflow RAMdum

  4. AN APPROACH OF DEFENDING AGAINST DDOS ATTACK

    Institute of Scientific and Technical Information of China (English)

    Wu Zhijun; Duan Haixin; Li Xing

    2006-01-01

    An approach of defending against Distributed Denial of Service (DDoS) attack based on flow model and flow detection is presented. The proposed approach can protect targets from DDoS attacking, and allow targets to provide good service to legitimate traffic under DDoS attacking, with fast reaction. This approach adopts the technique of dynamic comb filter, yields a low level of false positives of less than 1.5%,drops similar percentage of good traffic, about 1%, and passes neglectable percentage of attack bandwidth to the victim, less than 1.5%. The prototype of commercial product, D-fighter, is developed by implementing this proposed approach on Intel network processor platform IXP 1200.

  5. Forensics Investigation of Web Application Security Attacks

    Directory of Open Access Journals (Sweden)

    Amor Lazzez

    2015-02-01

    Full Text Available Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.

  6. Type Recognition of Air-Attack Target Based on VD-AiNet Cluster Algorithm%基于VD-AiNet聚类算法的空袭目标类型识别

    Institute of Scientific and Technical Information of China (English)

    范海雄; 刘付显

    2011-01-01

    To solve the problem of recognizing aerial defense and antimissile target type, based on the analysis of the primary air-attack target types, important useful factors and primary recognition principles , the vector distance primary artificial immune network cluster algorithm of artificial immune algorithm is used in the model of antibody swatch training. Furthermore, the side-by-side decision making model of antibody training and target recognition are established. Finally, the algorithm and model is validated with examples, proving the utility and effectiveness of the algorithm and model.%针对防空反导作战中空袭目标类型识别问题,在分析空袭目标的主要类型、识别指标及其识别原则的基础上,将人工免疫算法中矢量距人工免疫网络聚类算法应用于抗体样本训练模块,并建立了抗体训练和目标识别的并行决策模型.最后进行了算例验证,结果表明了算法和模型的可行性和有效性.

  7. 基于改进AHP的多机协同多目标攻击威胁评估算法分析%Threat Assessment Algorithm on Multi-aircraft Cooperative and Multi-target Attack

    Institute of Scientific and Technical Information of China (English)

    雷蕾

    2016-01-01

    现代空战需要先进的火控计算,目标威胁评估是其重要的组成部分。文章通过建立威胁评估体系模型,再提出威胁因子及权值计算方法,从而构建了一套完整的目标威胁评估算法。最后针对一个多机协同多目标攻击态势,利用建立的算法进行威胁矩阵的计算,计算结果表明该方法是有效可行的。%Modern air combat needs advanced ifre control calculation, and the target threat assessment is an important part of the ifre control system. Through the establishment of threat assessment system model, and then put forward the threat factor and weight calculation method. Thus,construct a complete target threat assessment algorithm. Finally, according to the situation of multi Aircraft Cooperative multi target attack, the method is used to calculate the threat matrix. The results show that the proposed method is effective and feasible.

  8. Study on Cruise Missile Intelligent Self-Distinguish Attacking Target on Route Based on Similar Compete Neural Network (SCNN)%巡航导弹智能自主在线目标识别选择问题研究

    Institute of Scientific and Technical Information of China (English)

    房茂燕; 汪民乐; 毕义明

    2013-01-01

    巡航导弹智能自主在线目标识别选择是巡航导弹智能自主作战的重要特征之一.主要针对在巡航导弹弹载计算机计算能力弱、反应时间较短的情况下,如何快速地对目标进行识别分类.采用模板匹配方法进行自动目标识别的大量工作在地面进行,降低了弹载计算机的计算量.为了提高在线智能自主目标识别精度和速度,提出了基于相似度竞争网络,以继承竞争网络在模式识别方面快速简单的优点,同时针对竞争网络抗干扰能力差,对模板类型以外目标无法剔除的不足进行改进,很好解决了巡航导弹在线智能自主目标识别的算法问题.最后通过仿真对算法进行验证.%Intelligent self - selecting attacking target (ISAT) on route is one of the most important characters of the cruise missile's intelligent self - attacking. The paper was Mainly for the problem how to quickly identify and classify targets under tha case that onboard computer in cruise missile calculation ability is weak and the reaction time is shorter. Lots of automatic target recognition work using template matching method were done on ground to reduce the calculation amount of on - board computer. Similar competition neural network ( SCNN) was proposed for improving the precision and the speed of the online intelligent autonomous target recognition. The SCNN inherits the competitive neural network's advantages of fast and simple in pattern recognition, at the same time, the problem of poor antijamming ability of the competition networks and the problem that goals o outside the template type cannot be eliminated, were well solved. At the end of the paper,the algorithm was verified by simulation.

  9. Padeliporfin vascular-targeted photodynamic therapy versus active surveillance in men with low-risk prostate cancer (CLIN1001 PCM301): an open-label, phase 3, randomised controlled trial.

    Science.gov (United States)

    Azzouzi, Abdel-Rahmène; Vincendeau, Sébastien; Barret, Eric; Cicco, Antony; Kleinclauss, François; van der Poel, Henk G; Stief, Christian G; Rassweiler, Jens; Salomon, Georg; Solsona, Eduardo; Alcaraz, Antonio; Tammela, Teuvo T; Rosario, Derek J; Gomez-Veiga, Francisco; Ahlgren, Göran; Benzaghou, Fawzi; Gaillac, Bertrand; Amzal, Billy; Debruyne, Frans M J; Fromont, Gaëlle; Gratzke, Christian; Emberton, Mark

    2017-02-01

    Vascular-targeted photodynamic therapy, a novel tissue-preserving treatment for low-risk prostate cancer, has shown favourable safety and efficacy results in single-arm phase 1 and 2 studies. We compared this treatment with the standard of care, active surveillance, in men with low-risk prostate cancer in a phase 3 trial. This randomised controlled trial was done in 47 European university centres and community hospitals. Men with low-risk, localised prostate cancer (Gleason pattern 3) who had received no previous treatment were randomly assigned (1:1) to vascular-targeted photodynamic therapy (4 mg/kg padeliporfin intravenously over 10 min and optical fibres inserted into the prostate to cover the desired treatment zone and subsequent activation by laser light 753 nm with a fixed power of 150 mW/cm for 22 min 15 s) or active surveillance. Randomisation was done by a web-based allocation system stratified by centre with balanced blocks of two or four patients. Best practice for active surveillance at the time of study design was followed (ie, biopsy at 12-month intervals and prostate-specific antigen measurement and digital rectal examination at 3-month intervals). The co-primary endpoints were treatment failure (histological progression of cancer from low to moderate or high risk or death during 24 months' follow-up) and absence of definite cancer (absence of any histology result definitely positive for cancer at month 24). Analysis was by intention to treat. Treatment was open-label, but investigators assessing primary efficacy outcomes were masked to treatment allocation. This trial is registered with ClinicalTrials.gov, number NCT01310894. Between March 8, 2011, and April 30, 2013, we randomly assigned 206 patients to vascular-targeted photodynamic therapy and 207 patients to active surveillance. Median follow-up was 24 months (IQR 24-25). The proportion of participants who had disease progression at month 24 was 58 (28%) of 206 in the vascular-targeted

  10. Air surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Patton, G.W.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the air surveillance and monitoring programs currently in operation at that Hanford Site. Atmospheric releases of pollutants from Hanford to the surrounding region are a potential source of human exposure. For that reason, both radioactive and nonradioactive materials in air are monitored at a number of locations. The influence of Hanford emissions on local radionuclide concentrations was evaluated by comparing concentrations measured at distant locations within the region to concentrations measured at the Site perimeter. This section discusses sample collection, analytical methods, and the results of the Hanford air surveillance program. A complete listing of all analytical results summarized in this section is reported separately by Bisping (1995).

  11. A Targeted Self-Management Approach for Reducing Stroke Risk Factors in African American Men Who Have Had a Stroke or Transient Ischemic Attack.

    Science.gov (United States)

    Sajatovic, Martha; Tatsuoka, Curtis; Welter, Elisabeth; Colon-Zimmermann, Kari; Blixen, Carol; Perzynski, Adam T; Amato, Shelly; Cage, Jamie; Sams, Johnny; Moore, Shirley M; Pundik, Svetlana; Sundararajan, Sophia; Modlin, Charles; Sila, Cathy

    2017-01-01

    This study compared a novel self-management (TargetEd MAnageMent Intervention [TEAM]) versus treatment as usual (TAU) to reduce stroke risk in African American (AA) men. Six-month prospective randomized controlled trial with outcomes evaluated at baseline, 3 months, and 6 months. Academic health center. Thirty-eight (age 60 were randomly assigned to TEAM (n = 19) or TAU (n = 19). Self-management training, delivered in 1 individual and 4 group sessions (over 3 months). Blood pressure, glycosylated hemoglobin (HbA1c), lipids, medication adherence, weight, and standardized measures of health behaviors (diet, exercise, smoking, substances), depression, and quality of life. Qualitative assessments evaluated the perspectives of TEAM participants. T tests for paired differences and nonparametric tests. Thematic content qualitative analysis. Mean age was 52.1 (standard deviation [SD] = 7.4) and mean body mass index was 31.4 (SD = 7.4). Compared to TAU, TEAM participants had significantly lower mean systolic blood pressure by 24 weeks, and there was also improvement in HbA1c and high-density lipoprotein cholesterol ( P = .03). Other biomarker and health behaviors were similar between groups. Qualitative results suggested improved awareness of risk factors as well as positive effects of group support.

  12. Mathematical Attacks on RSA Cryptosystem

    Directory of Open Access Journals (Sweden)

    Imad K. Salah

    2006-01-01

    Full Text Available In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage.

  13. Surveillance of Mycobacterium avium subsp. paratuberculosis in dairy herds

    NARCIS (Netherlands)

    Weber, M.F.

    2009-01-01

    In this thesis, the potential for improvements in surveillance of Mycobacterium avium subsp. paratuberculosis (Map) infection and paratuberculosis in dairy herds was investigated, leading to a reduction in surveillance costs whilst continuing to meet specific quality targets. In particular, differen

  14. 攻击机动目标的导弹三维变结构导引律%A 3D Variable Structure Guidance Law for Missiles in Attacking Maneuvering Targets

    Institute of Scientific and Technical Information of China (English)

    周灿辉; 周德云; 张堃

    2012-01-01

    针对导弹采用变结构导引律攻击机动目标时,容易引起视线角速率抖动的问题,在变结构控制理论的基础上,利用RBF神经网络具有自主学习的能力,提出了一种基于RBF神经网络的变结构趋近律参数项在线自适应调节的三维导引律,克服了导引过程中变结构趋近律参数项不易确定的缺点,从而降低变结构控制的抖振,提高了导弹的命中精度.仿真结果表明,该导引律有很强的自适应能力和鲁棒性,满足导引要求.%When the missile attacks the maneuvering targets using the variable structure guidance law, chattering of line-of-sight angular rate may happen. A 3-dimensional variable structure guidance law was presented based on RBF neural network adaptive parameter adjustment, which combining the self-learning ability of RBF neural network with the variable structure control theory. It solves the problem of the variable structure that the parameter of it is not easy to be determined. So it can reduce the chattering and improve the missile's attack accuracy. The simulation results show that the new guidance law has strong adaptability and robustness, which can meet the need of guidance.

  15. Review of Australia's polio surveillance.

    Science.gov (United States)

    Paterson, Beverley J; Durrheim, David N

    2013-06-30

    With eradication almost within reach, the importance of detecting every poliomyelitis case has taken on additional significance. The selected surveillance strategy must be effective and efficient. A review of polio surveillance in Australia was conducted to consider whether current strategies were optimal. Document review and semi-structured key informant interviews were used to conduct the review. Interviews were recorded, transcribed and thematically analysed. The review was an iterative process with feedback on the findings sought from interviewees. Since Western Pacific Regional polio-elimination status was certified, one imported adult case was detected in 2007 in Australia, with no evidence of further transmission, and no Australian paediatric cases identified. Respondents reported that: it was not possible to prevent importations; paediatric cases were more likely to be identified than adult cases; and there may be a low level of suspicion among clinicians. Case detection and outbreak mitigation were considered key reasons to undertake polio surveillance. While Australia has not achieved one of the key World Health Organization (WHO) surveillance targets, this did not compromise Australias polio-free status. Identified issues with polio surveillance were the potential for an importation with high attendant investigation and containment costs, low stool sample collection rates, and the opportunity to improve safeguards around the importation and laboratory storage of biological samples containing poliovirus. The review found strong support for ongoing polio surveillance, particularly to detect imported cases and to demonstrate commitment to maintaining a polio-free region. Existing polio surveillance strategies were considered appropriate for Australia.

  16. Distributed Denial of Service Attacks: A Review

    Directory of Open Access Journals (Sweden)

    Sonali Swetapadma Sahu

    2014-01-01

    Full Text Available A wireless sensor network (WSN is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.

  17. Nocturnal panic attacks

    Directory of Open Access Journals (Sweden)

    Lopes Fabiana L.

    2002-01-01

    Full Text Available The panic-respiration connection has been presented with increasing evidences in the literature. We report three panic disorder patients with nocturnal panic attacks with prominent respiratory symptoms, the overlapping of the symptoms with the sleep apnea syndrome and a change of the diurnal panic attacks, from spontaneous to situational pattern. The implication of these findings and awareness to the distinct core of the nocturnal panic attacks symptoms may help to differentiate them from sleep disorders and the search for specific treatment.

  18. Supply Chain Attack Framework and Attack Patterns

    Science.gov (United States)

    2013-12-01

    Malware is embedded in a replacement server motherboard (e.g., in the flash memory) in order to alter server functionality from that intended. Attack...Slashdot: Dell Ships Infected Motherboards July 21, 2010(c/o Rick Dove) Threat: An adversary with access to hardware procurement, maintenance, or upgrade...control can embed malware in a critical component server motherboard . Vulnerabilities: The control processes and mechanisms for hardware

  19. Preventing Coordinated Attacks Via Distributed Alert Exchange

    CERN Document Server

    Garcia-Alfaro, Joaquin; Muehl, Gero; Borrell, Joan

    2008-01-01

    Attacks on information systems followed by intrusions may cause large revenue losses. The prevention of both is not always possible by just considering information from isolated sources of the network. A global view of the whole system is necessary to recognize and react to the different actions of such an attack. The design and deployment of a decentralized system targeted at detecting as well as reacting to information system attacks might benefit from the loose coupling realized by publish/subscribe middleware. In this paper, we present the advantages and convenience in using this communication paradigm for a general decentralized attack prevention framework. Furthermore, we present the design and implementation of our approach based on existing publish/subscribe middleware and evaluate our approach for GNU/Linux systems.

  20. Correlations in complex networks under attack

    CERN Document Server

    Srivastava, Animesh; Ganguly, Niloy; Peruani, Fernando; 10.1103/PhysRevE.86.036106

    2013-01-01

    For any initial correlated network after any kind of attack where either nodes or edges are removed, we obtain general expressions for the degree-degree probability matrix and degree distribution. We show that the proposed analytical approach predicts the correct topological changes after the attack by comparing the evolution of the assortativity coefficient for different attack strategies and intensities in theory and simulations. We find that it is possible to turn an initial assortative network into a disassortative one, and vice versa, by fine-tuning removal of either nodes or edges. For an initial uncorrelated network, on the other hand, we discover that only a targeted edge-removal attack can induce such correlations.

  1. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage to ...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs.......By definition, an insider has better access, is more trusted, and has better information about internal procedures, high-value targets, and potential weak spots in the security, than an outsider. Consequently, an insider attack has the potential to cause significant, even catastrophic, damage...... to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools...

  2. 基于多群体改进萤火虫算法的UCAV协同多目标分配%Target Assignment in Cooperative Attacking of UCAVs Based on Multi-Intelligence Improved Glowworm Swarm Optimization Algorithm

    Institute of Scientific and Technical Information of China (English)

    王永泉; 罗建军

    2014-01-01

    对多UCAV协同攻击目标分配问题进行了研究。以收益指标、消耗指标及航程指标为准则建立数学模型,采用改进的萤火虫优化算法对模型进行求解;对基本萤火虫优化算法进行了改进,给出了新的萤火虫更新策略,引入了局部搜索及全局信息交换机制,并将萤火虫优化算法与混合蛙跳算法融合,实现了多智能群体共同进化,提出了一种基于多群体改进萤火虫优化算法的UCAV目标分配算法;针对UCAV协同攻击决策特点,设计了萤火虫离散编码方式,最终得到多UCAV协同攻击最优分配方案。仿真结果表明,多群体萤火虫优化算法能够稳定快速地给出目标分配最优方案。%A target allocation algorithm based on multi-intelligence improved glowworm swarm optimization ( MIG-SO) algorithm is proposed. A model of decision-making is built up by taking benefit index, loss index and range in-dex as the criteria, and the MIGSO is used to solve the model. Finally the optimal allocation scheme for multi-air-craft cooperative attacking is gotten. According to the characteristics of UCAV attack decision making, a special coding for firefly particle and firefly update strategy is presented. With shuffled frog leaping algorithm (SFLA), glowworms are divided into different ethnic groups, and local search and global information exchange method im-proves GSO performance. SFLA is also combined with GSO, which realize the co-evolution of the two kinds of groups. The simulation results shows that the MIGSO algorithm can give the optimal target assignment solution quickly and effectively.

  3. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  4. Heart Attack Payment - Hospital

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – provider data. This data set includes provider data for payments associated with a 30-day episode of care for heart...

  5. Heart Attack Payment - State

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – state data. This data set includes state-level data for payments associated with a 30-day episode of care for heart...

  6. Heart Attack Payment - National

    Data.gov (United States)

    U.S. Department of Health & Human Services — Payment for heart attack patients measure – national data. This data set includes national-level data for payments associated with a 30-day episode of care for heart...

  7. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... TIA , or transient ischemic attack, is a "mini stroke" that occurs when a blood clot blocks an ... a short time. The only difference between a stroke and TIA is that with TIA the blockage ...

  8. Transient Ischemic Attack

    Medline Plus

    Full Text Available ... Attack Stent © 2017, American Heart Association, Inc. All rights reserved. Unauthorized use prohibited. The content in this library is for educational purposes only, and therefore is not intended to be ...

  9. Cooperating attackers in neural cryptography.

    Science.gov (United States)

    Shacham, Lanir N; Klein, Einat; Mislovaty, Rachel; Kanter, Ido; Kinzel, Wolfgang

    2004-06-01

    A successful attack strategy in neural cryptography is presented. The neural cryptosystem, based on synchronization of neural networks by mutual learning, has been recently shown to be secure under different attack strategies. The success of the advanced attacker presented here, called the "majority-flipping attacker," does not decay with the parameters of the model. This attacker's outstanding success is due to its using a group of attackers which cooperate throughout the synchronization process, unlike any other attack strategy known. An analytical description of this attack is also presented, and fits the results of simulations.

  10. Biomechanics of knife stab attacks.

    Science.gov (United States)

    Chadwick, E K; Nicol, A C; Lane, J V; Gray, T G

    1999-10-25

    Equipment, materials and methods for the measurement of the biomechanical parameters governing knife stab attacks have been developed and data have been presented that are relevant to the improvement of standards for the testing of stab-resistant materials. A six-camera Vicon motion analysis system was used to measure velocity, and derive energy and momentum during the approach phase of the attack and a specially developed force-measuring knife was used to measure three-dimensional forces and torque during the impact phase. The body segments associated with the knife were modelled as a series of rigid segments: trunk, upper arm, forearm and hand. The velocities of these segments, together with knowledge of the mass distribution from biomechanical tables, allowed the calculation of the individual segment energy and momentum values. The instrumented knife measured four components of load: axial force (along the length of the blade), cutting force (parallel to the breadth of the blade), lateral force (across the blade) and torque (twisting action) using foil strain gauges. Twenty volunteers were asked to stab a target with near maximal effort. Three styles of stab were used: a short thrust forward, a horizontal style sweep around the body and an overhand stab. These styles were chosen based on reported incidents, providing more realistic data than had previously existed. The 95th percentile values for axial force and energy were 1885 N and 69 J, respectively. The ability of current test methods to reproduce the mechanical parameters measured in human stab attacks has been assessed. It was found that current test methods could reproduce the range of energy and force values measured in the human stab attacks, although the simulation was not accurate in some respects. Non-axial force and torque values were also found to be significant in the human tests, but these are not reproduced in the standard mechanical tests.

  11. Bayesian Watermark Attacks

    OpenAIRE

    Shterev, Ivo; Dunson, David

    2012-01-01

    This paper presents an application of statistical machine learning to the field of watermarking. We propose a new attack model on additive spread-spectrum watermarking systems. The proposed attack is based on Bayesian statistics. We consider the scenario in which a watermark signal is repeatedly embedded in specific, possibly chosen based on a secret message bitstream, segments (signals) of the host data. The host signal can represent a patch of pixels from an image or a video frame. We propo...

  12. DNS rebinding attacks

    OpenAIRE

    Kokkinopoulos, Georgios

    2009-01-01

    Approved for public release, distribution unlimited. A Domain Name System (DNS) Rebinding attack compromises the integrity of name resolution in DNS with the goal of controlling the IP address of the host to which the victim ultimately connects. The same origin policy and DNS Pinning techniques were introduced to protect Web browsers from DNS rebinding attacks, but their effectiveness has been undermined by vulnerabilities introduced by plug-ins such as JavaScript and Adobe Flash Play...

  13. Attack Vulnerability of Network with Duplication-Divergence Mechanism

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability a is more robust against target attack relatively. Furthermore, duplication-divergence network is broken down more quickly than its counterpart BA network under target attack. Such result is consistent with the fact of WWW and Internet networks under target attack. So duplication-divergence model is a more realistic one for us to investigate the characteristics of the world wide web in future. We also observe that the exponent 7 of degree distribution and average degree are important parameters of networks, reflecting the performance of networks under target attack. Our results are helpful to the research on the security of network.

  14. High Order Differential Attack and Trace Attack to Block Ciphers

    Institute of Scientific and Technical Information of China (English)

    HU Yupu; CHEN Kai; Xiao Guozhen

    2001-01-01

    In this paper, we prove a high or-der differential property of power function, then giverespectively high order differential attack and traceattack to block ciphers. These attacks depend onlyon block cipher's algebraic shape on GF(2n) and haveno relation with its designing structure. The condi-tions are given for both effective attacks and strengthagainst attacks.

  15. Surveillance and Critical Theory

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2015-09-01

    Full Text Available In this comment, the author reflects on surveillance from a critical theory approach, his involvement in surveillance research and projects, and the status of the study of surveillance. The comment ascertains a lack of critical thinking about surveillance, questions the existence of something called “surveillance studies” as opposed to a critical theory of society, and reflects on issues such as Edward Snowden’s revelations, and Foucault and Marx in the context of surveillance.

  16. Life After a Heart Attack

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  17. What Is a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  18. What Causes a Heart Attack?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  19. XQuery Injection Attack and Countermeasures

    Institute of Scientific and Technical Information of China (English)

    谭玉森

    2014-01-01

    As a database that allows data to be stored in XML format, XML database suffers from some similar attacks as traditional relational database does. These attacks include injection attack by XQuey function in application software. These include BaseX, eXist and MarkLogic. In order to defeat these attacks, countermeasures are proposed.

  20. TARGET:?

    National Research Council Canada - National Science Library

    James M Acton

    2014-01-01

      By 2003. as military planners had become worried that the country's long-range conventional weapons, such as cruise missiles, might be too slow to reach hypothetical distant targets that needed to be struck urgently...

  1. Seven Deadliest Wireless Technologies Attacks

    CERN Document Server

    Haines, Brad

    2010-01-01

    How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption

  2. Flooding Distributed Denial of Service Attacks-A Review

    Directory of Open Access Journals (Sweden)

    Khadijah W.M. Ghazali

    2011-01-01

    Full Text Available Problem statement: Flaws either in users’ implementation of a network or in the standard specification of protocols has resulted in gaps that allow various kinds of network attack to be launched. Of the kinds of network attacks, denial-of-service flood attacks have caused the most severe impact. Approach: This study reviews recent researches on flood attacks and their mitigation, classifying such attacks as either high-rate flood or low-rate flood. Finally, the attacks are compared against criteria related to their characteristics, methods and impacts. Results: Denial-of-service flood attacks vary in their rates, traffic, targets, goals and impacts. However, they have general similarities that are the methods used are flooding and the main purpose is to achieve denial of service to the target. Conclusion/Recommendations: Mitigation of the denial-of-service flood attacks must correspond to the attack rates, traffic, targets, goals and impacts in order to achieve effective solution.

  3. Social Engineering Attack Detection Model: SEADMv2

    CSIR Research Space (South Africa)

    Mouton, F

    2015-10-01

    Full Text Available link in the security chain. A social engineering attack targets this weakness by using various manipulation techniques to elicit individuals to perform sensitive requests. The field of social engineering is still in its infancy as far as formal...

  4. The political attack ad

    Directory of Open Access Journals (Sweden)

    Palma Peña-Jiménez, Ph.D.

    2011-01-01

    Full Text Available During election campaigns the political spot has a clear objective: to win votes. This message is communicated to the electorate through television and Internet, and usually presents a negative approach, which includes a direct critical message against the opponent, rather than an exposition of proposals. This article is focused on the analysis of the campaign attack video ad purposely created to encourage the disapproval of the political opponent among voters. These ads focus on discrediting the opponent, many times, through the transmission of ad hominem messages, instead of disseminating the potential of the political party and the virtues and manifesto of its candidate. The article reviews the development of the attack ad since its first appearance, which in Spain dates back to 1996, when the famous Doberman ad was broadcast, and examines the most memorable campaign attack ads.

  5. Surveillance Key Frame Extraction Based on Aggregation Dispersion Entropy and Moving Target Detection%基于聚散熵及运动目标检测的监控视频关键帧提取

    Institute of Scientific and Technical Information of China (English)

    马利克; 彭进业; 冯晓毅

    2015-01-01

    针对公安监控视频检索中根据运动目标准确标注视频关键帧的问题,提出一种基于聚散熵及运动目标检测的监控视频关键帧提取算法。首先通过对视频内容的分析,提出监控视频聚散熵的概念。其次根据聚散熵对监控视频进行子镜头划分,再次根据运动目标检测对子镜头进行划分,从而提取视频关键帧。最后列举出算法在几种典型视频数据库中的实验结果及结果分析。实验结果表明该算法在关键帧提取的准确性和鲁棒性上都有良好表现,该算法针对公安监控视频检索需求,在缩短公安视频侦查时间及智能检索中起到支撑作用。%Key frame extraction is an important step in surveillance video retrieval. We propose a surveillance key frame extraction algorithm which is based on the aggregation dispersion entropy and moving target detection. Firstly, the concept of the aggregation dispersion entropy was defined to distinguish the presence of moving objects in video. Secondly, the aggregation dispersion entropy was used to divide surveillance video into several shots. And then the shots were splitted into sub⁃shots by the moving target detection. So the key frames could be got though the sub⁃shots. Finally, the algorithm of key frame extraction was given. The experimental results and their discussions were given;they showed that this algorithm has good performance both in accuracy and robustness for several different databases. Also, it is the demand of surveillance video retrieval in police use. And it is expected to be of further use in police video investigation.

  6. Shark attack in Natal.

    Science.gov (United States)

    White, J A

    1975-02-01

    The injuries in 5 cases of shark attack in Natal during 1973-74 are reviewed. Experience in shark attacks in South Africa during this period is discussed (1965-73), and the value of protecting heavily utilized beaches in Natal with nets is assessed. The surgical applications of elasmobranch research at the Oceanographic Research Institute (Durban) and at the Headquarters of the Natal Anti-Shark Measures Board (Umhlanga Rocks) are described. Modern trends in the training of surf life-guards, the provision of basic equipment for primary resuscitation of casualties on the beaches, and the policy of general and local care of these patients in Natal are discussed.

  7. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  8. Attacks on biometric systems: a case study in fingerprints

    Science.gov (United States)

    Uludag, Umut; Jain, Anil K.

    2004-06-01

    In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks that can decrease their security considerably. In this paper, we analyze these attacks in the realm of a fingerprint biometric system. We propose an attack system that uses a hill climbing procedure to synthesize the target minutia templates and evaluate its feasibility with extensive experimental results conducted on a large fingerprint database. Several measures that can be utilized to decrease the probability of such attacks and their ramifications are also presented.

  9. The surveillant assemblage.

    Science.gov (United States)

    Haggerty, K D; Ericson, R V

    2000-12-01

    George Orwell's 'Big Brother' and Michel Foucault's 'panopticon' have dominated discussion of contemporary developments in surveillance. While such metaphors draw our attention to important attributes of surveillance, they also miss some recent dynamics in its operation. The work of Gilles Deleuze and Felix Guattari is used to analyse the convergence of once discrete surveillance systems. The resultant 'surveillant assemblage' operates by abstracting human bodies from their territorial settings, and separating them into a series of discrete flows. These flows are then reassembled in different locations as discrete and virtual 'data doubles'. The surveillant assemblage transforms the purposes of surveillance and the hierarchies of surveillance, as well as the institution of privacy.

  10. Bioterrorism Preparedness Through Public Health and Medical Bio-Surveillance

    Science.gov (United States)

    2006-05-31

    viral hemorrhagic fevers (Ebola, Marburg, and Lassa ); aflatoxin; and botulinum and shigella toxins comprise some of the most dangerous bio- agents... outbreaks could occur simultaneously in multiple locations, which is less likely in a natural epidemic. 5 Contagions can spread throughout the...surveillance to detect attacks. Surveillance to detect, collect, analyze, and interpret reports of bio-events and trained staffs to monitor disease outbreaks

  11. Colorado animal-based plague surveillance systems: relationships between targeted animal species and prediction efficacy of areas at risk for humans.

    Science.gov (United States)

    Lowell, Jennifer L; Eisen, Rebecca J; Schotthoefer, Anna M; Xiaocheng, Liang; Montenieri, John A; Tanda, Dale; Pape, John; Schriefer, Martin E; Antolin, Michael F; Gage, Kenneth L

    2009-06-01

    Human plague risks (Yersinia pestis infection) are greatest when epizootics cause high mortality among this bacterium's natural rodent hosts. Therefore, health departments in plague-endemic areas commonly establish animal-based surveillance programs to monitor Y. pestis infection among plague hosts and vectors. The primary objectives of our study were to determine whether passive animal-based plague surveillance samples collected in Colorado from 1991 to 2005 were sampled from high human plague risk areas and whether these samples provided information useful for predicting human plague case locations. By comparing locations of plague-positive animal samples with a previously constructed GIS-based plague risk model, we determined that the majority of plague-positive Gunnison's prairie dogs (100%) and non-prairie dog sciurids (85.82%), and moderately high percentages of sigmodontine rodents (71.4%), domestic cats (69.3%), coyotes (62.9%), and domestic dogs (62.5%) were recovered within 1 km of the nearest area posing high peridomestic risk to humans. In contrast, the majority of white-tailed prairie dog (66.7%), leporid (cottontailed and jack rabbits) (71.4%), and black-tailed prairie dog (93.0%) samples originated more than 1 km from the nearest human risk habitat. Plague-positive animals or their fleas were rarely (one of 19 cases) collected within 2 km of a case exposure site during the 24 months preceding the dates of illness onset for these cases. Low spatial accuracy for identifying epizootic activity prior to human plague cases suggested that other mammalian species or their fleas are likely more important sources of human infection in high plague risk areas. To address this issue, epidemiological observations and multi-locus variable number tandem repeat analyses (MLVA) were used to preliminarily identify chipmunks as an under-sampled, but potentially important, species for human plague risk in Colorado.

  12. Presence, distribution, and molecular epidemiology of methicillin-resistant Staphylococcus aureus in a small animal teaching hospital: a year-long active surveillance targeting dogs and their environment.

    Science.gov (United States)

    van Balen, Joany; Kelley, Christina; Nava-Hoet, Rocio C; Bateman, Shane; Hillier, Andrew; Dyce, Jonathan; Wittum, Thomas E; Hoet, Armando E

    2013-05-01

    Methicillin-resistant Staphylococcus aureus (MRSA) is known to be present in small animal veterinary clinical environments. However, a better understanding of the ecology and dynamics of MRSA in these environments is necessary for the development of effective infectious disease prevention and control programs. To achieve this goal, a yearlong active MRSA surveillance program was established at The Ohio State University (OSU) Veterinary Medical Center to describe the spatial and molecular epidemiology of this bacterium in the small animal hospital. Antimicrobial susceptibility testing, staphylococcal chromosomal cassette mec (SCCmec) typing, pulsed-field gel electrophoresis (PFGE) typing, and dendrogram analysis were used to characterize and analyze the 81 environmental and 37 canine-origin MRSA isolates obtained during monthly sampling events. Overall, 13.5% of surfaces were contaminated with MRSA at 1 or more sampling times throughout the year. The majority of the environmental and canine isolates were SCCmec type II (93.8% and 86.5%, respectively) and USA100 (90.1% and 86.5%, respectively). By PFGE analysis, these isolates were found to be closely related, which reflects a low diversity of MRSA strains circulating in the hospital. For 5 consecutive months, 1 unique pulsotype was the most prevalent across the medical services and was recovered from a variety of surfaces and hospital locations. Carts/gurneys, doors, and examination tables/floors were the most frequently contaminated surfaces. Some surfaces maintained the same pulsotypes for 3 consecutive months. Molecular analysis found that incoming MRSA-positive dogs were capable of introducing a new pulsotype into the hospital environment during the surveillance period. Our results suggest that once a MRSA strain is introduced into the hospital environment, it can be maintained and spread for extended periods of time. These findings can aid in the development of biosecurity and biocontainment protocols aimed at

  13. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  14. Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ibrahim S. I. Abuhaiba

    2012-11-01

    Full Text Available The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to protect. We present a new attack, Swarm Flooding Attack, against Directed Diffusion based WSNs, which targets the consumption of sensors computational resources, such as bandwidth, disk space, or processor time. Two variants of swarm attack have been introduced: Bee and Ant. Both approaches are inspired from the natural swarming difference between bees and ants. In all cases, the strategy used to mount an attack is the same. An attack consists of a set of malicious user queries represented by interests that are inserted into the network. However, the two forms of attack vary in the synchronization aspects among attackers. These types of attacks are hard to defend against as illustrated. For each of the proposed attack models, we present analysis, simulation, and experimental measurements. We show that the system achieves maximal damage on system performance represented by many metrics.

  15. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  16. Robustness of non-interdependent and interdependent networks against dependent and adaptive attacks

    Science.gov (United States)

    Tyra, Adam; Li, Jingtao; Shang, Yilun; Jiang, Shuo; Zhao, Yanjun; Xu, Shouhuai

    2017-09-01

    Robustness of complex networks has been extensively studied via the notion of site percolation, which typically models independent and non-adaptive attacks (or disruptions). However, real-life attacks are often dependent and/or adaptive. This motivates us to characterize the robustness of complex networks, including non-interdependent and interdependent ones, against dependent and adaptive attacks. For this purpose, dependent attacks are accommodated by L-hop percolation where the nodes within some L-hop (L ≥ 0) distance of a chosen node are all deleted during one attack (with L = 0 degenerating to site percolation). Whereas, adaptive attacks are launched by attackers who can make node-selection decisions based on the network state in the beginning of each attack. The resulting characterization enriches the body of knowledge with new insights, such as: (i) the Achilles' Heel phenomenon is only valid for independent attacks, but not for dependent attacks; (ii) powerful attack strategies (e.g., targeted attacks and dependent attacks, dependent attacks and adaptive attacks) are not compatible and cannot help the attacker when used collectively. Our results shed some light on the design of robust complex networks.

  17. AIDS-case surveillance.

    Science.gov (United States)

    Lal, S; Khodakevich, L; Sengupta, D

    1994-01-01

    In 1991 in India, the Ministry of Health realized that the diagnostic and reporting network for AIDS cases was inadequate as AIDS cases grew and that the establishment of specialized AIDS units in hospitals was not the best strategy. It decided to integrate AIDS diagnostic and management facilities into primary health services. It would arrange training for 1 physician from each district and peripheral hospital, private hospital, and inpatient service of other medical institutions in AIDS diagnosis and management. These physicians would then train others in the clinical diagnosis and management of AIDS cases. The physicians would use the World Health Organization [WHO] case definition of AIDS supported by HIV serological test results. All AIDS cases would be transferred to the Medical College Hospitals of the States and Union Territories (UTs), regional hospitals, and perhaps some private hospitals. Between May 1986 and October 1993, India had 459 AIDS cases reported from 19 States and UTs, especially the States of Tamil Nadul and Maharashtra. This AIDS case surveillance system should motivate political will, describe the underlying and preceding HIV epidemic, and contribute to the understanding of current and future course of the epidemic. Thus, it will guide decision makers to develop sound preventive strategies, to plan health care, and to evaluate interventions. The surveillance system's target population is all outpatients and inpatients at medical institutions. During 1993-1994, 1000 hospitals should make up the network of referral institutions. AIDS case surveillance coordinators (ASCs) at each institution form the basis of the network. The individual case record of each suspected AIDS case will have details on his/her life and medical history. Records of confirmed cases will be sent to State ASCs who will compile them for the National AIDS Control Organisation. After 3-4 year of training and practice in AIDS diagnosis and reporting, AIDS reporting will be

  18. Programmable Logic Controller Modification Attacks for use in Detection Analysis

    Science.gov (United States)

    2014-03-27

    come to be known as the Stuxnet worm [15, 31]. This worm did not attack the PLC directly, but rather targeted the controlling HMI. Stuxnet was designed...programmable devices can be updated to close potential security holes , but also provide an attacker the means to upload malicious firmware to the device. The...that caused the worm to remain dormant if it was installed on a system that was not the intended target. Long et al. demonstrate the effects of network

  19. Targeted surveillance on nosocomial infection and analysis on intervention effect in integrated ICU%综合ICU医院感染目标性监测及干预效果调查

    Institute of Scientific and Technical Information of China (English)

    张萍; 王光明; 焦婕英; 秦彩玲; 葛敏

    2013-01-01

    目的 通过开展目标性检测,了解ICU医院感染发生情况、危险因素及干预效果.方法 采用前瞻性目标性监测的方法,对2011年7月—2012年6月兵器工业五二一医院ICU患者进行医院感染监测,同时运用PDCA循环的方法进行干预.结果 监测338例患者,发生医院感染52例次,例次感染发病率为15.38%,调整例次感染发病率为4.13%;呼吸机相关性肺炎42.58‰,导尿管相关性尿路感染4.33‰,导管相关性血流感染4.94‰.结论 ICU患者导管使用多,呼吸机相关性肺炎发生率高,应加强监测,并针对危险因素运用PDCA循环的方法进行干预,效果良好.%[Objective]To carry out the targeted surveillance, understand the incidence rate, risk factors .and intervention effect of nosocomial infection in ICU. [Methods] By using prospective targeted surveillance, patients in ICU of No. 521 Hospital ( Ordnance Industry Health Institute) were monitored for f nosocomial infection from July 2011 to June 2012, and the intervention was conducted by PDCA circulation method. [Results] Among 338 patients, there were 52 cases-times of nosoeomial infection with the incidence rate of 15.38% , and adjusted incidence rate was 4.13%. The rate of ventilator associated pneumonia was 42.58%e, the rate of catheter associated urinary tract infection was 4. 33%., and the rate of catheter related bloodstream infection was 4. 94%e. [ Conclusion] ICU patients are treated with catheter more frequently, and the incidence rate of ventilator associated pneumonia is high. It is necessary to strengthen the surveillance and implement the effective intervention of PDCA circulation method according to risk factors, which has good effect.

  20. When women attack.

    Science.gov (United States)

    McLaughlin, Bryan; Davis, Catasha; Coppini, David; Kim, Young Mie; Knisely, Sandra; McLeod, Douglas

    2015-01-01

    The common assumption that female candidates on the campaign trail should not go on the attack, because such tactics contradict gender stereotypes, has not received consistent support. We argue that in some circumstances gender stereotypes will favor female politicians going negative. To test this proposition, this study examines how gender cues affect voter reactions to negative ads in the context of a political sex scandal, a context that should prime gender stereotypes that favor females. Using an online experiment involving a national sample of U.S. adults (N = 599), we manipulate the gender and partisan affiliation of a politician who attacks a male opponent caught in a sex scandal involving sexually suggestive texting to a female intern. Results show that in the context of a sex scandal, a female candidate going on the attack is evaluated more positively than a male. Moreover, while female participants viewed the female sponsor more favorably, sponsor gender had no effect on male participants. Partisanship also influenced candidate evaluations: the Democratic female candidate was evaluated more favorably than her Republican female counterpart.

  1. Attack Trees with Sequential Conjunction

    NARCIS (Netherlands)

    Jhawar, Ravi; Kordy, Barbara; Mauw, Sjouke; Radomirović, Sasa; Trujillo-Rasua, Rolando

    2015-01-01

    We provide the first formal foundation of SAND attack trees which are a popular extension of the well-known attack trees. The SAND at- tack tree formalism increases the expressivity of attack trees by intro- ducing the sequential conjunctive operator SAND. This operator enables the modeling of

  2. Replacement Attack: A New Zero Text Watermarking Attack

    Science.gov (United States)

    Bashardoost, Morteza; Mohd Rahim, Mohd Shafry; Saba, Tanzila; Rehman, Amjad

    2017-03-01

    The main objective of zero watermarking methods that are suggested for the authentication of textual properties is to increase the fragility of produced watermarks against tampering attacks. On the other hand, zero watermarking attacks intend to alter the contents of document without changing the watermark. In this paper, the Replacement attack is proposed, which focuses on maintaining the location of the words in the document. The proposed text watermarking attack is specifically effective on watermarking approaches that exploit words' transition in the document. The evaluation outcomes prove that tested word-based method are unable to detect the existence of replacement attack in the document. Moreover, the comparison results show that the size of Replacement attack is estimated less accurate than other common types of zero text watermarking attacks.

  3. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    Directory of Open Access Journals (Sweden)

    Yi-Hsun Wang

    2010-09-01

    Full Text Available Web applications suffer from cross-site scripting (XSS attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model for generalizing the structure model. The paper has the contributions as following: (1 automatically learn the structure of attack vectors from practical data analysis to modeling a structure model of attack vectors, (2 mimic the manners and the elements of attack vectors to extend the ability of testing tool for identifying XSS vulnerabilities, (3 be helpful to verify the flaws of blacklist sanitization procedures of Web applications. We evaluated the proposed mechanism by Burp Intruder with a dataset collected from public XSS archives. The results show that mutated XSS attack generation can identify potential vulnerabilities.

  4. 基于 OpenGL 的空间目标监视雷达三维显示系统%3D Display System for Space Target Surveillance Radar Based on OpenGL

    Institute of Scientific and Technical Information of China (English)

    沈静波; 刘扬

    2015-01-01

    Due to large detection range of space target surveillance radar and great height of target,a 3D display system is needed to reflect the target’s real spatial position.A framework of radar 3D display system based on OpenGL is proposed,and its modules are divided.For the demands of assistant display for space target,a design for radar beam and search sectors display is put forward to reflect the real-time beam schedu-ling of radar.An earth texture management based on quadtree dynamic fractal is proposed for high resolution display of the surface.A rotation method of 3D earth based on virtual trace ball is proposed to adjust the user’s angle of view agilely.The system is implemented in a space target surveillance radar successfully, achieving smooth display and fluent image.%空间目标监视雷达探测范围较远,目标高度较高,所以需要三维显示软件来反映目标实际的空间位置信息。基于 OpenGL 提出了一种雷达三维显示系统的设计框架和模块划分。针对空间目标的辅助显示需求,提出了雷达波束和搜索屏的显示设计,可以实时反映雷达的波束调度情况;提出了一种基于四叉树动态分形的地球纹理管理方法,用于实现高精度的地表纹理显示;提出了一种基于虚拟轨迹球的三维地球旋转设计,实现了灵活的用户视角调整。该系统已在某型空间目标监视雷达上成功应用,画面显示平滑流畅。

  5. The concept of immune surveillance against tumors: The first theories

    Science.gov (United States)

    Ribatti, Domenico

    2017-01-01

    The immune system plays a major role in the surveillance against tumors. To avoid attack from the immune system, tumor cells develop different strategies to escape immune surveillance. Evidence of immune surveillance comes from both animal models and clinical observations. Mice with a wide variety of immunodeficiencies have a high rate of tumor incidence and are more susceptible to transplanted or chemical carcinogen-induced tumors. Immunosuppressed patients have a high incidence of tumors. However, many patients develop cancer even in the presence of an apparently normal immune system. This indicates that tumor cells are able to escape immune surveillance. The aim of this review article is to summarize the literature concerning the development of the theory of immune surveillance against tumors; to discuss the evidence for and against this theory, and to discuss the concept of immunoediting. Finally, the current approaches in anti-tumor immunotherapy will be analyzed. PMID:27764780

  6. Seven Deadliest Unified Communications Attacks

    CERN Document Server

    York, Dan

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpo

  7. A Survey on Detecting Wormhole Attack in Manet

    Directory of Open Access Journals (Sweden)

    Bipin N. Patel

    2014-03-01

    Full Text Available A Mobile Ad Hoc Network (MANET is a self organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. It does not require any cryptographic primitives. This attack targets specifically routing control packets, the nodes that are close to the attackers are shielded from any alternative routes with more than one or two hops to the remote location. All routes are thus directed to the wormhole established by the attackers. The entire routing system in MANET can even be brought down using the wormhole attack. We have presented several existing techniques to detect wormhole attack in mobile ad hoc networks.

  8. Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

    CERN Document Server

    Wang, Yi-Hsun; Lee, Hahn-Ming; 10.4204/EPTCS.35.2

    2010-01-01

    Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks. In this study, we focus on generating more threatening XSS attacks for the state-of-the-art detection approaches that can find potential XSS vulnerabilities in Web applications, and propose a mechanism for structural learning of attack vectors with the aim of generating mutated XSS attacks in a fully automatic way. Mutated XSS attack generation depends on the analysis of attack vectors and the structural learning mechanism. For the kernel of the learning mechanism, we use a Hidden Markov model (HMM) as the structure of the attack vector model to capture the implicit manner of the attack vector, and this manner is benefited from the syntax meanings that are labeled by the proposed tokenizing mechanism. Bayes theorem is used to determine the number of hidden states in the model...

  9. Evaluation of multivariate surveillance

    OpenAIRE

    Frisén,Marianne; Andersson, Eva; Schiöler, Linus

    2009-01-01

    Multivariate surveillance is of interest in many areas such as industrial production, bioterrorism detection, spatial surveillance, and financial transaction strategies. Some of the suggested approaches to multivariate surveillance have been multivariate counterparts to the univariate Shewhart, EWMA, and CUSUM methods. Our emphasis is on the special challenges of evaluating multivariate surveillance methods. Some new measures are suggested and the properties of several measures are demonstrat...

  10. Surveillance and Resilience in Theory and Practice

    Directory of Open Access Journals (Sweden)

    Charles D. Raab

    2015-09-01

    Full Text Available Surveillance is often used as a tool in resilience strategies towards the threat posed by terrorist attacks and other serious crime. “Resilience” is a contested term with varying and ambiguous meaning in governmental, business and social discourses, and it is not clear how it relates to other terms that characterise processes or states of being. Resilience is often assumed to have positive connotations, but critics view it with great suspicion, regarding it as a neo-liberal governmental strategy. However, we argue that surveillance, introduced in the name of greater security, may itself erode social freedoms and public goods such as privacy, paradoxically requiring societal resilience, whether precautionary or in mitigation of the harms it causes to the public goods of free societies. This article develops new models and extends existing ones to describe resilience processes unfolding over time and in anticipation of, or in reaction to, adversities of different kinds and severity, and explores resilience both on the plane of abstract analysis and in the context of societal responses to mass surveillance. The article thus focuses upon surveillance as a special field for conceptual analysis and modelling of situations, and for evaluating contemporary developments in “surveillance societies”.

  11. Attack resilience of the evolving scientific collaboration network.

    Directory of Open Access Journals (Sweden)

    Xiao Fan Liu

    Full Text Available Stationary complex networks have been extensively studied in the last ten years. However, many natural systems are known to be continuously evolving at the local ("microscopic" level. Understanding the response to targeted attacks of an evolving network may shed light on both how to design robust systems and finding effective attack strategies. In this paper we study empirically the response to targeted attacks of the scientific collaboration networks. First we show that scientific collaboration network is a complex system which evolves intensively at the local level--fewer than 20% of scientific collaborations last more than one year. Then, we investigate the impact of the sudden death of eminent scientists on the evolution of the collaboration networks of their former collaborators. We observe in particular that the sudden death, which is equivalent to the removal of the center of the egocentric network of the eminent scientist, does not affect the topological evolution of the residual network. Nonetheless, removal of the eminent hub node is exactly the strategy one would adopt for an effective targeted attack on a stationary network. Hence, we use this evolving collaboration network as an experimental model for attack on an evolving complex network. We find that such attacks are ineffectual, and infer that the scientific collaboration network is the trace of knowledge propagation on a larger underlying social network. The redundancy of the underlying structure in fact acts as a protection mechanism against such network attacks.

  12. Attacks on computer systems

    Directory of Open Access Journals (Sweden)

    Dejan V. Vuletić

    2012-01-01

    Full Text Available Computer systems are a critical component of the human society in the 21st century. Economic sector, defense, security, energy, telecommunications, industrial production, finance and other vital infrastructure depend on computer systems that operate at local, national or global scales. A particular problem is that, due to the rapid development of ICT and the unstoppable growth of its application in all spheres of the human society, their vulnerability and exposure to very serious potential dangers increase. This paper analyzes some typical attacks on computer systems.

  13. The attack navigator

    DEFF Research Database (Denmark)

    Probst, Christian W.; Willemson, Jan; Pieters, Wolter

    2016-01-01

    The need to assess security and take protection decisions is at least as old as our civilisation. However, the complexity and development speed of our interconnected technical systems have surpassed our capacity to imagine and evaluate risk scenarios. This holds in particular for risks...... that are caused by the strategic behaviour of adversaries. Therefore, technology-supported methods are needed to help us identify and manage these risks. In this paper, we describe the attack navigator: a graph-based approach to security risk assessment inspired by navigation systems. Based on maps of a socio...

  14. GEIS Surveillance Network Program

    Science.gov (United States)

    2013-10-01

    resistance surveillance, diarrhea etiology and antimicrobial resistance surveillance, sexually transmitted illness surveillance, and capacity building...vomiting, diarrhea , joint pains, general malaise. Of the samples analyzed, only 53.7% had an associated etiology: Malaria (47.0%, EBV (39.7...immunity to the disease. Many adults in those situations are reservoirs, facilitating continuing disease transmission to those without immunity. In Kenya

  15. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence an

  16. SOA-surveillance Nederland

    NARCIS (Netherlands)

    Rijlaarsdam J; Bosman A; Laar MJW van de; CIE

    2000-01-01

    In May 1999 a working group was started to evaluate the current surveillance systems for sexually transmitted diseases (STD) and to make suggestions for a renewed effective and efficient STD surveillance system in the Netherlands. The surveillance system has to provide insight into the prevalence

  17. ASGE Technology Committee systematic review and meta-analysis assessing the ASGE Preservation and Incorporation of Valuable Endoscopic Innovations thresholds for adopting real-time imaging-assisted endoscopic targeted biopsy during endoscopic surveillance of Barrett's esophagus.

    Science.gov (United States)

    Thosani, Nirav; Abu Dayyeh, Barham K; Sharma, Prateek; Aslanian, Harry R; Enestvedt, Brintha K; Komanduri, Sri; Manfredi, Michael; Navaneethan, Udayakumar; Maple, John T; Pannala, Rahul; Parsi, Mansour A; Smith, Zachary L; Sullivan, Shelby A; Banerjee, Subhas

    2016-04-01

    Endoscopic real-time imaging of Barrett's esophagus (BE) with advanced imaging technologies enables targeted biopsies and may eliminate the need for random biopsies to detect dysplasia during endoscopic surveillance of BE. This systematic review and meta-analysis was performed by the American Society for Gastrointestinal Endoscopy (ASGE) Technology Committee to specifically assess whether acceptable performance thresholds outlined by the ASGE Preservation and Incorporation of Valuable Endoscopic Innovations (PIVI) document for clinical adoption of these technologies have been met. We conducted meta-analyses calculating the pooled sensitivity, negative predictive value (NPV), and specificity for chromoendoscopy by using acetic acid and methylene blue, electronic chromoendoscopy by using narrow-band imaging, and confocal laser endomicroscopy (CLE) for the detection of dysplasia. Random effects meta-analysis models were used. Statistical heterogeneity was evaluated by means of I(2) statistics. The pooled sensitivity, NPV, and specificity for acetic acid chromoendoscopy were 96.6% (95% confidence interval [CI], 95-98), 98.3% (95% CI, 94.8-99.4), and 84.6% (95% CI, 68.5-93.2), respectively. The pooled sensitivity, NPV, and specificity for electronic chromoendoscopy by using narrow-band imaging were 94.2% (95% CI, 82.6-98.2), 97.5% (95% CI, 95.1-98.7), and 94.4% (95% CI, 80.5-98.6), respectively. The pooled sensitivity, NPV, and specificity for endoscope-based CLE were 90.4% (95% CI, 71.9-97.2), 98.3% (95% CI, 94.2-99.5), and 92.7% (95% CI, 87-96), respectively. Our meta-analysis indicates that targeted biopsies with acetic acid chromoendoscopy, electronic chromoendoscopy by using narrow-band imaging, and endoscope-based CLE meet the thresholds set by the ASGE PIVI, at least when performed by endoscopists with expertise in advanced imaging techniques. The ASGE Technology Committee therefore endorses using these advanced imaging modalities to guide targeted biopsies for

  18. Targeting human papillomavirus to reduce the burden of cervical, vulvar and vaginal cancer and pre-invasive neoplasia: establishing the baseline for surveillance.

    Science.gov (United States)

    Nygård, Mari; Hansen, Bo Terning; Dillner, Joakim; Munk, Christian; Oddsson, Kristján; Tryggvadottir, Laufey; Hortlund, Maria; Liaw, Kai-Li; Dasbach, Erik J; Kjær, Susanne Krüger

    2014-01-01

    Infection with high-risk human papillomavirus (HPV) is causally related to cervical, vulvar and vaginal pre-invasive neoplasias and cancers. Highly effective vaccines against HPV types 16/18 have been available since 2006, and are currently used in many countries in combination with cervical cancer screening to control the burden of cervical cancer. We estimated the overall and age-specific incidence rate (IR) of cervical, vulvar and vaginal cancer and pre-invasive neoplasia in Denmark, Iceland, Norway and Sweden in 2004-2006, prior to the availability of HPV vaccines, in order to establish a baseline for surveillance. We also estimated the population attributable fraction to determine roughly the expected effect of HPV16/18 vaccination on the incidence of these diseases. Information on incident cervical, vulvar and vaginal cancers and high-grade pre-invasive neoplasias was obtained from high-quality national population-based registries. A literature review was conducted to define the fraction of these lesions attributable to HPV16/18, i.e., those that could be prevented by HPV vaccination. Among the four countries, the age-standardised IR/10⁵ of cervical, vaginal and vulvar cancer ranged from 8.4-13.8, 1.3-3.1 and 0.2-0.6, respectively. The risk for cervical cancer was highest in women aged 30-39, while vulvar and vaginal cancers were most common in women aged 70+. Age-standardised IR/10⁵ of cervical, vulvar and vaginal pre-invasive neoplasia ranged between 138.8-183.2, 2.5-8.8 and 0.5-1.3, respectively. Women aged 20-29 had the highest risk for cervical pre-invasive neoplasia, while vulvar and vaginal pre-invasive neoplasia peaked in women aged 40-49 and 60-69, respectively. Over 50% of the observed 47,820 incident invasive and pre-invasive cancer cases in 2004-2006 can be attributed to HPV16/18. In the four countries, vaccination against HPV 16/18 could prevent approximately 8500 cases of gynecological cancer and pre-cancer annually. Population-based cancer

  19. The Metaphorical Bakery in Haruki Murakami’s Novels:On the Setting of the Target inThe Bakery Attack%村上春树小说中“面包店”的隐喻--论《袭击面包店》中袭击目标的设定

    Institute of Scientific and Technical Information of China (English)

    杨炳菁; 关冰冰

    2014-01-01

    对于村上春树为何在短篇小说《袭击面包店》中将袭击目标设定为面包店的研究并不多见。本文从文化所蕴含的隐喻功能这一角度出发,以文本阅读为基础,结合面包以及面包店在日本和西方的发展简史,得出面包店这一袭击目标的设定具有对国家权力和社会制度进行攻击的政治含义。%There is little research focusing on the reason why Haruki Murakami chose a bakery as the attack target in his short storyThe BakeryAttack. This paper analyzes the short story and introduces the brief development of bread and bakery in Japan and the Western world. From the perspective of the function of metaphor in a culture, this paper comes to a conclusion that taking a bakery as the attack target has a political implication, which is lashing out state power and social institution.

  20. Recent "phishing" attacks

    CERN Multimedia

    IT Department

    2009-01-01

    Over the last few weeks there has been a marked increase in the number of attacks on CERN made by cybercriminals. Typical attacks arrive in the form of e-mail messages purporting to come from the CERN Help Desk, Mail Service, or some similarly official-sounding entity and suggest that there is a problem with your account, such as it being over-quota. They then ask you to click on a link or to reply and give your password. Please don’t! Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. NEVER provide your password or other details if these are requested. These messages try to trick you into clicking on Web links which will help them to install malicious software on your computer, and anti-virus software cannot be relied on to detect all cases. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN Comput...

  1. DDoS Attack Detection Algorithms Based on Entropy Computing

    Science.gov (United States)

    Li, Liying; Zhou, Jianying; Xiao, Ning

    Distributed Denial of Service (DDoS) attack poses a severe threat to the Internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume of traffic which is caused by the attack or occurs when a huge number of users occasionally access the target machine at the same time. The entropy detection method is an effective method to detect the DDoS attack. It is mainly used to calculate the distribution randomness of some attributes in the network packets' headers. In this paper, we focus on the detection technology of DDoS attack. We improve the previous entropy detection algorithm, and propose two enhanced detection methods based on cumulative entropy and time, respectively. Experiment results show that these methods could lead to more accurate and effective DDoS detection.

  2. Noncombatants and liability to be attacked in wars

    DEFF Research Database (Denmark)

    Lippert-Rasmussen, Kasper

    2013-01-01

    The paper assumes that some people, at least, are liable to attack in war. In a number of ways, this is an ambiguous statement, so before proceeding, I need to clarify the specific senses in which I shall generally be using the terms "liable" and "attack." When I write that "S is liable to military....... Colloquially, then, "S is liable to attack" means roughly that S is a legitimate target. Given this, it should be clear that when I talk about the criteria of "liability to attack," I am talking in effect about the features separating people who may and may not be attacked. Unless I indicate otherwise, I also...... of these stipulations conform, I think, with recent literature on just war....

  3. Sensors for Desert Surveillance

    Directory of Open Access Journals (Sweden)

    B. S. Chauhan

    2005-10-01

    Full Text Available Various types of sensors-visible, passive night vision, infrared, synthetic aperture radar, etc can be used for desert surveillance. The surveillance capability of these sensors depends to a large extent, on various atmospheric effects, viz., absorption, scattering, aerosol, turbulence, and optical mirage. In this paper, effects of various atmospheric phenomena on the transmission of signals, merits and demerits of different means of surveillance under desert environmental conditions are discussed. Advanced surveillance techniques, ie, multisensor fusion, multi and hyperspectral imaging, having special significance for desert surveillance, have also been discussed.

  4. Attack Classification Schema for Smart City WSNs.

    Science.gov (United States)

    Garcia-Font, Victor; Garrigues, Carles; Rifà-Pous, Helena

    2017-04-05

    Urban areas around the world are populating their streets with wireless sensor networks (WSNs) in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  5. Attack Classification Schema for Smart City WSNs

    Directory of Open Access Journals (Sweden)

    Victor Garcia-Font

    2017-04-01

    Full Text Available Urban areas around the world are populating their streets with wireless sensor networks (WSNs in order to feed incipient smart city IT systems with metropolitan data. In the future smart cities, WSN technology will have a massive presence in the streets, and the operation of municipal services will be based to a great extent on data gathered with this technology. However, from an information security point of view, WSNs can have failures and can be the target of many different types of attacks. Therefore, this raises concerns about the reliability of this technology in a smart city context. Traditionally, security measures in WSNs have been proposed to protect specific protocols in an environment with total control of a single network. This approach is not valid for smart cities, as multiple external providers deploy a plethora of WSNs with different security requirements. Hence, a new security perspective needs to be adopted to protect WSNs in smart cities. Considering security issues related to the deployment of WSNs as a main data source in smart cities, in this article, we propose an intrusion detection framework and an attack classification schema to assist smart city administrators to delimit the most plausible attacks and to point out the components and providers affected by incidents. We demonstrate the use of the classification schema providing a proof of concept based on a simulated selective forwarding attack affecting a parking and a sound WSN.

  6. SURVEY ON SURVIVAL APPROACHES IN WIRELESS NETWORK AGAINST JAMMING ATTACK

    Directory of Open Access Journals (Sweden)

    FARAZ AHSAN

    2011-08-01

    Full Text Available Wireless networks are more depicted to intentional or unintentional threats than their wired based equivalent networks. Major reason being the wireless medium which can be approached by others, who can listen and interfere in an on-going valid communication. In the absence of a collision detection mechanism and relying mainly on cooperation of each other for packet routing, the standard defined for wireless network is unable to identify any malicious activity, by default. Among attacks the ones which create isolation of the nodes on the network are considered more severe. If they last long enough, can result in denial-of-service and hence network collapses completely. The simplest form of such attacks is jamming attack which can block any current legitimate communication. It is easy to launch as no especial hardware is required and the area in range for a particular time can be jammed for any legal communication. Jamming is a specialized Denial of Service attack in which purpose is not to overflow buffers, instead to choke the physical communication channel, hence avoiding jammer is much harder than other forms of denial of service attacks. Unlike other attacks, especially routing attacks, no network parameter and topology etc need to be known in advance before launching jamming attack. However, if the network parameters are known and the attack is intelligently placed, a jammer can last longer resulting in more survival time on the network and damage. This paper surveys on different types of jamming attack and the mitigation techniques generally used. Besides this, we investigate about the approaches proposed that are considered efficient to survive in a jammed region, actively. Finally, we conclude by highlighting the potential areas which can be targeted to optimize in minimizing the effects of a jamming attack, as future directions.

  7. Tracing Technique for Blaster Attack

    CERN Document Server

    S., Siti Rahayu; S., Shahrin; A., Faizal M; M, Mohd Zaki; R, Irda

    2009-01-01

    Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.

  8. The Timing of Terrorist Attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2016-01-01

    I use a simple optimal stopping model to derive policy relevant insights on the timing of one-shot attacks by small autonomous terrorist units or “lone wolf” individuals. A main insight is that an increase in proactive counterterrorism measures can lead to a short term increase in the number...... of attempted terrorist attacks because it makes it more risky for existing terrorist units to pursue further development of capabilities. This is consistent with the events in London in 2005 where a terrorist attack on 7 July was followed by a similar but unsuccessful attack two weeks later....

  9. Seven Deadliest Social Network Attacks

    CERN Document Server

    Timm, Carl

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastruct

  10. Seven Deadliest Web Application Attacks

    CERN Document Server

    Shema, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. .. .. Attacks detailed in this book include: ..: ..; Cross-Site Scripting (XSS) ..; Cross-Site Request Fo

  11. Health environmental risks surveillance systems: toxicological surveillance

    OpenAIRE

    Ana Ferrer Dufol; Santiago Nogué Xarau; Francisco Vargas Marcos; Olivia Castillo Soria; Pilar Gascó Alberich; Ana de la Torre Reoyo; Eduardo de la Peña de Torres

    2004-01-01

    A study of the Clinical Toxicological Section, about the Epidemiological Surveillance in Emergency Services, in relation to chemical products intoxications during the 1999-2003 period, is presented. This work is a result of an agreement between the Spanish Toxicological Association (AETOX) and the Spanish Ministry of Health and Consumption, and was presented in the National Congress of Environment (CONAMA) within the “Health Environmental Risks Surveillance Systems” working group.

  12. A Survey of Man in the Middle Attacks

    DEFF Research Database (Denmark)

    Conti, Mauro; Dragoni, Nicola; Lesyk, Viktor

    2016-01-01

    The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we...... on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among...

  13. Targeted surveillance of nosocomial infections in general ICU%综合性 ICU 医院感染目标性监测结果分析

    Institute of Scientific and Technical Information of China (English)

    王娇; 陈梦燕; 黄静

    2015-01-01

    OBJECTIVE To understand the prevalence of nosocomial infections in ICU patients and take targeted in‐terventions so as to control the nosocomial infections .METHODS According to the Standards for targeted surveil‐lance of nosocomial infections ,the incidence of nosocomial infections ,daily infection rate ,incidence of three types of catheter‐related infections ,nosocomial infection sites ,and distribution of pathogens in the ICU patients who were hospitalized from Feb 2012 to Feb 2013 were monitored .RESULTS The nosocomial infections occurred in 78 (72 case‐times) of 655 patients with the incidence of nosocomial infections of 11 .90% and the case‐time infection rate of 12 .52% ;the daily infection rate was 13 .84‰ ,and the case‐time daily infection rate was 14 .55‰ ;the inci‐dence of central venous catheter‐related bloodstream infections was 0 .56‰ ,the incidence of urinary catheter‐relat‐ed urinary tract infections was 1 .15‰ ,and the incidence of ventilator‐associated pneumonia was 78 .43‰ .The in‐cidence of lower respiratory tract infections was 80 .25% ,the incidence of bloodstream infections was 7 .41% ,the incidence of urinary tract infections was 3 .70% .The K lebsiella pneumoniae was dominant among the isolated pathogens ,accounting for 42 .74% .CONCLUSION The incidence of nosocomial infections is high in the ICU ,and the catheter‐related infections are the high risk factors .It is necessary to take targeted rectification measures of the ward management so as to reduce the incidence of nosocomial infections .%目的:了解医院IC U患者发生医院感染的情况,以采取针对性的干预措施控制医院感染的发生。方法根据《医院感染目标性监测规范》,监测2012年2月-2013年2月入住IC U患者的医院感染率、日感染率、3种导管相关感染率、医院感染部位及感染病原菌分布。结果监测的655例患者中发生医院感染78例、82例次,医院感染率11

  14. MECH: Algorithms and Tools for Automated Assessment of Potential Attack Locations (Software User Guide)

    Science.gov (United States)

    2015-10-02

    a Halo,” or MECH, is an analytical abstraction to model the locational relationships between a target and its attackers (around the route) in...line) A range for M/C points to see the target continuously move along the route to the attack engagement location E. Device Triggering Range (yellow...Behaviors in Tactical Planning (Views 3,4 of Figure 2.5) Attackers go through formal or informal optimization (i.e., prioritization , trade off choices) of

  15. Damage Measurement of Collision Attacks on Performance of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2014-12-01

    Full Text Available Wireless sensor networks (WSN are widely developed to monitor different phenomena in a variety of areas including nature, medical centers, home automation, industrial and military applications. Such development in many different fields, raises important security issues related to the reliability of the WSNs. Due to the resource constrained nature of the WSNs, these networks are the target of many different types of attacks and prone to failure. In this paper, we consider the collision attack. An attempt has been made to measure the impact of the collision attack on the performance of WSNs under variety scenarios performed by the attackers. The main contribution of this paper is to present that although the attack does not consume much energy of the attacker, it can highly disrupt the normal operation of the target sensor networks. The implementation of the proposed attack model has been done by using NS2 network simulator.

  16. Reassembling Surveillance Creep

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Lauritsen, Peter

    2017-01-01

    We live in societies in which surveillance technologies are constantly introduced, are transformed, and spread to new practices for new purposes. How and why does this happen? In other words, why does surveillance “creep”? This question has received little attention either in theoretical...... development or in empirical analyses. Accordingly, this article contributes to this special issue on the usefulness of Actor-Network Theory (ANT) by suggesting that ANT can advance our understanding of ‘surveillance creep’. Based on ANT’s model of translation and a historical study of the Danish DNA database......, we argue that surveillance creep involves reassembling the relations in surveillance networks between heterogeneous actors such as the watchers, the watched, laws, and technologies. Second, surveillance creeps only when these heterogeneous actors are adequately interested and aligned. However...

  17. Invisible Trojan-horse attack.

    Science.gov (United States)

    Sajeed, Shihan; Minshull, Carter; Jain, Nitin; Makarov, Vadim

    2017-08-21

    We demonstrate the experimental feasibility of a Trojan-horse attack that remains nearly invisible to the single-photon detectors employed in practical quantum key distribution (QKD) systems, such as Clavis2 from ID Quantique. We perform a detailed numerical comparison of the attack performance against Scarani-Ac´ın-Ribordy-Gisin (SARG04) QKD protocol at 1924 nm versus that at 1536 nm. The attack strategy was proposed earlier but found to be unsuccessful at the latter wavelength, as reported in N. Jain et al., New J. Phys. 16, 123030 (2014). However at 1924 nm, we show experimentally that the noise response of the detectors to bright pulses is greatly reduced, and show by modeling that the same attack will succeed. The invisible nature of the attack poses a threat to the security of practical QKD if proper countermeasures are not adopted.

  18. Handbook of surveillance technologies

    CERN Document Server

    Petersen, JK

    2012-01-01

    From officially sanctioned, high-tech operations to budget spy cameras and cell phone video, this updated and expanded edition of a bestselling handbook reflects the rapid and significant growth of the surveillance industry. The Handbook of Surveillance Technologies, Third Edition is the only comprehensive work to chronicle the background and current applications of the full-range of surveillance technologies--offering the latest in surveillance and privacy issues.Cutting-Edge--updates its bestselling predecessor with discussions on social media, GPS circuits in cell phones and PDAs, new GIS s

  19. Redefining syndromic surveillance.

    Science.gov (United States)

    Katz, Rebecca; May, Larissa; Baker, Julia; Test, Elisa

    2011-12-01

    With growing concerns about international spread of disease and expanding use of early disease detection surveillance methods, the field of syndromic surveillance has received increased attention over the last decade. The purpose of this article is to clarify the various meanings that have been assigned to the term syndromic surveillance and to propose a refined categorization of the characteristics of these systems. Existing literature and conference proceedings were examined on syndromic surveillance from 1998 to 2010, focusing on low- and middle-income settings. Based on the 36 unique definitions of syndromic surveillance found in the literature, five commonly accepted principles of syndromic surveillance systems were identified, as well as two fundamental categories: specific and non-specific disease detection. Ultimately, the proposed categorization of syndromic surveillance distinguishes between systems that focus on detecting defined syndromes or outcomes of interest and those that aim to uncover non-specific trends that suggest an outbreak may be occurring. By providing an accurate and comprehensive picture of this field's capabilities, and differentiating among system types, a unified understanding of the syndromic surveillance field can be developed, encouraging the adoption, investment in, and implementation of these systems in settings that need bolstered surveillance capacity, particularly low- and middle-income countries. Copyright © 2011 Ministry of Health, Saudi Arabia. Published by Elsevier Ltd. All rights reserved.

  20. Surveillance of antibiotic resistance

    National Research Council Canada - National Science Library

    Johnson, Alan P

    2015-01-01

    .... Surveillance of antibiotic resistance involves the collection of antibiotic susceptibility test results undertaken by microbiology laboratories on bacteria isolated from clinical samples sent for investigation...

  1. Multi-Layer Approach for the Detection of Selective Forwarding Attacks

    Directory of Open Access Journals (Sweden)

    Naser Alajmi

    2015-11-01

    Full Text Available Security breaches are a major threat in wireless sensor networks (WSNs. WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD. The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  2. Multi-Layer Approach for the Detection of Selective Forwarding Attacks.

    Science.gov (United States)

    Alajmi, Naser; Elleithy, Khaled

    2015-11-19

    Security breaches are a major threat in wireless sensor networks (WSNs). WSNs are increasingly used due to their broad range of important applications in both military and civilian domains. WSNs are prone to several types of security attacks. Sensor nodes have limited capacities and are often deployed in dangerous locations; therefore, they are vulnerable to different types of attacks, including wormhole, sinkhole, and selective forwarding attacks. Security attacks are classified as data traffic and routing attacks. These security attacks could affect the most significant applications of WSNs, namely, military surveillance, traffic monitoring, and healthcare. Therefore, there are different approaches to detecting security attacks on the network layer in WSNs. Reliability, energy efficiency, and scalability are strong constraints on sensor nodes that affect the security of WSNs. Because sensor nodes have limited capabilities in most of these areas, selective forwarding attacks cannot be easily detected in networks. In this paper, we propose an approach to selective forwarding detection (SFD). The approach has three layers: MAC pool IDs, rule-based processing, and anomaly detection. It maintains the safety of data transmission between a source node and base station while detecting selective forwarding attacks. Furthermore, the approach is reliable, energy efficient, and scalable.

  3. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that

  4. Research on Coordinated Antisumarine Attack Effeciency of Two Helicopters Under Countermeasures

    Institute of Scientific and Technical Information of China (English)

    丁红岩; 董晓明; 蹇明裕

    2012-01-01

    The organization of coordinated attack and the selection of aiming point which affect hit probability were analyzed for the countermeasures taken by the hostile submarines at two helicopters' coordinated attack.A computational model of coordinated attack parameters,a model of submarine maneuver,and a model of noise jammer were established.Compared to single helicopter' torpedo attack,the coordinated attack of two helicopters can effectively increase the hit probability of torpedo and achieve the higher target detecting probability under counterwork condition.

  5. WILD PIG ATTACKS ON HUMANS

    Energy Technology Data Exchange (ETDEWEB)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  6. Range-Gated Laser Stroboscopic Imaging for Night Remote Surveillance

    Institute of Scientific and Technical Information of China (English)

    WANG Xin-Wei; ZHOU Yan; FAN Song-Tao; HE Jun; LIU Yu-Liang

    2010-01-01

    @@ For night remote surveillance,we present a method,the range-gated laser stroboscopic imaging(RGLSI),which uses a new kind of time delay integration mode to integrate target signals so that night remote surveillance can be realized by a low-energy illuminated laser.The time delay integration in this method has no influence on the video frame rate.

  7. Surveillance and persuasion

    NARCIS (Netherlands)

    Nagenborg, Michael

    2014-01-01

    This paper is as much about surveillance as about persuasive technologies (PTs). With regard to PTs it raises the question about the ethical limits of persuasion. It will be argued that even some forms of self-imposed persuasive soft surveillance technologies may be considered unethical. Therefore,

  8. Soil and vegetation surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Antonio, E.J.

    1995-06-01

    Soil sampling and analysis evaluates long-term contamination trends and monitors environmental radionuclide inventories. This section of the 1994 Hanford Site Environmental Report summarizes the soil and vegetation surveillance programs which were conducted during 1994. Vegetation surveillance is conducted offsite to monitor atmospheric deposition of radioactive materials in areas not under cultivation and onsite at locations adjacent to potential sources of radioactivity.

  9. The Cyber-Physical Attacker

    DEFF Research Database (Denmark)

    Vigo, Roberto

    2012-01-01

    The world of Cyber-Physical Systems ranges from industrial to national interest applications. Even though these systems are pervading our everyday life, we are still far from fully understanding their security properties. Devising a suitable attacker model is a crucial element when studying...... the security properties of CPSs, as a system cannot be secured without defining the threats it is subject to. In this work an attacker scenario is presented which addresses the peculiarities of a cyber-physical adversary, and we discuss how this scenario relates to other attacker models popular in the security...

  10. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  11. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses o...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  12. Multiculturalism & The Charlie Hebdo Attack

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    The attack on Charlie Hebdo has by many been linked to multiculturalism. But it is unclear exactly how the connection between multiculturalism and the attack should be understood and whether there indeed is such a connection. The article discusses this by distinguishing between different senses...... of multiculturalism and different ways in which one might think that there is a link between multiculturalism and the attack. On this basis the resulting claims are discussed as to whether they are in fact plausible, which many of them turn out not to be....

  13. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    Science.gov (United States)

    Friedrich, Steinhäusler; Stan, Rydell; Lyudmila, Zaitseva

    2008-08-01

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb). This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  14. Preventing AODV Routing Protocol from Black Hole Attack

    Directory of Open Access Journals (Sweden)

    Lalit Himral,

    2011-05-01

    Full Text Available Ad-hoc networks, due to their improvised nature, are frequently established insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. Ad hoc On-demand Distance Vector routing (AODVis a widely adopted network routing protocol for Mobile Ad hoc Network (MANET. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploitingvulnerability of on-demand routing protocols such as AODV. In this paper we proposed a solution for identifying the malicious node in AODV protocol suffering from black hole attack.

  15. Sleep Deprivation Attack Detection in Wireless Sensor Network

    CERN Document Server

    Bhattasali, Tapalina; Sanyal, Sugata; 10.5120/5056-7374 10.5120/5056-7374 10.5120/5056-7374 10.5120/5056-7374

    2012-01-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique ...

  16. Threat Modeling-Oriented Attack Path Evaluating Algorithm

    Institute of Scientific and Technical Information of China (English)

    LI Xiaohong; LIU Ran; FENG Zhiyong; HE Ke

    2009-01-01

    In order to evaluate all attack paths in a threat tree,based on threat modeling theory,a weight distribution algorithm of the root node in a threat tree is designed,which computes threat coefficients of leaf nodes in two ways including threat occurring possibility and the degree of damage.Besides,an algorithm of searching attack path was also obtained in accordence with its definition.Finally,an attack path evaluation system was implemented which can output the threat coefficients of the leaf nodes in a target threat tree,the weight distribution information,and the attack paths.An example threat tree is given to verify the effectiveness of the algorithms.

  17. Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Khodor Hamandi

    2015-01-01

    Full Text Available Currently, Android is the leading mobile operating system in number of users worldwide. On the security side, Android has had significant challenges despite the efforts of the Android designers to provide a secure environment for apps. In this paper, we present numerous attacks targeting the messaging framework of the Android system. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks. Also, we shed light on the Android elements that are responsible for these attacks. Furthermore, we present the architecture of an intrusion detection system (IDS that promises to thwart SMS messaging attacks. Our IDS shows a detection rate of 87.50% with zero false positives.

  18. Social Engineering:A Partial Technical attack

    OpenAIRE

    P.S.Maan; Manish Sharma

    2012-01-01

    This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that...

  19. 2012 Sexually Transmitted Diseases Surveillance

    Science.gov (United States)

    ... National Summary Chlamydia Gonorrhea Syphilis Chancroid Selected STDs Appendix Appendix Interpreting STD Surveillance Data Appendix Tables A1 - A4 STD Surveillance Case Definitions Contributors ...

  20. HIV surveillance in complex emergencies.

    Science.gov (United States)

    Salama, P; Dondero, T J

    2001-04-01

    Many studies have shown a positive association between both migration and temporary expatriation and HIV risk. This association is likely to be similar or even more pronounced for forced migrants. In general, HIV transmission in host-migrant or host-forced-migrant interactions depends on the maturity of the HIV epidemic in both the host and the migrant population, the relative seroprevalence of HIV in the host and the migrant population, the prevalence of other sexually transmitted infections (STIs) that may facilitate transmission, and the level of sexual interaction between the two communities. Complex emergencies are the major cause of mass population movement today. In complex emergencies, additional factors such as sexual interaction between forced-migrant populations and the military; sexual violence; increasing commercial sex work; psychological trauma; and disruption of preventive and curative health services may increase the risk for HIV transmission. Despite recent success in preventing HIV infection in stable populations in selected developing countries, internally displaced persons and refugees (or forced migrants) have not been systematically included in HIV surveillance systems, nor consequently in prevention activities. Standard surveillance systems that rely on functioning health services may not provide useful data in many complex emergency settings. Secondary sources can provide some information in these settings. Little attempt has been made, however, to develop innovative HIV surveillance systems in countries affected by complex emergencies. Consequently, data on the HIV epidemic in these countries are scarce and HIV prevention programs are either not implemented or interventions are not effectively targeted. Second generation surveillance methods such as cross-sectional, population-based surveys can provide rapid information on HIV, STIs, and sexual behavior. The risks for stigmatization and breaches of confidentiality must be recognized

  1. Impact of Sybil and Wormhole Attacks in Location Based Geographic Multicast Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shyamala Ramachandran

    2011-01-01

    Full Text Available Problem statement: Wireless sensor networks have been used in many applications, such as home automation, military surveillances and entity tracking systems. The sensor nodes have low computational capabilities and are highly resource constrained. Routing protocols of wireless sensor networks are prone to various routing attacks, such as black hole, rushing, wormhole, Sybil and denial of service attacks. Approach: The objective of this study was to examine the effects of wormhole in conjunction with Sybil attack on a location based-Geographic Multicast Routing (GMR protocol. Results: The NS-2 based simulation was used in analyzing the wormhole in conjunction with Sybil attack on GMR. Conclusion: It is found that, the Sybil attack degrades the network performance by 24% and the wormhole attack by 20%.

  2. Cooperative Guidance for Multimissile Salvo Attack

    Institute of Scientific and Technical Information of China (English)

    Zhao Shiyu; Zhou Rui

    2008-01-01

    Cooperative guidance problems of multiple missiles are considered in this article. A cooperative guidance scheme, where coordi-nation algorithms and local guidance laws are combined together, is proposed. This scheme actually builds up a hierarchical cooperative guidance architecture, which may provide a general solution to the multimissile cooperative guidance problems. In the case of salvo attacks which require missiles to hit the target simultaneously, both centralized and distributed coordination algorithms are derived based on the impact-time-control guidance (ITCG) law. Numerical simulations are performed to demonstrate the effectiveness of the proposed approaches.

  3. Genetic attack on neural cryptography.

    Science.gov (United States)

    Ruttor, Andreas; Kinzel, Wolfgang; Naeh, Rivka; Kanter, Ido

    2006-03-01

    Different scaling properties for the complexity of bidirectional synchronization and unidirectional learning are essential for the security of neural cryptography. Incrementing the synaptic depth of the networks increases the synchronization time only polynomially, but the success of the geometric attack is reduced exponentially and it clearly fails in the limit of infinite synaptic depth. This method is improved by adding a genetic algorithm, which selects the fittest neural networks. The probability of a successful genetic attack is calculated for different model parameters using numerical simulations. The results show that scaling laws observed in the case of other attacks hold for the improved algorithm, too. The number of networks needed for an effective attack grows exponentially with increasing synaptic depth. In addition, finite-size effects caused by Hebbian and anti-Hebbian learning are analyzed. These learning rules converge to the random walk rule if the synaptic depth is small compared to the square root of the system size.

  4. Social Engineering:A Partial Technical attack

    Directory of Open Access Journals (Sweden)

    P. S. Maan

    2012-03-01

    Full Text Available This paper suggests the crystal clear concept behind the social engineering attack. Basically social engineering is a non technical attack. But social engineering attack is an attack on human psychology to get the information, but using what? Basically it is an attack on human psychology by using some technical skills or technology. Social engineering attack has many types like fake mail, telephonic cheat etc. which are impossible without any technical skills, so in this paper we suggest that , it is a partial technical attack and can be divided in human based and typical computer based social engineering attack.

  5. Optimized and Executive Survey of Physical Node Capture Attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Bhavana Butani

    2014-10-01

    Full Text Available Wireless sensor networks (WSNs are novel large-scale wireless networks that consist of distributed, self organizing, low-power, low-cost, tiny sensor devices to cooperatively collect information through infrastructure less wireless networks. These networks are envisioned to play a crucial role in variety of applications like critical military surveillance applications, forest fire monitoring, commercial applications such as building security monitoring, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key or other confidential information like node’s id etc from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing security schemes against Node capture attack. Our survey provides deep insights of existing techniques that enhance the attacking efficiency of the node capture attack in wireless sensor network. It also analyzes various detection and key pre-distribution schemes for inventing a new scheme to improve resilience against node capture attack.

  6. Optimal Allocation of Aerial Target Detection and Attack in Cooperative Multi-fighter Air Combat%多机协同对空目标探测与攻击任务的最优分配

    Institute of Scientific and Technical Information of China (English)

    肖冰松; 方洋旺; 夏海宝; 许蕴山; 刘万俊

    2011-01-01

    To solve the problem of cooperative guidance in information-based cooperative multi-fighter air combat, the model of detection and attack task allocation was built. The detection task allocation model was first built by the battlefield situation and the detection capability of radar. Then, the attack task allocation was built by the battlefield situation and the engagement capability of weapon. Finally, the multi objective decision problem was translated into single objective optimization. Particle swarm optimization algorithm was designed to solve the problem by building the mapping between particles. Simulation results indicate that the algorithm is feasible and effective.%针对信息化条件下多机协同空战中需要协同制导的问题,建立了探测任务和攻击任务分配的模型。首先根据战场态势和雷达探测能力建立探测任务分配模型,然后根据战场态势和武器作战能力建立攻击任务分配模型,最后将此多目标决策问题转化为单目标优化问题。通过建立可行解到粒子间的映射,提出了粒子群优化算法对该优化问题进行求解。仿真实验表明了该模型与算法的可行性与有效性。

  7. Microarchitectural Side-Channel Attacks

    OpenAIRE

    Gallais, Jean-Francois

    2013-01-01

    Cryptanalysis is the science which evaluates the security of a cryptosystem and detects its weaknesses and flaws. Initially confined to the black-box model, where only the input and output data were considered, cryptanalysis is now broadened to the security evaluation of the physical implementation of a cryptosystem. The implementation attacks which compose physical cryptanalysis are divided into fault attacks, exploiting the effect of disruption of the normal functioning of the device, and s...

  8. Market-Based Approach to Mobile Surveillance Systems

    Directory of Open Access Journals (Sweden)

    Ahmed M. Elmogy

    2012-01-01

    Full Text Available The active surveillance of public and private sites is increasingly becoming a very important and critical issue. It is, therefore, imperative to develop mobile surveillance systems to protect these sites. Modern surveillance systems encompass spatially distributed mobile and static sensors in order to provide effective monitoring of persistent and transient objects and events in a given area of interest (AOI. The realization of the potential of mobile surveillance requires the solution of different challenging problems such as task allocation, mobile sensor deployment, multisensor management, cooperative object detection and tracking, decentralized data fusion, and interoperability and accessibility of system nodes. This paper proposes a market-based approach that can be used to handle different problems of mobile surveillance systems. Task allocation and cooperative target tracking are studied using the proposed approach as two challenging problems of mobile surveillance systems. These challenges are addressed individually and collectively.

  9. Assassination in the United States: an operational study of recent assassins, attackers, and near-lethal approachers.

    Science.gov (United States)

    Fein, R A; Vossekuil, B

    1999-03-01

    This study is the first operational exploration of the thinking and behavior of all 83 persons known to have attacked, or approached to attack, a prominent public official or public figure in the United States since 1949. In addition to data about each attack or near-attack and each subject's demographic and background characteristics, information was gathered about each subject's ideas and actions in the days and weeks before their attacks or near-lethal approaches. Questions were examined about each subject's movement from the idea of attack to actual attack, motives, selection of targets, planning, communication of threat and intent, symptoms of mental illness, and significant life experiences. In every case, the attack or near-attack was the end result of an understandable, and often discernible, process of thinking and action. Implications for protectors, investigators, and researchers are discussed.

  10. Research Note on the Energy Infrastructure Attack Database (EIAD

    Directory of Open Access Journals (Sweden)

    Jennifer Giroux

    2013-12-01

    Full Text Available The January 2013 attack on the In Amenas natural gas facility drew international attention. However this attack is part of a portrait of energy infrastructure targeting by non-state actors that spans the globe. Data drawn from the Energy Infrastructure Attack Database (EIAD shows that in the last decade there were, on average, nearly 400 annual attacks carried out by armed non-state actors on energy infrastructure worldwide, a figure that was well under 200 prior to 1999. This data reveals a global picture whereby violent non-state actors target energy infrastructures to air grievances, communicate to governments, impact state economic interests, or capture revenue in the form of hijacking, kidnapping ransoms, theft. And, for politically motivated groups, such as those engaged in insurgencies, attacking industry assets garners media coverage serving as a facilitator for international attention. This research note will introduce EIAD and position its utility within various research areas where the targeting of energy infrastructure, or more broadly energy infrastructure vulnerability, has been addressed, either directly or indirectly. We also provide a snapshot of the initial analysis of the data between 1980-2011, noting specific temporal and spatial trends, and then conclude with a brief discussion on the contribution of EIAD, highlighting future research trajectories. 

  11. Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    CERN Document Server

    Prasad, K Munivara; Karthik, M Ganesh; 10.5121/ijcsit.2011.3612

    2012-01-01

    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots.

  12. Enhanced Intrusion Detection System for Input Validation Attacks in Web Application

    Directory of Open Access Journals (Sweden)

    Puspendra Kumar

    2013-01-01

    Full Text Available Internet continues to expand exponentially and access to the Internet become more prevalent in our daily life but at the same time web application are becoming most attractive targets for hacker and cyber criminals. This paper presents an enhanced intrusion detection system approach for detecting input validation attacks in the web application. The existing IDS for Input validation attacks are language dependent. The proposed IDS is language independent i.e. it works for any web application developed with the aid of java, php, dot net etc. In addition the proposed system detects directory traversal attacks, command injection attacks, cross site scripting attacks and SQL injection attacks, those were not detected in the existing IDS. This is an automatic technique for detection vulnerabilities over the internet. Our technique is based on the web application parameter which is in form of POST and GET which has generalized structure and values. This technique reduces analysis time of input validation attacks.

  13. Tumor-Associated Glycans and Immune Surveillance

    OpenAIRE

    Anastas Pashov; Behjatolah Monzavi-Karbassi; Thomas Kieber-Emmons

    2013-01-01

    Changes in cell surface glycosylation are a hallmark of the transition from normal to inflamed and neoplastic tissue. Tumor-associated carbohydrate antigens (TACAs) challenge our understanding of immune tolerance, while functioning as immune targets that bridge innate immune surveillance and adaptive antitumor immunity in clinical applications. T-cells, being a part of the adaptive immune response, are the most popular component of the immune system considered for targeting tumor cells. Howev...

  14. Real-time wideband holographic surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, David M. (1917 Hood, Richland, WA 99352); Collins, H. Dale (1751 Duluth, Richland, WA 99352); Hall, Thomas E. (8301 W. Entiat Pl., Kennewick, WA 99336); McMakin, Douglas L. (2173 Shasta Ave., Richland, WA 99352); Gribble, R. Parks (1215 Cottonwood Dr., Richland, WA 99352); Severtsen, Ronald H. (1803 Birch Ave., Richland, WA 99352); Prince, James M. (3029 W. 2nd Ave., Apt. F95, Kennewick, WA 99336); Reid, Larry D. (Rt. 1, Box 1291B, Benton City, WA 99320)

    1996-01-01

    A wideband holographic surveillance system including a transceiver for generating a plurality of electromagnetic waves; antenna for transmitting the electromagnetic waves toward a target at a plurality of predetermined positions in space; the transceiver also receiving and converting electromagnetic waves reflected from the target to electrical signals at a plurality of predetermined positions in space; a computer for processing the electrical signals to obtain signals corresponding to a holographic reconstruction of the target; and a display for displaying the processed information to determine nature of the target. The computer has instructions to apply a three dimensional backward wave algorithm.

  15. Intelligent video surveillance systems and technology

    CERN Document Server

    Ma, Yunqian

    2009-01-01

    From the streets of London to subway stations in New York City, hundreds of thousands of surveillance cameras ubiquitously collect hundreds of thousands of videos, often running 24/7. How can such vast volumes of video data be stored, analyzed, indexed, and searched? How can advanced video analysis and systems autonomously recognize people and detect targeted activities real-time? Collating and presenting the latest information Intelligent Video Surveillance: Systems and Technology explores these issues, from fundamentals principle to algorithmic design and system implementation.An Integrated

  16. Children's Mental Health Surveillance

    Science.gov (United States)

    Children’s Mental Health Surveillance What are childhood mental disorders? The term childhood mental disorder means all mental disorders that can ... is the impact of mental disorders in children? Mental health is important to overall health. Mental disorders are ...

  17. Between visibility and surveillance

    DEFF Research Database (Denmark)

    Uldam, Julie

    visible. It thus enables activists to monitor and expose corporate misconduct, but simultaneously renders them vulnerable to surveillance from corporations. In this presentation, I examine these practices and discuss their implications for political participation by drawing on examples of companies...

  18. Autonomous surveillance for biosecurity.

    Science.gov (United States)

    Jurdak, Raja; Elfes, Alberto; Kusy, Branislav; Tews, Ashley; Hu, Wen; Hernandez, Emili; Kottege, Navinda; Sikka, Pavan

    2015-04-01

    The global movement of people and goods has increased the risk of biosecurity threats and their potential to incur large economic, social, and environmental costs. Conventional manual biosecurity surveillance methods are limited by their scalability in space and time. This article focuses on autonomous surveillance systems, comprising sensor networks, robots, and intelligent algorithms, and their applicability to biosecurity threats. We discuss the spatial and temporal attributes of autonomous surveillance technologies and map them to three broad categories of biosecurity threat: (i) vector-borne diseases; (ii) plant pests; and (iii) aquatic pests. Our discussion reveals a broad range of opportunities to serve biosecurity needs through autonomous surveillance. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  19. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  20. 522 Postmarket Surveillance Studies

    Data.gov (United States)

    U.S. Department of Health & Human Services — The 522 Postmarket Surveillance Studies Program encompasses design, tracking, oversight, and review responsibilities for studies mandated under section 522 of the...

  1. Lifestyle Changes for Heart Attack Prevention

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  2. How Is a Heart Attack Treated?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  3. How Is a Heart Attack Diagnosed?

    Science.gov (United States)

    ... symptoms of a heart attack. It presents one woman's real-life experience with heart attack symptoms, which started during her pregnancy. The video also explains how a heart attack occurs and encourages women to seek care right away for heart attack symptoms. For more information, ...

  4. Analytical Characterization of Internet Security Attacks

    Science.gov (United States)

    Sellke, Sarah H.

    2010-01-01

    Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…

  5. RESIST SRP AGAINST WORMHOLE ATTACK

    Directory of Open Access Journals (Sweden)

    Marjan Kuchaki Rafsanjani

    2013-06-01

    Full Text Available Ad-hoc networks refer to temporary or interim networks which form for special purposes. Actually they are wireless networks with mobile nodes. These networks use no network assisting element for path routing and in these networks available nodes are responsible for path routing. Therefore when malicious nodes want to find a way to interfere with the path routing then the existence of a secure route protocol (SRP can prevent the interference. SRP protocol is one of the secure algorithms of path routing protocol but it is notresistant against wormhole attack. Wormhole attack is considered as a subtle attack in which two malicious nodes make a short connection in network's topology through private or implicit connection and represent two non neighbor nodes as neighbors and prevent the correctoperation of path routing protocol by using this method. One of the methods of preventing wormhole attack is by using packet leashes. We try to decrease the wormhole attack occurrence in this routing protocol by a kind of packet leashes called temporal leashes. We alsowill minimize problems resulting from using temporal leashes by different methods and modifications in its structure.

  6. Network robustness under large-scale attacks

    CERN Document Server

    Zhou, Qing; Liu, Ruifang; Cui, Shuguang

    2014-01-01

    Network Robustness under Large-Scale Attacks provides the analysis of network robustness under attacks, with a focus on large-scale correlated physical attacks. The book begins with a thorough overview of the latest research and techniques to analyze the network responses to different types of attacks over various network topologies and connection models. It then introduces a new large-scale physical attack model coined as area attack, under which a new network robustness measure is introduced and applied to study the network responses. With this book, readers will learn the necessary tools to evaluate how a complex network responds to random and possibly correlated attacks.

  7. Communication Breakdown: DHS Operations During a Cyber Attack

    Science.gov (United States)

    2010-12-01

    attack their targets. There are many malware generating programs on the Internet, such as Eleanor , Tornado, Napoleon, and Zeus. These programs allow...Fagel observed command and control being conducted in some of these exercises by parking the mobile communications base stations of various first

  8. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history....... Including their possible application on a national security level for managing longer strategic endeavors....

  9. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...... side-channels attacks can be applied to ECC. This paper reflects an ongoing research in the field of countermeasures against the attacks mentioned above....

  10. Gait biometrics under spoofing attacks: an experimental investigation

    Science.gov (United States)

    Hadid, Abdenour; Ghahramani, Mohammad; Kellokumpu, Vili; Feng, Xiaoyi; Bustard, John; Nixon, Mark

    2015-11-01

    Gait is a relatively biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. Although it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We recently analyzed for the first time the effects of spoofing attacks on silhouette-based gait biometric systems and showed that it was indeed possible to spoof gait biometric systems by clothing impersonation and the deliberate selection of a target that has a similar build to the attacker. To gain deeper insight into the performance of current gait biometric systems under spoofing attacks, we provide a thorough investigation on how clothing can be used to spoof a target and evaluate the performance of two state-of-the-art recognition methods on a gait spoofing database recorded at the University of Southampton. Furthermore, we describe and evaluate an initial solution coping with gait spoofing attacks. The obtained results are very promising and point out interesting findings which can be used for future investigations.

  11. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  12. Using Poison Center Data for Postdisaster Surveillance

    Science.gov (United States)

    Wolkin, Amy; Schnall, Amy H.; Law, Royal; Schier, Joshua

    2015-01-01

    The role of public health surveillance in disaster response continues to expand as timely, accurate information is needed to mitigate the impact of disasters. Health surveillance after a disaster involves the rapid assessment of the distribution and determinants of disaster-related deaths, illnesses, and injuries in the affected population. Public health disaster surveillance is one mechanism that can provide information to identify health problems faced by the affected population, establish priorities for decision makers, and target interventions to meet specific needs. Public health surveillance traditionally relies on a wide variety of data sources and methods. Poison center (PC) data can serve as data sources of chemical exposures and poisonings during a disaster. In the US, a system of 57 regional PCs serves the entire population. Poison centers respond to poison-related questions from the public, health care professionals, and public health agencies. The Centers for Disease Control and Prevention (CDC) uses PC data during disasters for surveillance of disaster-related toxic exposures and associated illnesses to enhance situational awareness during disaster response and recovery. Poison center data can also be leveraged during a disaster by local and state public health to supplement existing surveillance systems. Augmenting traditional surveillance data (ie, emergency room visits and death records) with other data sources, such as PCs, allows for better characterization of disaster-related morbidity and mortality. Poison center data can be used during a disaster to detect outbreaks, monitor trends, track particular exposures, and characterize the epidemiology of the event. This timely and accurate information can be used to inform public health decision making during a disaster and mitigate future disaster-related morbidity and mortality. PMID:25205009

  13. Global Mapping of Cyber Attacks

    Science.gov (United States)

    2014-01-01

    permutations of rows and columns. 3 Related Work Most prior empirical cyber security work is interested in characterizing the mode of operation of attack...The attribute networks (ICT att, bandwidth att, bribes att, ICT vie and ICT % diff) have all 1 component, and density and clustering coefficient...attnlrutes or attackers and victims ICT att x ICT vie 0.19*** 0.23*** 0.51*** 0.47*** Bribes att x ICT vie 0.21• 0.21* -0.26* -0.27 Bandwidth att

  14. Automated Generation of Attack Trees

    DEFF Research Database (Denmark)

    Vigo, Roberto; Nielson, Flemming; Nielson, Hanne Riis

    2014-01-01

    Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error-prone and impractica......Attack trees are widely used to represent threat scenarios in a succinct and intuitive manner, suitable for conveying security information to non-experts. The manual construction of such objects relies on the creativity and experience of specialists, and therefore it is error...

  15. Veterinary surveillance laboratories: developing the training program.

    Science.gov (United States)

    Mitchell, Staci L; McCline, Katasha T; Hanfelt, Margery M

    2010-01-01

    The increased need and demand for onsite, frequent, rapid, and portable food and bottled water testing for indicators of microbiological and chemical agents led to the deployment of 2 laboratory veterinary equipment sets. A Surveillance Food Laboratory Program (SFLP) was developed to allow Veterinary Corps commanders to establish targeted testing programs to enhance food safety and wholesomeness, along with faster responses to food defense, suspected foodborne illness, and food/water risk assessment missions. To support the deployment of the veterinary equipment sets and the SFLP, 2 new functional courses were developed by the Department of Veterinary Science. The Surveillance Food Laboratory Technician Course teaches essential technical skills that include sample processing, assay methodologies, results review, and interpretation of results produced by these laboratories. The Surveillance Food Laboratory Manager Course, developed for designated managers of the laboratories and laboratory programs, teaches the skills critical to ensuring proper surveillance laboratory oversight, testing, evaluation of results, risk communication, and response to presumptive positive results produced by the laboratories. Together, the courses allowed for the successful deployment of the unique veterinary equipment sets, resulting in development of fully operational surveillance laboratories in support of food protection missions in every major theater of operations.

  16. An Assessment of User Response to Phishing Attacks: The Effects of Fear and Self-Confidence

    Science.gov (United States)

    House, Deanna

    2013-01-01

    Phishing attacks have threatened the security of both home users and organizations in recent years. Individuals of varying levels of computer proficiency are potential targets for a phishing attack; all that is needed is an email address and Internet access. Phishing uses social engineering to fraudulently obtain information that is confidential…

  17. A decision framework for managing risk to airports from terrorist attack.

    Science.gov (United States)

    Shafieezadeh, Abdollah; Cha, Eun J; Ellingwood, Bruce R

    2015-02-01

    This article presents an asset-level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast-resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life-cycle cost considering a 10-year service period.

  18. Empirical Analysis of Virtual Carrier Sense Flooding Attacks Over Wireless Local Area Network

    Directory of Open Access Journals (Sweden)

    Mina Malekzadeh

    2009-01-01

    Full Text Available Problem statement: Wireless Local Areas (WLANs are subject to different types of vulnerabilities. Denial of Service (DoS attack is the most current challenging issue on the WLANs. The objectives of the study were to (i Provide an empirical analysis to conduct a series of wireless virtual carrier sense DoS attacks using wireless control frames vulnerabilities, (ii Design a testbed to compared and analyzed the damage that these attacks can imposed on wireless networks, and (iii Evaluated the effectiveness of such attacks on performance of WLAN in term of data transmission rate. Approach: The testbed employed ubuntu distribution along a network analyzer, Atheros chipset, and frame injection to the tested WLAN. All experiments were placed on two phases: Targeting wireless access point and targeting wireless client. Each phase presented the results of experiments under three circumstances: Before, during, and after the attacks. Results: Even when virtual carrier sense communication was disabled in the tested WLAN, still the target nodes answered to these forgery frames which made the attacks easier. Attacks over the wireless clients were more effective than the access point. In VCS-RTS-C the rate of data transmission from 3547.384 B sec1 decreased to 9.185 B sec1. In contrast with VCS-CTS-C, it decreased from 4959.887-44.740 B sec1 and amount of decrease for VCS-ACK-C was from 7057.401-136.96 B sec1. The obtained results demonstrated that during the attacks the target clients were completely disconnected from the wireless network and unable to do any communication. Conclusion: The influence of wireless virtual carrier sense attacks on performance of the wireless network was analyzed. The data transmission rate of the tested WLAN under the attacks was compared with the transmission rate of the WLAN operated under normal conditions. The obtained results confirmed the attacks could easily overwhelmed and shut down the wireless network.

  19. Surveillance Metrics Sensitivity Study

    Energy Technology Data Exchange (ETDEWEB)

    Bierbaum, R; Hamada, M; Robertson, A

    2011-11-01

    In September of 2009, a Tri-Lab team was formed to develop a set of metrics relating to the NNSA nuclear weapon surveillance program. The purpose of the metrics was to develop a more quantitative and/or qualitative metric(s) describing the results of realized or non-realized surveillance activities on our confidence in reporting reliability and assessing the stockpile. As a part of this effort, a statistical sub-team investigated various techniques and developed a complementary set of statistical metrics that could serve as a foundation for characterizing aspects of meeting the surveillance program objectives. The metrics are a combination of tolerance limit calculations and power calculations, intending to answer level-of-confidence type questions with respect to the ability to detect certain undesirable behaviors (catastrophic defects, margin insufficiency defects, and deviations from a model). Note that the metrics are not intended to gauge product performance but instead the adequacy of surveillance. This report gives a short description of four metrics types that were explored and the results of a sensitivity study conducted to investigate their behavior for various inputs. The results of the sensitivity study can be used to set the risk parameters that specify the level of stockpile problem that the surveillance program should be addressing.

  20. Towards One Health disease surveillance: The Southern African Centre for Infectious Disease Surveillance approach

    Directory of Open Access Journals (Sweden)

    Esron D. Karimuribo

    2012-06-01

    Full Text Available Africa has the highest burden of infectious diseases in the world and yet the least capacity for its risk management. It has therefore become increasingly important to search for ‘fit-for- purpose’ approaches to infectious disease surveillance and thereby targeted disease control. The fact that the majority of human infectious diseases are originally of animal origin means we have to consider One Health (OH approaches which require inter-sectoral collaboration for custom-made infectious disease surveillance in the endemic settings of Africa. A baseline survey was conducted to assess the current status and performance of human and animal health surveillance systems and subsequently a strategy towards OH surveillance system was developed. The strategy focused on assessing the combination of participatory epidemiological approaches and the deployment of mobile technologies to enhance the effectiveness of disease alerts and surveillance at the point of occurrence, which often lies in remote areas. We selected three study sites, namely the Ngorongoro, Kagera River basin and Zambezi River basin ecosystems. We have piloted and introduced the next-generation Android mobile phones running the EpiCollect application developed by Imperial College to aid geo-spatial and clinical data capture and transmission of this data from the field to the remote Information Technology (IT servers at the research hubs for storage, analysis, feedback and reporting. We expect that the combination of participatory epidemiology and technology will significantly improve OH disease surveillance in southern Africa.

  1. Cluster headache attack remission with sphenopalatine ganglion stimulation

    DEFF Research Database (Denmark)

    Barloese, Mads C J; Jürgens, Tim P; May, Arne

    2016-01-01

    BACKGROUND: Cluster headache (CH) is a debilitating headache disorder with severe consequences for patient quality of life. On-demand neuromodulation targeting the sphenopalatine ganglion (SPG) is effective in treating the acute pain and a subgroup of patients experience a decreased frequency of CH......, range 699-847) after insertion of an SPG microstimulator. Remission periods (attack-free periods exceeding one month, per the ICHD 3 (beta) definition) occurring during the 24-month study period were characterized. Attack frequency, acute effectiveness, medication usage, and questionnaire data were...

  2. Mitigating Higher Ed Cyber Attacks

    Science.gov (United States)

    Rogers, Gary; Ashford, Tina

    2015-01-01

    In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…

  3. Television journalism during terror attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    2008-01-01

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on major American networks the first 24 hours...

  4. FLOODING ATTACK AWARE SECURE AODV

    Directory of Open Access Journals (Sweden)

    S. Madhavi

    2013-01-01

    Full Text Available Providing security in a Mobile Ad hoc Network (MANET is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

  5. Television Journalism During Terror Attacks

    DEFF Research Database (Denmark)

    Mogensen, Kirsten

    This article views television news coverage of ongoing terrorist attacks and their immediate aftermath as a special genre within journalism, and describes norms connected with the genre. The description is based on qualitative analyses of the coverage on the major American networks in the fi rst 24...

  6. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  7. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  8. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  9. Novel Mechanism to Defend DDoS Attacks Caused by Spam

    CERN Document Server

    Nagamalai, Dhinaharan; Lee, Jae-Kwang

    2010-01-01

    Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more common and sophisticated. The researchers have proposed various solutions to the DDOS attacks. Can we stop these kinds of attacks with available technology? These days the DDoS attack through spam has increased and disturbed the mail services of various organizations. Spam penetrates through all the filters to establish DDoS attacks, which causes serious problems to users and the data. In this paper we propose a novel approach to defend DDoS attack caused by spam mails. This approach is a combination of fine tuning of source filters, content filters, strictly implementing mail policies,educating user, network monitoring ...

  10. Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    CERN Document Server

    Nagamalai, Dhinaharan; Lee, Jae Kwang

    2010-01-01

    Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more common and sophisticated. The researchers have proposed various solutions to the DDOS attacks. Can we stop these kinds of attacks with available technology? These days the DDoS attack through spam has increased and disturbed the mail services of various organizations. Spam penetrates through all the filters to establish DDoS attacks, which causes serious problems to users and the data. In this paper we propose a multilayer approach to defend DDoS attack caused by spam mails. This approach is a combination of fine tuning of source filters, content filters, strictly implementing mail policies, educating user, network monit...

  11. IP Traceback for Flooding attacks on Internet Threat Monitors (ITM) Using Honeypots

    CERN Document Server

    Prasad, K Munivara; Jyothsna, V; 10.5121/ijnsa.2012.4102

    2012-01-01

    The Internet Threat Monitoring (ITM) is an efficient monitoring system used globally to measure, detect, characterize and track threats such as denial of service (DoS) and distributed Denial of Service (DDoS) attacks and worms. . To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address the flooding attack of DDoS against ITM monitors to exhaust the network resources, such as bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. One possible way to counter DDoS attacks is to trace the attack sources and punish the perpetrators. we propose a novel traceback method for DDoS using Honeypots. IP tracing through honeypot is a single packet tracing method and is more efficient than commonly used packet marking techniques.

  12. CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack

    CERN Document Server

    Kavisankar, L

    2011-01-01

    The challenging number is used for the detection of Spoofing attack. The IP Spoofing is considered to be one of the potentially brutal attack which acts as a tool for the DDoS attack which is considered to be a major threat among security problems in today's internet. These kinds of attack are extremely severe. They bring down business of company drastically. DDoS attack can easily exhaust the computing and communication resources of its victim within a short period of time. There are attacks exploiting some vulnerability or implementation bug in the software implementation of a service to bring that down and some attacks will use all the available resources at the target machine. This deals on attacks that consume all the bandwidth available to the victim machine. While concentrating on the bandwidth attack the TCP SYN flood is the more prominent attack. TCP/IP protocol suite is the most widely used protocol suite for data communication. The TCP SYN flood works by exhausting the TCP connection queue of the h...

  13. Recent computer attacks via Instant Messaging

    CERN Multimedia

    IT Department

    2008-01-01

    Be cautious of any unexpected messages containing web links even if they appear to come from known contacts. If you happen to click on such a link and if your permission is requested to run or install software, always decline it. Several computers at CERN have recently been broken into by attackers who have tricked users of Instant Messaging applications (e.g. MSN, Yahoo Messenger, etc.) into clicking on web links which appeared to come from known contacts. The links appeared to be photos from ‘friends’ and requested software to be installed. In practice, attacker software was installed and the messages did not come from real contacts. In the past such fake messages were mainly sent by email but now a wider range of applications are being targeted, including Instant Messaging. Cybercriminals are making growing use of fake messages to try to trick you into clicking on Web links which will help them to install malicious software on your computer. Anti-virus software cann...

  14. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  15. The plays and arts of surveillance: studying surveillance as entertainment

    NARCIS (Netherlands)

    Albrechtslund, Anders; Dubbeld, L.

    2006-01-01

    This paper suggests a direction in the development of Surveillance Studies that goes beyond current attention for the caring, productive and enabling aspects of surveillance practices. That is, surveillance could be considered not just as positively protective, but even as a comical, playful,

  16. Impact of Degree Heterogeneity on Attack Vulnerability of Interdependent Networks

    Science.gov (United States)

    Sun, Shiwen; Wu, Yafang; Ma, Yilin; Wang, Li; Gao, Zhongke; Xia, Chengyi

    2016-09-01

    The study of interdependent networks has become a new research focus in recent years. We focus on one fundamental property of interdependent networks: vulnerability. Previous studies mainly focused on the impact of topological properties upon interdependent networks under random attacks, the effect of degree heterogeneity on structural vulnerability of interdependent networks under intentional attacks, however, is still unexplored. In order to deeply understand the role of degree distribution and in particular degree heterogeneity, we construct an interdependent system model which consists of two networks whose extent of degree heterogeneity can be controlled simultaneously by a tuning parameter. Meanwhile, a new quantity, which can better measure the performance of interdependent networks after attack, is proposed. Numerical simulation results demonstrate that degree heterogeneity can significantly increase the vulnerability of both single and interdependent networks. Moreover, it is found that interdependent links between two networks make the entire system much more fragile to attacks. Enhancing coupling strength between networks can greatly increase the fragility of both networks against targeted attacks, which is most evident under the case of max-max assortative coupling. Current results can help to deepen the understanding of structural complexity of complex real-world systems.

  17. Tumor-Associated Glycans and Immune Surveillance

    Directory of Open Access Journals (Sweden)

    Anastas Pashov

    2013-06-01

    Full Text Available Changes in cell surface glycosylation are a hallmark of the transition from normal to inflamed and neoplastic tissue. Tumor-associated carbohydrate antigens (TACAs challenge our understanding of immune tolerance, while functioning as immune targets that bridge innate immune surveillance and adaptive antitumor immunity in clinical applications. T-cells, being a part of the adaptive immune response, are the most popular component of the immune system considered for targeting tumor cells. However, for TACAs, T-cells take a back seat to antibodies and natural killer cells as first-line innate defense mechanisms. Here, we briefly highlight the rationale associated with the relative importance of the immune surveillance machinery that might be applicable for developing therapeutics.

  18. Tumor-Associated Glycans and Immune Surveillance

    Science.gov (United States)

    Monzavi-Karbassi, Behjatolah; Pashov, Anastas; Kieber-Emmons, Thomas

    2013-01-01

    Changes in cell surface glycosylation are a hallmark of the transition from normal to inflamed and neoplastic tissue. Tumor-associated carbohydrate antigens (TACAs) challenge our understanding of immune tolerance, while functioning as immune targets that bridge innate immune surveillance and adaptive antitumor immunity in clinical applications. T-cells, being a part of the adaptive immune response, are the most popular component of the immune system considered for targeting tumor cells. However, for TACAs, T-cells take a back seat to antibodies and natural killer cells as first-line innate defense mechanisms. Here, we briefly highlight the rationale associated with the relative importance of the immune surveillance machinery that might be applicable for developing therapeutics. PMID:26343966

  19. Zika Attacks Nerves, Muscles, Other Tissues

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164010.html Zika Attacks Nerves, Muscles, Other Tissues Monkey study may ... 2017 (HealthDay News) -- Scientists have learned where the Zika virus attacks the body in monkeys. In their ...

  20. Classification of cyber attacks in South Africa

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-05-01

    Full Text Available This paper introduces a classification scheme for the visual classification of cyber attacks. Through the use of the scheme, the impact of various cyber attacks throughout the history of South Africa are investigated and classified. The goal...

  1. Using an ontology for network attack planning

    CSIR Research Space (South Africa)

    Van Heerden, R

    2016-09-01

    Full Text Available The modern complexity of network attacks and their counter-measures (cyber operations) requires detailed planning. This paper presents a Network Attack Planning ontology which is aimed at providing support for planning such network operations within...

  2. Stochastic Model of TCP SYN Attacks

    Directory of Open Access Journals (Sweden)

    Simona Ramanauskaitė

    2011-08-01

    Full Text Available A great proportion of essential services are moving into internet space making the threat of DoS attacks even more actual. To estimate the real risk of some kind of denial of service (DoS attack in real world is difficult, but mathematical and software models make this task easier. In this paper we overview the ways of implementing DoS attack models and offer a stochastic model of SYN flooding attack. It allows evaluating the potential threat of SYN flooding attacks, taking into account both the legitimate system flow as well as the possible attack power. At the same time we can assess the effect of such parameters as buffer capacity, open connection storage in the buffer or filte­ring efficiency on the success of different SYN flooding attacks. This model can be used for other type of memory depletion denial of service attacks.Article in Lithuanian

  3. Target surveillance of blood culture positive samples and control of false positive%血培养阳性标本的目标性监测与假阳性的控制

    Institute of Scientific and Technical Information of China (English)

    覃凌; 王慕云

    2012-01-01

    OBJECTIVE To provide objective guidelines for the clinical diagnosis and rational application of antibiotics by analyzing the reasons of the false positive of blood culture and exploring the effect on its incidence after taking corresponding countermeasures. METHODS We monitored all the positive blood culture cases to find the causes of the false positive cases from Jan to Jun 2008. and the interventions were adopted in response to the problems since Jul 2008, the follow-up of the blood culture positive cases was performed during the period of Jul 2008 -Dec 2010. RESULTS The conditional pathogens were dominated in the blood cultured positive cases during Jan-Jun 2008, among which coagulase-negative Staphylococcus accounted for 83. 33%, the rate of false positive blood culture was 35. 29%, while descending to 8. 70% from Jul to Dec 2010 after taking the control measures (x2 =9. 172,P = 0. 002). CONCLUSION By applying quality control administration mode in target surveillance of blood culture positive, taking correct intervention measures such as instituting standardized blood culture sampling procedure and emphasizing the relevant knowledge and operation skills of the nurses as well as the intensifying the quality supervision and assessment, we can improve the quality of submission of the blood culture specimens, reduce the rate of false positive and ensure the accuracy of the examination results.%目的 分析医院血培养假阳性的原因,探讨采取相关措施后对其发生率的影响,为指导临床诊断及合理应用抗菌药物提供客观依据.方法 对2008年1-6月所有血培养阳性的病例进行目标追踪监测,了解假阳性率,分析产生的原因;2008年7月针对问题采取相应的干预措施,持续追踪2008年7月-2010年12月血培养阳性病例.结果 2008年1-6月血培养假阳性病例的病原菌分布以条件致病菌为主,其中凝固酶阴性葡萄球菌占83.33%,血培养假阳性率高达35.29

  4. Targeted surveillance and intervention in ventilator-associated pneumonia in an intensive care unit%重症监护室呼吸机相关性肺炎的目标监测与干预

    Institute of Scientific and Technical Information of China (English)

    李晓红; 杨俐; 邹安娜; 邓惠

    2013-01-01

    Objective To investigate the occurrence of ventilator-associated pneumonia(VAP) in an intensive care unit (ICU),and evaluate the efficacy of intervention measures.Methods Patients receiving mechanical ventilation for >48 h in an ICU from January 2010 to June 2012 were performed targeted surveillance,problems were found out and intervened,incidence of VAP and compliance with infection control measures before and after intervention were compared.Results A total of 1 724 patients with mechanical ventilation were investigated,21.93% (378 cases) of whom developed VAP; incidence of VAP in 2010 and January-June 2012 was 51.54‰ and 19.53‰ respectively(X2 =12.13,P<0.01).The amount of consumption of hand sanitizer and liquid soap per patient per day in 2010,2011 and January-June 2012 was 5.21mL/HD,10.98mL/HD and 30.48 mL/HD respectively.Conclusion The incidence of VAP in this ICU is high,VAP can be controlled effectively through the enforcement of intervention measures and health care workers compliance with infection control measures.%目的 了解某医院综合重症监护室(ICU)呼吸机相关性肺炎(VAP)发病情况,以及实施干预措施后的效果.方法 对2010年1月-2012年6月入住该ICU使用呼吸机辅助呼吸>48 h的患者进行目标监测,及时发现问题并采取针对性干预措施,比较干预前后VAP发病率及感染控制措施的依从性.结果 共调查1 724例接受呼吸机辅助呼吸患者,其中378例发生VAP,VAP发病率为21.93%;2010年与2012年(1-6月)VAP发病率分别为51.54‰和19.53‰,两者比较,差异有统计学意义(X2=12.13,P<0.01).2010年、2011年、2012年(1-6月)速干手消毒剂和皂液合计每患者每住院日消耗量分别为5.21 mL/HD、10.98 mL/HD、30.48 rmL/HD.结论 该院ICU内VAP发病率较高,通过干预措施的有效实施,VAP的发生得到有效控制,医务人员感染控制措施依从性得到提高.

  5. Is This an Outbreak? A retrospective evaluation of syndromic surveillance for emerging infectious disease

    NARCIS (Netherlands)

    C.C. van den Wijngaard (Kees)

    2010-01-01

    textabstractIn the last decade, worldwide several major infectious disease events occurred — like the anthrax attacks in the USA in 2001, the SARS epidemic in 2003 and the 2009 influenza pandemic. As a result, public-health authorities worldwide have acknowledged the need for improved surveillance f

  6. Active surveillance: Oncologic outcome

    NARCIS (Netherlands)

    L.D.F. Venderbos (Lionne); L.P. Bokhorst (Leonard); C.H. Bangma (Chris); M.J. Roobol-Bouts (Monique)

    2013-01-01

    textabstractPURPOSE OF REVIEW: To give insight into recent literature (during the past 12-18 months) reporting on oncologic outcomes of men on active surveillance. RECENT FINDINGS: From recent published trials comparing radical prostatectomy vs. watchful waiting, we learn that radical treatment only

  7. Pregnancy nutrition surveillance system.

    Science.gov (United States)

    2003-01-01

    The Pregnancy Nutrition Surveillance System is a useful tool in monitoring Healthy People 2010 objectives and is intended to provide a framework for analyzing data on the nutritional status and behavioral risk factors of pregnant women and the association to birth outcome. The data are useful to health professionals in providing prenatal care and developing programs to reduce pregnancy-related health risks.

  8. A Study of Gaps in Attack Analysis

    Science.gov (United States)

    2016-10-12

    at- tack analysis as opposed to analyzing individual attacks; making detection sensors temporally and spatially dynamic; making attack identification...and Analysis Environment Asymmetry 22 3.5 Legacy Support Requirements 27 3.6 Sensors are Static Spatially and Temporally , While Attacks are Dynamic 28...or analysis, typically due to a lack of context from the points of attack. 2. Systems are designed for expressiveness and flexibility a. Many languages

  9. Terror attacks influence driving behavior in Israel

    Science.gov (United States)

    Stecklov, Guy; Goldstein, Joshua R.

    2004-01-01

    Terror attacks in Israel produce a temporary lull in light accidents followed by a 35% spike in fatal accidents on Israeli roads 3 days after the attack. Our results are based on time-series analysis of Israeli traffic flows, accidents, and terror attacks from January 2001 through June 2002. Whereas prior studies have focused on subjective reports of posttraumatic stress, our study shows a population-level behavioral response to violent terror attacks. PMID:15448203

  10. Sybil attack in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Abirami.K

    2013-04-01

    Full Text Available Wireless network is very susceptible to different types of attack. The main attack is Sybil attack, which allows forming other attacks on the network. Security is very important to the wireless network. In wireless sensor network, to verify node identities by cryptographic authentication but this is not easy because sensor node which contains limited resources. Therefore the current research is going on how to handling the situation of different traffic levels and transmission power for security.

  11. New Multi-step Worm Attack Model

    OpenAIRE

    Robiah, Y.; Rahayu, S. Siti; Shahrin , S.; M. FAIZAL A.; Zaki, M. Mohd; Marliza, R.

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. Fo...

  12. Environmental surveillance master sampling schedule

    Energy Technology Data Exchange (ETDEWEB)

    Bisping, L.E.

    1996-02-01

    Environmental surveillance of the Hanford Site and surrounding areas is conducted by the Pacific Northwest National Laboratory (PNNL) for the US Department of Energy (DOE). This document contains the planned 1996 schedules for routine collection of samples for the Surface Environmental Surveillance Project (SESP), Drinking Water Project, and Ground-Water Surveillance Project.

  13. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical

  14. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof;

    2015-01-01

    through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  15. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  16. Automated classification of computer network attacks

    CSIR Research Space (South Africa)

    Van Heerden, R

    2013-11-01

    Full Text Available In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes...

  17. 47 CFR 76.1612 - Personal attack.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Personal attack. 76.1612 Section 76.1612... CABLE TELEVISION SERVICE Notices § 76.1612 Personal attack. (a) When, during origination cablecasting of issues of public importance, an attack is made upon the honesty, character, integrity, or like...

  18. Cache timing attacks on recent microarchitectures

    DEFF Research Database (Denmark)

    Andreou, Alexandres; Bogdanov, Andrey; Tischhauser, Elmar Wolfgang

    2017-01-01

    Cache timing attacks have been known for a long time, however since the rise of cloud computing and shared hardware resources, such attacks found new potentially devastating applications. One prominent example is S$A (presented by Irazoqui et al at S&P 2015) which is a cache timing attack against...

  19. Cyberprints: Identifying Cyber Attackers by Feature Analysis

    Science.gov (United States)

    Blakely, Benjamin A.

    2012-01-01

    The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…

  20. On Mitigating Distributed Denial of Service Attacks

    Science.gov (United States)

    Gao, Zhiqiang

    2006-01-01

    Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…

  1. Attacks and countermeasures on AES and ECC

    DEFF Research Database (Denmark)

    Tange, Henrik; Andersen, Birger

    2013-01-01

    AES (Advanced Encryption Standard) is widely used in LTE and Wi-Fi communication systems. AES has recently been exposed to new attacks which have questioned the overall security of AES. The newest attack is a so called biclique attack, which is using the fact that the content of the state array...

  2. The Defense of a Valuable Target - A Control Theoretical Analysis

    Directory of Open Access Journals (Sweden)

    Kåre M. Mjelde

    1982-01-01

    Full Text Available A problem is considered of the defence of a valuable target against enemy attacks, such as to minimize the total number of successful attacks during a given period of time. Defence weapons are allocated to:

  3. Enabling analytical and Modeling Tools for Enhanced Disease Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Dawn K. Manley

    2003-04-01

    Early detection, identification, and warning are essential to minimize casualties from a biological attack. For covert attacks, sick people are likely to provide the first indication of an attack. An enhanced medical surveillance system that synthesizes distributed health indicator information and rapidly analyzes the information can dramatically increase the number of lives saved. Current surveillance methods to detect both biological attacks and natural outbreaks are hindered by factors such as distributed ownership of information, incompatible data storage and analysis programs, and patient privacy concerns. Moreover, because data are not widely shared, few data mining algorithms have been tested on and applied to diverse health indicator data. This project addressed both integration of multiple data sources and development and integration of analytical tools for rapid detection of disease outbreaks. As a first prototype, we developed an application to query and display distributed patient records. This application incorporated need-to-know access control and incorporated data from standard commercial databases. We developed and tested two different algorithms for outbreak recognition. The first is a pattern recognition technique that searches for space-time data clusters that may signal a disease outbreak. The second is a genetic algorithm to design and train neural networks (GANN) that we applied toward disease forecasting. We tested these algorithms against influenza, respiratory illness, and Dengue Fever data. Through this LDRD in combination with other internal funding, we delivered a distributed simulation capability to synthesize disparate information and models for earlier recognition and improved decision-making in the event of a biological attack. The architecture incorporates user feedback and control so that a user's decision inputs can impact the scenario outcome as well as integrated security and role-based access-control for communicating

  4. Postmarketing surveillance for drug abuse.

    Science.gov (United States)

    Arfken, Cynthia L; Cicero, Theodore J

    2003-06-05

    Assessing actual abuse of prescribed medications requires postmarketing surveillance. In this article we discuss general systems of postmarketing surveillance that exist as of the end of 2002 in the United States and two medication-specific surveillance systems that were devised and tested. The two specific surveillance systems are compared with limitations highlighted. Postmarketing surveillance is in its infancy and requires more research on ways to improve its validity without inducing illicit experimentation. Information on comparator medications is highly recommended both to validate the system and to place the results in context.

  5. Methods of Identifying and Preventing SQL Attacks

    Directory of Open Access Journals (Sweden)

    Bojken Shehu

    2012-11-01

    Full Text Available The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack. The term SQL injection attack is defined and a diagram is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using relevant diagrams for illustration. The other sections cover the preventive methods, where the methods are also discussed with an illustration using diagrams.

  6. Lightweight Distance Bounding Protocol against Relay Attacks

    Science.gov (United States)

    Kim, Jin Seok; Cho, Kookrae; Yum, Dae Hyun; Hong, Sung Je; Lee, Pil Joong

    Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack.

  7. Induced attack during multiple fixed-ratio, variable-ratio schedules of reinforcement1

    Science.gov (United States)

    Webbe, Frank M.; DeWeese, Jo; Malagodi, E. F.

    1974-01-01

    Two pigeons were exposed to a multiple schedule of reinforcement: in the presence of one discriminative stimulus, key pecks produced grain according to a fixed-ratio schedule; in the presence of a second discriminative stimulus, key pecks produced grain according to a variable-ratio schedule. The key-peck requirements in the two components were increased in successive stages from 50 to 125 responses. Live target pigeons were restrained at the rear of the chamber. Attacks against the targets were automatically recorded, and a variety of measures of attack behavior were taken. Attacks, when they occurred, always followed grain presentation. All measures revealed higher levels of attack during the fixed-ratio component at all parameter values. All measures generally increased with increases in fixed-ratio values with both birds, and with increases in variable-ratio values with one bird. With the other bird, only the per cent of reinforcements followed by attack increased with increases in variable-ratio value; all other measures first increased and then decreased. Both increasing and bitonic functions relating induced attack to schedule parameters have been reported in experiments usually employing a single measure of attack. The measures have varied widely among these experiments. It is suggested that further studies of induced attack examine a wider range of schedule parameters and that relationships among measures be studied. PMID:16811777

  8. Induced attack during multiple fixed-ratio, variable-ratio schedules of reinforcement.

    Science.gov (United States)

    Webbe, F M; Deweese, J; Malagodi, E F

    1974-07-01

    TWO PIGEONS WERE EXPOSED TO A MULTIPLE SCHEDULE OF REINFORCEMENT: in the presence of one discriminative stimulus, key pecks produced grain according to a fixed-ratio schedule; in the presence of a second discriminative stimulus, key pecks produced grain according to a variable-ratio schedule. The key-peck requirements in the two components were increased in successive stages from 50 to 125 responses. Live target pigeons were restrained at the rear of the chamber. Attacks against the targets were automatically recorded, and a variety of measures of attack behavior were taken. Attacks, when they occurred, always followed grain presentation. All measures revealed higher levels of attack during the fixed-ratio component at all parameter values. All measures generally increased with increases in fixed-ratio values with both birds, and with increases in variable-ratio values with one bird. With the other bird, only the per cent of reinforcements followed by attack increased with increases in variable-ratio value; all other measures first increased and then decreased. Both increasing and bitonic functions relating induced attack to schedule parameters have been reported in experiments usually employing a single measure of attack. The measures have varied widely among these experiments. It is suggested that further studies of induced attack examine a wider range of schedule parameters and that relationships among measures be studied.

  9. Continuous Weight Attack on Complex Network

    Institute of Scientific and Technical Information of China (English)

    YIN Yan-Ping; ZHANG Duan-Ming; TAN Jin; PAN Gui-Jun; HE Min-Hua

    2008-01-01

    We introduce a continuous weight attack strategy and numerically investigate the effect of continuous use a weight coefficient ω to define the attack intensity. The weight coefficient ω increases continuously from 1 to infinity, where 1 represents no attack and infinity represents complete destructive attack. Our results show that the continuous weight attack on two selected nodes with small ω (ω≈ 3) could achieve the same damage of complete elimination of a single selected node on both BA and ER networks. It is found that the continuous weight attack on a single selected edge with small ω (ω≈ 2) can reach the same effect of complete elimination of a single edge on BA network, but on ER network the damage of the continuous weight attack on a single edge is close to but always smaller than that of complete elimination of edge even if ω is very large.

  10. NETWORK SECURITY ATTACKS. ARP POISONING CASE STUDY

    Directory of Open Access Journals (Sweden)

    Luminiţa DEFTA

    2010-12-01

    Full Text Available Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic. However, using ARP poisoning the traffic between two computers can be intercepted even in a network that uses switches. This method is known as man in the middle attack. With this type of attack the affected stations from a network will have invalid entries in the ARP table. Thus, it will contain only the correspondence between the IP addresses of the stations from the same network and a single MAC address (the station that initiated the attack. In this paper we present step by step the initiation of such an attack in a network with three computers. We will intercept the traffic between two stations using the third one (the attacker.

  11. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  12. Whispering through DDoS attack

    Directory of Open Access Journals (Sweden)

    Miralem Mehic

    2016-03-01

    Full Text Available Denial of service (DoS attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

  13. Attack Tree Generation by Policy Invalidation

    DEFF Research Database (Denmark)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, Rene Rydhof

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identifi...... on invalidating policies in the system model by identifying possible sequences of actions that lead to an attack. The generated attacks are precise enough to illustrate the threat, and they are general enough to hide the details of individual steps....... through brainstorming of experts. In this work we formalize attack tree generation including human factors; based on recent advances in system models we develop a technique to identify possible attacks analytically, including technical and human factors. Our systematic attack generation is based...

  14. CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack

    Directory of Open Access Journals (Sweden)

    L.Kavisankar

    2011-10-01

    Full Text Available The challenging number is used for the detection of Spoofing attack. The IP Spoofing is considered to beone of the potentially brutal attack which acts as a tool for the DDoS attack which is considered to be amajor threat among security problems in today’s internet. These kinds of attack are extremely severe.They bring down business of company drastically. DDoS attack can easily exhaust the computing andcommunication resources of its victim within a short period of time. There are attacks exploiting somevulnerability or implementation bug in the software implementation of a service to bring that down andsome attacks will use all the available resources at the target machine. This deals on attacks thatconsume all the bandwidth available to the victim machine. While concentrating on the bandwidth attackthe TCP SYN flood is the more prominent attack. TCP/IP protocol suite is the most widely used protocolsuite for data communication. The TCP SYN flood works by exhausting the TCP connection queue of thehost and thus denying legitimate connection request. There are various methods used to detect andprevent this attack, one of which is to block the packet based on SYN flag count from the same IP address.This kind of prevention methods becomes unsuitable when the attackers use the Spoofed IP address. TheSYN spoofing becomes a major tool the TCP SYN flooding. For the prevention of this kind of attacks, theTCP specific probing is used in the proposed scheme where the client is requested challenging numberwhile sending the ACK in the three way hand shake. This is very useful to find the Spoofed IPPackets/TCP SYN flood and preventing them.

  15. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  16. Surface-water surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Saldi, K.A.; Dirkes, R.L.; Blanton, M.L.

    1995-06-01

    This section of the 1994 Hanford Site Environmental Report summarizes the Surface water on and near the Hanford Site is monitored to determine the potential effects of Hanford operations. Surface water at Hanford includes the Columbia River, riverbank springs, ponds located on the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site, and offsite water systems directly east and across the Columbia River from the Hanford Site. Columbia River sediments are also included in this discussion. Tables 5.3.1 and 5.3.2 summarize the sampling locations, sample types, sampling frequencies, and sample analyses included in surface-water surveillance activities during 1994. Sample locations are also identified in Figure 5.3.1. This section describes the surveillance effort and summarizes the results for these aquatic environments. Detailed analytical results are reported by Bisping (1995).

  17. VoIP attacks detection engine based on neural network

    Science.gov (United States)

    Safarik, Jakub; Slachta, Jiri

    2015-05-01

    The security is crucial for any system nowadays, especially communications. One of the most successful protocols in the field of communication over IP networks is Session Initiation Protocol. It is an open-source project used by different kinds of applications, both open-source and proprietary. High penetration and text-based principle made SIP number one target in IP telephony infrastructure, so security of SIP server is essential. To keep up with hackers and to detect potential malicious attacks, security administrator needs to monitor and evaluate SIP traffic in the network. But monitoring and following evaluation could easily overwhelm the security administrator in networks, typically in networks with a number of SIP servers, users and logically or geographically separated networks. The proposed solution lies in automatic attack detection systems. The article covers detection of VoIP attacks through a distributed network of nodes. Then the gathered data analyze aggregation server with artificial neural network. Artificial neural network means multilayer perceptron network trained with a set of collected attacks. Attack data could also be preprocessed and verified with a self-organizing map. The source data is detected by distributed network of detection nodes. Each node contains a honeypot application and traffic monitoring mechanism. Aggregation of data from each node creates an input for neural networks. The automatic classification on a centralized server with low false positive detection reduce the cost of attack detection resources. The detection system uses modular design for easy deployment in final infrastructure. The centralized server collects and process detected traffic. It also maintains all detection nodes.

  18. Surveillance for gastrointestinal malignancies

    Institute of Scientific and Technical Information of China (English)

    Ashish K Tiwari; Heather S Laird-Fick; Ramesh K Wali; Hemant K Roy

    2012-01-01

    Gastrointestinal (GI) malignancies are notorious for frequently progressing to advanced stages even in the absence of serious symptoms,thus leading to delayed diagnoses and dismal prognoses.Secondary prevention of GI malignancies through early detection and treatment of cancer-precursor/premalignant lesions,therefore,is recognized as an effective cancer prevention strategy.In order to efficiently detect these lesions,systemic application of screening tests (surveillance) is needed.However,most of the currently used non-invasive screening tests for GI malignancies (for example,serum markers such as alpha-fetoprotein for hepatocellular carcinoma,and fecal occult blood test,for colon cancer) are only modestly effective necessitating the use of highly invasive endoscopy-based procedures,such as esophagogastroduodenoscopy and colonoscopy for screening purposes.Even for hepatocellular carcinoma where non-invasive imaging (ultrasonography) has become a standard screening tool,the need for repeated liver biopsies of suspicious liver nodules for histopathological confirmation can't be avoided.The invasive nature and high-cost associated with these screening tools hinders implementation of GI cancer screening programs.Moreover,only a small fraction of general population is truly predisposed to developing GI malignancies,and indeed needs surveillance.To spare the average-risk individuals from superfluous invasive procedures and achieve an economically viable model of cancer prevention,it's important to identify cohorts in general population that are at substantially high risk of developing GI malignancies (riskstratification),and select suitable screening tests for surveillance in these cohorts.We herein provide a brief overview of such high-risk cohorts for different GI malignancies,and the screening strategies that have commonly been employed for surveillance purpose in them.

  19. Ocean surveillance satellites

    Science.gov (United States)

    Laurent, D.

    Soviet and U.S. programs involving satellites for surveillance of ships and submarines are discussed, considering differences in approaches. The Soviet program began with the Cosmos 198 in 1967 and the latest, the Cosmos 1400 series, 15 m long and weighing 5 tons, carry radar for monitoring ships and a nuclear reactor for a power supply. Other Soviet spacecraft carrying passive microwave sensors and ion drives powered by solar panels have recently been detonated in orbit for unknown reasons. It has also been observed that the Soviet satellites are controlled in pairs, with sequential orbital changes for one following the other, and both satellites then overflying the same points. In contrast, U.S. surveillance satellites have been placed in higher orbits, thus placing greater demands on the capabilities of the on-board radar and camera systems. Project White Cloud and the Clipper Bow program are described, noting the continued operation of the White Cloud spacecraft, which are equipped to intercept radio signals from surface ships. Currently, the integrated tactical surveillance system program has completed its study and a decision is expected soon.

  20. History of trichinellosis surveillance

    Directory of Open Access Journals (Sweden)

    Blancou J.

    2001-06-01

    Full Text Available The origin of trichinellosis, which existed in ancient times as testified by the discovery of parasite larvae on an Egyptian mummy, unfolded in several stages: discovery of encapsulated larvae (in the 1820s, identification and scientific description of these larvae (Paget Owen, 1835, followed by experimental infestations of animals (dogs, pigs, rabbits, mice or of humans as from 1850.The main occurrences of trichinellosis were followed with particular attention in Europe (Germany, Denmark, France, etc. and in the United States of America at the end of the XIXth century. They affected numerous domestic animal species (pigs, horses, etc. or wildlife and humans. Germany paid the heaviest toll with regard to the disease in humans, between 1860 and 1880, with several thousands of patients and more than 500 deaths.Different trichinellosis surveillance systems were set up in the relevant countries in the 1860s. In humans, this surveillance was carried out on affected living patients by a biopsy of the biceps muscles and subsequently by an analysis of eosinophilia (1895. In animals, surveillance was for a long time solely based on postmortem examination of the muscles of the affected animals. This method was used for the first time in 863 in Germany, and from the 1 890s, on several hundreds of thousands of pigs in Europe or in the United States of America.

  1. Terrorist Attacks and Financial Markets

    OpenAIRE

    Bonekamp, Bas; van Veen, Tom

    2017-01-01

    This paper investigates the magnitude and the duration of the effect of a terrorist attack on stock market indices. We investigate the impact of New York (2001), Madrid (2004), London (2005), Boston (2013), Paris (2015), Brussels (2016), Nice (2016) and Berlin(2016) on the stock indices of the USA (S&P), Japan (NIKKEI), Germany (DAX), Spain (IBEX), UK (FTSE), France (CAC) and the Euronext Index (BEL). We use both a graphical analysis and an event study methodology to assess the effect of terr...

  2. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  3. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    OpenAIRE

    Stephen Herzog

    2011-01-01

    In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to aveng...

  4. Predicting Suicide Attacks: Integrating Spatial, Temporal, and Social Features of Terrorist Attack Targets

    Science.gov (United States)

    2013-01-01

    geocoded all returnees within the state of California and all mental health, substance abuse, and hospital facilities using GIS . The spatial information...themes. The data were then processed with SAS through regression analysis to identify key areas of concern. She used GIS to geocode and assign...criminal justice fields. She has developed expertise in using geographic information systems ( GIS ), ATLAS.ti, SAS, and GeoClip to perform a combination

  5. A Super-resolution Reconstruction Algorithm for Surveillance Video

    Directory of Open Access Journals (Sweden)

    Jian Shao

    2017-01-01

    Full Text Available Recent technological developments have resulted in surveillance video becoming a primary method of preserving public security. Many city crimes are observed in surveillance video. The most abundant evidence collected by the police is also acquired through surveillance video sources. Surveillance video footage offers very strong support for solving criminal cases, therefore, creating an effective policy, and applying useful methods to the retrieval of additional evidence is becoming increasingly important. However, surveillance video has had its failings, namely, video footage being captured in low resolution (LR and bad visual quality. In this paper, we discuss the characteristics of surveillance video and describe the manual feature registration – maximum a posteriori – projection onto convex sets to develop a super-resolution reconstruction method, which improves the quality of surveillance video. From this method, we can make optimal use of information contained in the LR video image, but we can also control the image edge clearly as well as the convergence of the algorithm. Finally, we make a suggestion on how to adjust the algorithm adaptability by analyzing the prior information of target image.

  6. Anger attacks in obsessive compulsive disorder

    Directory of Open Access Journals (Sweden)

    Nitesh Prakash Painuly

    2011-01-01

    Full Text Available Background: Research on anger attacks has been mostly limited to depression, and only a few studies have focused on anger attacks in obsessive compulsive disorder. Materials and Methods: In a cross-sectional study all new obsessive compulsive disorder patients aged 20-60 years attending an outpatient clinic were assessed using the anger attack questionnaire, irritability, depression and anxiety scale (for the direction of the aggressive behavior and quality of life (QOL. Results: The sample consisted of 42 consecutive subjects with obsessive compulsive disorder, out of which 21 (50% had anger attacks. The obsessive compulsive disorder subjects with and without anger attacks did not show significant differences in terms of sociodemographic variables, duration of illness, treatment, and family history. However, subjects with anger attacks had significantly higher prevalence of panic attacks and comorbid depression. Significantly more subjects with anger attacks exhibited aggressive acts toward spouse, parents, children, and other relatives in the form of yelling and threatening to hurt, trying to hurt, and threatening to leave. However, the two groups did not differ significantly in terms of QOL, except for the psychological domain being worse in the subjects with anger attacks. Conclusion: Anger attacks are present in half of the patients with obsessive compulsive disorder, and they correlate with the presence of comorbid depression.

  7. ACTIVITY ATTACK ON REDUCED VARIANTS OF RIJNDAEL

    Institute of Scientific and Technical Information of China (English)

    Wei Baodian; Liu Dongsu; Wang Xinmei

    2004-01-01

    The famous Square attacks against the Rijndael algorithm have taken advantage of the change of the balance of some bytes. Further study shows that the change of activity always happens before the change of balance, which builds the foundation for a new activity attack presented in this paper. In the activity attack, the round in which the activity changes is executed in an equivalent form to avoid the obstructive restriction of the subkeys of that round.The existence of the birthday paradox guarantees much fewer plaintexts necessary for activity attacks comparing with that for corresponding Square attacks. But no benefit may result from the new attacks performed independently because the activity attacks guess four instead of one key byte once. Only when both the balance property and the activity property are exploited at the same time can much better performance be obtained. The better performance in the simulation shows that the consuming time and chosen plaintexts necessary are both reduced to one tenth of those of the corresponding Square attacks. So the activity attacks could be viewed as an efficient supplement to the Square attacks.

  8. Psychological interventions following terrorist attacks.

    Science.gov (United States)

    Mansdorf, Irwin J

    2008-01-01

    Psychological reactions to terror attacks have been documented as ranging from no symptoms to transient behavioural symptoms to more serious posttraumatic stress. A review of representative studies is presented, with a critical analysis of the salient points of the various psychological intervention strategies for terrorist attacks. Common aspects of both most intervention approaches include multifaceted models that foster social support and include a preparatory phase, a phase of 'psychological first aid' and a follow-up phase of referral for more severe cases. The notion of intervention for all who may show some symptoms is not universally accepted. Where treatment or intervention is used, the debriefing aspect of CISM (Critical Incident Stress Management) remains highly disputed, with the focus on intrusively revisiting the trauma appearing to have questionable value at best. Some data questions whether formal treatment or intervention is necessary or even desirable. For many who choose not to seek out any help following a trauma, clinical data shows no negative results. Moreover, the preponderance of data shows that conventional 'debriefing' is not recommended. If the debriefing mechanism is refined so that intrusive emotional rehashing of the traumatic event is eliminated, the resultant interventions resemble resilience based approaches. Further defining when intervention is called for and refining the mechanisms of intervention in multi-stage intervention.

  9. Migraine attacks the Basal Ganglia

    Directory of Open Access Journals (Sweden)

    Bigal Marcelo

    2011-09-01

    Full Text Available Abstract Background With time, episodes of migraine headache afflict patients with increased frequency, longer duration and more intense pain. While episodic migraine may be defined as 1-14 attacks per month, there are no clear-cut phases defined, and those patients with low frequency may progress to high frequency episodic migraine and the latter may progress into chronic daily headache (> 15 attacks per month. The pathophysiology of this progression is completely unknown. Attempting to unravel this phenomenon, we used high field (human brain imaging to compare functional responses, functional connectivity and brain morphology in patients whose migraine episodes did not progress (LF to a matched (gender, age, age of onset and type of medication group of patients whose migraine episodes progressed (HF. Results In comparison to LF patients, responses to pain in HF patients were significantly lower in the caudate, putamen and pallidum. Paradoxically, associated with these lower responses in HF patients, gray matter volume of the right and left caudate nuclei were significantly larger than in the LF patients. Functional connectivity analysis revealed additional differences between the two groups in regard to response to pain. Conclusions Supported by current understanding of basal ganglia role in pain processing, the findings suggest a significant role of the basal ganglia in the pathophysiology of the episodic migraine.

  10. Defeating Internet attacks and Spam using "disposable" Mobile IPv6 home addresses

    CERN Document Server

    Mutaf, Pars

    2011-01-01

    We propose a model of operation for next generation wireless Internet, in which a mobile host has hundreds of "disposable" Mobile IPv6 home addresses. Each correspondent is distributed a different disposable home address. If attacked on a given home address, the mobile user can block packets to that address and become unreachable to the attacker. Blocking one address does not affect other addresses. Other correspondents can still reach the mobile host. A new home address can also be requested via e-mail, instant messaging, or directly from the target host using a protocol that we develop. This model is especially useful against battery exhausting Denial-of-Service (DoS) attacks and CPU exhausting distributed DoS attacks, since it seems to be the only viable solution, currently. We show however that this model can also be used to defeat other attacks and also to stop spam.

  11. IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM Using Honeypots

    Directory of Open Access Journals (Sweden)

    K.Munivara Prasad

    2012-02-01

    Full Text Available The Internet Threat Monitoring (ITM is an efficient monitoring system used globally to measure, detect, characterize and track threats such as denial of service (DoS and distributed Denial of Service (DDoS attacks and worms. . To block the monitoring system in the internet the attackers are targeted the ITMsystem. In this paper we address the flooding attack of DDoS against ITM monitors to exhaust the network resources, such as bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacksusing Botnet on ITM. One possible way to counter DDoS attacks is to trace the attack sources and punish the perpetrators. we propose a novel traceback method for DDoS using Honeypots. IP tracing through honeypot is a single packet tracing method and is more efficient than commonly used packet marking techniques.

  12. Lone-Actor Terrorist Target Choice.

    Science.gov (United States)

    Gill, Paul; Corner, Emily

    2016-09-01

    Lone-actor terrorist attacks have risen to the forefront of the public's consciousness in the past few years. Some of these attacks were conducted against public officials. The rise of hard-to-detect, low-tech attacks may lead to more public officials being targeted. This paper explores whether different behavioral traits are apparent within a sample of lone-actor terrorists who plotted against high-value targets (including public officials) than within a sample of lone actors who plotted against members of the public. Utilizing a unique dataset of 111 lone-actor terrorists, we test a series of hypotheses related to attack capability and operational security. The results indicate that very little differentiates those who attack high-value targets from those who attack members of the public. We conclude with a series of illustrations to theorize why this may be the case. Copyright © 2016 John Wiley & Sons, Ltd.

  13. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  14. Autonomous soaring and surveillance in wind fields with an unmanned aerial vehicle

    Science.gov (United States)

    Gao, Chen

    Small unmanned aerial vehicles (UAVs) play an active role in developing a low-cost, low-altitude autonomous aerial surveillance platform. The success of the applications needs to address the challenge of limited on-board power plant that limits the endurance performance in surveillance mission. This thesis studies the mechanics of soaring flight, observed in nature where birds utilize various wind patterns to stay airborne without flapping their wings, and investigates its application to small UAVs in their surveillance missions. In a proposed integrated framework of soaring and surveillance, a bird-mimicking soaring maneuver extracts energy from surrounding wind environment that improves surveillance performance in terms of flight endurance, while the surveillance task not only covers the target area, but also detects energy sources within the area to allow for potential soaring flight. The interaction of soaring and surveillance further enables novel energy based, coverage optimal path planning. Two soaring and associated surveillance strategies are explored. In a so-called static soaring surveillance, the UAV identifies spatially-distributed thermal updrafts for soaring, while incremental surveillance is achieved through gliding flight to visit concentric expanding regions. A Gaussian-process-regression-based algorithm is developed to achieve computationally-efficient and smooth updraft estimation. In a so-called dynamic soaring surveillance, the UAV performs one cycle of dynamic soaring to harvest energy from the horizontal wind gradient to complete one surveillance task by visiting from one target to the next one. A Dubins-path-based trajectory planning approach is proposed to maximize wind energy extraction and ensure smooth transition between surveillance tasks. Finally, a nonlinear trajectory tracking controller is designed for a full six-degree-of-freedom nonlinear UAV dynamics model and extensive simulations are carried to demonstrate the effectiveness of

  15. Rope Climbing Robot with Surveillance Capability

    Directory of Open Access Journals (Sweden)

    Kanza Zafar

    2013-08-01

    Full Text Available In the past different engineers and researcher developed robots capable of climbing for various purposes. In this paper we have developed a robot capable of rope climbing in both horizontal and vertical direction. Furthermore, the robot has the ability to perform surveillance using a camera mounted on top of the robot. The quality of the transmitted video from the camera to the computer is clear and stable. Hence the developed robot is a good choice for surveillance purposes. In addition, it can be used to traverse floors of a building. It uses an IR sensor to sense strips attached at each floor. Once the strips are sensed, a dropping mechanism is activated in which a specific object is dropped to the targeted floor or location. The robot can work in automatic mode or manual through RF signals from an RF transmitter. Finally the robot is cost effective compared to many other developed robots for rope climbing.

  16. SDN-based path hopping communication against eavesdropping attack

    Science.gov (United States)

    Zhang, Chuanhao; Bu, Youjun; Zhao, Zheng

    2016-10-01

    Network eavesdropping is one of the most popular means used by cyber attackers, which has been a severe threat to network communication security. Adversaries could capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as username and password etc. Traditional network usually uses static network configuration, and existing defense methods, including firewall, IDS, IPS etc., cannot prevent eavesdropping, which has no distinguishing characteristic. Network eavesdropping become silent during most of the time of the attacking process, which is why it is difficult to discover and to defend. But A successful eavesdropping attack also has its' precondition, which is the target path should be relatively stable and has enough time of duration. So, In order to resolve this problem, it has to work on the network architecture. In this paper, a path hopping communication(PHC) mechanism based on Software Define Network (SDN) was proposed to solve this problem. In PHC, Ends in communication packets as well as the routing paths were changed dynamically. Therefore, the traffic would be distributed to multiple flows and transmitted along different paths. so that Network eavesdropping attack could be prevented effectively. It was concluded that PHC was able to increase the overhead of Network eavesdropping, as well as the difficulty of communication data recovery.

  17. Sleep Deprivation Attack Detection in Wireless Sensor Network

    Science.gov (United States)

    Bhattasali, Tapalina; Chaki, Rituparna; Sanyal, Sugata

    2012-02-01

    Deployment of sensor network in hostile environment makes it mainly vulnerable to battery drainage attacks because it is impossible to recharge or replace the battery power of sensor nodes. Among different types of security threats, low power sensor nodes are immensely affected by the attacks which cause random drainage of the energy level of sensors, leading to death of the nodes. The most dangerous type of attack in this category is sleep deprivation, where target of the intruder is to maximize the power consumption of sensor nodes, so that their lifetime is minimized. Most of the existing works on sleep deprivation attack detection involve a lot of overhead, leading to poor throughput. The need of the day is to design a model for detecting intrusions accurately in an energy efficient manner. This paper proposes a hierarchical framework based on distributed collaborative mechanism for detecting sleep deprivation torture in wireless sensor network efficiently. Proposed model uses anomaly detection technique in two steps to reduce the probability of false intrusion.

  18. Surveillance and Control of Nosocomial Infection in Neonatal ICU

    Institute of Scientific and Technical Information of China (English)

    ZHONG Xiaozhu

    2002-01-01

    Objective To strengthen the surveillance and control of nosocomial infection in neonatal ICU. Methods To be seriously considered by leaders, to carry out rules and systems, to strengthen education and enhance consciousness of infections, to carry out targeted surveillance on basis of routine surveillance. Results The consciousness of infections has been enhanced. Passive carrying out of sterilization and isolation has turned active carrying out. The air quality in NICU has been improved. Ventilator - related infections have been decreased. Conclusion To strengthen surveillance and control of nosocomial infection in neonatal ICU and to find out and solve the weak link in infection control is the key to control nosocomial infection, to insure medical safety, and to improve medical quality.

  19. Vector-borne disease surveillance in livestock populations: a critical review of literature recommendations and implemented surveillance (BTV-8) in five European countries

    DEFF Research Database (Denmark)

    Dórea, Fernanda C.; Elbers, Armin R.W.; Hendrikx, Pascal

    2016-01-01

    Preparedness against vector-borne threats depends on the existence of a long-term, sustainable surveillance of vector-borne disease and their relevant vectors. This work reviewed the availability of such surveillance systems in five European countries (Denmark, France, The Netherlands, Sweden...... of the literature aimed at identifying disease surveillance strategies and methods that are currently suggested as best suited to target vector-borne diseases in order to guide future development of surveillance in the countries in question. Passive surveillance was found to be efficient for early detection...... of diseases during the early phase of introduction into a free country. However, its value diminished once the disease has been established in a territory. Detection of emerging diseases was found to be very context and area specific, and thus active surveillance designs need to take the available...

  20. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is widely used to design IT systems in the modern computer world, and often it is implemented by a prop...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....... by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...

  1. Detection of Denial-of-service Attacks

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Denial-of-service (DOS) is a type of computer attack, which can essentially disable computers and networks.Resource consumption type of DOS attack could not be detected by the traditional misuse detection technique. This paper presents a new method of support vector mchine (SVM) to detect these attacks. We find that a DOS attack to a host is related to the activities within an impact data set of the host. The SVM method is used to classify the subsets of an impact data set to estimate its anomalism. The experiment result shows that this method can detect resource consumption type of DOS attacks, such as SYNflood, Smurf and UDP-storm. A receiver operating characteristic curve is plotted to determine performance for any possible operating point of the DOS attacks detection.

  2. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  3. Distributed and Mobile Collaboration for Real Time Epidemiological Surveillance during Forces Deployments.

    Science.gov (United States)

    Chaudet, Hervé; Meynard, Jean-Baptiste; Texier, Gaëtan; Tournebize, Olivier; Pellegrin, Liliane; Queyriaux, Benjamin; Boutin, Jean-Paul

    2005-01-01

    This paper presents a pilot project of a real time syndromic surveillance system in French armed forces for early warning of biological attack by mass destruction weapons. For simulating the situation of a theatre of operations and its organisation, an electronic syndromic surveillance system covering all branches of service in French Guiana (about 3,000 persons) has been deployed and connected to a surveillance centre in France. This system has been design taking in account a collaborative view of epidemiological surveillance and the mobility of forces in extreme conditions. Several kinds of hardware, from rugged personal digital assistant to desktop computer, and several telecommunication links, from PSTN to satellite data links, are used. This system allows a quick report of cases, which are georeferenced. In the first results, some problems associated with the human and the technical aspects have been reported, in association with some immediate advantages.

  4. Fault Attack on the Balanced Shrinking Generator

    Institute of Scientific and Technical Information of China (English)

    GAO Juntao; LI Xuelian; HU Yupu

    2006-01-01

    Fault analysis, belonging to indirect attack, is a cryptanalysis technique for the physical implementation of cryptosystem. In this paper, we propose a fault attack on the Balanced Shrinking Generator. The results show that the attacker can obtain the secret key by analyzing faulty output sequences which is produced by changing control clock of one of Linear Feedback Shift Registers (LFSR). Therefore, the balanced shrinking generator has a trouble in hardware implementation.

  5. Impact of Alleged Russian Cyber Attacks

    Science.gov (United States)

    2009-05-01

    March 14, 2009). 96 Ivan Buranov, Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal...Vladimir Vodo, and Seda Yegikyan, Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated by Open Source...Buranov, Ivan; Vodo, Vladimir; and Yegikyan, Seda Pro-Kremlin Activist Admits Attack on Estonian Websites, Denies Criminal Wrongdoing, Translated

  6. GSFC Supplier Surveillance

    Science.gov (United States)

    Kelly, Michael P.

    2011-01-01

    Topics covered include: Develop Program/Project Quality Assurance Surveillance Plans The work activities performed by the developer and/or his suppliers are subject to evaluation and audit by government-designated representatives. CSO supports project by selecting on-site supplier representative s by one of several methods: (1) a Defense Contract Management Agency (DCMA) person via a Letter Of Delegation (LOD), (2) an independent assurance contractor (IAC) via a contract Audits, Assessments, and Assurance (A3) Contract Code 300 Mission Assurance Support Contract (MASC)

  7. Bodygraphic Injury Surveillance System

    Science.gov (United States)

    Tsuboi, Toshiki; Kitamura, Koji; Nishida, Yoshihumi; Motomura, Yoichi; Takano, Tachio; Yamanaka, Tatsuhiro; Mizoguchi, Hiroshi

    This paper proposes a new technology,``a bodygraphic injury surveillance system (BISS)'' that not only accumulates accident situation data but also represents injury data based on a human body coordinate system in a standardized and multilayered way. Standardized and multilayered representation of injury enables accumulation, retrieval, sharing, statistical analysis, and modeling causalities of injury across different fields such as medicine, engineering, and industry. To confirm the effectiveness of the developed system, the authors collected 3,685 children's injury data in cooperation with a hospital. As new analyses based on the developed BISS, this paper shows bodygraphically statistical analysis and childhood injury modeling using the developed BISS and Bayesian network technology.

  8. Surveillance of influenza viruses attacking children in Beijing during 2009 pandemic influenza A(H1N1)%2009甲型H1N1流感大流行期间北京儿童的流感监测

    Institute of Scientific and Technical Information of China (English)

    朱汝南; 沙莉; 袁艺; 王菲; 胡凤华; 李杰; 胡岚; 张宝元; 曹玲; 金丽敏; 李娟娟; 钱渊; 王晓颖; 孙宇; 王芳; 邓洁; 赵林清; 曲东; 李颖; 任晓旭

    2010-01-01

    -time RT-PCR,the total positive rate of influenza A viruses was 29.3%,including 623(14.3%)identified as 2009 pandemic influenza A(H1N1)and 657(15.1%)influenza A viruses without subtype identity.Among those pandemic influenza H1N1 positive,23 were severe cases with 5 deaths.The ages for 618 pandemic influenza H1N1 infected children with completed information were from 14 days to 16 years.The ratio of male to female wag 1.3:1.Among them,25.2% were patients in age group of 1 to 3 years old and distribution of children in age groups of 3 to 6 years old and 6 to 12 years old were similar(about 30.0%).During the survey period,it appeared only one prevalence wave of pandemic influenza H1N1.The positive rate of pandemic H1N1 increased in September and the peak(36.5%of positive rate)was in November and then declined to 2.7%in February 2010.The data from routine influenza virus surveillance from 20-30 clinical samples collected each week indicated an alternative prevalence of seasonal H3N2,pandemic H1N1 and influenza B during this study period.Respiratory syncytial virus(RSV)became predominant in children after the circulating of pandemic H1N1.Conclusion There was an epidemic of pandemic influenza H1N1 in children in Beijing from June 2009 to February 2010,especially in those of preschool and school aged children.Seasonal influenza viruses and pandemic influenza H1N1 were contributed alternatively.

  9. Projectbeschrijving Surveillance Ziekenhuisinfecties 1996-1999

    NARCIS (Netherlands)

    Berg JMJ van den; Boer AS de; Mintjes-de Groot AJ; Sprenger MJW; Cucic S; Pelt W van; Centraal Begeleidingsorgaan; CIE

    1996-01-01

    In the Project Surveillance Hospital Acquired Infections a surveillance system in a national network of hospitals is being developed and implemented. In the project surveillance of hospital acquired infections is implemented in components: surveillance of surgical wound infections, surveillance of i

  10. Phase-remapping attack in practical quantum-key-distribution systems

    Science.gov (United States)

    Fung, Chi-Hang Fred; Qi, Bing; Tamaki, Kiyoshi; Lo, Hoi-Kwong

    2007-03-01

    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the “plug-and-play” system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.

  11. Evaluation of Hypervisor Stability towards Insider Attacks

    Institute of Scientific and Technical Information of China (English)

    Roman Kulikov; Svetlana Kolesnikova

    2016-01-01

    Virtualization technology plays a key role in cloud computing. Thus, the security issues of virtualization tools (hypervisors, emulators, etc.) should be under precise consideration. However, threats of insider attacks are underestimated. The virtualization tools and hypervisors have been poorly protected from this type of attacks. Furthermore, hypervisor is one of the most critical elements in cloud computing infrastructure. Firstly, hypervisor vulnerabilities analysis is provided. Secondly, a formal model of insider attack on hypervisor is developed. Consequently, on the basis of the formal attack model, we propose a new methodology of hypervisor stability evaluation. In this paper, certain security countermeasures are considered that should be integrated in hypervisor software architecture.

  12. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  13. Off-Path Attacking the Web

    CERN Document Server

    Gilad, Yossi

    2012-01-01

    We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured with SSL/TLS. The attacks are practical and require a puppet (malicious script in browser sandbox) running on a the victim client machine, and attacker capable of IP-spoofing on the Internet. Our attacks use a technique allowing an off-path attacker to learn the sequence numbers of both client and server in a TCP connection. The technique exploits the fact that many computers, in particular those running Windows, use a global IP-ID counter, which provides a side channel allowing efficient exposure of the connection sequence numbers. We present results of experiments evaluating the learning technique and the attacks ...

  14. Localized attack on clustering networks

    CERN Document Server

    Dong, Gaogao; Du, Ruijin; Shao, Shuai; Stanley, H Eugene; Shlomo, Havlin

    2016-01-01

    Clustering network is one of which complex network attracting plenty of scholars to discuss and study the structures and cascading process. We primarily analyzed the effect of clustering coefficient to other various of the single clustering network under localized attack. These network models including double clustering network and star-like NON with clustering and random regular (RR) NON of ER networks with clustering are made up of at least two networks among which exist interdependent relation among whose degree of dependence is measured by coupling strength. We show both analytically and numerically, how the coupling strength and clustering coefficient effect the percolation threshold, size of giant component, critical coupling point where the behavior of phase transition changes from second order to first order with the increase of coupling strength between the networks. Last, we study the two types of clustering network: one type is same with double clustering network in which each subnetwork satisfies ...

  15. Attacks on Local Searching Tools

    CERN Document Server

    Nielson, Seth James; Wallach, Dan S

    2011-01-01

    The Google Desktop Search is an indexing tool, currently in beta testing, designed to allow users fast, intuitive, searching for local files. The principle interface is provided through a local web server which supports an interface similar to Google.com's normal web page. Indexing of local files occurs when the system is idle, and understands a number of common file types. A optional feature is that Google Desktop can integrate a short summary of a local search results with Google.com web searches. This summary includes 30-40 character snippets of local files. We have uncovered a vulnerability that would release private local data to an unauthorized remote entity. Using two different attacks, we expose the small snippets of private local data to a remote third party.

  16. Federated Access to Cyber Observables for Detection of Targeted Attacks

    Science.gov (United States)

    2014-10-01

    backdoor that communicates with command and control servers using a number of encoding channels, e.g., DNS or Twitter , (3) pro- ceeded to escalate...Cyber Defender Workstations HTML GUI API HTTPS XML Transition Partner Apps Networking Gear (hundreds): •Routers •Floor Switches •Office Switches

  17. Data mining techniques for distributed denial of service attacks detection in the internet of things: A research survey

    CSIR Research Space (South Africa)

    Machaka, P

    2016-08-01

    Full Text Available . The chapter further investigates the state-of-the-art in data mining techniques for Distributed Denial of Service (DDoS) attacks targeting the various infrastructures. The chapter explores the characteristics and pervasiveness of DDoS attacks. It also explores...

  18. Spatially localized attacks on interdependent networks: the existence of a finite critical attack size

    CERN Document Server

    Berezin, Yehiel; Danziger, Michael M; Li, Daqing; Havlin, Shlomo

    2013-01-01

    Many real world complex systems such as infrastructure, communication and transportation networks are embedded in space, where entities of one system may depend on entities of other systems. These systems are subject to geographically localized failures due to malicious attacks or natural disasters. Here we study the resilience of a system composed of two interdependent spatially embedded networks to localized geographical attacks. We find that if an attack is larger than a finite (zero fraction of the system) critical size, it will spread through the entire system and lead to its complete collapse. If the attack is below the critical size, it will remain localized. In contrast, under random attack a finite fraction of the system needs to be removed to initiate system collapse. We present both numerical simulations and a theoretical approach to analyze and predict the effect of local attacks and the critical attack size. Our results demonstrate the high risk of local attacks on interdependent spatially embedd...

  19. Sonoma Persistent Surveillance System

    Energy Technology Data Exchange (ETDEWEB)

    Pennington, D M

    2006-03-24

    Sonoma offers the first cost-effective, broad-area, high-resolution, real-time motion imagery system for surveillance applications. Sonoma is unique in its ability to provide continuous, real-time video imagery of an area the size of a small city with resolutions sufficient to track 8,000 moving objects in the field of view. At higher resolutions and over smaller areas, Sonoma can even track the movement of individual people. The visual impact of the data available from Sonoma is already causing a paradigm shift in the architecture and operation of other surveillance systems. Sonoma is expected to cost just one-tenth the price of comparably sized sensor systems. Cameras mounted on an airborne platform constantly monitor an area, feeding data to the ground for real-time analysis. Sonoma was designed to provide real-time data for actionable intelligence in situations such as monitoring traffic, special events, border security, and harbors. If a Sonoma system had been available in the aftermath of the Katrina and Rita hurricanes, emergency responders would have had real-time information on roads, water levels, and traffic conditions, perhaps saving many lives.

  20. Aftermath of bustamante attack on genomic beacon service.

    Science.gov (United States)

    Aziz, Md Momin Al; Ghasemi, Reza; Waliullah, Md; Mohammed, Noman

    2017-07-26

    With the enormous need for federated eco-system for holding global genomic and clinical data, Global Alliance for Genomic and Health (GA4GH) has created an international website called beacon service which allows a researcher to find out whether a specific dataset can be utilized to his or her research beforehand. This simple webservice is quite useful as it allows queries like whether a certain position of a target chromosome has a specific nucleotide. However, the increased integration of individuals genomic data into clinical practice and research raised serious privacy concern. Though the answer of such queries are yes or no in Bacon network, it results in serious privacy implication as demonstrated in a recent work from Shringarpure and Bustamante. In their attack model, the authors demonstrated that with a limited number of queries, presence of an individual in any dataset can be determined. We propose two lightweight algorithms (based on randomized response) which captures the efficacy while preserving the privacy of the participants in a genomic beacon service. We also elaborate the strength and weakness of the attack by explaining some of their statistical and mathematical models using real world genomic database. We extend their experimental simulations for different adversarial assumptions and parameters. We experimentally evaluated the solutions on the original attack model with different parameters for better understanding of the privacy and utility tradeoffs provided by these two methods. Also, the statistical analysis further elaborates the different aspects of the prior attack which leads to a better risk management for the participants in a beacon service. The differentially private and lightweight solutions discussed here will make the attack much difficult to succeed while maintaining the fundamental motivation of beacon database network.

  1. Wounding patterns and human performance in knife attacks: optimising the protection provided by knife-resistant body armour

    OpenAIRE

    Bleetman, A; Watson, Celia H.; Horsfall, Ian; Champion, Steve M.

    2016-01-01

    Stab attacks generate high loads,1 and to defeat them, armour needs to be of a certain thickness and stiffness.2,3 Slash attacks produce much lower loads and armour designed to defeat them can be far lighter and more flexible.Methods and subjects: Phase 1: Human performance in slash attacks: 87 randomly selected students at the Royal Military College of Science were asked to make one slash attack with an instrumented blade on a vertically mounted target. No instructions on how to slash the...

  2. Terrorist attacks escalate in frequency and fatalities preceding highly lethal attacks.

    Directory of Open Access Journals (Sweden)

    Andy Martens

    Full Text Available Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates--both in the number of people killed per attack and in the frequency of attacks--leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack.

  3. Surveillance theory and its implications for law

    NARCIS (Netherlands)

    Timan, Tjerk; Galic, Masa; Koops, Bert-Jaap; Yeung, Karen; Brownsword, Roger; Scotford, Eloise

    2016-01-01

    This chapter provides an overview of key surveillance theories and their implications for law and regulation. It presents three stages of theories that characterise changes in thinking about surveillance in society and the disciplining, controlling, and entertaining functions of surveillance.

  4. British used Congreve Rockets to Attack Napoleon

    Science.gov (United States)

    2004-01-01

    Sir William Congreve developed a rocket with a range of about 9,000 feet. The incendiary rocket used black powder, an iron case, and a 16-foot guide stick. In 1806, British used Congreve rockets to attack Napoleon's headquarters in France. In 1807, Congreve directed a rocket attack against Copenhagen.

  5. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc)

    2006-01-01

    textabstractIn this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to

  6. Quantifying Shannon's work function for cryptanalytic attacks

    NARCIS (Netherlands)

    van Son, R.J.J.H.

    2010-01-01

    Attacks on cryptographic systems are limited by the available computational resources. A theoretical understanding of these resource limitations is needed to evaluate the security of cryptographic primitives and procedures. This study uses an Attacker versus Environment game formalism based on compu

  7. Revisiting attacker model for smart vehicles

    NARCIS (Netherlands)

    Petit, Jonathan; Feiri, Michael; Kargl, Frank

    Because of the potential impact on user's life in cooperative automated safety applications, the security of Vehicle-to-X communication (V2X) is mandatory. However, the current attacker model used in literature is often too network-oriented, and it is unclear what realistic attacks could be. In this

  8. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks with c...... with cascaded Erbium-doped fiber amplifiers and a comb laser....

  9. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolić, Ivica; Rechberger, Christian

    2014-01-01

    ciphers, including the new standard SHA-3 (Keccak). The rebound attack is a start-from-the-middle approach for finding differential paths and conforming pairs in byte-oriented designs like Substitution-Permutation networks and AES. We apply our new compositional attack to the reduced version of the hash...

  10. Fast Collision Attack on MD5

    NARCIS (Netherlands)

    Stevens, M.M.J.

    2006-01-01

    In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the same differential path of MD5 and the set of sufficient conditions that was presented by Wang et al. We present a new technique which allows us to deterministically fulfi

  11. Minimization and Reliability Analyses of Attack Graphs

    Science.gov (United States)

    2002-02-01

    they model only attacks. Since we have a generic state machine model , we can simultaneously model not just attacks, but also seemingly benign system...Finite State Machine Model The Network We model the network as a set of facts, each represented as a relational predicate. The state of the network

  12. Attack tree generation by policy invalidation

    NARCIS (Netherlands)

    Ivanova, Marieta Georgieva; Probst, Christian W.; Hansen, René Rydhof; Kammüller, Florian; Naeem Akram, R.; Jajodia, S.

    2015-01-01

    Attacks on systems and organisations increasingly exploit human actors, for example through social engineering, complicating their formal treatment and automatic identification. Formalisation of human behaviour is difficult at best, and attacks on socio-technical systems are still mostly identified th

  13. Estimating the Attack Rate of Pregnancy-Associated Listeriosis during a Large Outbreak

    Directory of Open Access Journals (Sweden)

    Maho Imanishi

    2015-01-01

    Full Text Available Background. In 2011, a multistate outbreak of listeriosis linked to contaminated cantaloupes raised concerns that many pregnant women might have been exposed to Listeria monocytogenes. Listeriosis during pregnancy can cause fetal death, premature delivery, and neonatal sepsis and meningitis. Little information is available to guide healthcare providers who care for asymptomatic pregnant women with suspected L. monocytogenes exposure. Methods. We tracked pregnancy-associated listeriosis cases using reportable diseases surveillance and enhanced surveillance for fetal death using vital records and inpatient fetal deaths data in Colorado. We surveyed 1,060 pregnant women about symptoms and exposures. We developed three methods to estimate how many pregnant women in Colorado ate the implicated cantaloupes, and we calculated attack rates. Results. One laboratory-confirmed case of listeriosis was associated with pregnancy. The fetal death rate did not increase significantly compared to preoutbreak periods. Approximately 6,500–12,000 pregnant women in Colorado might have eaten the contaminated cantaloupes, an attack rate of ~1 per 10,000 exposed pregnant women. Conclusions. Despite many exposures, the risk of pregnancy-associated listeriosis was low. Our methods for estimating attack rates may help during future outbreaks and product recalls. Our findings offer relevant considerations for management of asymptomatic pregnant women with possible L. monocytogenes exposure.

  14. New Multi-step Worm Attack Model

    CERN Document Server

    Robiah, Y; Shahrin, S; Faizal, M A; Zaki, M Mohd; Marliza, R

    2010-01-01

    The traditional worms such as Blaster, Code Red, Slammer and Sasser, are still infecting vulnerable machines on the internet. They will remain as significant threats due to their fast spreading nature on the internet. Various traditional worms attack pattern has been analyzed from various logs at different OSI layers such as victim logs, attacker logs and IDS alert log. These worms attack pattern can be abstracted to form worms' attack model which describes the process of worms' infection. For the purpose of this paper, only Blaster variants were used during the experiment. This paper proposes a multi-step worm attack model which can be extended into research areas in alert correlation and computer forensic investigation.

  15. Evaluating Deterioration of Concrete by Sulfate Attack

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Effects of factors such as water to cement ratio, fly ash and silica fume on the resistance of concrete to sulfate attack were investigated by dry-wet cycles and immersion method. The index of the resistance to sulfate attack was used to evaluate the deterioration degree of concrete damaged by sulfate. The relationship between the resistance of concrete to sulfate attack and its permeability/porosity were analyzed as well as its responding mechanism. Results show that the depth of sulfate crystal attack from surface to inner of concrete can be reduced by decreasing w/c and addition of combining fly ash with silica fume. The variation of relative elastic modulus ratio and relative flexural strength ratio of various specimens before and after being subjected to sulfate attack was compared.

  16. Combating Memory Corruption Attacks On Scada Devices

    Science.gov (United States)

    Bellettini, Carlo; Rrushi, Julian

    Memory corruption attacks on SCADA devices can cause significant disruptions to control systems and the industrial processes they operate. However, despite the presence of numerous memory corruption vulnerabilities, few, if any, techniques have been proposed for addressing the vulnerabilities or for combating memory corruption attacks. This paper describes a technique for defending against memory corruption attacks by enforcing logical boundaries between potentially hostile data and safe data in protected processes. The technique encrypts all input data using random keys; the encrypted data is stored in main memory and is decrypted according to the principle of least privilege just before it is processed by the CPU. The defensive technique affects the precision with which attackers can corrupt control data and pure data, protecting against code injection and arc injection attacks, and alleviating problems posed by the incomparability of mitigation techniques. An experimental evaluation involving the popular Modbus protocol demonstrates the feasibility and efficiency of the defensive technique.

  17. Automatic Classification of Attacks on IP Telephony

    Directory of Open Access Journals (Sweden)

    Jakub Safarik

    2013-01-01

    Full Text Available This article proposes an algorithm for automatic analysis of attack data in IP telephony network with a neural network. Data for the analysis is gathered from variable monitoring application running in the network. These monitoring systems are a typical part of nowadays network. Information from them is usually used after attack. It is possible to use an automatic classification of IP telephony attacks for nearly real-time classification and counter attack or mitigation of potential attacks. The classification use proposed neural network, and the article covers design of a neural network and its practical implementation. It contains also methods for neural network learning and data gathering functions from honeypot application.

  18. CompChall: Addressing Password Guessing Attacks

    CERN Document Server

    Goyal, Vipul; Singh, Mayank; Abraham, Ajith; Sanyal, Sugata

    2011-01-01

    Even though passwords are the most convenient means of authentication, they bring along themselves the threat of dictionary attacks. Dictionary attacks may be of two kinds: online and offline. While offline dictionary attacks are possible only if the adversary is able to collect data for a successful protocol execution by eavesdropping on the communication channel and can be successfully countered using public key cryptography, online dictionary attacks can be performed by anyone and there is no satisfactory solution to counter them. This paper presents a new authentication protocol which is called CompChall (computational challenge). The proposed protocol uses only one way hash functions as the building blocks and attempts to eliminate online dictionary attacks by implementing a challenge-response system. This challenge-response system is designed in a fashion that it does not pose any difficulty to a genuine user but is time consuming and computationally intensive for an adversary trying to launch a large n...

  19. Performance Evaluation of Wormhole Attack In AODV

    Directory of Open Access Journals (Sweden)

    Samuel Jacob

    2015-02-01

    Full Text Available The Mobile Ad hoc Networks (MANETs is a collection of wireless nodes which interact with each other by sending packets to one another or on behalf of another node, without any central network infrastructure to control data routing. For communication, the nodes cooperatively forward data packets to other nodes in network by using the routing protocol. But, these routing protocols are not secure, thus paving the way for the MANET to be open to malicious attacks. A malicious attack which is commonly observed in MANET environment is wormhole attack. The objective of this work is to analyze the performance parameters of throughput, delay and packet loss in AODV with the existence of wormhole attack. Simulation results have shown that the performance parameters are affected very much when there is an attack due to wormholes.

  20. Use of Attack Graphs in Security Systems

    Directory of Open Access Journals (Sweden)

    Vivek Shandilya

    2014-01-01

    Full Text Available Attack graphs have been used to model the vulnerabilities of the systems and their potential exploits. The successful exploits leading to the partial/total failure of the systems are subject of keen security interest. Considerable effort has been expended in exhaustive modeling, analyses, detection, and mitigation of attacks. One prominent methodology involves constructing attack graphs of the pertinent system for analysis and response strategies. This not only gives the simplified representation of the system, but also allows prioritizing the security properties whose violations are of greater concern, for both detection and repair. We present a survey and critical study of state-of-the-art technologies in attack graph generation and use in security system. Based on our research, we identify the potential, challenges, and direction of the current research in using attack graphs.

  1. SURVEY OF PACKET DROPPING ATTACK IN MANET

    Directory of Open Access Journals (Sweden)

    A.Janani

    2014-03-01

    Full Text Available Mobile Ad-hoc NETwork (MANET is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can communicate with each other if and only if all the nodes are in the same range. This wide distribution of nodes makes MANET vulnerable to various attacks, packet dropping attack or black hole attack is one of the possible attack. It is very hard to detect and prevent. To prevent from packet dropping attack, detection of misbehavior links and selfish nodes plays a vital role in MANETs. In this paper, a omprehensive investigation on detection of misbehavior links and malicious nodes is carried out.

  2. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    . In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...... but not the computation. Such weaker model can still be practically useful and moreover, may provide nice building-blocks to tackle full-fledged tampering in future. In this dissertation we study different models of memory-tampering and provide a number of solutions with different flavors. Mainly we took two different...

  3. Defining 'surveillance' in drug safety.

    Science.gov (United States)

    Aronson, Jeffrey K; Hauben, Manfred; Bate, Andrew

    2012-05-01

    The concept of surveillance in pharmacovigilance and pharmacoepidemiology has evolved from the concept of surveillance in epidemiology, particularly of infectious diseases. We have surveyed the etymology, usages, and previous definitions of 'surveillance' and its modifiers, such as 'active' and 'passive'. The following essential definitional features of surveillance emerge: (i) surveillance and monitoring are different--surveillance involves populations, while monitoring involves individuals; (ii) surveillance can be performed repeatedly and at any time during the lifetime of a medicinal product or device; (iii) although itself non-interventional, it can adduce any types of evidence (interventional, observational, or anecdotal, potentially at different times); (iv) it encompasses data collection, management, analysis, and interpretation; (v) it includes actions to be taken after signal detection, including initial evaluation and communication; and (vi) it should contribute to the classification of adverse reactions and their prevention or mitigation and/or to the harnessing of beneficial effects. We conclude that qualifiers add ambiguity and uncertainty without enhancing the idea of surveillance. We propose the following definition of surveillance of health-care products, which embraces all the surveyed ideas and reflects real-world pharmacovigilance processes: 'a form of non-interventional public health research, consisting of a set of processes for the continued systematic collection, compilation, interrogation, analysis, and interpretation of data on benefits and harms (including relevant spontaneous reports, electronic medical records, and experimental data).' As a codicil, we note that the purposes of surveillance are to identify, evaluate, understand, and communicate previously unknown effects of health-care products, or new aspects of known effects, in order to harness such effects (if beneficial) or prevent or mitigate them (if harmful).

  4. Intelligent multimedia surveillance current trends and research

    CERN Document Server

    Atrey, Pradeep K; Cavallaro, Andrea

    2013-01-01

    Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their behavior, and to detect suspicious or abnormal activities for crime prevention. Despite its benefits, there is societal apprehension regarding the use of such technology, so an important challenge in this research area is to balance public safety and privacy.

  5. Continuous Swarm Surveillance via Distributed Priority Maps

    Science.gov (United States)

    Howden, David

    With recent and ongoing improvements to unmanned aerial vehicle (UAV) endurance and availability, they are in a unique position to provide long term surveillance in risky environments. This paper presents a swarm intelligence algorithm for executing an exhaustive and persistent search of a non-trivial area of interest using a decentralized UAV swarm without long range communication. The algorithm allows for an environment containing arbitrary arrangements of no-fly zones, non-uniform levels of priority and dynamic priority changes in response to target acquisition or external commands. Performance is quantitatively analysed via comparative simulation with another leading algorithm of its class.

  6. An Entropy Architecture for Defending Distributed Denial-of-service Attacks

    Directory of Open Access Journals (Sweden)

    S. K. Srivatsa

    2009-10-01

    Full Text Available The goal of intrusion detection is to identify entities attempting to destabilize the security controls. Network based intrusion detection techniques are used to identify unauthorized, illicit and anomalous behavior based on the network traffic. Identifying the network intruders is the most significant problem for network administrators and network security experts. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. New threats are emerging at an increasing rate. Distributed Denial-of-Service (DDoS attacks have emerged as a popular means of causing mass damage. The impacts of DoS attack will cause greater collateral damage. DoS attacks remain a serious threat to the users, organizations, and infrastructures of the Internet. The approaches used in the existing defense techniques are based on traffic characteristics such as traffic deviation, attack pattern matching etc, which may not yield accurate detection and involves high complexity. In this paper, the router based entropy algorithm has been designed to improve the performance and protection from the distributed denial-of-service attacks. This work includes attack tree construction, attacks detection and clustering of alerts. By calculating the predicted entropy for a router, alerts are raised for flows in which the predicted entropy is more than a threshold value. Then the alerts are grouped into different clusters according to their source, target, time and attack-type. It helps to avoid group redundant alerts and to associate alerts that are of the same nature. By Simulation results, it has been shown that the proposed architecture improves the detection accuracy and throughput while reducing the alert overhead. In this paper, we have explored the current research potential in terms of security, throughput performance of the router and impact of DoS attack technology based on intruder activity and attack tools.

  7. Self-surveillance

    DEFF Research Database (Denmark)

    Albrechtslund, Anders

    coupled with social interaction and sometimes framed as entertainment or games. Facilitated by online community and social networking sites, the possibility of collecting and sharing data is a significant feature of these self-monitoring technologies. They all include sharing features where weight, blood...... pressure, fitness activities, sleep cycles, etc. can be broadcasted, e.g. as tweets on Twitter or status updates on Facebook. Such quantification practices with monitoring technologies become co-producing when individuals constitute themselves as subjects engaging in self-tracking, self-care, and self......, and gamification modulate the enactment of selfhood? How does self-surveillance contribute to corresponding notions of self-optimization and self-cultivation such as “the good life”, “sustainable lifestyle”, “healthy living”, “good learning” and “work productivity”?...

  8. Detection Block Model for SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Diksha G. Kumar

    2014-10-01

    Full Text Available With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers' lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique in which specially crafted input string is entered in user input field. It is submitted to server and result is returned to the user. In SQL injection vulnerability, the database server is forced to execute malicious operations which may cause the data loss or corruption, denial of access, and unauthentic access to sensitive data by crafting specific inputs. An attacker can directly compromise the database, and that is why this is a most threatening web attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project. It is probably the most common Website vulnerability today. Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented across all platforms, or do not cover all types of SQL injection attacks. In this work we implement Message Authentication Code (MAC based solution against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC of static and dynamic queries is compared to detect SQL injection attack.

  9. Drug approval and surveillance.

    Science.gov (United States)

    Potts, M

    1980-01-01

    This article argues that current regulations governing the licensing of drugs, particularly in the U.S., need to be changed and replaced by a system of provisional or conditional licensing and increased postmarketing surveillance of drug use. In terms of research and development of new forms of contraception, this proposal would have great impact. It is believed that the U.S./Food and Drug Administration (FDA) requirements--animal experiments and Phase 1 and 2 clinical trials--not only put an unacceptable financial burden on any institution attempting to develop new contraceptives, but do not demonstrably contribute to the reduction of risks. The author questions whether even if oral contraceptives introduced prior to new U.S./FDA regulations had been subject to these current regulations that convincing evidence would have been found to alert anyone to the now-known rare adverse effects, such as risk of thromboembolism. It is pointed out that these sorts of rare risks were uncovered by continuous screening processes which are not now a part of the FDA drug regulation requirements. The author also questions the politics of "conpulsory safety," such as might be legislated for regulated car safety belt use. Citing a partnership already established between government and private industry in high-risk/low cost ventures in the aerospace industry, the author sees no reason why such a relationship could not evolve in the pharmaceutical industry. In Britain, proposals have been made to establish a fund to compensate patients adversely affected by drugs which pharmaceutical companies would reimburse if proved negligent; such a fund may work in the U.S. under new regulations which stress postmarketing surveillance.

  10. Secure surveillance videotapes

    Energy Technology Data Exchange (ETDEWEB)

    Resnik, W.M.; Kadner, S.P. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Olsen, R.; Chitumbo, K. [International Atomic Energy Agency, Vienna (Austria); Pepper, S. [International Safeguards Project Office, Vienna (Austria)

    1995-12-31

    With assistance from the US Program for Technical Assistance to IAEA Safeguards (POTAS), Aquila Technologies Group developed the Tamper-Resistant Analog Media (TRAM-1000) system to provide standard VHS surveillance video tapes with an enhanced tamper-indicating capability. This project represents further implementation of the partnership approach in facilities including light water reactors with MOX facilities. These facilities use Uniplex Digiquad system video tapes. The partnership approach ensures that one organization can exchange the tapes in a machine without the presence of the other, without losing continuity of information. The TRAM-1000 system development project was accomplished in two stages. In the first stage of the project, the original system delivered to the IAEA, consists of three parts: (1) the tamper detection unit, (2) a specially augmented VHS video tape, and (3) an HP-95 reader. The tamper detection unit houses a VACOSS active fiber-optic seal and an electronic identification tag (E-TAG) reader. In the second stage of the project, the original TRAM-1000 was modified to its current design based on agency input. After delivery of the original TRAM-1000 system to the IAEA, it was reviewed by inspectors. The inspectors felt that the initial system`s tape storage/transport method could be simplified. Rather than threading the fiber through the tape spindles, the inspectors suggested that the tape be placed in a bag capable of being sealed. Also, a more flexible fiber-optic cable was recommended. As a result of these suggestions, Aquila developed a tamper-proof bag specifically for holding a surveillance video tape and sealable with a VACOSS fiber optical seal.

  11. Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes

    Directory of Open Access Journals (Sweden)

    Divya Ann Luke

    2014-06-01

    Full Text Available The wireless networks are more sensitive to the Denial-of-Service (DoS attacks. The existing system is based on Spread Spectrum (SS. This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internalthreat model. A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS. Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole send s IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself

  12. Terrorist Attacks Escalate in Frequency and Fatalities Preceding Highly Lethal Attacks

    Science.gov (United States)

    Martens, Andy; Sainudiin, Raazesh; Sibley, Chris G.; Schimel, Jeff; Webber, David

    2014-01-01

    Highly lethal terrorist attacks, which we define as those killing 21 or more people, account for 50% of the total number of people killed in all terrorist attacks combined, yet comprise only 3.5% of terrorist attacks. Given the disproportionate influence of these incidents, uncovering systematic patterns in attacks that precede and anticipate these highly lethal attacks may be of value for understanding attacks that exact a heavy toll on life. Here we examined whether the activity of terrorist groups escalates–both in the number of people killed per attack and in the frequency of attacks–leading up to highly lethal attacks. Analyses of terrorist attacks drawn from a state-of-the-art international terrorism database (The Global Terrorism Database) showed evidence for both types of escalation leading up to highly lethal attacks, though complexities to the patterns emerged as well. These patterns of escalation do not emerge among terrorist groups that never commit a highly lethal attack. PMID:24755753

  13. EFSA Panel on Animal Health and Welfare (AHAW); Scientific Opinion on bluetongue monitoring and surveillance

    DEFF Research Database (Denmark)

    Stegeman, Arjan; Bøtner, Anette; Savini, Giovanni

    for the purpose of monitoring and surveillance programmes for bluetongue. A systematic literature review and a review of monitoring and surveillance data from European Union Member States was performed in order to estimate the prevalences observed in the Member States. The prevalences observed in areas that have...... there is no scientific evidence that suggests an optimal size of the relevant geographic unit for BTV monitoring and surveillance, since it depends on many factors, including the goal of the surveillance programmes. Early warning based on passive surveillance will take place irrespective of the size of the geographical...... unit but, when based on active surveillance, it is best targeted at regions considered at risk for introduction, using small geographical units, a high sampling frequency and sample size. For estimating the impact of interventions on the prevalence of infected animals, smaller areas result in more...

  14. An Intrusion Detection System Against UDP Flood Attack and Ping of Death Attack (DDOS in MANET

    Directory of Open Access Journals (Sweden)

    Ankur Ashok Acharya

    2016-04-01

    Full Text Available DDoS is one of the serious attacks in the ad hoc network. Among lot many DDoS attacks, UDP flood attack and Ping of death attack are considered to be important as these two attacks may cause severe damage to the network. To provide better security to the network, efficient intrusion detection (IDS system is required to monitor the network continuously, keeping track of malicious activities and policy violations and produce report to the network administrator. UDP flood attack and ping of death attack are given importance in this paper as they are not well addressed in the existing research works. Packet capture and packet decoder is used to identify the packets and retrieve the packet details. A threshold is set for each node that is connected to the network. If the packet flow into the node exceeds the threshold that is set then the administrator is notified about the same.

  15. Dynamic intervention: pathogen disarmament of mitochondrial-based immune surveillance.

    Science.gov (United States)

    Holland, Robin L; Blanke, Steven R

    2014-11-12

    In this issue of Cell Host & Microbe, Suzuki et al. (2014) describe a Vibrio cholerae Type-III-secreted effector that targets mitochondrial dynamics to dampen host innate immune signaling. This suggests that mammalian hosts possess surveillance mechanisms to monitor pathogen-mediated alterations in the integrity of normal cellular processes and organelles.

  16. You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors

    CERN Document Server

    Gong, Neil Zhenqiang

    2016-01-01

    We propose new privacy attacks to infer attributes (e.g., locations, occupations, and interests) of online social network users. Our attacks leverage seemingly innocent user information that is publicly available in online social networks to infer missing attributes of targeted users. Given the increasing availability of (seemingly innocent) user information online, our results have serious implications for Internet privacy -- private attributes can be inferred from users' publicly available data unless we take steps to protect users from such inference attacks. To infer attributes of a targeted user, existing inference attacks leverage either the user's publicly available social friends or the user's behavioral records (e.g., the webpages that the user has liked on Facebook, the apps that the user has reviewed on Google Play), but not both. As we will show, such inference attacks achieve limited success rates. However, the problem becomes qualitatively different if we consider both social friends and behavio...

  17. 基于灰色理论的攻击者攻击能力评估%Attack Ability Evaluation of Attackers Based on Grey Theory

    Institute of Scientific and Technical Information of China (English)

    赵博夫; 殷肖川; 吴传芝

    2011-01-01

    分析网络攻击对目标网络的破坏效果以及攻击者的攻击能力.基于灰色理论,提出一种评估攻击者攻击能力的方法,给出评估的指标体系,对评估准则进行计算.在实际网络中进行攻击实验,结果表明,该评估方法能有效对网络攻击过程中攻击者的攻击能力进行定量评估.%This paper analyzes the attack effect of target network and the ability of attackers, basing on Grey theory, it evaluates the ability of attackers in the process of network attacks.It gives the evaluation index system, and calculates the evaluation criterions.Experimental results in the actual network show that the method can quantitatively evaluates the ability of attacker in the process of network attacks.

  18. Adaptive cyber-attack modeling system

    Science.gov (United States)

    Gonsalves, Paul G.; Dougherty, Edward T.

    2006-05-01

    The pervasiveness of software and networked information systems is evident across a broad spectrum of business and government sectors. Such reliance provides an ample opportunity not only for the nefarious exploits of lone wolf computer hackers, but for more systematic software attacks from organized entities. Much effort and focus has been placed on preventing and ameliorating network and OS attacks, a concomitant emphasis is required to address protection of mission critical software. Typical software protection technique and methodology evaluation and verification and validation (V&V) involves the use of a team of subject matter experts (SMEs) to mimic potential attackers or hackers. This manpower intensive, time-consuming, and potentially cost-prohibitive approach is not amenable to performing the necessary multiple non-subjective analyses required to support quantifying software protection levels. To facilitate the evaluation and V&V of software protection solutions, we have designed and developed a prototype adaptive cyber attack modeling system. Our approach integrates an off-line mechanism for rapid construction of Bayesian belief network (BN) attack models with an on-line model instantiation, adaptation and knowledge acquisition scheme. Off-line model construction is supported via a knowledge elicitation approach for identifying key domain requirements and a process for translating these requirements into a library of BN-based cyber-attack models. On-line attack modeling and knowledge acquisition is supported via BN evidence propagation and model parameter learning.

  19. Utilizing Probabilistic Linear Equations in Cube Attacks

    Institute of Scientific and Technical Information of China (English)

    Yuan Yao; Bin Zhang; Wen-Ling Wu

    2016-01-01

    Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of cube attacks. Moreover, cube attacks are hard to apply if linear equations are rare. Therefore, it is of significance to make use of probabilistic linear equations, namely nonlinear superpolys that can be approximated by linear expressions effectively. In this paper, we suggest a way to test out and utilize these probabilistic linear equations, thus extending cube attacks to a wider scope. Concretely, we employ the standard parameter estimation approach and the sequential probability ratio test (SPRT) for linearity test in the preprocessing phase, and use maximum likelihood decoding (MLD) for solving the probabilistic linear equations in the online phase. As an application, we exhibit our new attack against 672 rounds of Trivium and reduce the number of key bits to search by 7.

  20. Rotational Rebound Attacks on Reduced Skein

    DEFF Research Database (Denmark)

    Khovratovich, Dmitry; Nikolic, Ivica; Rechberger, Christian

    2010-01-01

    In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approac...... inside-out computations and neutral bits in the inbound phase of the rebound attack, and give well-defined rotational distinguishers as certificates of weaknesses for the compression functions and block ciphers.......In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied to AES-like constructions. For the first time, we show that this approach...... and the Threefish cipher. The new techniques include an analytical search for optimal input values in the rotational cryptanalysis, which allows to extend the outbound phase of the attack with a precomputation phase, an approach never used in any rebound-style attack before. Further we show how to combine multiple...

  1. Mixed-Signal Hardware Security: Attacks and Countermeasures for ΔΣ ADC

    Directory of Open Access Journals (Sweden)

    Shayan Taheri

    2017-08-01

    Full Text Available Mixed-signal integrated circuits (ICs play an eminent and critical role in design and development of the embedded systems leveraged within smart weapons and military systems. These ICs can be a golden target for adversaries to compromise in order to function maliciously. In this work, we study the security aspects of a tunnel field effect transistor (TFET-based first-order one-bit delta-sigma ( Δ Σ analog to digital converter (ADC through proposing four attack and one defense models. The first attack manipulates the input signal to the Δ Σ modulator. The second attack manipulates the analog version of the modulator output bit and is triggered by the noise signal. The third attack manipulates the modulator output bit and has a controllable trigger mechanism. The fourth attack manipulates the analog version of the modulator output bit and is triggered by a victim capacitance within the chip. For the defense, a number of signal processing filters are used in order to purge the analog version of the modulator output bit for elimination of the malicious unwanted features, introduced by the attacks. According to the simulation results, the second threat model displays the strongest attack. Derived from the countermeasure evaluation, the best filter to confront the threat models is the robust regression using the least absolute residual computing method.

  2. Optimal space-time attacks on system state estimation under a sparsity constraint

    Science.gov (United States)

    Lu, Jingyang; Niu, Ruixin; Han, Puxiao

    2016-05-01

    System state estimation in the presence of an adversary that injects false information into sensor readings has attracted much attention in wide application areas, such as target tracking with compromised sensors, secure monitoring of dynamic electric power systems, secure driverless cars, and radar tracking and detection in the presence of jammers. From a malicious adversary's perspective, the optimal strategy for attacking a multi-sensor dynamic system over sensors and over time is investigated. It is assumed that the system defender can perfectly detect the attacks and identify and remove sensor data once they are corrupted by false information injected by the adversary. With this in mind, the adversary's goal is to maximize the covariance matrix of the system state estimate by the end of attack period under a sparse attack constraint such that the adversary can only attack the system a few times over time and over sensors. The sparsity assumption is due to the adversary's limited resources and his/her intention to reduce the chance of being detected by the system defender. This becomes an integer programming problem and its optimal solution, the exhaustive search, is intractable with a prohibitive complexity, especially for a system with a large number of sensors and over a large number of time steps. Several suboptimal solutions, such as those based on greedy search and dynamic programming are proposed to find the attack strategies. Examples and numerical results are provided in order to illustrate the effectiveness and the reduced computational complexities of the proposed attack strategies.

  3. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  4. Detection of Variations of Local Irregularity of Traffic under DDOS Flood Attack

    Directory of Open Access Journals (Sweden)

    Ming Li

    2008-01-01

    Full Text Available The aim of distributed denial-of-service (DDOS flood attacks is to overwhelm the attacked site or to make its service performance deterioration considerably by sending flood packets to the target from the machines distributed all over the world. This is a kind of local behavior of traffic at the protected site because the attacked site can be recovered to its normal service state sooner or later even though it is in reality overwhelmed during attack. From a view of mathematics, it can be taken as a kind of short-range phenomenon in computer networks. In this paper, we use the Hurst parameter (H to measure the local irregularity or self-similarity of traffic under DDOS flood attack provided that fractional Gaussian noise (fGn is used as the traffic model. As flood attack packets of DDOS make the H value of arrival traffic vary significantly away from that of traffic normally arriving at the protected site, we discuss a method to statistically detect signs of DDOS flood attacks with predetermined detection probability and false alarm probability.

  5. Time series modeling for syndromic surveillance

    Directory of Open Access Journals (Sweden)

    Mandl Kenneth D

    2003-01-01

    Full Text Available Abstract Background Emergency department (ED based syndromic surveillance systems identify abnormally high visit rates that may be an early signal of a bioterrorist attack. For example, an anthrax outbreak might first be detectable as an unusual increase in the number of patients reporting to the ED with respiratory symptoms. Reliably identifying these abnormal visit patterns requires a good understanding of the normal patterns of healthcare usage. Unfortunately, systematic methods for determining the expected number of (ED visits on a particular day have not yet been well established. We present here a generalized methodology for developing models of expected ED visit rates. Methods Using time-series methods, we developed robust models of ED utilization for the purpose of defining expected visit rates. The models were based on nearly a decade of historical data at a major metropolitan academic, tertiary care pediatric emergency department. The historical data were fit using trimmed-mean seasonal models, and additional models were fit with autoregressive integrated moving average (ARIMA residuals to account for recent trends in the data. The detection capabilities of the model were tested with simulated outbreaks. Results Models were built both for overall visits and for respiratory-related visits, classified according to the chief complaint recorded at the beginning of each visit. The mean absolute percentage error of the ARIMA models was 9.37% for overall visits and 27.54% for respiratory visits. A simple detection system based on the ARIMA model of overall visits was able to detect 7-day-long simulated outbreaks of 30 visits per day with 100% sensitivity and 97% specificity. Sensitivity decreased with outbreak size, dropping to 94% for outbreaks of 20 visits per day, and 57% for 10 visits per day, all while maintaining a 97% benchmark specificity. Conclusions Time series methods applied to historical ED utilization data are an important tool

  6. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  7. Review Paper on Flooding Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ruchita Meher,

    2014-01-01

    Full Text Available Mobile ad-hoc network (MANET is widely applicable in various areas like military services, civilian environments and emergency operations. The issues in MANET are broadcasting, clustering, mobility management, bandwidth management and power management. Broadcasting becomes an important issue in MANET for route information discovery. The different routing attacks in MANET are flooding, black hole, link spoofing and wormhole attack. In this paper we are representing works proposed by various author on flooding attack. Our contribution in this paper is that we have presented details comparison of various counter based schemes.

  8. Measuring a System’s Attack Surface

    Science.gov (United States)

    2004-01-01

    fold: • In terms of a state machine model of the system, we present formal definitions of attack, attack surface, and attack class. Our definitions are...versions. The rest of this paper is organized as follows. In Section 2, we introduce our state machine model and point out the key differences from...approach in Section 6 and compare it to related work in Section 7. We conclude in Section 8. 2 State Machine Model We use a state machine to model the

  9. FAST CORRELATION ATTACKS ON BLUETOOTH COMBINER

    Institute of Scientific and Technical Information of China (English)

    Ma Weiju; Feng Dengguo

    2006-01-01

    A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper.This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream. The result is less time-consuming than before. It is also shown that the security of the modified Bluetooth combiner by Hermelin and Nyberg is not significantly enhanced.

  10. What Are the Symptoms of a Heart Attack?

    Science.gov (United States)

    ... from the NHLBI on Twitter. What Are the Symptoms of a Heart Attack? Not all heart attacks ... symptoms are called silent heart attacks. Most Common Symptoms The most common warning symptoms of a heart ...

  11. Mechanism Analysis of Air Surveillance Radar Network System Dense False Target Jamming%对空情报雷达网密集假目标干扰机理分析

    Institute of Scientific and Technical Information of China (English)

    赵源; 熊英; 唐斌

    2015-01-01

    针对雷达网欺骗干扰问题,首先讨论了雷达网数据关联处理方法薄弱环节,给出了可以欺骗雷达网的假目标应该满足的条件,然后分析对空情报雷达网密集假目标干扰的产生机理和作用机理,为产生高逼真的假目标,将空间分布转化为非线性最优化问题. 当进行多干扰机协同干扰时,将干扰机功率资源在空间的分配问题转化为非线性规划问题. 仿真研究了对网络化雷达的假目标欺骗干扰效果以及影响干扰效果的因素,该结果可为对空情报雷达网电子对抗提供理论指导.%The weakness of data processing algorithms for radar network is discussed,requirements of false targets for combating the victim radar network is given. Then the mechanism of dense false target jamming against radar network is analyzed. The false target distribution is transformed into a nonlinear optimization in order to generate the false target acting like a real target. For multiple jammers scenario,power resource allocation is turned into a nonlinear programming. The effectiveness of jamming is simulated and the influ-ence factors are studied. This research will provide a theoretical guidance for the radar network electronic countermeasure( ECM) .

  12. Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals

    Directory of Open Access Journals (Sweden)

    Xiapu Luo

    2009-01-01

    Full Text Available This paper addresses the important problem of detecting pulsing denial of service (PDoS attacks which send a sequence of attack pulses to reduce TCP throughput. Unlike previous works which focused on a restricted form of attacks, we consider a very broad class of attacks. In particular, our attack model admits any attack interval between two adjacent pulses, whether deterministic or not. It also includes the traditional flooding-based attacks as a limiting case (i.e., zero attack interval. Our main contribution is Vanguard, a new anomaly-based detection scheme for this class of PDoS attacks. The Vanguard detection is based on three traffic anomalies induced by the attacks, and it detects them using a CUSUM algorithm. We have prototyped Vanguard and evaluated it on a testbed. The experiment results show that Vanguard is more effective than the previous methods that are based on other traffic anomalies (after a transformation using wavelet transform, Fourier transform, and autocorrelation and detection algorithms (e.g., dynamic time warping.

  13. Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses

    Directory of Open Access Journals (Sweden)

    Stephen Herzog

    2011-01-01

    Full Text Available In April 2007, the Estonian Government moved a memorial commemorating the Soviet liberation of the country from the Nazis to a less prominent and visible location in Tallinn. This decision triggered rioting among Russian-speaking minorities and cyber terrorism targeting Estonia's critical economic and political infrastructure. Drawing upon the Estonian cyber attacks, this article argues that globalization and the Internet have enabled transnational groups—such as the Russian diaspora—to avenge their grievances by threatening the sovereignty of nation-states in cyberspace. Sophisticated and virtually untraceable political "hacktivists" may now possess the ability to disrupt or destroy government operations, banking transactions, city power grids, and even military weapon systems. Fortunately, western countries banded together to effectively combat the Estonian cyber attacks and minimize their effects. However, this article concludes that in the age of globalization, interdependence, and digital interconnectedness, nation-states must engage in increased cooperative cyber-defense activities to counter and prevent devastating Internet attacks and their implications.

  14. Runtime Monitoring Technique to handle Tautology based SQL Injection Attacks

    Directory of Open Access Journals (Sweden)

    Ramya Dharam

    2015-05-01

    Full Text Available Software systems, like web applications, are often used to provide reliable online services such as banking, shopping, social networking, etc., to users. The increasing use of such systems has led to a high need for assuring confidentiality, integrity, and availability of user data. SQL Injection Attacks (SQLIAs is one of the major security threats to web applications. It allows attackers to get unauthorized access to the back-end database consisting of confidential user information. In this paper we present and evaluate a Runtime Monitoring Technique to detect and prevent tautology based SQLIAs in web applications. Our technique monitors the behavior of the application during its post- deployment to identify all the tautology based SQLIAs. A framework called Runtime Monitoring Framework, that implements our technique, is used in the development of runtime monitors. The framework uses two pre-deployment testing techniques, such as basis-path and data-flow to identify a minimal set of all legal/valid execution paths of the application. Runtime monitors are then developed and integrated to perform runtime monitoring of the application, during its post-deployment for the identified valid/legal execution paths. For evaluation we targeted a subject application with a large number of both legitimate inputs and illegitimate tautology based inputs, and measured the performance of the proposed technique. The results of our study show that runtime monitor developed for the application was successfully able to detect all the tautology based attacks without generating any false positives.

  15. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  16. The Derivation and Use of a Scalable Model for Network Attack Identification and Path Prediction

    Directory of Open Access Journals (Sweden)

    Sanjeeb Nanda

    2008-04-01

    Full Text Available The rapid growth of the Internet has triggered an explosion in the number of applications that leverage its capabilities. Unfortunately, many are designed to burden or destroy the capabilities of their peers and the network's infrastructure. Hence, considerable effort has been focused on detecting and predicting the security breaches they propagate. However, the enormity of the Internet poses a formidable challenge to analyzing such attacks using scalable models. Furthermore, the lack of complete information on network vulnerabilities makes forecasting the systems that may be exploited by such applications in the future very hard. This paper presents a technique for deriving a scalable model for representing network attacks, and its application to identify actual attacks with greater certainty amongst false positives and false negatives. It also presents a method to forecast the propagation of security failures proliferated by an attack over time and its likely targets in the future.

  17. A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks

    CERN Document Server

    Padmavathi, Dr G

    2009-01-01

    Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.

  18. Youth Risk Behavior Surveillance System

    Science.gov (United States)

    ... Evaluation FAQs Additional Evaluation Resources Health & Academics Anti-Bullying Policies and Enumeration: An Infobrief for Local Education ... Youth Risk Behavior Surveillance System (YRBSS) monitors six types of health-risk behaviors that contribute to the ...

  19. Radioisotopic Thermoelectric Generator (RTG) Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Mulford, Roberta Nancy [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-29

    This lecture discusses stockpile stewardship efforts and the role surveillance plays in the process. Performance of the RTGs is described, and the question of the absence of anticipated He is addressed.

  20. Cyber surveillance for flood disasters

    National Research Council Canada - National Science Library

    Lo, Shi-Wei; Wu, Jyh-Horng; Lin, Fang-Pang; Hsu, Ching-Han

    2015-01-01

    ... river areas and sections. Therefore, in this paper, we propose an easy method to automatically monitor the flood object of a specific area, based on the currently widely used remote cyber surveillance systems and image...

  1. Airport Surveillance Radar : Model 8 -

    Data.gov (United States)

    Department of Transportation — The Airport Surveillance Radar Model 8 (ASR-8) is a short-range (60 nautical mile (nmi)), analog radar system used to detect and report the presence and location of...

  2. Airport Surveillance Radar : Model 7 -

    Data.gov (United States)

    Department of Transportation — The Airport Surveillance Radar Model 7 (ASR-7) is a short-range (60 nautical miles (nmi)) analog radar system used to detect and report the presence and location of...

  3. Surveillance of rotavirus diarrhea

    Directory of Open Access Journals (Sweden)

    Titis Widowati

    2012-01-01

    Full Text Available Background Rotavirus is a major cause of severe diarrhea and dehydration in children worldwide. Data on the burden of disease in Indonesia is limited. Objective To provide an epidemiological profile of rotavirus infection among children hospitalized for diarrhea in Mohammad Hoesin Hospital, Palembang. Methods In January - December 2006, a prospective, hospital-based surveillance was carried out in children aged less than five years, presenting with diarrhea. Stool samples were examined for rotavirus using enzyme immunoassay (EIA. G- and P-typing were performed on specimens confirmed to be positive by EIA. Results A total of 513 fecal specimens from 534 children were tested for rotavirus. Rotavirus was detected in 64% of the specimens, mostly of the G9 type (62.5%. Incidence of rotavirus diarrhea was highest in the 6 month to 2 years age group (60.4%. Children with rotavirus diarrhea were more likely to present with dehydration, compared to those with non-rotavirus diarrhea (94% vs 70%, respectively, P=0.03. Conclusion Rotavirus was the most common pathogen found in children with diarrhea. Rotavirus was detected in 64% of pediatric diarrheal specimens tested in our study. This finding warrants the use of a large-scale program to prevent disease, such as vaccination against rotavirus. [Paediatr Indones. 2012;52:22-7].

  4. Taxonomy of SSL/TLS Attacks

    Directory of Open Access Journals (Sweden)

    Keerthi Vasan K.

    2016-02-01

    Full Text Available Secure Socket Layer (SSL and Transport Layer Security (TLS protocols use cryptographic algorithms to secure data and ensure security goals such as Data Confidentiality and Integrity in networking. They are used along with other protocols such as HTTP, SMTP, etc. in applications such as web browsing, electronic mail, and VoIP. The existing versions of the protocols as well as the cryptographic algorithms they use have vulnerabilities and is not resistant towards Man-In-The- Middle (MITM attacks. Exploiting these vulnerabilities, several attacks have been launched on SSL/TLS such as session hijacking, version degradation, heart bleed, Berserk etc. This paper is a comprehensive analysis of the vulnerabilities in the protocol, attacks launched by exploiting the vulnerabilities and techniques to mitigate the flaws in protocols. A novel taxonomy of the attacks against SSL/TLS has been proposed in this paper.

  5. Twisted Polynomials and Forgery Attacks on GCM

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed A. M. A.; Beelen, Peter; Bogdanov, Andrey;

    2015-01-01

    nonce misuse resistance, such as POET. The algebraic structure of polynomial hashing has given rise to security concerns: At CRYPTO 2008, Handschuh and Preneel describe key recovery attacks, and at FSE 2013, Procter and Cid provide a comprehensive framework for forgery attacks. Both approaches rely...... heavily on the ability to construct forgery polynomials having disjoint sets of roots, with many roots (“weak keys”) each. Constructing such polynomials beyond naïve approaches is crucial for these attacks, but still an open problem. In this paper, we comprehensively address this issue. We propose to use...... in an improved key recovery algorithm. As cryptanalytic applications of our twisted polynomials, we develop the first universal forgery attacks on GCM in the weak-key model that do not require nonce reuse. Moreover, we present universal weak-key forgeries for the nonce-misuse resistant AE scheme POET, which...

  6. Outdoor Air Pollution, Heart Attack and Stroke

    Science.gov (United States)

    Elevated outdoor ambient air particle pollution triggers heart attacks, strokes, and abnormal heart rhythms and worsens heart failure in individuals at high risk due to underlying medical conditions. Emergency Medical Services in communities are the first responders to these eme...

  7. Diabetes - preventing heart attack and stroke

    Science.gov (United States)

    Diabetes complications - heart; Coronary artery disease - diabetes; CAD - diabetes; Cerebrovascular disease - diabetes ... People with diabetes have a higher chance of having heart attacks and strokes. Smoking and having high blood pressure and high ...

  8. Performance Evaluation of AODV under Blackhole Attack

    National Research Council Canada - National Science Library

    Tarunpreet Bhatia; A K Verma

    2013-01-01

    .... This paper simulates one of the most malicious behaviors known as blackhole attack. The blackhole node creates forged reply, advertising valid and fresh route to destination and thereafter drops data packets maliciously...

  9. Uncertainties of a preemptive nuclear attack

    Energy Technology Data Exchange (ETDEWEB)

    Bunn, M.; Tsipis, K.

    1983-11-01

    The deterrence of nuclear war requires that nuclear forces not be vulnerable to a preemptive disarming attack that would preclude retaliation. The uncertainties surrounding a countersilo attack stem from incomplete intelligence information about the accuracy of weapons delivery due to errors in the inertial-guidance system and those associated with reentry into the atmosphere. An analyses of these uncertainties examines the results of test flights and calculations based on simulations that consider the problems of fratricide, estimates of yield, and a number of other technical uncertainties that are overshadowed by the uncertainty of whether the nation under attack would respond with launch-on-warning or launch-under-attack. The analysis concludes that, despite a current level of stability, the progress of weapons technology bodes ill for the future unless stringent testing and deployment limitations are imposed. 6 figures, 1 table. (DCK)

  10. Thatcher condemns attacks on abortion mp.

    Science.gov (United States)

    1987-12-19

    The Prime Minister, Mrs Margaret Thatcher, has stepped in to condemn a series of violent attacks on Liberal MP David Alton who is trying to reduce the [Illegible word] limit on abortions from 28 to 18 weeks.

  11. Identifying and Analyzing Web Server Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-08-29

    Abstract: Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.

  12. Women's Heart Disease: Heart Attack Symptoms

    Science.gov (United States)

    ... this page please turn JavaScript on. Feature: Women's Heart Disease Heart Attack Symptoms Past Issues / Winter 2014 Table ... NHLBI has uncovered some of the causes of heart diseases and conditions, as well as ways to prevent ...

  13. The role of sleep in migraine attacks

    Directory of Open Access Journals (Sweden)

    Elaine Inamorato

    1993-11-01

    Full Text Available Migraine attacks may be precipitated by sleep deprivation or excessive sleep and sleep is also associated with relief of migraine attacks. In view of this variable relationship we studied the records of 159 consecutive outpatients of our Headache Unit. In 121 records there was reference to sleep involvement, in 55% by a single form and in 45% by more than one form. When only one form was related, relief was most common (70%. 30% of that group of patients had the migraine attack precipitated by sleep, 24% by deprivation and 6% by sleep excess. When the effects of sleep were multiple, these effects were as expected logically in 65%: «in accordance» group (e.g attack precipitated by sleep deprivation and relieved by sleep onset. In a second group, («conflicting» where the involvement was not logical, there were three different combinations of sleep involvement, possibly due to more than one pathophysiological mechanism.

  14. Longest-path attacks on complex networks

    CERN Document Server

    Pu, Cunlai

    2014-01-01

    We investigate the longest-path attacks on complex networks. Specifically, we remove approximately the longest simple path from a network iteratively until there are no paths left in the network. We propose two algorithms, the random augmenting approach (RPA) and the Hamilton-path based approach (HPA), for finding the approximately longest simple path in a network. Results demonstrate that steps of longest-path attacks increase with network density linearly for random networks, while exponentially increasing for scale-free networks. The more homogeneous the degree distribution is, the more fragile the network, which is totally different from the previous results of node or edge attacks. HPA is generally more efficient than RPA in the longest-path attacks of complex networks. These findings further help us understand the vulnerability of complex systems, better protect complex systems, and design more tolerant complex systems.

  15. Study Shows How Zika Attacks Infant Brain

    Science.gov (United States)

    ... gov/news/fullstory_162514.html Study Shows How Zika Attacks Infant Brain Virus can copy itself thousands ... New research paints a chilling portrait of how Zika ravages the infant brain. Scientists from the U.S. ...

  16. A NEW METHOD FOR RESYNCHRONIZATION ATTACK

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(217), and that of O(267) for LILI-128.

  17. Using agility to combat cyber attacks.

    Science.gov (United States)

    Anderson, Kerry

    2017-06-01

    Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

  18. SECURING MANET FROM BLACKHOLE AND WORMHOLE ATTACKS

    Directory of Open Access Journals (Sweden)

    C.M.Vidhyapathi

    2013-06-01

    Full Text Available Mobile Ad-Hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV(Ad hoc On-demand Distance Vector Routing Protocol. Blackhole and Wormhole nodes are malicious nodeswhich degrade the performance of the network. They actively participate in the network and conform to forward packets to the destination. The Watchdog Mechanism is used to correct the network from both blackhole and wormhole attacks. The networks originally, with the attacks and after being prevented from attacks are compared on the basis of packets received, throughput, end-to-end delay and packet delivery ratio. ns2 software is used for the simulation.

  19. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  20. Prevention of Routing Attacks In Manet

    Directory of Open Access Journals (Sweden)

    N.Rajesh

    2013-01-01

    Full Text Available Mobile Ad hoc Networks (MANET are easily prone to attacks due to its network infrastructure. In previous routing attacks the malicious node is isolated using naive fuzzy response decisions. In this paper a new technology of broadcasting the awareness information about attacker node to all the existing nodes in the network is discussed. The awareness approach is based on an extended Dempster-Shafer mathematical theory(D-S Theory. Dempster-Shafer mathematical theory is used to collect the evidence notion of importance factors. The adaptiveness of the mechanism allows to systematically cope with the identified MANET routing attacks. The intrusion response action in MANET was addressed by isolating uncooperative nodes based on the node reputation derived from their behaviors. Here the effectiveness of the approach with the consideration of the packet delivery ratio and routing cost were demonstrated using java swing concepts

  1. Sensors for Screening and Surveillance

    Energy Technology Data Exchange (ETDEWEB)

    Dye, D.H.

    2002-03-05

    Much attention, in fact an entire session at this conference, is being devoted to protecting the United States against human threats--individuals who may pose a danger by their mere presence on US soil. However, tomorrow's terrorists will employ weapons in their attacks, and we must also be diligent in preventing these weapons from reaching their targets. Sensors can play an important role in detecting these weapons before they achieve their desired effects. A sensor system can best be understood as a way of automating search techniques that would normally be carried out by a human's touch and vision senses, or by a dog's sniffing capabilities. The list of potential threats is long, including nuclear, biological, chemical and radiological weapons, and each presents its own challenges. However, any effective system must meet the following requirements: (1) Sensor systems must be operationally practical. Delays must be kept to a minimum. The systems must be safe to operate. Individual privacy and corporate proprietary information must be protected. The systems must be part of a viable concept of operations; i.e., they must provide information that can enable effective, preemptive actions to be taken. (2) Sensors systems must be highly sensitive, providing a low probability of missed detections (false negatives). Our adversaries will conceal their device from detection, and they will likely probe our defenses for any weaknesses. Our systems must be robust against these techniques. (3) Sensor systems must give a low probability of false alarms (false positives). Our response to the detection of such a weapon will marshal substantial resources and, in many scenarios, be highly disruptive to the general population. Thus a system that gives frequent false alarms will soon be ignored.

  2. Public Health Disease Surveillance Networks.

    Science.gov (United States)

    Morse, Stephen S

    2014-02-01

    Zoonotic infections are important sources of human disease; most known emerging infections are zoonotic (e.g., HIV, Ebola virus, severe acute respiratory syndrome, Nipah virus, and enteropathogenic Escherichia coli) and originated as natural infections of other species that acquired opportunities to come in contact with humans. There are also serious infectious diseases classically considered zoonotic, such as influenza, rabies, bubonic plague, brucellosis, and leptospirosis. More recently, it has been recognized that wildlife constitutes a particularly important source of novel zoonoses. With all this microbial movement, surveillance is considered the first line of public health defense. The zoonotic origin of many human and livestock infections argues strongly for the synergistic value of a One Health approach, which provides the capability to identify pathogens crossing into new species and could provide earlier warning of potential epidemics. This article discusses public health surveillance and major recent surveillance initiatives and reviews progress toward implementing a One Health surveillance framework. Networks discussed include global intergovernmental organizations and recent combined efforts of these organizations; Web-based nongovernmental systems (e.g., ProMED, the Program for Monitoring Emerging Diseases); and networks of bilateral or multilateral government programs (e.g., the CDC's Global Disease Detection [GDD] platform; the U.S. Department of Defense's Global Emerging Infections Surveillance and Response System [GEIS]; regional and subregional networks; and the U.S. Agency for International Development's Emerging Pandemic Threats [EPT] program and its surveillance component, PREDICT). Syndromic surveillance also has potential to complement existing systems. New technologies are enabling revolutionary capabilities for global surveillance, but in addition to serious technical needs, both sustainability and data-sharing mechanisms remain

  3. Development of the Observational Surveillance

    OpenAIRE

    Rieutort, Delphine

    2015-01-01

    Impact of population on the environment, and conversely, is obvious and represents a real challenge for Public Health since 2000. It has been shown an increase in cancer prevalence, respiratory disease or even reproductive disorders, for which multifactorial origins are strongly suspected. In this context, surveillance has become an essential tool to decision making in public health, and surveillance networks of health events are multiplying, giving rise to numerous databases (sometimes consi...

  4. Occupational Surveillance for Spaceflight Exposures

    Science.gov (United States)

    Tarver, William J.

    2010-01-01

    This slide presentation reviews the importance of longterm occupational health surveillance of astronauts after exposure to the possible hazards of spaceflight. Because there is not much information about long term effects of spaceflight on human health, it is important to identify some of the possible results of exposure to the many possible factors that can influence longterm health impacts. This surveillance also allows for NASA to meet the obligation to care for the astronauts for their lifetime.

  5. Surface Environmental Surveillance Procedures Manual

    Energy Technology Data Exchange (ETDEWEB)

    RW Hanf; TM Poston

    2000-09-20

    Environmental surveillance data are used in assessing the impact of current and past site operations on human health and the environment, demonstrating compliance with applicable local, state, and federal environmental regulations, and verifying the adequacy of containment and effluent controls. SESP sampling schedules are reviewed, revised, and published each calendar year in the Hanford Site Environmental Surveillance Master Sampling Schedule. Environmental samples are collected by SESP staff in accordance with the approved sample collection procedures documented in this manual.

  6. Randomized, controlled trial of telcagepant over four migraine attacks

    DEFF Research Database (Denmark)

    Ho, Andrew P; Dahlöf, Carl Gh; Silberstein, Stephen D

    2010-01-01

    This study evaluated the calcitonin gene-related peptide (CGRP) receptor antagonist telcagepant (tablet formulation) for treatment of a migraine attack and across four attacks. Adults with migraine were randomized, double-blind, to telcagepant 140 mg, telcagepant 280 mg, or control treatment...... sequences to treat four moderate-to-severe migraine attacks. Control patients received placebo for three attacks and telcagepant 140 mg for one attack. Efficacy for the first attack (Attack 1) and consistency of efficacy over multiple attacks were assessed. For an individual patient, consistent efficacy...

  7. To mitigate Black-hole attack with CBDS in MANET

    Directory of Open Access Journals (Sweden)

    Navjot

    2015-06-01

    Full Text Available Mobile ad-hoc network is self configured network that consist of mobile nodes which communicate with each other. Distributed self-organized nature of this network makes it venerable to various attacks likes DOS attack, Black hole attack, wormhole attack and jamming attack etc. Blackhole attack is one of the serious attack in network in which information loss occur which degrades the performance of network. In this work black hole attack is detected with the help of CBDS (cooperative Bait Detection Algorithm and MD5 is used for the security purpose. This work is implemented in Network simulator and performance is checked on the bases of network parameters.

  8. Security of Linear Secret-Sharing Schemes Against Mass Surveillance

    DEFF Research Database (Denmark)

    Giacomelli, Irene; Olimid, Ruxandra; Ranellucci, Samuel

    2015-01-01

    Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is widely used to design IT systems in the modern computer world, and often it is implemented by a prop......Following the line of work presented recently by Bellare, Paterson and Rogaway, we formalize and investigate the resistance of linear secret-sharing schemes to mass surveillance. This primitive is widely used to design IT systems in the modern computer world, and often it is implemented...... by a proprietary code that the provider (“big brother”) could manipulate to covertly violate the privacy of the users (by implementing Algorithm-Substitution Attacks or ASAs). First, we formalize the security notion that expresses the goal of big brother and prove that for any linear secret-sharing scheme...... there exists an undetectable subversion of it that efficiently allows surveillance. Second, we formalize the security notion that assures that a sharing scheme is secure against ASAs and construct the first sharing scheme that meets this notion....

  9. Heart Attack Prediction System Based Neural Arbitration

    OpenAIRE

    Helwan, Abdulkader

    2015-01-01

    Heart attack is an asymptomatic and epidemic medical condition that may suddenly occur and causes “death”. Therefore, it is a life-threatening condition and it should be detected before it occurs. Heart attack is so far predicted using the conventional ways of doctor’s examination and by performing some medical tests such as stress test, ECG, and heart CTScan etc. The coronary vessels constriction, the cholesterol levels in the arteries, and other attributes can be good indicators for making ...

  10. Cyber Security Audit and Attack Detection Toolkit

    Energy Technology Data Exchange (ETDEWEB)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  11. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

    Institute of Scientific and Technical Information of China (English)

    Gao-Li Wang

    2013-01-01

    The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions,which consist of two parallel branches.Extended MD4 was proposed by Rivest in 1990,and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation,1988~1992).On the basis of differential analysis and meet-in-the-middle attack principle,this paper proposes a collision attack on the full Extended MD4 and a pseudo-preimage attack on the full RIPEMD respectively.The collision attack on Extended MD4 holds with a complexity of 237,and a collision instance is presented.The pseudo-preimage attack on RIPEMD holds with a complexity of 2125,4,which optimizes the complexity order for brute-force attack.The results in this study will also be beneficial to the analysis of other double-branch hash functions such as RIPEMD-160.

  12. [Infectious disease surveillance in Miyagi after the Great East Japan Earthquake].

    Science.gov (United States)

    Kim, Mihyun; Kamigaki, Taro; Mimura, Satoshi; Oshitani, Hitoshi

    2013-10-01

    The Great East Japan Earthquake, which occurred on March 11, 2011, damaged many health facilities and compelled many inhabitants to live in evacuation centers. For the purpose of monitoring infectious disease outbreaks, infectious disease surveillance targeted at evacuation centers was established in Miyagi Prefecture. In this study, we summarized the monitoring activities of infectious diseases through this surveillance after the earthquake. Infectious disease surveillance was implemented from March 18 to November 6, 2011. The surveillance consisted of two phases (hereafter, surveillance 1 and 2) reflecting the difference in frequencies of reporting as well as the number of targeted diseases. Surveillance 1 operated between March 18 and May 13, 2011, and Surveillance 2 operated between May 10 and November 6, 2011. We reviewed the number of cases reported, the number of evacuation centers, and demographic information of evacuees with the surveillance. In Surveillance 1, there were 8,737 reported cases; 84% of them were acute respiratory symptoms, and 16% were acute digestive symptoms. Only 4.4% of evacuation centers were covered by the surveillance one week after the earthquake. In Surveillance 2, 1,339 cases were reported; 82% of them were acute respiratory symptoms, and 13% were acute digestive symptoms. Surveillance 2 revealed that the proportion of children aged 5 years and younger was lower than that of other age groups in all targeted diseases. No particular outbreaks were detected through those surveillances. Infectious disease surveillance operated from one week after the earthquake to the closure of all evacuation centers in Miyagi Prefecture. No outbreaks were detected in that period. However, low coverage of evacuation centers just after the earthquake as well as skewed frequencies of reported syndromes draw attention to the improvement of the early warning system. It is important to coordinate with the medical aid team that visits the evacuation centers

  13. Modeling Resources Allocation in Attacker-Defender Games with "Warm Up" CSF.

    Science.gov (United States)

    Guan, Peiqiu; Zhuang, Jun

    2016-04-01

    Like many other engineering investments, the attacker's and defender's investments may have limited impact without initial capital to "warm up" the systems. This article studies such "warm up" effects on both the attack and defense equilibrium strategies in a sequential-move game model by developing a class of novel and more realistic contest success functions. We first solve a single-target attacker-defender game analytically and provide numerical solutions to a multiple-target case. We compare the results of the models with and without consideration of the investment "warm up" effects, and find that the defender would suffer higher expected damage, and either underestimate the attacker effort or waste defense investment if the defender falsely believes that no investment "warm up" effects exist. We illustrate the model results with real data, and compare the results of the models with and without consideration of the correlation between the "warm up" threshold and the investment effectiveness. Interestingly, we find that the defender is suggested to give up defending all the targets when the attack or the defense "warm up" thresholds are sufficiently high. This article provides new insights and suggestions on policy implications for homeland security resource allocation.

  14. An evaluation of the sensitivity of acute flaccid paralysis surveillance for poliovirus infection in Australia

    Directory of Open Access Journals (Sweden)

    Madin Ben

    2009-09-01

    Full Text Available Abstract Background World Health Organization (WHO targets for acute flaccid paralysis (AFP surveillance, including the notification of a minimum rate of AFP among children, are used to assess the adequacy of AFP surveillance for the detection of poliovirus infection. Sensitive surveillance for poliovirus infection in both developed and developing countries is essential to support global disease eradication efforts. We applied recently developed methods for the quantitative evaluation of disease surveillance systems to evaluate the sensitivity of AFP surveillance for poliovirus infection in Australia. Methods A scenario tree model which accounted for administrative region, age, population immunity, the likelihood of AFP, and the probability of notification and stool sampling was used to assess the sensitivity of AFP surveillance for wild poliovirus infection among children aged less than 15 years in Australia. The analysis was based on historical surveillance data collected between 2000 and 2005. We used a surveillance time period of one month, and evaluated the ability of the surveillance system to detect poliovirus infection at a prevalence of 1 case per 100 000 persons and 1 case per million persons. Results There was considerable variation in the sensitivity of AFP surveillance for poliovirus infection among Australian States and Territories. The estimated median sensitivity of AFP surveillance in Australia among children aged less than 15 years was 8.2% per month at a prevalence of 1 case per 100,000 population, and 0.9% per month at a prevalence of 1 case per million population. The probability that Australia is free from poliovirus infection given negative surveillance findings following 5 years of continuous surveillance was 96.9% at a prevalence of 1 case per 100,000 persons and 56.5% at a prevalence of 1 case per million persons. Conclusion Given the ongoing risk of poliovirus importation prior to global eradication, long term

  15. Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

    Directory of Open Access Journals (Sweden)

    Apostolos P. Fournaris

    2017-07-01

    Full Text Available Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT and Operational Technology (OT systems that are meant to operate harmonically under a security critical framework. As security IT countermeasures are gradually been installed in many embedded system nodes, thus securing them from many well-know cyber attacks there is a lurking danger that is still overlooked. Apart from the software vulnerabilities that typical malicious programs use, there are some very interesting hardware vulnerabilities that can be exploited in order to mount devastating software or hardware attacks (typically undetected by software countermeasures capable of fully compromising any embedded system device. Real-time microarchitecture attacks such as the cache side-channel attacks are such case but also the newly discovered Rowhammer fault injection attack that can be mounted even remotely to gain full access to a device DRAM (Dynamic Random Access Memory. Under the light of the above dangers that are focused on the device hardware structure, in this paper, an overview of this attack field is provided including attacks, threat directives and countermeasures. The goal of this paper is not to exhaustively overview attacks and countermeasures but rather to survey the various, possible, existing attack directions and highlight the security risks that they can pose to security critical embedded systems as well as indicate their strength on compromising the Quality of Service (QoS such systems are designed to provide.

  16. NF-κB and enhancer-binding CREB protein scaffolded by CREB-binding protein (CBP)/p300 proteins regulate CD59 protein expression to protect cells from complement attack.

    Science.gov (United States)

    Du, Yiqun; Teng, Xiaoyan; Wang, Na; Zhang, Xin; Chen, Jianfeng; Ding, Peipei; Qiao, Qian; Wang, Qingkai; Zhang, Long; Yang, Chaoqun; Yang, Zhangmin; Chu, Yiwei; Du, Xiang; Zhou, Xuhui; Hu, Weiguo

    2014-01-31

    The complement system can be activated spontaneously for immune surveillance or induced to clear invading pathogens, in which the membrane attack complex (MAC, C5b-9) plays a critical role. CD59 is the sole membrane complement regulatory protein (mCRP) that restricts MAC assembly. CD59, therefore, protects innocent host cells from attacks by the complement system, and host cells require the constitutive and inducible expression of CD59 to protect themselves from deleterious destruction by complement. However, the mechanisms that underlie CD59 regulation remain largely unknown. In this study we demonstrate that the widely expressed transcription factor Sp1 may regulate the constitutive expression of CD59, whereas CREB-binding protein (CBP)/p300 bridge NF-κB and CREB, which surprisingly functions as an enhancer-binding protein to induce the up-regulation of CD59 during in lipopolysaccharide (LPS)-triggered complement activation, thus conferring host defense against further MAC-mediated destruction. Moreover, individual treatment with LPS, TNF-α, and the complement activation products (sublytic MAC (SC5b-9) and C5a) could increase the expression of CD59 mainly by activating NF-κB and CREB signaling pathways. Together, our findings identify a novel gene regulation mechanism involving CBP/p300, NF-κB, and CREB; this mechanism suggests potential drug targets for controlling various complement-related human diseases.

  17. Target Detection of Primary Surveillance Radar in Wind Turbine Clutter%空管一次雷达抗风电场干扰目标检测方法

    Institute of Scientific and Technical Information of China (English)

    冯涛; 刘飞虎; 安凯

    2016-01-01

    In recent years,wind turbine clutter (WTC)caused interference begun to attract attention as the construction of wind farms.Since moving target detection(MTD)can’t filter out the non-zero frequency echoes which reflected from wind turbine,the echoes may cause target shadowing and false alarm rate rises. In order to solving this problem,the author presents a target identification based method.Before aircraft fly into WTC,they are classified into three categories (turbojet aircraft,propeller aircraft or helicopter)using target identification algorithm.Then,after the aircraft flied into WTC,all target echoes which located in range gate will be recognized by jet engine modulation (JEM).The identification algorithm in second step transforms the echo signals into frequency domain and extracts the relevant features,and then using the type of aircraft corresponded classifier to identify the echo signals.After the identification,the WTC will be ruled out and the aircraft echoes will be reserved.Simulation results prove that the method can effectively identify the aircraft and wind turbine echoes and complete WTC mitigation and aircraft detection tasks.%近年来,随着风力发电场建设的不断推进,风电场对雷达探测的干扰问题开始引起人们的重视。动目标检测(Moving Target Detection,MTD)技术无法滤除风轮机的非零频回波,进而引起目标遮蔽及虚警上升。为了解决该问题,提出了一种基于目标识别的抗风电场干扰目标检测方法。该方法在飞行器进入风轮机杂波区前,先对预测进入风电场区域的飞行器进行初始目标识别,利用已有算法完成涡扇飞机、螺旋桨飞机或直升机的判定,提高后续识别的准确率;再在飞行器进入风轮机杂波区后,利用4种目标(3种飞行器目标及风轮机目标)的发动机调制(Jet Engine Modulation,JEM)特性进行识别。第二步识别是通过将所有进入波门区域的目标回波信号,转化到频域并

  18. Occupational Medical Surveillance Recommendations

    Science.gov (United States)

    1991-07-01

    sodium pentachlorophenate) Fumigants (Chlorpicrin, Ethylene dibromide) Rodenticides (Pyriminil, Alpha-naphthylthiourea - ANTU) 23 Target Organs...IA&C_#* AP** 000050-33-9 Phenylbutazone 3. - 000050-55-5 Resperine 3 2 000052-24-4 Tris(Aziridinyl)- Phosphine Sulfide 2A 2 000063-92-3 Phenoxybenzamine

  19. A Fuzzy Rule Based Forensic Analysis of DDoS Attack in MANET

    Directory of Open Access Journals (Sweden)

    Ms. S. M. Nirkhi

    2013-07-01

    Full Text Available Mobile Ad Hoc Network (MANET is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ways of security compromise is denial of services (DoS form of attack, this attack may paralyze a node or the entire network and when coordinated by group of attackers is considered as distributed denial of services (DDoS attack. A typical, DoS attack is flooding excessive volume of traffic to deplete key resources of the target network. In MANET flooding can be done at routing. Ad Hoc nature of MANET calls for dynamic route management. In flat ad hoc routing categories there falls the reactive protocols sub category, in which one of the most prominent member of this subcategory is dynamic source routing (DSR which works well for smaller number of nodes and low mobility situations. DSR allows on demand route discovery, for this they broadcast a route request message (RREQ. Intelligently flooding RREQ message there forth causing DoS or DDoS attack, making targeted network paralyzed for a small duration of time is not very difficult to launch and have potential of loss to the network. After an attack on the target system is successful enough to crash or disrupt MANET for some period of time, this event of breach triggers for investigation. Investigation and forensically analyzing attack scenario provides the source of digital proof against attacker. In this paper, the parameters for RREQ flooding are pointed, on basis of these parameters fuzzy logic based rules are deduced and described for both DoS and DDoS. We implemented a fuzzy forensic tool to determine the flooding RREQ attack of the form DoS and DDoS. For this implementation various experiments and

  20. A Focused Ethnographic Study of Alberta Cattle Veterinarians’ Decision Making about Diagnostic Laboratory Submissions and Perceptions of Surveillance Programs

    OpenAIRE

    Kate Sawford; Ardene Robinson Vollman; Craig Stephen

    2013-01-01

    The animal and public health communities need to address the challenge posed by zoonotic emerging infectious diseases. To minimize the impacts of future events, animal disease surveillance will need to enable prompt event detection and response. Diagnostic laboratory-based surveillance systems targeting domestic animals depend in large part on private veterinarians to submit samples from cases to a laboratory. In contexts where pre-diagnostic laboratory surveillance systems have been implemen...

  1. Pathologic features of fatal shark attacks.

    Science.gov (United States)

    Byard, R W; Gilbert, J D; Brown, K

    2000-09-01

    To examine the pattern of injuries in cases of fatal shark attack in South Australian waters, the authors examined the files of their institution for all cases of shark attack in which full autopsies had been performed over the past 25 years, from 1974 to 1998. Of the seven deaths attributed to shark attack during this period, full autopsies were performed in only two cases. In the remaining five cases, bodies either had not been found or were incomplete. Case 1 was a 27-year-old male surfer who had been attacked by a shark. At autopsy, the main areas of injury involved the right thigh, which displayed characteristic teeth marks, extensive soft tissue damage, and incision of the femoral artery. There were also incised wounds of the right wrist. Bony injury was minimal, and no shark teeth were recovered. Case 2 was a 26-year-old male diver who had been attacked by a shark. At autopsy, the main areas of injury involved the left thigh and lower leg, which displayed characteristic teeth marks, extensive soft tissue damage, and incised wounds of the femoral artery and vein. There was also soft tissue trauma to the left wrist, with transection of the radial artery and vein. Bony injury was minimal, and no shark teeth were recovered. In both cases, death resulted from exsanguination following a similar pattern of soft tissue and vascular damage to a leg and arm. This type of injury is in keeping with predator attack from underneath or behind, with the most severe injuries involving one leg. Less severe injuries to the arms may have occurred during the ensuing struggle. Reconstruction of the damaged limb in case 2 by sewing together skin, soft tissue, and muscle bundles not only revealed that no soft tissue was missing but also gave a clearer picture of the pattern of teeth marks, direction of the attack, and species of predator.

  2. Target classification by surveillance radar based on multifractal features%基于多重分形特征的防空雷达目标分类方法

    Institute of Scientific and Technical Information of China (English)

    李秋生; 谢维信

    2013-01-01

    On basis of introducing the mathematical model of aircraft returns in the conventional radar, by means of the multi-fractal measure analysis, this paper analyzed the multifractal characteristic of the aircraft returns as well as the extraction method of their multifractal signatures, and proposed the classification method for three types of aircraft containing jets, propeller aircrafts and helicopters from the angle of pattern recognition. The experimental analysis shows, the conventional radar returns from three types of aircraft targets, containing jets, propeller aircrafts and helicopters, have significantly different multifractal characteristic curves, and the defined multifractal characteristic parameters can be used as effective features for aircraft target classification and recognition. The simulation validated the validity of the proposed method.%在介绍常规雷达飞机目标回波数学模型的基础上,利用多重分形测度分析手段,分析了常规雷达飞机目标回波的多重分形特性及其多重分形特征的提取方法,并从模式分类的角度,提出了利用多重分形特征对喷气式飞机、螺旋桨飞机和直升机等三类飞机目标进行分类的方法.实验表明,上述三类飞机的目标回波数据具有显著不同的多重分形特征,所定义的多重分形特征参数可以作为飞机目标分类和识别的有效特征,仿真实验验证了所提方法的有效性.

  3. Where can an Insider attack?

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof; Nielson, Flemming

    2006-01-01

    to the targeted organisation. While the problem is well recognised in the security community as well as in law-enforcement and intelligence communities, the main resort still is to audit log files \\$\\backslash\\$emph{after the fact}. There has been little research into developing models, automated tools......, and techniques for analysing and solving (parts of) the problem. In this paper we first develop a formal model of systems, that can describe real-world scenarios. These high-level models are then mapped to acKlaim, a process algebra with support for access control, that is used to study and analyse properties...... of the modelled systems. Our analysis of processes identifies which actions may be performed by whom, at which locations, accessing which data. This allows to compute a superset of audit results---before an incident occurs....

  4. Congenital syphilis surveillance

    Directory of Open Access Journals (Sweden)

    Antonella Marangoni

    2011-06-01

    Full Text Available Congenital syphilis (CS is mainly a consequence of the lack of antenatal care and control of sexually transmitted infections.The bedrock of the prevention of CS is syphilis diagnosis by serological screening during pregnancy.Current Italian guidelines suggest that all the pregnant women should be tested in the first trimester. Due to the frequently absence of specific signs of infection at birth, laboratory tests are often the only method for a correct CS diagnosis. The aim of this study was to evaluate the usefulness of Treponema pallidum IgM Western Blot (WB and Polymerase Chain Reaction (PCR on cerebrospinal fluid (CSF as an aid in the diagnosis of CS during a prospective surveillance study carried out at St. Orsola Hospital in Bologna, Italy, from November 2000 through June 2010. All pregnant women during pregnancy and at delivery were screened for syphilis by ARCHITECT® Syphilis TP, Abbott. Positive samples were further analysed by Treponema Pallidum Hemagglutination Test (TPHA and Rapid Plasma Reagin (RPR tests, Radim.An in-house Western Blot (WB was also performed. Infants born to syphilis seropositive mothers were enrolled in a prospective follow up. At birth, tests were performed (including IgM WB. Infants with positive RPR tests at birth born to mothers not adequately treated received also a long bone radiograph as well as a complete CSF analysis, including Veneral Disease Research Laboratori (VDRL (Siemens Healthcare Diagnostics and PCR testing. All seroreactive infants received careful follow up examinations and serological testing at 0, 3, 6, 9, 12 months or until the tests became negative. In this study, positive syphilis serology was noted in 151 pregnant women delivering in our hospital. Fifteen women had never been adequately treated, and 9 out 15 gave birth to infected newborns.All these 9 infants had positive IgM WB results on serum samples. Two babies had characteristic long bone lesions at X-ray examination and 3 were born

  5. A Game Theoretic Approach to Cyber Attack Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Peng Liu

    2005-11-28

    The area investigated by this project is cyber attack prediction. With a focus on correlation-based prediction, current attack prediction methodologies overlook the strategic nature of cyber attack-defense scenarios. As a result, current cyber attack prediction methodologies are very limited in predicting strategic behaviors of attackers in enforcing nontrivial cyber attacks such as DDoS attacks, and may result in low accuracy in correlation-based predictions. This project develops a game theoretic framework for cyber attack prediction, where an automatic game-theory-based attack prediction method is proposed. Being able to quantitatively predict the likelihood of (sequences of) attack actions, our attack prediction methodology can predict fine-grained strategic behaviors of attackers and may greatly improve the accuracy of correlation-based prediction. To our best knowledge, this project develops the first comprehensive framework for incentive-based modeling and inference of attack intent, objectives, and strategies; and this project develops the first method that can predict fine-grained strategic behaviors of attackers. The significance of this research and the benefit to the public can be demonstrated to certain extent by (a) the severe threat of cyber attacks to the critical infrastructures of the nation, including many infrastructures overseen by the Department of Energy, (b) the importance of cyber security to critical infrastructure protection, and (c) the importance of cyber attack prediction to achieving cyber security.

  6. Modelling social-technical attacks with timed automata

    NARCIS (Netherlands)

    David, Nicolas; David, Alexandre; Hansen, René Rydhof; Larsen, Kim G.; Legay, Axel; Olesen, Mads Chr.; Probst, Christian W.

    2015-01-01

    Attacks on a system often exploit vulnerabilities that arise from human behaviour or other human activity. Attacks of this type, so-called socio-technical attacks, cover everything from social engineering to insider attacks, and they can have a devastating impact on an unprepared organisation. In th

  7. A Robust Mechanism for Defending Distributed Denial OF Service Attacks on Web Servers

    CERN Document Server

    Sen, Jaydip

    2011-01-01

    Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease and low costs of launching such attacks, supplemented by the current inadequate sate of any viable defense mechanism, have made them one of the top threats to the Internet community today. Since the increasing popularity of web-based applications has led to several critical services being provided over the Internet, it is imperative to monitor the network traffic so as to prevent malicious attackers from depleting the resources of the network and denying services to legitimate users. This paper first presents a brief discussion on some of the important types of DDoS attacks that currently exist and some existing mechanisms to combat these attacks. It then points out the major drawbacks of the currently existing defense mechanisms and proposes a new mechanism for protecting a web-server against a DDoS attack. In the proposed mechanism, ...

  8. Efficiency of attack strategies on complex model and real-world networks

    CERN Document Server

    Bellingeri, Michele; Vincenzi, Simone

    2013-01-01

    We investigated the efficiency of attack strategies to network nodes when targeting several complex model and real-world networks. We tested 5 attack strategies, 3 of which were introduced in this work for the first time, to attack 3 model (Erdos and Renyi, Barabasi and Albert preferential attachment network, and scale-free network configuration models) and 3 real networks (Gnutella peer-to-peer network, email network of the University of Rovira i Virgili, and immunoglobulin interaction network). Nodes were removed sequentially according to the importance criterion defined by the attack strategy. We used the size of the largest connected component (LCC) as a measure of network damage. We found that the efficiency of attack strategies (fraction of nodes to be deleted for a given reduction of LCC size) depends on the topology of the network, although attacks based on the number of connections of a node and betweenness centrality were often the most efficient strategies. Sequential deletion of nodes in decreasin...

  9. A Hybrid Real-time Zero-day Attack Detection and Analysis System

    Directory of Open Access Journals (Sweden)

    Ratinder Kaur

    2015-08-01

    Full Text Available A zero-day attack poses a serious threat to the Internet security as it exploits zero-day vulnerabilities in the computer systems. Attackers take advantage of the unknown nature of zero-day exploits and use them in conjunction with highly sophisticated and targeted attacks to achieve stealthiness with respect to standard intrusion detection techniques. Thus, it's difficult to defend against such attacks. Present research exhibits various issues and is not able to provide complete solution for the detection and analysis of zero-day attacks. This paper presents a novel hybrid system that integrates anomaly, behavior and signature based techniques for detecting and analyzing zero-day attacks in real-time. It has layered and modular design which helps to achieve high performance, flexibility and scalability. The system is implemented and evaluated against various standard metrics like True Positive Rate (TPR, False Positive Rate (FPR, F-Measure, Total Accuracy (ACC and Receiver Operating Characteristic (ROC curve. The result shows high detection rate with nearly zero false positives. Additionally, the proposed system is compared with Honeynet system.

  10. Performance Evaluation of AODV with Blackhole Attack

    Science.gov (United States)

    Dara, Karuna

    2010-11-01

    A Mobile Ad Hoc Network (MANET) is a temporary network set up by a wireless mobile computers moving arbitrary in the places that have no network infrastructure. These nodes maintain connectivity in a decentralized manner. Since the nodes communicate with each other, they cooperate by forwarding data packets to other nodes in the network. Thus the nodes find a path to the destination node using routing protocols. However, due to security vulnerabilities of the routing protocols, mobile ad-hoc networks are unprotected to attacks of the malicious nodes. One of these attacks is the Black Hole Attack against network integrity absorbing all data packets in the network. Since the data packets do not reach the destination node on account of this attack, data loss will occur. In this paper, we simulated the black hole attack in various mobile ad-hoc network scenarios using AODV routing protocol of MANET and have tried to find a effect if number of nodes are increased with increase in malicious nodes.

  11. Trace Attack against Biometric Mobile Applications

    Directory of Open Access Journals (Sweden)

    Sanaa Ghouzali

    2016-01-01

    Full Text Available With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen. Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.

  12. Panic Attack during Elective Gastrointestinal Endoscopy

    Directory of Open Access Journals (Sweden)

    Charalampos Mitsonis

    2011-01-01

    Full Text Available Background. Esophagogastroduodenoscopy (EGD and colonoscopy (CS can evoke anxiety, embarrassment, and discomfort. These concerns can culminate in panic attacks, which may traumatize patients and significantly decrease their compliance to the procedure. The objective of this study was to evaluate the relationship between preendoscopic anxiety and the possibility of a panic attack during an elective gastrointestinal endoscopy (EGE. Methods. The study population comprised of 79 Greek outpatients. The examination was carried out without the use of conscious sedation. Patients' anxiety levels were assessed before the procedure using the Greek version of the Spielberger State-Trait Anxiety Inventory (STAI-Y. Results. Seventy-nine patients were enrolled: 45 EGD and 34 CS. Females had higher state and trait anxiety levels than males (48.14 ± 7.94 versus 44.17 ± 7.43, <0.05; and 43.68 ± 6.95 versus 39.86 ± 7.46, <0.05. Patients who experienced panic attack had significantly higher levels of both trait and state anxiety, compared to those who were panic-free. There was no significant relationship between panic attacks and sex or type of procedure. Conclusions. Patients who experience panic attacks during endoscopic procedures appear to have significantly higher anxiety levels before the procedure. Administering the STAI questionnaire prior to the endoscopy seems to be a useful screening method for vulnerable patients.

  13. On the anatomy of social engineering attacks -- A literature-based dissection of successful attacks

    NARCIS (Netherlands)

    Bullee, Jan-Willem; Montoya, L.; Pieters, Wolter; Junger, Marianne; Hartel, Pieter H.

    2017-01-01

    The aim of this studywas to explore the extent towhich persuasion principles are used in successful social engineering attacks. Seventy-four scenarioswere extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenariowas split into attack steps, containing sin

  14. Pareto Efficient Solutions of Attack-Defence Trees

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2015-01-01

    Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes, such as proba......Attack-defence trees are a promising approach for representing threat scenarios and possible countermeasures in a concise and intuitive manner. An attack-defence tree describes the interaction between an attacker and a defender, and is evaluated by assigning parameters to the nodes...... on a new and general formalism for attack-defence trees....

  15. Cross-site scripting attacks procedure and Prevention Strategies

    Directory of Open Access Journals (Sweden)

    Wang Xijun

    2016-01-01

    Full Text Available Cross-site scripting attacks and defense has been the site of attack and defense is an important issue, this paper, the definition of cross-site scripting attacks, according to the current understanding of the chaos on the cross-site scripting, analyzes the causes and harm cross-site scripting attacks formation of attacks XXS complete process XSS attacks made a comprehensive analysis, and then for the web program includes Mobility there are cross-site scripting filter laxity given from ordinary users browse the web and web application developers two the defense cross-site scripting attacks effective strategy.

  16. Multiple operating system rotation environment moving target defense

    Science.gov (United States)

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  17. Information systems to support surveillance for malaria elimination.

    Science.gov (United States)

    Ohrt, Colin; Roberts, Kathryn W; Sturrock, Hugh J W; Wegbreit, Jennifer; Lee, Bruce Y; Gosling, Roly D

    2015-07-01

    Robust and responsive surveillance systems are critical for malaria elimination. The ideal information system that supports malaria elimination includes: rapid and complete case reporting, incorporation of related data, such as census or health survey information, central data storage and management, automated and expert data analysis, and customized outputs and feedback that lead to timely and targeted responses. Spatial information enhances such a system, ensuring cases are tracked and mapped over time. Data sharing and coordination across borders are vital and new technologies can improve data speed, accuracy, and quality. Parts of this ideal information system exist and are in use, but have yet to be linked together coherently. Malaria elimination programs should support the implementation and refinement of information systems to support surveillance and response and ensure political and financial commitment to maintain the systems and the human resources needed to run them. National malaria programs should strive to improve the access and utility of these information systems and establish cross-border data sharing mechanisms through the use of standard indicators for malaria surveillance. Ultimately, investment in the information technologies that support a timely and targeted surveillance and response system is essential for malaria elimination.

  18. Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks

    CERN Document Server

    Duan, Lingjie; Huang, Jianwei; Shin, Kang G

    2011-01-01

    Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy. Moreover, attackers may not follow the fusion center's decision regarding their spectrum access. This paper considers a challenging attack scenario where multiple rational attackers overhear all honest SUs' sensing reports and cooperatively maximize attackers' aggregate spectrum utilization. We show that, without attack-prevention mechanisms, honest SUs are unable to transmit over the licensed spectrum, and they may further be penalized by the primary user for collisions due to attackers' aggressive transmissions. To prevent such attacks, we propose two novel attack-prevention mechanisms with direct and indirect punishments. The key idea is to identify collisions...

  19. Attack-tolerant networked control system: an approach for detection the controller stealthy hijacking attack

    Science.gov (United States)

    Atta Yaseen, Amer; Bayart, Mireille

    2017-01-01

    In this work, a new approach will be introduced as a development for the attack-tolerant scheme in the Networked Control System (NCS). The objective is to be able to detect an attack such as the Stuxnet case where the controller is reprogrammed and hijacked. Besides the ability to detect the stealthy controller hijacking attack, the advantage of this approach is that there is no need for a priori mathematical model of the controller. In order to implement the proposed scheme, a specific detector for the controller hijacking attack is designed. The performance of this scheme is evaluated be connected the detector to NCS with basic security elements such as Data Encryption Standard (DES), Message Digest (MD5), and timestamp. The detector is tested along with networked PI controller under stealthy hijacking attack. The test results of the proposed method show that the hijacked controller can be significantly detected and recovered.

  20. Character superimposition inpainting in surveillance video

    Science.gov (United States)

    Jia, Lili; Tao, Junjie; You, Ying

    2016-01-01

    Video surveillance systems play an important role in the crime scene investigation, and the digital surveillance system always requires the superimposed video data being subjected to a data compression processing. The purpose of this paper is to study the use of inpainting techniques to remove the characters and inpaint the target region. We give the efficient framework including getting Character Superimposition mask, superimposition movement and inpainting the blanks. The character region is located with the manual ROI selection and varying text extractor, such as the time. The superimposed characters usually have distinguished colors from the original background, so the edges are easily detected. We use the canny operator the get the edge image. The missing information which is effect the structure of the original image is reconstructed using a structure propagating algorithm. The experiment was done with C/C++ in the vs2010 KDE. The framework of this paper showed is powerful to recreate the character superimposition region and helpful to the crime scene investigation.