17 resultados para DDoS attack defense
em Chinese Academy of Sciences Institutional Repositories Grid Portal
Resumo:
The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [Li et al., AIAA J. 46, 2899(2008)], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 0° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves VLFWs� are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.The direct numerical simulation of boundary layer transition over a 5° half-cone-angle blunt cone is performed. The free-stream Mach number is 6 and the angle of attack is 1°. Random wall blow-and-suction perturbations are used to trigger the transition. Different from the authors’ previous work [ Li et al., AIAA J. 46, 2899 (2008) ], the whole boundary layer flow over the cone is simulated (while in the author’s previous work, only two 45° regions around the leeward and the windward sections are simulated). The transition location on the cone surface is determined through the rapid increase in skin fraction coefficient (Cf). The transition line on the cone surface shows a nonmonotonic curve and the transition is delayed in the range of 20° ≤ θ ≤ 30° (θ = 0° is the leeward section). The mechanism of the delayed transition is studied by using joint frequency spectrum analysis and linear stability theory (LST). It is shown that the growth rates of unstable waves of the second mode are suppressed in the range of 20° ≤ θ ≤ 30°, which leads to the delayed transition location. Very low frequency waves (VLFWs) are found in the time series recorded just before the transition location, and the periodic times of VLFWs are about one order larger than those of ordinary Mack second mode waves. Band-pass filter is used to analyze the low frequency waves, and they are deemed as the effect of large scale nonlinear perturbations triggered by LST waves when they are strong enough.
Induction of defense responses against Alternaria rot by different elicitors in harvested pear fruit
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
IEEE Computer Society
Resumo:
提出了一种新的基于排队论的DoS攻防绩效评估方法.针对不同种类DoS攻防手段建立了统一的指标体系和绩效计算方法,基于排队论方法分别建立评估模型,对UDP Flood和SYN Flood攻击的绩效进行不包含主观因素的定量评估,分析不同攻击手段和强度的有效性.针对典型DoS攻防场景,利用网络仿真工具进行模拟,通过实验与模型推导结果对比验证了排队论模型的合理性,并阐述了此方法在不同类型DoS攻防手段中的应用.
Resumo:
A high-quality cDNA library was constructed from whole body tissues of the zhikong scallop, Chlamys farreri, challenged by Listonella anguillarum. A total of 5720 clones were sequenced, yielding 5123 expressed sequence tags (ESTs). Among the 3326 unique genes identified, 2289 (69%) genes had no significant (E-value < 1e-5) matches to known sequences in public databases and 194 (6%) matched proteins of unknown functions. The remaining 843 (25%) genes that exhibited homology with genes of known functions, showed broad involvement in metabolic processes (31%), cell structure and motility (20%), gene and protein expression (12%), cell signaling and cell communication (8%), cell division (4%), and notably, 25% of those genes were related to immune function. They included stress response genes, complement-like genes, proteinase and proteinase inhibitors, immune recognition receptors and immune effectors. The EST collection obtained in this study provides a useful resource for gene discovery and especially for the identification of host-defense genes and systems in scallops and other molluscs. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
C-type lectins are a superfamily of carbohydrate-recognition proteins which play crucial roles in the innate immunity. In this study, a novel multidomain C-type lectin gene from scallop Chlamys farreri (designated as Cflec-4) was cloned by RACE approach based on EST analysis. The full-length cDNA of Cflec-4 was of 2086 bp. The open reading frame was of 1830 bp and encoded a polypeptide of 609 amino acids, including a signal sequence and four dissimilar carbohydrate-recognition domains (CRDs). The deduced amino acid sequence of CflecA shared high similarities to other C-type lectin family members. The phylogenetic analysis revealed the divergence between the three N-terminal CRDs and the C-terminal one, suggesting that the four CRDs in Cflec-4 originated by repeated duplication of different primordial CRD. The potential tertiary structure of each CRD in Cflec-4 was typical double-loop structure with Ca2+-binding site 2 in the long loop region and two conserved disulfide bridges at the bases of the loops. The tissue distribution of Cflec-4 mRNA was examined by fluorescent quantitative real-time PCR. In the healthy scallops, the Cflec-4 transcripts could be only detected in gonad and hepatopancreas, whereas in the Listonella anguillarum challenged scallops, it could be also detected in hemocytes. These results collectively suggested that CflecA was involved in the immune defense of scallop against pathogen infection and provided new insight into the evolution of C-type lectin superfamily. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
Crustacean haemocytes play important roles in the host immune response including recognition, phagocytosis, melanization, cytotoxicity and inter-cellular signal communication. Expressed sequence tags (ESTs) analysis is proved to be an efficient approach not only for gene discovery, but also for gene expression profiles performance. In order to further understand the innate immune system and defense mechanisms of Chinese shrimp at molecular level, complementary DNA library is constructed from the haemocyte tissue of Fenneropenaeus chinensis. A total of 2371 cDNA clones are successfully sequenced and the average sequence length is 460 bp. About 50% are identified as orthologs of known genes from other organisms by BLASTx and BLASTn program. By sequences comparability and analysis, 34 important genes including 177 ESTs are identified that may be involved in defense or immune functions in shrimp based on the known knowledge. These genes are categorized into five categories according to their putative functions in shrimp immune system: 13 genes are different types of antimicrobial peptides (AMP, penaeidin, antilipopolysaccharide factor, etc.), and their proportion is about 3 8%; 11 genes belong to prophenoloxidase system (prophenoloxidase, serine proteinase, serine proteinase inhibitor, etc.), and their proportion is about 32%; five genes have high homology with clotting protein (lectin, transglutaminase, etc), and their proportion is about 15%; three genes may be involved in inter-cell signal communication (peroxinectin, integrin), and their proportion is about 9%; two genes have been identified to be chaperone proteins (Hsc70, thioredoxin peroxidase), and their proportion is about 6%. These EST sequences enrich our understanding of the immune genes of F chinensis and will help farther experimental research into immune factors and improve our knowledge of the immune mechanisms of shrimp. (c) 2007 Elsevier B.V. All rights reserved.
Resumo:
MicroRNAs (miRNA) that are around 22 nucleotides long non-protein-coding RNAs, play key regulatory roles in plants. Recent research findings show that miRNAs are involved in plant defense and viral offense systems. Advances in understanding the mechanism of miRNA biogenesis and evolution are useful for elucidating the complicated roles they play in viral infection networks. In this paper a brief summary of evolution of plant anti-virus defense is given and the function of miRNAs involved in plant-virus competition is highlighted. It is believed that miRNAs have several advantages over homology-dependent and siRNA-mediated gene silencing when they are applied biotechnologically to promote plant anti-virus defense. miRNA-mediated anti-virus pathway is an ancient mechanism with a promising future. However, using miRNAs as a powerful anti-virus tool will be better realized only if miRNA genomics and functions in plant viral infection are fully understood.
Resumo:
ISG15 is an interferon-stimulated gene that encodes a ubiquitin-like protein. ISG15 homologues have been identified in a number of fish species, some of which are known to be regulated at expression level by virus infection and lipopolysacchande (LPS) treatment However, the relationship between ISG15 and live bacterial infection has not been investigated in piscine models. In this study, an ISG15 homologue, SoISG15, was identified from red drum Scraeriops ocellaws and analyzed at expression and functional levels The open reading frame ofSolSG15 is 477 base pairs (bp) and mtronless, with a 5'-untranslated region (UTR) of 91 bp and a 3'-UTR of 415 bp The deduced amino acid sequence of S0ISG15 shares 60-67% overall identities with the ISG15 of several fish species. S0ISG15 possesses two conserved ubiquinn-like domains and the canonical ubiquitin conjugation motif, LRGG, at the C-terminus. Expressional analysis showed that constitutive expression of SolSG15 was highest in blood and lowest in kidney Experimental challenges with LPS and bacterial pathogens induced significant S0ISG15 expression in the kidney but not in the liver Similar differential induction was also observed at cellular level with primary hepatocytes and head kidney (HK) lymphocytes. Poly(' C), however, effected drastic induction of S0ISG15 expression in kidney and liver at both tissue and cellular levels. Immunoblot analysis showed that S0ISG15 was secreted by cultured HK lymphocytes into the extracellular milieu. Recombinant S0ISG15 expressed in and purified from Eschenclua colt was able to enhance the respiratory burst activity, acid phosphatase activity, and bactericidal activity of HK macrophages. Taken together, the results of this study indicated that SoISG 15 possesses apparent immunological property and is likely to be involved in host immune defense against bacterial infection. (C)2010 Elsevier Ltd All rights reserved.