8 resultados para low-rate distributed denial of service (DDoS) attack
em Helda - Digital Repository of University of Helsinki
Resumo:
The discussion of a service-dominant logic has made the findings of decades of service marketing research a topic of interest for marketing at large. Some fundamental aspects of the logic such as value creation and its marketing implications are more complex than they have been treated as so far and need to be further developed to serve marketing theory and practice well. Following the analysis in the present article it is argued that although customers are co-producers in service processes, according to the value-in-use notion adopted in the contemporary marketing and management literature they are fundamentally the creators of value for themselves. Furthermore, it is concluded that although by providing goods and services as input resources into customers’ consumption and value-generating processes firms are fundamentally value facilitators, interactions with customers that exist or can be created enable firms to engage themselves with their customers’ processes and thereby they become co-creators of value with their customers. As marketing implications it is observed that 1) the goal of marketing is to support customers’ value creation, 2) following a service logic and due to the existence of interactions where the firm’s and the customer’s processes merge into an integrated joint value creation process, the firm is not restricted to making value propositions only, but can directly and actively influence the customer’s value fulfilment as well and extend its marketing process to include activities during customer-firm interactions, and 3) although all goods and services are consumed as service, customers’ purchasing decisions can be expected to be dependant of whether they have the skills and interest to use a resource, such as a good, as service or want to buy extended market offerings including process-related elements. Finally, the analysis concludes with five service logic theses.
Resumo:
The majority of Internet traffic use Transmission Control Protocol (TCP) as the transport level protocol. It provides a reliable ordered byte stream for the applications. However, applications such as live video streaming place an emphasis on timeliness over reliability. Also a smooth sending rate can be desirable over sharp changes in the sending rate. For these applications TCP is not necessarily suitable. Rate control attempts to address the demands of these applications. An important design feature in all rate control mechanisms is TCP friendliness. We should not negatively impact TCP performance since it is still the dominant protocol. Rate Control mechanisms are classified into two different mechanisms: window-based mechanisms and rate-based mechanisms. Window-based mechanisms increase their sending rate after a successful transfer of a window of packets similar to TCP. They typically decrease their sending rate sharply after a packet loss. Rate-based solutions control their sending rate in some other way. A large subset of rate-based solutions are called equation-based solutions. Equation-based solutions have a control equation which provides an allowed sending rate. Typically these rate-based solutions react slower to both packet losses and increases in available bandwidth making their sending rate smoother than that of window-based solutions. This report contains a survey of rate control mechanisms and a discussion of their relative strengths and weaknesses. A section is dedicated to a discussion on the enhancements in wireless environments. Another topic in the report is bandwidth estimation. Bandwidth estimation is divided into capacity estimation and available bandwidth estimation. We describe techniques that enable the calculation of a fair sending rate that can be used to create novel rate control mechanisms.
Resumo:
In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.
Resumo:
Acute intermittent porphyria (AIP, MIM #176000) is an inherited metabolic disease due to a partial deficiency of the third enzyme, hydroxymethylbilane synthase (HMBS, EC: 4.3.1.8), in the haem biosynthesis. Neurological symptoms during an acute attack, which is the major manifestation of AIP, are variable and relatively rare, but may endanger a patient's life. In the present study, 12 Russian and two Finnish AIP patients with severe neurological manifestations during an acute attack were studied prospectively from 1995 to 2006. Autonomic neuropathy manifested as abdominal pain (88%), tachycardia (94%), hypertension (75%) and constipation (88%). The most common neurological sign was acute motor peripheral neuropathy (PNP, 81%) often associated with neuropathic sensory loss (54%) and CNS involvement (85%). Despite heterogeneity of the neurological manifestations in our patients with acute porphyria, the major pattern of PNP associated with abdominal pain, dysautonomia, CNS involvement and mild hepatopathy could be demonstrated. If more strict inclusion criteria for biochemical abnormalities (>10-fold increase in excretion of urinary PBG) are applied, neurological manifestations in an acute attack are probably more homogeneous than described previously, which suggests that some of the neurological patients described previously may not have acute porphyria but rather secondary porphyrinuria. Screening for acute porphyria using urinary PBG is useful in a selected group of neurological patients with acute PNP or encephalopathy and seizures associated with pain and dysautonomia. Clinical manifestations and the outcome of acute attacks were used as a basis for developing a 30-score scale of the severity of an acute attack. This scale can easily be used in clinical practice and to standardise the outcome of an attack. Degree of muscle weakness scored by MRC, prolonged mechanical ventilation, bulbar paralysis, impairment of consciousness and hyponatraemia were important signs of a poor prognosis. Arrhythmia was less important and autonomic dysfunction, severity of pain and mental symptoms did not affect the outcome. The delay in the diagnosis and repeated administrations of precipitating factors were the main cause of proceeding of an acute attack into pareses and severe CNS involvement and a fatal outcome in two patients. Nerve conduction studies and needle EMG were performed in eleven AIP patients during an acute attack and/or in remission. Nine patients had severe PNP and two patients had an acute encephalopathy but no clinically evident PNP. In addition to axonopathy, features suggestive of demyelination could be demonstrated in patients with severe PNP during an acute attack. PNP with a moderate muscle weakness was mainly pure axonal. Sensory involvement was common in acute PNP and could be subclinical. Decreased conduction velocities with normal amplitudes of evoked potentials during acute attacks with no clinically evident PNP indicated subclinical polyneuropathy. Reversible symmetrical lesions comparable with posterior reversible encephalopathy syndrome (PRES) were revealed in two patients' brain CT or MRI during an acute attack. In other five patients brain MRI during or soon after the symptoms was normal. The frequency of reversible brain oedema in AIP is probably under-estimated since it may be short-lasting and often indistinguishable on CT or MRI. In the present study, nine different mutations were identified in the HMBS gene in 11 unrelated Russian AIP patients from North Western Russia and their 32 relatives. AIP was diagnosed in nine symptom-free relatives. The majority of the mutations were family-specific and confirmed allelic heterogeneity also among Russian AIP patients. Three mutations, c.825+5G>C, c.825+3_825+6del and c.770T>C, were novel. Six mutations, c.77G>A (p.R26H), c.517C>T (p.R173W), c.583C>T (p.R195C), c.673C>T (p.R225X), c.739T>C (p.C247R) and c.748G>C (p.E250A), have previously been identified in AIP patients from Western and other Eastern European populations. The effects of novel mutations were studied by amplification and sequencing of the reverse-transcribed total RNA obtained from the patients' lymphoblastoid or fibroblast cell lines. The mutations c.825+5G>C and c.770T>C resulted in varyable amounts of abnormal transcripts, r.822_825del (p.C275fsX2) and [r.770u>c, r.652_771del, r.613_771del (p.L257P, p.G218_L257del, p.I205_L257del)]. All mutations demonstrated low residual activities (0.1-1.3 %) when expressed in COS-1 cells confirming the causality of the mutations and the enzymatic defect of the disease. The clinical outcome, prognosis and correlation between the HMBS genotype and phenotype were studied in 143 Finnish and Russian AIP patients with ten mutations (c.33G>T, c.97delA, InsAlu333, p.R149X, p.R167W, p.R173W, p.R173Q, p.R225G, p.R225X, c.1073delA) and more than six patients in each group. The patients were selected from the pool of 287 Finnish AIP patients presented in a Finnish Porphyria Register (1966-2003) and 23 Russian AIP patients (diagnosed 1995-2003). Patients with the p.R167W and p.R225G mutations showed lower penetrance (19% and 11%) and the recurrence rate (33% and 0%) in comparison to the patients with other mutations (range 36 to 67% and 0 to 66%, respectively), as well as milder biochemical abnormalities [urinary porphobilinogen 47±10 vs. 163±21 mol/L, p<0.001; uroporphyrin 130±40 vs. 942±183 nmol/L, p<0.001] suggesting a milder form of AIP in these patients. Erythrocyte HMBS activity did not correlate with the porphobilinogen excretion in remission or the clinical of the disease. In all AIP severity patients, normal PBG excretion predicted freedom from acute attacks. Urinary PBG excretion together with gender, age at the time of diagnosis and mutation type could predict the likelihood of acute attacks in AIP patients.