10 resultados para DDoS attack defense
em Indian Institute of Science - Bangalore - Índia
Resumo:
Grouping and coordination tactics for ground attack missions by a heterogeneous mix of reconnaissance, enemy suppression, and attack unmanned aerial vehicles (UAVs) is presented. Dubins' paths are used to determine the optimal number of attack UAVs and their positional and heading freedoms, as functions of weapon seeker range and field of view. A generic battlefield scenario with layered defense is created and the tactics are evaluated on a Group Flyer simulation platform for both nominal and off-nominal conditions.
Resumo:
Most bacterial genomes harbor restriction-modification systems, encoding a REase and its cognate MTase. On attack by a foreign DNA, the REase recognizes it as nonself and subjects it to restriction. Should REases be highly specific for targeting the invading foreign DNA? It is often considered to be the case. However, when bacteria harboring a promiscuous or high-fidelity variant of the REase were challenged with bacteriophages, fitness was maximal under conditions of catalytic promiscuity. We also delineate possible mechanisms by which the REase recognizes the chromosome as self at the noncanonical sites, thereby preventing lethal dsDNA breaks. This study provides a fundamental understanding of how bacteria exploit an existing defense system to gain fitness advantage during a host-parasite coevolutionary ``arms race.''
Resumo:
In this work, we have tried to emphasize the connection between mycobacterial growth and regulation of gene expression. Utilization of multiple carbon sources and diauxic growth helps bacteria to regulate gene expression at an optimum level so that the inhospitable conditions encountered during nutrient depletion can be circumvented. These aspects will be discussed with respect to mycobacterial growth in subsequent sections. Identification and characterization of genes induced under such conditions is helpful to understand the physiology of the bacterium. Although it is necessary to compare the total expression profile of proteins as they transit from vegetative growth to stationary phase, at times a lot of insights can be deciphered from the expression pattern of one or two proteins. We have compared the protein expression and sigma factor selectivity of two such proteins in M. smegmatis to understand the differential regulation of genes playing diverse function in the same species. Some newer insights on the structure and function of one of the Dps proteins are also explained.
Resumo:
Oxidative stress is caused by an imbalance between the production of reactive oxygen species (ROS) and the biological system's ability to detoxify these reactive intermediates. Mammalian cells have elaborate antioxidant defense mechanisms to control the damaging effects of ROS. Glutathione peroxidase (GPx), a selenoenzyme, plays a key role in protecting the organism from oxidative damage by catalyzing the reduction of harmful hydroperoxides with thiol a ``catalytic triad'' with tryptophan and glutamine, which cofactors. The selenocysteine residue at the active site forms activates the selenium moiety for an efficient reduction of peroxides. After the discovery that ebselen, a synthetic organoselenium compound, mimics the catalytic activity of GPx both in vitro and in vivo, several research groups developed a number of small-molecule selenium compounds as functional mimics of GPx, either by modifying the basic structure of ebselen or by incorporating some structural features of the native enzyme. The synthetic mimics reported in the literature can be classified in three major categories: (i) cyclic selenenyl amides having a Se-N bond, (ii) diaryl diselenides, and (iii) aromatic or aliphatic monoselenides. Recent studies show that ebselen exhibits very poor GPx activity when aryl or benzylic thiols such as PhSH or BnSH are used as cosubstrates. Because the catalytic activity of each GPx mimic largely depends on the thiol cosubstrates used, the difference in the thiols causes the discrepancies observed in different studies. In this Account, we demonstrate the effect of amide and amine substituents on the GPx activity of various organoselenium compounds. The existence of strong Se ... O/N interactions in the selenenyl sulfide intermediates significantly reduces the GPx activity. These interactions facilitate an attack of thiol at selenium rather than at sulfur, leading to thiol exchange reactions that hamper the formation of catalytically active selenol. Therefore, any substituent capable of enhancing the nucleophilic attack of thiol at sulfur in the selenenyl sulfide state would enhance the antioxidant potency of organoselenium compounds. Interestingly, replacement of the sec-amide substituent by a tert-amide group leads to a weakening of Se ... 0 interactions in the selenenyl sulfide intermediates. This modification results in 10- to 20-fold enhancements in the catalytic activities. Another strategy involving the replacement of tert-amide moieties by tert-amino substituents further increases the activity by 3- to 4-fold. The most effective modification so far in benzylamine-based GPx mimics appears to be either the replacement of a tert-amino substituent by a sec-amino group or the introduction of an additional 6-methoxy group in the phenyl ring. These strategies can contribute to a remarkable enhancement in the GPx activity. In addition to enhancing catalytic activity, a change in the substituents near the selenium moiety alters the catalytic mechanisms. The mechanistic investigations of functional mimics are useful not only for understanding the complex chemistry at the active site of GPx but also for designing and synthesizing novel antioxidants and anti-inflammatory agents.
Resumo:
A procedure to evaluate surface-to-air missile battery placement patterns for air defense is presented. A measure of defense effectiveness is defined as a function of kill probability of the defense missiles and the nature of the surrounding terrain features. The concept of cumulative danger index is used to select the best path for a penetrating hostile aircraft for any given pattern of placement. The aircraft is assumed to be intelligent and well-informed. The path is generated using a dynamic programming methodology. The software package so developed can be used off-line to choose the best among a number of possible battery placement patterns.
Resumo:
We present a technique for irreversible watermarking approach robust to affine transform attacks in camera, biomedical and satellite images stored in the form of monochrome bitmap images. The watermarking approach is based on image normalisation in which both watermark embedding and extraction are carried out with respect to an image normalised to meet a set of predefined moment criteria. The normalisation procedure is invariant to affine transform attacks. The result of watermarking scheme is suitable for public watermarking applications, where the original image is not available for watermark extraction. Here, direct-sequence code division multiple access approach is used to embed multibit text information in DCT and DWT transform domains. The proposed watermarking schemes are robust against various types of attacks such as Gaussian noise, shearing, scaling, rotation, flipping, affine transform, signal processing and JPEG compression. Performance analysis results are measured using image processing metrics.
Resumo:
Restriction-modification (R-M) systems are ubiquitous and are often considered primitive immune systems in bacteria. Their diversity and prevalence across the prokaryotic kingdom are an indication of their success as a defense mechanism against invading genomes. However, their cellular defense function does not adequately explain the basis for their immaculate specificity in sequence recognition and nonuniform distribution, ranging from none to too many, in diverse species. The present review deals with new developments which provide insights into the roles of these enzymes in other aspects of cellular function. In this review, emphasis is placed on novel hypotheses and various findings that have not yet been dealt with in a critical review. Emerging studies indicate their role in various cellular processes other than host defense, virulence, and even controlling the rate of evolution of the organism. We also discuss how R-M systems could have successfully evolved and be involved in additional cellular portfolios, thereby increasing the relative fitness of their hosts in the population.
Resumo:
Mobile Ad hoc Networks (MANETs) having strikingly superior features also come with notable disadvantage and troubles and the most exigent amongst all being security related issues. Such an ringent network dexterously pave approach for the malicious nodes. Hence providing security is a tedious task. For such a dynamic environment, a security system which dynamically observes the attacker's plans and protect the highly sophisticated resources is in high demand. In this paper we present a method of providing security against wormhole attacks to a MANET by learning about the environment dynamically and adapting itself to avoid malicious nodes. We accomplish this with the assistance of Honeypot. Our method predicts the wormhole attack that may take place and protect the resources well-in advance. Also it cleverly deal with the attacker by using previous history and different type of messages to locate the attacker. Several experiments suggest that the system is accurate in handling wormhole attack.
Resumo:
In this paper, the approach for assigning cooperative communication of Uninhabited Aerial Vehicles (UAV) to perform multiple tasks on multiple targets is posed as a combinatorial optimization problem. The multiple task such as classification, attack and verification of target using UAV is employed using nature inspired techniques such as Artificial Immune System (AIS), Particle Swarm Optimization (PSO) and Virtual Bee Algorithm (VBA). The nature inspired techniques have an advantage over classical combinatorial optimization methods like prohibitive computational complexity to solve this NP-hard problem. Using the algorithms we find the best sequence in which to attack and destroy the targets while minimizing the total distance traveled or the maximum distance traveled by an UAV. The performance analysis of the UAV to classify, attack and verify the target is evaluated using AIS, PSO and VBA.
Resumo:
The growing number of applications and processing units in modern Multiprocessor Systems-on-Chips (MPSoCs) come along with reduced time to market. Different IP cores can come from different vendors, and their trust levels are also different, but typically they use Network-on-Chip (NoC) as their communication infrastructure. An MPSoC can have multiple Trusted Execution Environments (TEEs). Apart from performance, power, and area research in the field of MPSoC, robust and secure system design is also gaining importance in the research community. To build a secure system, the designer must know beforehand all kinds of attack possibilities for the respective system (MPSoC). In this paper we survey the possible attack scenarios on present-day MPSoCs and investigate a new attack scenario, i.e., router attack targeted toward NoC architecture. We show the validity of this attack by analyzing different present-day NoC architectures and show that they are all vulnerable to this type of attack. By launching a router attack, an attacker can control the whole chip very easily, which makes it a very serious issue. Both routing tables and routing logic-based routers are vulnerable to such attacks. In this paper, we address attacks on routing tables. We propose different monitoring-based countermeasures against routing table-based router attack in an MPSoC having multiple TEEs. Synthesis results show that proposed countermeasures, viz. Runtime-monitor, Restart-monitor, Intermediate manager, and Auditor, occupy areas that are 26.6, 22, 0.2, and 12.2 % of a routing table-based router area. Apart from these, we propose Ejection address checker and Local monitoring module inside a router that cause 3.4 and 10.6 % increase of a router area, respectively. Simulation results are also given, which shows effectiveness of proposed monitoring-based countermeasures.