291 resultados para layered intrusion
Resumo:
In what follows, I put forward an argument for an analytical method for social science that operates at the level of genre. I argue that generic convergence, generic hybridity, and generic instability provide us with a powerful perspectives on changes in political, cultural, and economic relationships, most specifically at the level of institutions. Such a perspective can help us identify the transitional elements, relationships, and trajectories that define the place of our current system in history, thereby grounding our understanding of possible futures.1 In historically contextualising our present with this method, my concern is to indicate possibilities for the future. Systemic contradictions indicate possibility spaces within which systemic change must and will emerge. We live in a system currently dominated by many fully-expressed contradictions, and so in the presence of many possible futures. The contradictions of the current age are expressed most overtly in the public genres of power politics. Contemporary public policy—indeed politics in general-is an excellent focus for any investigation of possible futures, precisely because of its future-oriented function. It is overtly hortatory; it is designed ‘to get people to do things’ (Muntigl in press: 147). There is no point in trying to get people to do things in the past. Consequently, policy discourse is inherently oriented towards creating some future state of affairs (Graham in press), along with concomitant ways of being, knowing, representing, and acting (Fairclough 2000).
Resumo:
Titanate nanofibers with two formulas, Na2Ti3O7 and Na1.5H0.5Ti3O7, respectively, exhibit ideal properties for removal of radioactive and heavy metal ions in wastewater, such as Sr2+ , Ba2+ (as substitute of 226Ra2+), and Pb2+ ions. These nanofibers can be fabricated readily by a reaction between titania and caustic soda and have structures in which TiO6 octahedra join each other to form layers with negative charges; the sodium cations exist within the interlayer regions and are exchangeable. They can selectively adsorb the bivalent radioactive ions and heavy metal ions from water through ion exchange process. More importantly, such sorption finally induces considerable deformation of the layer structure, resulting in permanent entrapment of the toxic bivalent cations in the fibers so that the toxic ions can be safely deposited. This study highlights that nanoparticles of inorganic ion exchangers with layered structure are potential materials for efficient removal of the toxic ions from contaminated water.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. The clustering protocols can be taken as an additional advantage in these processing constrained networks to collaboratively detect intrusions with less power usage and minimal overhead. Existing clustering protocols are not suitable for intrusion detection purposes, because they are linked with the routes. The route establishment and route renewal affects the clusters and as a consequence, the processing and traffic overhead increases due to instability of clusters. The ad hoc networks are battery and power constraint, and therefore a trusted monitoring node should be available to detect and respond against intrusions in time. This can be achieved only if the clusters are stable for a long period of time. If the clusters are regularly changed due to routes, the intrusion detection will not prove to be effective. Therefore, a generalized clustering algorithm has been proposed that can run on top of any routing protocol and can monitor the intrusions constantly irrespective of the routes. The proposed simplified clustering scheme has been used to detect intrusions, resulting in high detection rates and low processing and memory overhead irrespective of the routes, connections, traffic types and mobility of nodes in the network. Clustering is also useful to detect intrusions collaboratively since an individual node can neither detect the malicious node alone nor it can take action against that node on its own.
Resumo:
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services, battlefields operations, mobile conferencing and a variety of other useful applications. Due to dynamic nature and lack of centralized monitoring points, these networks are highly vulnerable to attacks. Intrusion detection systems (IDS) provide audit and monitoring capabilities that offer the local security to a node and help to perceive the specific trust level of other nodes. We take benefit of the clustering concept in MANETs for the effective communication between nodes, where each cluster involves a number of member nodes and is managed by a cluster-head. It can be taken as an advantage in these battery and memory constrained networks for the purpose of intrusion detection, by separating tasks for the head and member nodes, at the same time providing opportunity for launching collaborative detection approach. The clustering schemes are generally used for the routing purposes to enhance the route efficiency. However, the effect of change of a cluster tends to change the route; thus degrades the performance. This paper presents a low overhead clustering algorithm for the benefit of detecting intrusion rather than efficient routing. It also discusses the intrusion detection techniques with the help of this simplified clustering scheme.
Resumo:
The upper Condamine River in southern Queensland has formed extensive alluvial deposits which have been used for irrigation of cotton crops for over 40 years. Due to excessive use and long term drought conditions these groundwater resources are under substantial threat. This condition is now recognised by all stakeholders, and Qld Department of Environment and Resource Management (DERM) are currently undertaking a water planning process for the Central Condamine Alluvium with water users and other stakeholders. DERM aims to effectively demonstrate the character of the groundwater system and its current status, and notably the continued long-term drawdown of the watertable. It was agreed that 3D visualisation was an ideal tool to achieve this. The Groundwater Visualisation System (GVS) developed at QUT was utilised and the visualisation model developed in conjunction with DERM to achieve a planning-management tool for this particular application
Resumo:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.
Resumo:
Climate change effects are expected to substantially raise the average sea level. It is widely assumed that this raise will have a severe adverse impact on saltwater intrusion processes in coastal aquifers. In this study we hypothesize that a natural mechanism, identified as the “lifting process” has the potential to mitigate or in some cases completely reverse the adverse intrusion effects induced by sea-level rise. A detailed numerical study using the MODFLOW-family computer code SEAWAT, was completed to test this hypothesis and to understand the effects of this lifting process in both confined and unconfined systems. Our conceptual simulation results show that if the ambient recharge remains constant, the sea-level rise will have no long-term impact (i.e., it will not affect the steady-state salt wedge) on confined aquifers. Our transient confined flow simulations show a self-reversal mechanism where the wedge which will initially intrude into the formation due to the sea-level rise would be naturally driven back to the original position. In unconfined systems, the lifting process would have a lesser influence due to changes in the value of effective transmissivity. A detailed sensitivity analysis was also completed to understand the sensitivity of this self-reversal effect to various aquifer parameters.
Resumo:
A series of layered double hydroxides (LDHs) based composites were synthesized by using induced hydrolysis silylation method (IHS), surfactant precursor method, in-situ coprecipitation method, and direct silylation method. Their structures, morphologies, bonding modes and thermal stabilities can be readily adjusted by changing the parameters during preparation and drying processing of the LDHs. The characterization results show that the direct silylation reaction cannot occur between the dried LDHs and 3-aminopropyltriethoxysilane (APS) in an ethanol medium. However, the condensation reaction can proceed with heating process between adsorbed APS and LDHs plates. While using wet state substrates with and without surfactant and ethanol as the solvent, the silylation process can be induced by hydrolysis of APS on the surface of LDHs plates. Surfactants improve the hydrophobicity of the LDHs during the process of nucleation and crystallization, resulting in fluffy shaped crystals; meanwhile, they occupy the surface –OH positions and leave less “free –OH” available for the silylation reaction, favoring formation of silylated products with a higher population in the hydrolyzed bidentate (T2) and tridentate (T3) bonding forms. These bonding characteristics lead to spherical aggregates and tightly bonded particles. All silylated products show higher thermal stability than those of pristine LDHs.