260 resultados para Sulfate Attack
Resumo:
The IEEE Wireless LAN standard has been a true success story by enabling convenient, efficient and low-cost access to broadband networks for both private and professional use. However, the increasing density and uncoordinated operation of wireless access points, combined with constantly growing traffic demands have started hurting the users' quality of experience. On the other hand, the emerging ubiquity of wireless access has placed it at the center of attention for network attacks, which not only raises users' concerns on security but also indirectly affects connection quality due to proactive measures against security attacks. In this work, we introduce an integrated solution to congestion avoidance and attack mitigation problems through cooperation among wireless access points. The proposed solution implements a Partially Observable Markov Decision Process (POMDP) as an intelligent distributed control system. By successfully differentiating resource hampering attacks from overload cases, the control system takes an appropriate action in each detected anomaly case without disturbing the quality of service for end users. The proposed solution is fully implemented on a small-scale testbed, on which we present our observations and demonstrate the effectiveness of the system to detect and alleviate both attack and congestion situations.
Resumo:
This paper presents a formal methodology for attack modeling and detection for networks. Our approach has three phases. First, we extend the basic attack tree approach 1 to capture (i) the temporal dependencies between components, and (ii) the expiration of an attack. Second, using the enhanced attack trees (EAT) we build a tree automaton that accepts a sequence of actions from input stream if there is a traverse of an attack tree from leaves to the root node. Finally, we show how to construct an enhanced parallel automaton (EPA) that has each tree automaton as a subroutine and can process the input stream by considering multiple trees simultaneously. As a case study, we show how to represent the attacks in IEEE 802.11 and construct an EPA for it.
Resumo:
This investigation has shown that by transforming free caustic in red mud (RM) to Bayer hydrotalcite (during the seawater neutralization (SWN) process) enables a more controlled release mechanism for the neutralization of acid sulfate soils. The formation of hydrotalcite has been confirmed by X-ray diffraction (XRD) and differential thermalgravimetric analysis (DTG), while the dissolution of hydrotalcite and sodalite has been observed through XRD, DTG, pH plots, and ICP-OES. Coupling of all techniques enabled three neutralization mechanisms to be determined: (1) free alkali, (2) hydrotalcite dissolution, and (3) sodalite dissolution. The mechanisms are determined on the basis of ICP-OES and kinetic information. When the mass of RM or SWN-RM is greater than 0.08 g/50 mL, the pH of solution increases to a suitable value for plant life with aluminum leaching kept at a minimum. To obtain a neutralization pH greater than 6 in 10 min, the following ratio of bauxite residue (g) in 50 mL with a known iron sulfate (Fe2(SO4)3) concentration can be determined as follows: 0.04 g:50 mL:0.1 g/L of Fe2(SO4)3.
Resumo:
The cancer stem cell hypothesis states that tumours arise from cells with the ability to self-renew and differentiate into multiple cell types, and that these cells persist in tumors as a distinct population that can cause disease relapse and hence metastasis. The crux of this hypothesis is that these cells are the only cells capable of, by themselves, giving rise to new tumours. What proportion of a tumour consists of these stem cells, where are they localised, how are they regulated, and how can we identify them? The stromal cells embedded within the extracellular matrix (ECM) not only provide a scaffold but also produce ECM constituents for use by stem cells. Heparan sulfate proteoglycans (HSPGs) are ubiquitous to this cell niche and interact with a large number of ligands including growth factors, their receptors, and ECM structural components. It is still unclear whether ECM degradation and subsequent metastasis is a result of proteases produced by the tumour cells themselves or by cells within the stromal compartment. The identification of the cellular origin of cancer stem cells along with microenvironmental changes involved in the initiation, progression and the malignant conversion of all cancers is critical to the development of targeted therapeutics. As ubiquitous members of the ECM microenvironment and hence the cancer cell niche, HSPGs are candidates for a central role in these processes.
Resumo:
The development of hydrogels tailored for cartilage tissue engineering has been a research and clinical goal for over a decade. Directing cells towards a chondrogenic phenotype and promoting new matrix formation are significant challenges that must be overcome for the successful application of hydrogels in cartilage tissue therapies. Gelatin-methacrylamide (Gel-MA) hydrogels have shown promise for the repair of some tissues, but they have not been extensively investigated for cartilage tissue engineering. We encapsulated human chondrocytes in gel-MA based hydrogels, and show that with the incorporation of small quantities of photo-crosslinkable hyaluronic acid methacrylate (HA-MA), and to a lesser extent chondroitin sulfate methacrylate (CS-MA), chondrogenesis and mechanical properties can be enhanced. The addition of HA-MA to Gel-MA constructs resulted in more rounded cell morphologies, enhanced chondrogenesis as assessed by gene expression and immunofluorescence, and increased quantity and distribution of the newly synthesised ECM throughout the construct. Consequently, while the compressive moduli of control Gel-MA constructs increased by 26 kPa after 8 weeks culture, constructs with HA-MA and CS-MA increased by 96 kPa. The enhanced chondrogenic differentiation, distribution of ECM, and improved mechanical properties make these materials potential candidates for cartilage tissue engineering applications.
Resumo:
The Modicon Communication Bus (Modbus) protocol is one of the most commonly used protocols in industrial control systems. Modbus was not designed to provide security. This paper confirms that the Modbus protocol is vulnerable to flooding attacks. These attacks involve injection of commands that result in disrupting the normal operation of the control system. This paper describes a set of experiments that shows that an anomaly-based change detection algorithm and signature-based Snort threshold module are capable of detecting Modbus flooding attacks. In comparing these intrusion detection techniques, we find that the signature-based detection requires a carefully selected threshold value, and that the anomaly-based change detection algorithm may have a short delay before detecting the attacks depending on the parameters used. In addition, we also generate a network traffic dataset of flooding attacks on the Modbus control system protocol.
Resumo:
Along with the tri-lineage of bone, cartilage and fat, human mesenchymal stem cells (hMSCs) retain neural lineage potential. Multiple factors have been described that influence lineage fate of hMSCs including the extracellular microenvironment or niche. The niche includes the extracellular matrix (ECM) providing structural composition, as well as other associated proteins and growth factors, which collectively influence hMSC stemness and lineage specification. As such, lineage specific differentiation of MSCs is mediated through interactions including cell–cell and cell–matrix, as well as through specific signalling pathways triggering downstream events. Proteoglycans (PGs) are ubiquitous within this microenvironment and can be localised to the cell surface or embedded within the ECM. In addition, the heparan sulfate (HS) and chondroitin sulfate (CS) families of PGs interact directly with a number of growth factors, signalling pathways and ECM components including FGFs, Wnts and fibronectin. With evidence supporting a role for HSPGs and CSPGs in the specification of hMSCs down the osteogenic, chondrogenic and adipogenic lineages, along with the localisation of PGs in development and regeneration, it is conceivable that these important proteins may also play a role in the differentiation of hMSCs toward the neuronal lineage. Here we summarise the current literature and highlight the potential for HSPG directed neural lineage fate specification in hMSCs, which may provide a new model for brain damage repair.
Resumo:
Heparan sulfate proteoglycans (HSPGs) are key components of the extracellular matrix that mediate cell proliferation, invasion, and cellular signaling. The biological functions of HSPGs are linked to their co-stimulatory effects on extracellular ligands (e.g., WNTs) and the resulting activation of transcription factors that control mammalian development but also associated with tumorigenesis. We examined the expression profile of HSPG core protein syndecans (SDC1–4) and glypicans (GPC1–6) along with the enzymes that initiate or modify their glycosaminoglycan chains in human breast cancer (HBC) epithelial cells. Gene expression in relation to cell proliferation was examined in the HBC cell lines MCF-7 and MDA-MB-231 following treatment with the HS agonist heparin. Heparin increased gene expression of chain initiation and modification enzymes including EXT1 and NDST1, as well as core proteins SDC2 and GPC6. With HS/Wnt interactions established, we next investigated WNT pathway components and observed that increased proliferation of the more invasive MDA-MB-231 cells is associated with activation of the Wnt signaling pathway. Specifically, there was substantial upregulation (>5-fold) of AXIN1, WNT4A, and MYC in MDA-MB-231 but not in MCF-7 cells. The changes in gene expression observed for HSPG core proteins and related enzymes along with the associated Wnt signaling components suggest coordinated interactions. The influence of HSPGs on cellular proliferation and invasive potential of breast cancer epithelial cells are cell and niche specific. Further studies on the interactions between HSPGs and WNT ligands may yield clinically relevant molecular targets, as well as new biomarkers for characterization of breast cancer progression.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
Heparan sulfate (HS) sugar chains attached to core proteoglycans (PGs) termed HSPGs mediate an extensive range of cell-extracellular matrix (ECM) and growth factor interactions based upon their sulfation patterns. When compared with non-osteogenic (maintenance media) culture conditions, under established osteogenic culture conditions, MC3T3-E1 cells characteristically increase their osteogenic gene expression profile and switch their dominant fibroblast growth factor receptor (FGFR) from FGFR1 (0.5-fold decrease) to FGFR3 (1.5-fold increase). The change in FGFR expression profile of the osteogenic-committed cultures was reflected by their inability to sustain an FGF-2 stimulus, but respond to BMP-2 at day 14 of culture. The osteogenic cultures decreased their chondroitin and dermatan sulfate PGs (biglycan, decorin, and versican), but increased levels of the HS core protein gene expression, in particular glypican-3. Commitment and progress through osteogenesis is accompanied by changes in FGFR expression, decreased GAG initiation but increased N- and O-sulfation and reduced remodeling of the ECM (decreased heparanase expression) resulting in the production of homogenous (21 kDa) HS chain. With the HSPG glypican-3 expression strongly upregulated in these processes, siRNA was used to knockdown this gene to examine the effect on osteogenic commitment. Reduced glypican-3 abrogated the expression of Runx2, and thus differentiation. The reintroduction of this HSPG into Runx2-null cells allowed osteogenesis to proceed. These results demonstrate the dependence of osteogenesis on specific HS chains, in particular those associated with glypican-3.
Resumo:
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an initialization vector. In a stream cipher setting where the filter function is known, we can extend it to the cube attack with annihilators: By applying the cube attack to Boolean functions for which we can find low-degree multiples (equivalently annihilators), the attack complexity can be improved. When the size of the filter function is smaller than the LFSR, we can improve the attack complexity further by considering a sliding window version of the cube attack with annihilators. Finally, we extend the cube attack to vectorial Boolean functions by finding implicit relations with low-degree polynomials.
Resumo:
We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.
Resumo:
A well-known attack on RSA with low secret-exponent d was given by Wiener about 15 years ago. Wiener showed that using continued fractions, one can efficiently recover the secret-exponent d from the public key (N,e) as long as d < N 1/4. Interestingly, Wiener stated that his attack may sometimes also work when d is slightly larger than N 1/4. This raises the question of how much larger d can be: could the attack work with non-negligible probability for d=N 1/4 + ρ for some constant ρ > 0? We answer this question in the negative by proving a converse to Wiener’s result. Our result shows that, for any fixed ε > 0 and all sufficiently large modulus lengths, Wiener’s attack succeeds with negligible probability over a random choice of d < N δ (in an interval of size Ω(N δ )) as soon as δ > 1/4 + ε. Thus Wiener’s success bound d
Resumo:
NLS is one of the stream ciphers submitted to the eSTREAM project. We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method which is introduced in this paper. We build the distinguisher by using linear approximations of both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF). Since the bias of the distinguisher depends on the Konst value, which is a key-dependent word, we present the graph showing how the bias of distinguisher vary with Konst. In result, we estimate the bias of the distinguisher to be around O(2^−30). Therefore, we claim that NLS is distinguishable from truly random cipher after observing O(2^60) keystream words. The experiments also show that our distinguishing attack is successful on 90.3% of Konst among 2^32 possible values. We extend the CP attack to NLSv2 which is a tweaked version of NLS. In result, we build a distinguisher which has the bias of around 2− 48. Even though this attack is below the eSTREAM criteria (2^−40), the security margin of NLSv2 seems to be too low.