818 resultados para high security
Resumo:
There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.
Resumo:
Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.
Resumo:
Anomaly detection compensates shortcomings of signature-based detection such as protecting against Zero-Day exploits. However, Anomaly Detection can be resource-intensive and is plagued by a high false-positive rate. In this work, we address these problems by presenting a Cooperative Intrusion Detection approach for the AIS, the Artificial Immune System, as an example for an anomaly detection approach. In particular we show, how the cooperative approach reduces the false-positive rate of the detection and how the overall detection process can be organized to account for the resource constraints of the participating devices. Evaluations are carried out with the novel network simulation environment NeSSi as well as formally with an extension to the epidemic spread model SIR
Resumo:
We introduce the Network Security Simulator (NeSSi2), an open source discrete event-based network simulator. It incorporates a variety of features relevant to network security distinguishing it from general-purpose network simulators. Compared to the predecessor NeSSi, it was extended with a three-tier plugin architecture and a generic network model to shift its focus towards simulation framework for critical infrastructures. We demonstrate the gained adaptability by different use cases
Resumo:
Session Initiation Protocol (SIP) is developed to provide advanced voice services over IP networks. SIP unites telephony and data world, permitting telephone calls to be transmitted over Intranets and Internet. Increase in network performance and new mechanisms for guaranteed quality of service encourage this consolidation to provide toll cost savings. Security comes up as one of the most important issues when voice communication and critical voice applications are considered. Not only the security methods provided by traditional telephony systems, but also additional methods are required to overcome security risks introduced by the public IP networks. SIP considers security problems of such a consolidation and provides a security framework. There are several security methods defined within SIP specifications and extensions. But, suggested methods can not solve all the security problems of SIP systems with various system requirements. In this thesis, a Kerberos based solution is proposed for SIP security problems, including SIP authentication and privacy. The proposed solution tries to establish flexible and scalable SIP system that will provide desired level of security for voice communications and critical telephony applications.
Resumo:
An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.
Resumo:
Data structures such as k-D trees and hierarchical k-means trees perform very well in approximate k nearest neighbour matching, but are only marginally more effective than linear search when performing exact matching in high-dimensional image descriptor data. This paper presents several improvements to linear search that allows it to outperform existing methods and recommends two approaches to exact matching. The first method reduces the number of operations by evaluating the distance measure in order of significance of the query dimensions and terminating when the partial distance exceeds the search threshold. This method does not require preprocessing and significantly outperforms existing methods. The second method improves query speed further by presorting the data using a data structure called d-D sort. The order information is used as a priority queue to reduce the time taken to find the exact match and to restrict the range of data searched. Construction of the d-D sort structure is very simple to implement, does not require any parameter tuning, and requires significantly less time than the best-performing tree structure, and data can be added to the structure relatively efficiently.
Resumo:
We present and analyze several gaze-based graphical password schemes based on recall and cued-recall of grid points; eye-trackers are used to record user's gazes, which can prevent shoulder-surfing and may be suitable for users with disabilities. Our 22-subject study observes that success rate and entry time for the grid-based schemes we consider are comparable to other gaze-based graphical password schemes. We propose the first password security metrics suitable for analysis of graphical grid passwords and provide an in-depth security analysis of user-generated passwords from our study, observing that, on several metrics, user-generated graphical grid passwords are substantially weaker than uniformly random passwords, despite our attempts at designing schemes to improve quality of user-generated passwords.
Resumo:
Characterization of the combustion products released during the burning of commonly used engineering metallic materials may aid in material selection and risk assessment for the design of oxygen systems. The characterization of combustion products in regards to size distribution and morphology gives useful information for systems addressing fire detection. Aluminum rods (3.2-mm diameter cylinders) were vertically mounted inside a combustion chamber and ignited in pressurized oxygen by resistively heating an aluminum/palladium igniter wire attached to the bottom of the test sample. This paper describes the experimental work conducted to establish the particle size distribution and morphology of the resultant combustion products collected after the burning was completed and subsequently analyzed. In general, the combustion products consisted of a re-solidified oxidized slag and many small hollow spheres of size ranging from about 500 nm to 1000 µm in diameter, surfaced with quenched dendritic and grain-like structures. The combustion products were characterized using optical and scanning electron microscopy.
Resumo:
High heat-producing granites (HHPGs) are reservoir rocks for enhanced geothermal systems (EGS), yet the origins of their anomalous chemistry remain poorly understood. To gain a better understanding of the characteristic distribution of elemental depletions and enrichments (focussing on U, Th & K) within granite suites of different heritage and tectonic setting, and the processes that lead to these enrichments, we are undertaking a systematic accessory-mineral chronochemical study of two suites of S- and I-type granites in northern Queensland, as well as two archetypal HHPGs in Cornwall, England (S-type) and Soultz-sous- Forêts, France (I-type). Novel zircon LA-ICP-MS chronochemical methods will later be underpinned by a systematic petrographic, scanning electron microscope (SEM), and electron microprobe (EPMA) study of all the REE-Y-Th-U-rich accessory minerals to fully characterise how the composition, textural distributions and associations change with rock chemistry between and among the suites. Preliminary results indicate that zircons with inherited ages do not have anomalously high U (>1000 ppm) & Th (>400 ppm) values (Ahrens, 1965). Instead, enrichment in these HPE is seen in zircons dated to around the time of magmatic emplacement. These results indicate that enrichment arose primarily through fractional crystallisation of the granitic magmas. Our results support the suggestion that a source pre-enriched in the HPEs does not appear to be fundamental for the formation of all HHPGs. Instead fractional crystallisation processes, and the accessory minerals formed in magmas of differing initial compositions, are the key controls on the levels of enrichment observed (e.g. Champion & Chappell, 1992; Chappell & Hine, 2006). One implication is that the most fractionated granites may not be the most enriched in the HPEs and therefore prospective to future EGS development.
Resumo:
Fine-grained matrices in carbonaceous chondrites and small, micron-sized inclusions in achondrites can be characterized effectively using high resolution transmission electron microscopy (HRTEM).
Resumo:
The main purpose of this longitudinal study was to investigate the role of motivational climates, perceived competence and motivational regulations as antecedents of self-reported physical activity during junior high school years. The participants included 237 Finnish students (101 girls, 136 boys) that were 13 years old at the first stage of the study. Students completed the motivational climate and perceived competence questionnaires at Grade 7, motivation towards physical education questionnaire at Grade 8, and self-reported physical activity questionnaire at Grade 9. A path analysis revealed a path from task-involving motivational climate via perceived competence and intrinsic motivation to self-reported physical activity. Perceived competence and intrinsic motivation were statistically significant mediators between task-involving motivational climate and self-reported physical activity. This finding supports the four-stage causal sequence model of motivation.
Resumo:
Trajectory basis Non-Rigid Structure From Motion (NRSFM) currently faces two problems: the limit of reconstructability and the need to tune the basis size for different sequences. This paper provides a novel theoretical bound on 3D reconstruction error, arguing that the existing definition of reconstructability is fundamentally flawed in that it fails to consider system condition. This insight motivates a novel strategy whereby the trajectory's response to a set of high-pass filters is minimised. The new approach eliminates the need to tune the basis size and is more efficient for long sequences. Additionally, the truncated DCT basis is shown to have a dual interpretation as a high-pass filter. The success of trajectory filter reconstruction is demonstrated quantitatively on synthetic projections of real motion capture sequences and qualitatively on real image sequences.
Resumo:
This paper considers the problem of reconstructing the motion of a 3D articulated tree from 2D point correspondences subject to some temporal prior. Hitherto, smooth motion has been encouraged using a trajectory basis, yielding a hard combinatorial problem with time complexity growing exponentially in the number of frames. Branch and bound strategies have previously attempted to curb this complexity whilst maintaining global optimality. However, they provide no guarantee of being more efficient than exhaustive search. Inspired by recent work which reconstructs general trajectories using compact high-pass filters, we develop a dynamic programming approach which scales linearly in the number of frames, leveraging the intrinsically local nature of filter interactions. Extension to affine projection enables reconstruction without estimating cameras.