115 resultados para Attack


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of self-healing in peer-to-peer networks that are under repeated attack by an omniscient adversary. We assume that, over a sequence of rounds, an adversary either inserts a node with arbitrary connections or deletes an arbitrary node from the network. The network responds to each such change by quick "repairs," which consist of adding or deleting a small number of edges. These repairs essentially preserve closeness of nodes after adversarial deletions,without increasing node degrees by too much, in the following sense. At any point in the algorithm, nodes v and w whose distance would have been - in the graph formed by considering only the adversarial insertions (not the adversarial deletions), will be at distance at most - log n in the actual graph, where n is the total number of vertices seen so far. Similarly, at any point, a node v whose degreewould have been d in the graph with adversarial insertions only, will have degree at most 3d in the actual graph. Our distributed data structure, which we call the Forgiving Graph, has low latency and bandwidth requirements. The Forgiving Graph improves on the Forgiving Tree distributed data structure from Hayes et al. (2008) in the following ways: 1) it ensures low stretch over all pairs of nodes, while the Forgiving Tree only ensures low diameter increase; 2) it handles both node insertions and deletions, while the Forgiving Tree only handles deletions; 3) it requires only a very simple and minimal initialization phase, while the Forgiving Tree initially requires construction of a spanning tree of the network. © Springer-Verlag 2012.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rural communities in the Haut-Uele Province of northern Democratic Republic of Congo live in constant danger of attack and/or abduction by units of the Lord's Resistance Army operating in the region. This pilot study sought to develop and evaluate a community-participative psychosocial intervention involving life skills and relaxation training and Mobile Cinema screenings with this war-affected population living under current threat. 159 war-affected children and young people (aged 7-18) from the villages of Kiliwa and Li-May in north-eastern DR Congo took part in this study. In total, 22% of participants had been abduction previously while 73% had a family member abducted. Symptoms of post-traumatic stress reactions, internalising problems, conduct problems and pro-social behaviour were assessed by blinded interviewers at pre- and post-intervention and at 3-month follow-up. Participants were randomised (with an accompanying caregiver) to 8 sessions of a group-based, community-participative, psychosocial intervention (n=79) carried out by supervised local, lay facilitators or a wait-list control group (n=80). Average seminar attendance rates were high: 88% for participants and 84% for caregivers. Drop-out was low: 97% of participants were assessed at post-intervention and 88% at 3 month follow-up. At post-test, participants reported significantly fewer symptoms of post-traumatic stress reactions compared to controls (Cohen's d=0.40). At 3 month follow up, large improvements in internalising symptoms and moderate improvements in pro-social scores were reported, with caregivers noting a moderate to large decline in conduct problems among the young people. Trial Registration clinicalTrials.gov, Identifier: NCT01542398.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this short paper, we present an integrated approach to detecting and mitigating cyber-attacks to modern interconnected industrial control systems. One of the primary goals of this approach is that it is cost effective, and thus whenever possible it builds on open-source security technologies and open standards, which are complemented with novel security solutions that address the specific challenges of securing critical infrastructures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The alkali activation of waste products has become a widespread topic of research, mainly due to environmental benefits. Portland cement and alkali-activated mortar samples were prepared to compare their resistance to silage effluent which contains lactic acid. The mechanism of attack on each sample has also been investigated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Masked implementations of cryptographic algorithms are often used in commercial embedded cryptographic devices to increase their resistance to side channel attacks. In this work we show how neural networks can be used to both identify the mask value, and to subsequently identify the secret key value with a single attack trace with high probability. We propose the use of a pre-processing step using principal component analysis (PCA) to significantly increase the success of the attack. We have developed a classifier that can correctly identify the mask for each trace, hence removing the security provided by that mask and reducing the attack to being equivalent to an attack against an unprotected implementation. The attack is performed on the freely available differential power analysis (DPA) contest data set to allow our work to be easily reproducible. We show that neural networks allow for a robust and efficient classification in the context of side-channel attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction when it comes to analysing complex attacks. The paper models Duqu 2.0 based on the latest information sourced from formal and informal sources. This paper provides a well structured model which can be used for future analysis of Duqu 2.0 and related attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptographic algorithms have been designed to be computationally secure, however it has been shown that when they are implemented in hardware, that these devices leak side channel information that can be used to mount an attack that recovers the secret encryption key. In this paper an overlapping window power spectral density (PSD) side channel attack, targeting an FPGA device running the Advanced Encryption Standard is proposed. This improves upon previous research into PSD attacks by reducing the amount of pre-processing (effort) required. It is shown that the proposed overlapping window method requires less processing effort than that of using a sliding window approach, whilst overcoming the issues of sampling boundaries. The method is shown to be effective for both aligned and misaligned data sets and is therefore recommended as an improved approach in comparison with existing time domain based correlation attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Side channel attacks permit the recovery of the secret key held within a cryptographic device. This paper presents a new EM attack in the frequency domain, using a power spectral density analysis that permits the use of variable spectral window widths for each trace of the data set and demonstrates how this attack can therefore overcome both inter-and intra-round random insertion type countermeasures. We also propose a novel re-alignment method exploiting the minimal power markers exhibited by electromagnetic emanations. The technique can be used for the extraction and re-alignment of round data in the time domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aminolevulinic acid (ALA) stability within topical formulations intended for photodynamic therapy (PDT) is poor due to dimerisation to pyrazine-2,5-dipropionic acid (PY). Most strategies to improve stability use low pH vehicles, which can cause cutaneous irritancy. To overcome this problem, a novel approach is investigated that uses a non-aqueous vehicle to retard proton-induced charge separation across the 4-carbonyl group on ALA and lessen nucleophilic attack that leads to condensation dimerisation. Bioadhesive anhydrous vehicles based on methylvinylether-maleic anhydride copolymer patches and poly(ethyleneglycol) or glycerol thickened poly(acrylic acid) gels were formulated. ALA stability fell below pharmaceutically acceptable levels after 6 months, with bioadhesive patches stored at 5°C demonstrating the best stability by maintaining 86.2% of their original loading. Glycerol-based gels maintained 40.2% in similar conditions. However, ALA loss did not correspond to expected increases in PY, indicating the presence of another degradative process that prevented dimerisation. Nuclear magnetic resonance (NMR) analysis was inconclusive in respect of the mechanism observed in the patch system, but showed clearly that an esterification reaction involving ALA and both glycerol and poly(ethyleneglycol) was occurring. This was especially marked in the glycerol gels, where only 2.21% of the total expected PY was detected after 204 days at 5°C. Non-specific esterase hydrolysis demonstrated that ALA was recoverable from the gel systems, further supporting esterified binding within the gel matrices. It is conceivable that skin esterases could duplicate this finding upon topical application of the gel and convert these derivatives back to ALA in situ, provided skin penetration is not affected adversely.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To determine the epidemiology of out of hospital sudden cardiac death (OHSCD) in Belfast from 1 August 2003 to 31 July 2004.

Design: Prospective examination of out of hospital cardiac arrests by using the Utstein style and necropsy reports. World Health Organization criteria were applied to determine the number of sudden cardiac deaths.

Results: Of 300 OHSCDs, 197 (66%) in men, mean age (SD) 68 (14) years, 234 (78%) occurred at home. The emergency medical services (EMS) attended 279 (93%). Rhythm on EMS arrival was ventricular fibrillation (VF) in 75 (27%). The call to response interval (CRI) was mean (SD) 8 (3) minutes. Among patients attended by the EMS, 9.7% were resuscitated and 7.2% survived to leave hospital alive. The CRI for survivors was mean (SD) 5 (2) minutes and for non-survivors, 8 (3) minutes (p < 0.001). Ninety one (30%) OHSCDs were witnessed; of these 91 patients 48 (53%) had VF on EMS arrival. The survival rate for witnessed VF arrests was 20 of 48 (41.7%): all 20 survivors had VF as the presenting rhythm and CRI ? 7 minutes. The European age standardised incidence for OHSCD was 122/100 000 (95% confidence interval 111 to 133) for men and 41/100 000 (95% confidence interval 36 to 46) for women.

Conclusion: Despite a 37% reduction in heart attack mortality in Ireland over the past 20 years, the incidence of OHSCD in Belfast has not fallen. In this study, 78% of OHSCDs occurred at home.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a study of the residual strength of Pinus sylvestris, which has been subject to attack by the furniture beetle (Anobium punctatum). It is relatively easy to stop the infestation, but difficult to assess the structural soundness of the remaining timber. Removal and replacement of affected structural elements is usually difficult and expensive, particularly in buildings of historic interest. Current on-site assessment procedures are limited. The main object of the study was to develop an on-site test of timber quality: a test which can be carried out on the surface and also at varying depths into the timber. It is based on a probe pull-out technique using a portable load-measuring device. Pull-out force values have been correlated with both strength and energy absorbed as measured by compression testing on laboratory samples of both sound and infested timber. These two relationships are significant and could be used to assess whether remedial work is needed. In addition, work on the use of artificial borings to simulate the natural worming of timber is presented and the findings discussed.