97 resultados para Speculative attacks


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The complexity of modern SCADA networks and their associated cyber-attacks requires an expressive but flexible manner for representing both domain knowledge and collected intrusion alerts with the ability to integrate them for enhanced analytical capabilities and better understanding of attacks. This paper proposes an ontology-based approach for contextualized intrusion alerts in SCADA networks. In this approach, three security ontologies were developed to represent and store information on intrusion alerts, Modbus communications, and Modbus attack descriptions. This information is correlated into enriched intrusion alerts using simple ontology logic rules written in Semantic Query-Enhanced Web Rules (SQWRL). The contextualized alerts give analysts the means to better understand evolving attacks and to uncover the semantic relationships between sequences of individual attack events. The proposed system is illustrated by two use case scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1974, pursuing his interest in the infra-ordinary – ‘the banal, the quotidian, the obvious, the common, the ordinary, the back-ground noise, the habitual’ – Georges Perec wrote about an idea for a novel:
‘I imagine a Parisian apartment building whose façade has been removed … so that all the rooms in the front, from the ground floor up to the attics, are instantly and simultaneously visible’.
In Life A User’s Manual (1978) the consummation of this precis, patterns of existence are measured within architectural space with an archaeological sensibility that sifts through narrative and décor, structure and history, services and emotion, the personal and the system, ascribing commensurate value to each.
Apartment comes from the Italian appartare meaning ‘to separate’. The space of the boundary between activities is reduced to a series of intimately thin lines: the depth of a floor, a party wall, a window, the convex peep-hole in a door, or the façade that Perec seeks to render invisible. The apartness of the apartment is accelerated when aligned with short-term tenancies. Here Perec’s interweaving of personal histories over time using the structure of the block, gives way to convivialities of detachment: inhabitants are temporary, their personalities anonymous, their activities unknown or overlooked.
Borrowing methods from Perec, to move somewhere between conjecture, analysis and other documentation and tracing relationships between form, structure, materiality, technology, organisation, tenure and narrative use, this paper interrogates the late twentieth-century speculative apartment block in Britain and Ireland arguing that its speculative and commodified purpose allows a series of lives that are often less than ordinary to inhabit its spaces.
Henri Lefebvre described the emergence of an ‘abstract space’ under capitalism in terms which can be applied to the apartment building: the division of space into freely alienable privatised parcels which can be exchanged. Vertical distributions of class and other new, contiguous social and spatial relationships are couched within a paradox: the building which allows such proximities is also a conductor of division. Apartment comes from the Italian appartare meaning ‘to separate’. The space of the boundary between activities is reduced to a series of intimately thin lines: the depth of a floor, a party wall, a window, the convex peep-hole in a door, or the façade that Perec seeks to render invisible. The apartness of the apartment is accelerated when aligned with short-term tenancies. Here Perec’s interweaving of personal histories over time using the structure of the block, gives way to convivialities of detachment: inhabitants are temporary, their personalities anonymous, their activities unknown or overlooked.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1748, Bartholomew Mosse, a curious combination of surgeon, obstetrician and entertainment impresario, established a pleasure garden on the northern fringes of Dublin. Ostensibly designed to fund the construction of a maternity hospital to be located adjacently, Mosse’s New Pleasure Gardens became one of the premier leisure resorts in Dublin. This was to have a profound effect on the city’s urban form. Within a few years the gardens became an epicentre of speculative development as the upper classes jostled to build their houses in the vicinity. Meanwhile, the creation nearby of Sackville Mall, a wide and generous strolling ground, established a whole section of the city dedicated to haute spectacle, display and leisure. Like other pleasure gardens in the British Isles, Mosse’s venture introduced new, commodified forms of entertainment. In the colonial context of eighteenth-century Ireland, however, ‘a land only recently won and insecurely held’ (Foster, 1988) by the Protestant Anglo-Irish settler class, the production of culture and spectacle was perhaps more significant than elsewhere. Indeed, the form of Mosse’s gardens echoed the private city gardens of a key figure in the Anglo-Irish aristocracy, while the hospital itself was constructed in a style of a Palladian country house, symbol of colonial presence in the countryside. However, like other pleasure gardens, the mix of music and alcohol, the heterogeneous crowd culled from across social and gender boundaries, and a landscape punctuated with secluded corners, meant that it also acquired a dubious reputation as a haunt of louche and illicit behaviours. The curious juxtaposition between a maternity hospital and pleasure garden, therefore, begins to assume other, hitherto hidden complexities. These are borne out by a closer examination of the architecture of the hospital, the shape of its landscape and the records of its patrons and patients.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigated using lip movements as a behavioural biometric for person authentication. The system was trained, evaluated and tested using the XM2VTS dataset, following the Lausanne Protocol configuration II. Features were selected from the DCT coefficients of the greyscale lip image. This paper investigated the number of DCT coefficients selected, the selection process, and static and dynamic feature combinations. Using a Gaussian Mixture Model - Universal Background Model framework an Equal Error Rate of 2.20% was achieved during evaluation and on an unseen test set a False Acceptance Rate of 1.7% and False Rejection Rate of 3.0% was achieved. This compares favourably with face authentication results on the same dataset whilst not being susceptible to spoofing attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cryptographic algorithms have been designed to be computationally secure, however it has been shown that when they are implemented in hardware, that these devices leak side channel information that can be used to mount an attack that recovers the secret encryption key. In this paper an overlapping window power spectral density (PSD) side channel attack, targeting an FPGA device running the Advanced Encryption Standard is proposed. This improves upon previous research into PSD attacks by reducing the amount of pre-processing (effort) required. It is shown that the proposed overlapping window method requires less processing effort than that of using a sliding window approach, whilst overcoming the issues of sampling boundaries. The method is shown to be effective for both aligned and misaligned data sets and is therefore recommended as an improved approach in comparison with existing time domain based correlation attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Side channel attacks permit the recovery of the secret key held within a cryptographic device. This paper presents a new EM attack in the frequency domain, using a power spectral density analysis that permits the use of variable spectral window widths for each trace of the data set and demonstrates how this attack can therefore overcome both inter-and intra-round random insertion type countermeasures. We also propose a novel re-alignment method exploiting the minimal power markers exhibited by electromagnetic emanations. The technique can be used for the extraction and re-alignment of round data in the time domain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a new encryption scheme implemented at the physical layer of wireless networks employing orthogonal frequency-division multiplexing (OFDM). The new scheme obfuscates the subcarriers by randomly reserving several subcarriers for dummy data and resequences the training symbol by a new secure sequence. Subcarrier obfuscation renders the OFDM transmission more secure and random, while training symbol resequencing protects the entire physical layer packet, but does not affect the normal functions of synchronization and channel estimation of legitimate users while preventing eavesdroppers from performing these functions. The security analysis shows the system is robust to various attacks by analyzing the search space using an exhaustive key search. Our scheme is shown to have a better performance in terms of search space, key rate and complexity in comparison with other OFDM physical layer encryption schemes. The scheme offers options for users to customize the security level and key rate according to the hardware resource. Its low complexity nature also makes the scheme suitable for resource limited devices. Details of practical design considerations are highlighted by applying the approach to an IEEE 802.11 OFDM system case study.