95 resultados para Human supervisory control

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The recently discovered aging-dependent large accumulation of point mutations in the human fibroblast mtDNA control region raised the question of their occurrence in postmitotic tissues. In the present work, analysis of biopsied or autopsied human skeletal muscle revealed the absence or only minimal presence of those mutations. By contrast, surprisingly, most of 26 individuals 53 to 92 years old, without a known history of neuromuscular disease, exhibited at mtDNA replication control sites in muscle an accumulation of two new point mutations, i.e., A189G and T408A, which were absent or marginally present in 19 individuals younger than 34 years. These two mutations were not found in fibroblasts from 22 subjects 64 to 101 years of age (T408A), or were present only in three subjects in very low amounts (A189G). Furthermore, in several older individuals exhibiting an accumulation in muscle of one or both of these mutations, they were nearly absent in other tissues, whereas the most frequent fibroblast-specific mutation (T414G) was present in skin, but not in muscle. Among eight additional individuals exhibiting partial denervation of their biopsied muscle, four subjects >80 years old had accumulated the two muscle-specific point mutations, which were, conversely, present at only very low levels in four subjects <or =40 years old. The striking tissue specificity of the muscle mtDNA mutations detected here and their mapping at critical sites for mtDNA replication strongly point to the involvement of a specific mutagenic machinery and to the functional relevance of these mutations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified using a ruled based method.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper, we present a hybrid BDI-PGM framework, in which PGMs (Probabilistic Graphical Models) are incorporated into a BDI (belief-desire-intention) architecture. This work is motivated by the need to address the scalability and noisy sensing issues in SCADA (Supervisory Control And Data Acquisition) systems. Our approach uses the incorporated PGMs to model the uncertainty reasoning and decision making processes of agents situated in a stochastic environment. In particular, we use Bayesian networks to reason about an agent’s beliefs about the environment based on its sensory observations, and select optimal plans according to the utilities of actions defined in influence diagrams. This approach takes the advantage of the scalability of the BDI architecture and the uncertainty reasoning capability of PGMs. We present a prototype of the proposed approach using a transit scenario to validate its effectiveness.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The BDI architecture, where agents are modelled based on their beliefs, desires and intentions, provides a practical approach to develop large scale systems. However, it is not well suited to model complex Supervisory Control And Data Acquisition (SCADA) systems pervaded by uncertainty. In this paper we address this issue by extending the operational semantics of Can(Plan) into Can(Plan)+. We start by modelling the beliefs of an agent as a set of epistemic states where each state, possibly using a different representation, models part of the agent's beliefs. These epistemic states are stratified to make them commensurable and to reason about the uncertain beliefs of the agent. The syntax and semantics of a BDI agent are extended accordingly and we identify fragments with computationally efficient semantics. Finally, we examine how primitive actions are affected by uncertainty and we define an appropriate form of lookahead planning.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper proposes a hierarchical energy management system for multi-source multi-product (MSMP) microgrids. Traditional energy hub based scheduling method is combined with a hierarchical control structure to incorporate transient characteristics of natural gas flow and dynamics of energy converters in microgrids. The hierarchical EMS includes a supervisory control layer, an optimizing control layer, and an execution control layer. In order to efficiently accommodate the systems multi time-scale characteristics, the optimizing control layer is decomposed into three sub-layers: slow, medium and fast. Thermal, gas and electrical management systems are integrated into the slow, medium, and fast control layer, respectively. Compared with wind energy, solar energy is easier to integrate and more suitable for the microgrid environment, therefore, potential impacts of the hierarchical EMS on MSMP microgrids is investigated based on a building energy system integrating photovoltaic and microturbines. Numerical studies indicate that by using a hierarchical EMS, MSMP microgrids can be economically operated. Also, interactions among thermal, gas, and electrical system can be effectively managed.