15 resultados para IEC 61869
Resumo:
Background: Clinical and experimental studies suggest that the probiotic mixture VSL#3 has protective activities in the context of inflammatory bowel disease (IBD). The aim of the study was to reveal bacterial strain-specific molecular mechanisms underlying the anti-inflammatory potential of VSL#3 in intestinal epithelial cells (IEC).
Methodology/Principal Findings: VSL#3 inhibited TNF-induced secretion of the T-cell chemokine interferon-inducible protein (IP-10) in Mode-K cells. Lactobacillus casei (L. casei) cell surface proteins were identified as active anti-inflammatory components of VSL#3. Interestingly, L. casei failed to block TNF-induced IP-10 promoter activity or IP-10 gene transcription at the mRNA expression level but completely inhibited IP-10 protein secretion as well as IP-10-mediated T-cell transmigration. Kinetic studies, pulse-chase experiments and the use of a pharmacological inhibitor for the export machinery (brefeldin A) showed that L. casei did not impair initial IP-10 production but decreased intracellular IP-10 protein stability as a result of blocked IP-10 secretion. Although L. casei induced IP-10 ubiquitination, the inhibition of proteasomal or lysosomal degradation did not prevent the loss of intracellular IP-10. Most important for the mechanistic understanding, the inhibition of vesicular trafficking by 3-methyladenine (3-MA) inhibited IP-10 but not IL-6 expression, mimicking the inhibitory effects of L. casei. These findings suggest that L. casei impairs vesicular pathways important for the secretion of IP-10, followed by subsequent degradation of the proinflammatory chemokine. Feeding studies in TNF Delta ARE and IL-10(-/-) mice revealed a compartimentalized protection of VSL#3 on the development of cecal but not on ileal or colonic inflammation. Consistent with reduced tissue pathology in IL-10(-/-) mice, IP-10 protein expression was reduced in primary epithelial cells.
Conclusions/Significance: We demonstrate segment specific effects of probiotic intervention that correlate with reduced IP-10 protein expression in the native epithelium. Furthermore, we revealed post-translational degradation of IP-10 protein in IEC to be the molecular mechanism underlying the anti-inflammatory effect.
Resumo:
As ubiquitous computing becomes a reality, sensitive information is increasingly processed and transmitted by smart cards, mobile devices and various types of embedded systems. This has led to the requirement of a new class of lightweight cryptographic algorithm to ensure security in these resource constrained environments. The International Organization for Standardization (ISO) has recently standardised two low-cost block ciphers for this purpose, Clefia and Present. In this paper we provide the first comprehensive hardware architecture comparison between these ciphers, as well as a comparison with the current National Institute of Standards and Technology (NIST) standard, the Advanced Encryption Standard.
Resumo:
Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.
Resumo:
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middle attack are performed in a comprehensive testbed environment in conjunction with an electricity distribution operator.
Resumo:
Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.
Resumo:
The increased construction and reconstruction of smart substations has exposed a problem with version management of substation configuration description language (SCL) files due to frequent changes. This paper proposes a comparative approach for differentiation of smart substation SCL configuration files. A comparison model for SCL configuration files is built in this method, which is based on the SCL structure and abstract model defined by IEC 61850. The proposed approach adopts the algorithms of depth-first traversal, sorting, and cross comparison in order to rapidly identify differences of changed SCL configuration files. This approach can also be utilized to detect malicious tampering or illegal manipulation tailoring for SCL files. SCL comparison software is developed using the Qt platform to validate the feasibility and effectiveness of the proposed approach.
Resumo:
Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaic (PV) generators.
Resumo:
With the development and deployment of IEC 61850 based smart substations, cybersecurity vulnerabilities of supervisory control and data acquisition (SCADA) systems are increasingly emerging. In response to the emergence of cybersecurity vulnerabilities in smart substations, a test-bed is indispensable to enable cybersecurity experimentation. In this paper, a comprehensive and realistic cyber-physical test-bed has been built to investigate potential cybersecurity vulnerabilities and the impact of cyber-attacks on IEC 61850 based smart substations. This test-bed is close to a real production type environment, and has the ability to carry out end-to-end testing of cyber-attacks and physical consequences. A fuzz testing approach is proposed for detecting IEC 61850 based intelligent electronic devices (IEDs) and validated in the proposed test-bed.
Resumo:
Emerging cybersecurity vulnerabilities in supervisory control and data acquisition (SCADA) systems are becoming urgent engineering issues for modern substations. This paper proposes a novel intrusion detection system (IDS) tailored for cybersecurity of IEC 61850 based substations. The proposed IDS integrates physical knowledge, protocol specifications and logical behaviours to provide a comprehensive and effective solution that is able to mitigate various cyberattacks. The proposed approach comprises access control detection, protocol whitelisting, model-based detection, and multi-parameter based detection. This SCADA-specific IDS is implemented and validated using a comprehensive and realistic cyber-physical test-bed and data from a real 500kV smart substation.
Resumo:
Background and Aim: Inflammatory bowel diseases (IBD) are immune-mediated chronic diseases that are characterized by an overreaction of the intestinal immune system to the intestinal microbiota. VSL#3, a mixture of 8 different lactic acid bacteria, is a clinically relevant probiotic compound in the context of IBD, but the bacterial structures and molecular mechanisms underlying the observed protective effects are largely unknown. The intestinal epithelium plays a very important role in the maintenance of the intestinal homeostasis, as the intestinal epithelial cells (IEC) are capable of sensing, processing, and reacting upon signals from the luminal microbiota and the intestinal immune system. This immune regulatory function of the IEC is lost in IBD owing to dysregulated activation of the IEC. Thus, the aim of this study was to reveal protective mechanisms of VSL#3 on IEC function.
Results: In vitro, VSL#3 was found to selectively inhibit activation-induced secretion of the T-cell chemokine interferon-inducible protein (IP)-10 in IEC. Cell wall-associated proteins of VSL#3-derived Lactobacillus casei (L. casei) were identified to be the active anti-inflammatory component of VSL#3. Mechanistically, L. casei did not impair initial IP-10 protein production, but induced posttranslational degradation of IP-10 in IEC. Feeding studies in tumor necrosis factor (TNF)(Delta ARE/+) mice, a mouse model for experimental ileitis, revealed that neither VSL#3 nor L. casei is capable of reducing ileal inflammation. Even preweaning feeding of VSL#3 did not prevent the development of severe ileitis in TNF Delta ARE/+ mice. In contrast, VSL#3 feeding studies in IL-10-/- mice, a model for experimental colitis, revealed that VSL#3 has local, intestinal compartment-specific protective effects on the development of inflammation. Reduced histopathologic inflammation in the cecum of IL-10-/- mice after VSL#3 treatment was found to correlate with reduced levels of IP-10 protein in primary cecal epithelial cells.
Conclusion and Outlook: These results suggest that the inhibitory effect of VSL#3-derived L. casei on IP-10 secretion in IEC is an important probiotic mechanism that contributes to the anti-inflammatory effects of VSL#3 in specific subsets of patients with IBD. An important future aim is the identification of the active probiotic protein, which could serve as a basis for the development of new efficient therapies in the context of IBD.
Resumo:
BACKGROUND: Although pneumonia is a common cause of death in children in Malawi, healthcare staff frequently encounter patients or carers who refuse oxygen therapy. This qualitative study documents factors that influence acceptance or refusal of oxygen therapy for children in Malawi.
METHODS: Nine group interviews involving 86 participants were held in community and hospital settings in rural and urban Malawi. Eleven in-depth interviews of healthcare staff providing oxygen were held in a central hospital. Thematic analysis of transcripts of the audio recordings was carried out to identify recurring themes.
RESULTS: Similar ideas were identified in the group interviews and in-depth staff interviews. Past experiences of oxygen use (direct and indirect, positive and negative) had a strong influence on views of oxygen. A recurrent theme was fear of oxygen, often due to a perceived association between death and recent oxygen use. Fears were intensified by a lack of familiarity with equipment used to deliver oxygen, distrust of medical staff and concerns about cost of oxygen.
CONCLUSIONS: This study identifies reasons for refusal of oxygen therapy for children in a low-income country. Findings from the study suggest that training of healthcare staff to address fears of parents, and information, education and communication (IEC) approaches that improve public understanding of oxygen and provide positive examples of its use are likely to be helpful in improving uptake of oxygen therapy in Malawi.
Resumo:
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable attack specific modules for DDoS, spamming, info-stealing, remote access, boot-sector formatting etc. BlackEnergy has been involved in several high profile cyber physical attacks including the recent Ukraine power grid attack in December 2015. This paper investigates the evolution of BlackEnergy and its cyber attack capabilities. It presents a basic cyber attack model used by BlackEnergy for targeting industrial control systems. In particular, the paper analyzes cyber threats of BlackEnergy for synchrophasor based systems which are used for real-time control and monitoring functionalities in smart grid. Several BlackEnergy based attack scenarios have been investigated by exploiting the vulnerabilities in two widely used synchrophasor communication standards: (i) IEEE C37.118 and (ii) IEC 61850-90-5. Specifically, the paper addresses reconnaissance, DDoS, man-in-the-middle and replay/reflection attacks on IEEE C37.118 and IEC 61850-90-5. Further, the paper also investigates protection strategies for detection and prevention of BlackEnergy based cyber physical attacks.