3 resultados para ATTACKS
em Repositório Institucional da Universidade de Aveiro - Portugal
Resumo:
Internet Tra c, Internet Applications, Internet Attacks, Tra c Pro ling, Multi-Scale Analysis abstract Nowadays, the Internet can be seen as an ever-changing platform where new and di erent types of services and applications are constantly emerging. In fact, many of the existing dominant applications, such as social networks, have appeared recently, being rapidly adopted by the user community. All these new applications required the implementation of novel communication protocols that present di erent network requirements, according to the service they deploy. All this diversity and novelty has lead to an increasing need of accurately pro ling Internet users, by mapping their tra c to the originating application, in order to improve many network management tasks such as resources optimization, network performance, service personalization and security. However, accurately mapping tra c to its originating application is a di cult task due to the inherent complexity of existing network protocols and to several restrictions that prevent the analysis of the contents of the generated tra c. In fact, many technologies, such as tra c encryption, are widely deployed to assure and protect the con dentiality and integrity of communications over the Internet. On the other hand, many legal constraints also forbid the analysis of the clients' tra c in order to protect their con dentiality and privacy. Consequently, novel tra c discrimination methodologies are necessary for an accurate tra c classi cation and user pro ling. This thesis proposes several identi cation methodologies for an accurate Internet tra c pro ling while coping with the di erent mentioned restrictions and with the existing encryption techniques. By analyzing the several frequency components present in the captured tra c and inferring the presence of the di erent network and user related events, the proposed approaches are able to create a pro le for each one of the analyzed Internet applications. The use of several probabilistic models will allow the accurate association of the analyzed tra c to the corresponding application. Several enhancements will also be proposed in order to allow the identi cation of hidden illicit patterns and the real-time classi cation of captured tra c. In addition, a new network management paradigm for wired and wireless networks will be proposed. The analysis of the layer 2 tra c metrics and the di erent frequency components that are present in the captured tra c allows an e cient user pro ling in terms of the used web-application. Finally, some usage scenarios for these methodologies will be presented and discussed.
Resumo:
Os anelídeos poliquetas são elementos importantes em ambientes estuarinos e costeiros, pela sua elevada biodiversidade e abundância e pelo papel que têm nas cadeias tróficas. Algumas espécies são intensivamente exploradas para serem utilizadas como isco na pesca desportiva e profissional, como é o caso de Diopatra neapolitana. Apesar da importância económica, existem poucos estudos sobre a sua biologia e ecologia. No decorrer deste estudo foram identificadas duas outras espécies do género Diopatra em Portugal: D. marocensis, inicialmente descrita para a costa de Marrocos e cuja distribuição actual se sabe estender-se a toda a costa Portuguesa e Norte de Espanha e, D. micrura, espécie nova para a ciência. O presente estudo tem como objectivos principais estudar a diversidade e reprodução do género Diopatra, bem como a capacidade de regeneração da espécie D. neapolitana. Este trabalho aborda a distribuição espacial de D. marocensis ao longo da costa Portuguesa e descreve a espécie D. micrura, uma nova espécie do género Diopatra Audouin and Milne Edwards, 1833. As três espécies coabitam em águas transicionais, onde as espécies D. micrura e D. marocensis facilmente se confundem com juvenis de D. neapolitana. Foi realizada uma comparação morfológica e genética entre as três espécies. A espécie D. neapolitana coexiste em algumas áreas da Ria de Aveiro com a D. marocensis. Apesar destas duas espécies apresentarem padrões reprodutivos muito diferentes, Maio a Agosto é o período principal para a reprodução de ambas as espécies. D. neapolitana apresenta um desenvolvimento larvar planctónico, e os óocitos presentes na cavidade celómica são esverdeados e apresentam um diâmetro de 40-240 μm (média = 164.39±40.79 μm) e as fêmeas contêm no celoma milhares de óocitos. Contrariamente, a espécie D. marocensis reproduz-se por desenvolvimento directo no interior do tubo parental. Os óocitos observados no celoma são amarelos com um diâmetro entre 180 e 740 μm (média = 497.65 ± 31.38 μm) e o seu número varia entre 44 e 624 (276.85 ± 161.54). Por seu turno, o número de ovos observados no interior dos tubos varia entre 75 e 298, com um diâmetro entre 600 e 660 μm, e o número de larvas entre 60 e 194. A proporção machos: fêmeas foi de 1:1 para a população de D. neapolitana e entre 1:2 e 1:4 para a população de D. marocensis, em que as fêmeas dominam a população durante todo o ano. O estudo da capacidade de regeneração da espécie D. neapolitana, avaliada a partir de experiências de laboratório, revelou que esta espécie é capaz de sobreviver à perda de alguns setígeros. Durante a captura de D. neapolitana para vender como isco são normalmente cortados mais de 20 setígeros e de acordo com os nossos resultados a extremidade posterior que fica no tubo não é capaz de regenerar a extremidade anterior; a espécie consegue no entanto recuperar de ataques por predadores.
Resumo:
In Mobile Ad hoc NETworks (MANETs), where cooperative behaviour is mandatory, there is a high probability for some nodes to become overloaded with packet forwarding operations in order to support neighbor data exchange. This altruistic behaviour leads to an unbalanced load in the network in terms of traffic and energy consumption. In such scenarios, mobile nodes can benefit from the use of energy efficient and traffic fitting routing protocol that better suits the limited battery capacity and throughput limitation of the network. This PhD work focuses on proposing energy efficient and load balanced routing protocols for ad hoc networks. Where most of the existing routing protocols simply consider the path length metric when choosing the best route between a source and a destination node, in our proposed mechanism, nodes are able to find several routes for each pair of source and destination nodes and select the best route according to energy and traffic parameters, effectively extending the lifespan of the network. Our results show that by applying this novel mechanism, current flat ad hoc routing protocols can achieve higher energy efficiency and load balancing. Also, due to the broadcast nature of the wireless channels in ad hoc networks, other technique such as Network Coding (NC) looks promising for energy efficiency. NC can reduce the number of transmissions, number of re-transmissions, and increase the data transfer rate that directly translates to energy efficiency. However, due to the need to access foreign nodes for coding and forwarding packets, NC needs a mitigation technique against unauthorized accesses and packet corruption. Therefore, we proposed different mechanisms for handling these security attacks by, in particular by serially concatenating codes to support reliability in ad hoc network. As a solution to this problem, we explored a new security framework that proposes an additional degree of protection against eavesdropping attackers based on using concatenated encoding. Therefore, malicious intermediate nodes will find it computationally intractable to decode the transitive packets. We also adopted another code that uses Luby Transform (LT) as a pre-coding code for NC. Primarily being designed for security applications, this code enables the sink nodes to recover corrupted packets even in the presence of byzantine attacks.