4 resultados para stealthy attack

em Research Open Access Repository of the University of East London.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a software protection assessment process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the cold war, the United Kingdom government devised a number of public education campaigns to inform citizens about the precautions that they should undertake in the event of a nuclear attack. One such campaign, Protect and Survive, was released to the general public and media in May 1980. The negative publicity this publication received is considered to be a reason why a successor publication was never released despite the increased risk of nuclear attack. Using recently released records from the UK National Archives the paper considers that, aside from this explanation, interlocking institutional objectives, rather than simply inertia, provides an explanation for this hiatus.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper discusses the sustainable performance of geosynthetic clay liners (GCLs) which are popularly specified as “leachate retaining” or as “water proofing” membranes in the geo-environmental construction industry. Geosynthetic clay liners (GCLs) are composite matting comprising of bentonite clay with two covering geosynthetics. These are innovative labour saving construction material, developed over the last three decades. The paper outlines the variety of Geosynthetic Clay Liners (GCLs) can be classified essentially into two distinctly different forms viz; (a) air dry (< 8% m/c) with granular or powdered bentonite or (b) bentonite cake factory prehydrated to a moisture content (~40% m/c) beyond its shrinkage limit and vacuum extruded as a clay cake to enhance its sustainable performance. The dominant mineral in bentonite clay is the three-layered (2:1) clay mineral montmorillonite. High quality bentonites need to be used in the GCL manufacture. Sodium montmorillonite has the desired characteristic of high swelling capacity, high cation exchange capacity and the consequently very low hydraulic conductivity, providing the basis for the hydraulic sealing medium in GCLs. These encapsulate the active montmorillonite clay minerals which depend on the water and chemical balance between the sealing element and the surrounding geo environment. Quantitative mineralogical analyses and an assessment of the adsorbed cation regime, diffusion coefficients and clay leachate compatibility must necessarily be an integral part of the site appraisal to ensure acceptable long term sustainability and performance. Factors influencing the desired performance of bentonite in the GCLs placed in difficult construction and hostile chemical environments are discussed in this paper. Accordingly, the performance specifications for GCLs are identified and the appropriateness of enhancing the cation exchange capacity with polymer treatment and the need for factory prehydration of the untreated sodium bentonite is emphasised. The advantage of factory prehydrating the polymer treated bentonite to fluid content beyond its shrinkage limit and subsequently factory processing it to develop laminated clay is to develop a GCL that has enviable sealing characteristics with a greater resistance to geochemical attack and cracking. Since clay liners are buried in the ground as base liners, capping layer or as structural water proofing membrane, they can easily avoid strict quality and performance monitoring being “out of sight, out of mind!”. It is very necessary that barrier design for leachate containment must necessarily be in accordance with legislative requirement Assessment of long term hydraulic conductivities and clay-leachate compatibility assessment is deemed necessary. The derogatory factors affecting the sustainable performance of the bentonite in GCLs placed in difficult construction and hostile chemical environments are discussed. Sustainability concepts incorporated in waste management practice must aim to achieve 100% recycling and fully implement the handling of solid waste in developing countries with relatively lower labour costs.