23 resultados para cyber foraging

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The increasing dependency of everyday life on mobile devices also increases the number and complexity of computing tasks to be supported by these devices. However, the inherent requirement of mobility restricts them from being resources rich both in terms of energy (battery capacity) and other computing resources such as processing capacity, memory and other resources. This thesis looks into cyber foraging technique of offloading computing tasks. Various experiments on android mobile devices are carried out to evaluate offloading benefits in terms of sustainability advantage, prolonging battery life and augmenting the performance of mobile devices. This thesis considers two scenarios of cyber foraging namely opportunistic offloading and competitive offloading. These results show that the offloading scenarios are important for both green computing and resource augmentation of mobile devices. A significant advantage in battery life gain and performance enhancement is obtained. Moreover, cyber foraging is proved to be efficient in minimizing energy consumption per computing tasks. The work is based on scavenger cyber foraging system. In addition, the work can be used as a basis for studying cyber foraging and other similar approaches such as mobile cloud/edge computing for internet of things devices and improving the user experiences of applications by minimizing latencies through the use of potential nearby surrogates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Fog of Cyber Defence is a book about cyberspace, cyber security and cyberwar. The book is untangling the ties of the Nordic states with the important, yet complex and foggy phenomenon of cyber. It is adding important perspectives into the ongoing discussion about cyber security and creating room for the deepening of co-operation amongst the Nordic states. The articles in the book contribute to the debate over the implications of cyber for national security and the armed forces. The authors, who come from various professional backgrounds, appreciate and welcome further discussion and comments on the very important themes that impact our everyday lives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Cyber Warfare held at the Department of Military Technology of the National Defence University in the fall of 2012. This book is a collection of some of talks that were presented in the seminar. The papers address computer network defence in military cognitive networks, computer network exploitation, non-state actors in cyberspace operations, offensive cyber-capabilities against critical infrastructure and adapting the current national defence doctrine to cyber domain. This set of papers tries to give some insight to current issues of the cyber warfare. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis aims to find an effective way of conducting a target audience analysis (TAA) in cyber domain. There are two main focal points that are addressed; the nature of the cyber domain and the method of the TAA. Of the cyber domain the object is to find the opportunities, restrictions and caveats that result from its digital and temporal nature. This is the environment in which the TAA method is examined in this study. As the TAA is an important step of any psychological operation and critical to its success, the method used must cover all the main aspects affecting the choice of a proper target audience. The first part of the research was done by sending an open-ended questionnaire to operators in the field of information warfare both in Finland and abroad. As the results were inconclusive, the research was completed by assessing the applicability of United States Army Joint Publication FM 3-05.301 in the cyber domain via a theory-based content analysis. FM 3- 05.301 was chosen because it presents a complete method of the TAA process. The findings were tested against the results of the questionnaire and new scientific research in the field of psychology. The cyber domain was found to be “fast and vast”, volatile and uncontrollable. Although governed by laws to some extent, the cyber domain is unpredictable by nature and not controllable to reasonable amount. The anonymity and lack of verification often present in the digital channels mean that anyone can have an opinion, and any message sent may change or even be counterproductive to the original purpose. The TAA method of the FM 3-05.301 is applicable in the cyber domain, although some parts of the method are outdated and thus suggested to be updated if used in that environment. The target audience categories of step two of the process were replaced by new groups that exist in the digital environment. The accessibility assessment (step eight) was also redefined, as in the digital media the mere existence of a written text is typically not enough to convey the intended message to the target audience. The scientific studies made in computer sciences and both in psychology and sociology about the behavior of people in social media (and overall in cyber domain) call for a more extensive remake of the TAA process. This falls, however, out of the scope of this work. It is thus suggested that further research should be carried out in search of computer-assisted methods and a more thorough TAA process, utilizing the latest discoveries of human behavior. ---------------------------------------------------------------------------------------------------------------------------------- Tämän opinnäytetyön tavoitteena on löytää tehokas tapa kohdeyleisöanalyysin tekemiseksi kybertoimintaympäristössä. Työssä keskitytään kahteen ilmiöön: kybertoimintaympäristön luonteeseen ja kohdeyleisöanalyysin metodiin. Kybertoimintaympäristön osalta tavoitteena on löytää sen digitaalisesta ja ajallisesta luonteesta juontuvat mahdollisuudet, rajoitteet ja sudenkuopat. Tämä on se ympäristö jossa kohdeyleisöanalyysiä tarkastellaan tässä työssä. Koska kohdeyleisöanalyysi kuuluu olennaisena osana jokaiseen psykologiseen operaatioon ja on onnistumisen kannalta kriittinen tekijä, käytettävän metodin tulee pitää sisällään kaikki oikean kohdeyleisön valinnan kannalta merkittävät osa-alueet. Tutkimuksen ensimmäisessä vaiheessa lähetettiin avoin kysely informaatiosodankäynnin ammattilaisille Suomessa ja ulkomailla. Koska kyselyn tulokset eivät olleet riittäviä johtopäätösten tekemiseksi, tutkimusta jatkettiin tarkastelemalla Yhdysvaltojen armeijan kenttäohjesäännön FM 3-05.301 soveltuvuutta kybertoimintaympäristössä käytettäväksi teorialähtöisen sisällönanalyysin avulla. FM 3-05.301 valittiin koska se sisältää kokonaisvaltaisen kohdeyleisöanalyysiprosessin. Havaintoja verrattiin kyselytutkimuksen tuloksiin ja psykologian uusiin tutkimuksiin. Kybertoimintaympäristö on tulosten perusteella nopea ja valtava, jatkuvasti muuttuva ja kontrolloimaton. Vaikkakin lait hallitsevat kybertoimintaympäristöä jossakin määrin, on se silti luonteeltaan ennakoimaton eikä sitä voida luotettavasti hallita. Digitaalisilla kanavilla usein läsnäoleva nimettömyys ja tiedon tarkastamisen mahdottomuus tarkoittavat että kenellä tahansa voi olla mielipide asioista, ja mikä tahansa viesti voi muuttua, jopa alkuperäiseen tarkoitukseen nähden vastakkaiseksi. FM 3-05.301:n metodi toimii kybertoimintaympäristössä, vaikkakin jotkin osa-alueet ovat vanhentuneita ja siksi ne esitetään päivitettäväksi mikäli metodia käytetään kyseisessä ympäristössä. Kohdan kaksi kohdeyleisökategoriat korvattiin uusilla, digitaalisessa ympäristössä esiintyvillä ryhmillä. Lähestyttävyyden arviointi (kohta 8) muotoiltiin myös uudestaan, koska digitaalisessa mediassa pelkkä tekstin läsnäolo ei sellaisenaan tyypillisesti vielä riitä halutun viestin välittämiseen kohdeyleisölle. Tietotekniikan edistyminen ja psykologian sekä sosiologian aloilla tehty tieteellinen tutkimus ihmisten käyttäytymisestä sosiaalisessa mediassa (ja yleensä kybertoimintaympäristössä) mahdollistavat koko kohdeyleisöanalyysiprosessin uudelleenrakentamisen. Tässä työssä sitä kuitenkaan ei voida tehdä. Siksi esitetäänkin että lisätutkimusta tulisi tehdä sekä tietokoneavusteisten prosessien että vielä syvällisempien kohdeyleisöanalyysien osalta, käyttäen hyväksi viimeisimpiä ihmisen käyttäytymiseen liittyviä tutkimustuloksia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A postgraduate seminar series with a title Critical Infrastructure Protection against Cyber Threats held at the Department of Military Technology of the National Defence University in the fall of 2013 and 2014. This book is a collection of some of talks that were presented in the seminar. The papers address origin of critical infrastructure protection, wargaming cyberwar in critical infrastructure defence, cyber-target categorization, supervisory control and data acquisition systems vulnerabilities, electric power as critical infrastructure, improving situational awareness of critical infrastructure and trust based situation awareness in high security cloud environment. This set of papers tries to give some insight to current issues of the network-centric critical infrastructure protection. The seminar has always made a publication of the papers but this has been an internal publication of the Finnish Defence Forces and has not hindered publication of the papers in international conferences. Publication of these papers in peer reviewed conferences has indeed been always the goal of the seminar, since it teaches writing conference level papers. We still hope that an internal publication in the department series is useful to the Finnish Defence Forces by offering an easy access to these papers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phenomena in cyber domain, especially threats to security and privacy, have proven an increasingly heated topic addressed by different writers and scholars at an increasing pace – both nationally and internationally. However little public research has been done on the subject of cyber intelligence. The main research question of the thesis was: To what extent is the applicability of cyber intelligence acquisition methods circumstantial? The study was conducted in sequential a manner, starting with defining the concept of intelligence in cyber domain and identifying its key attributes, followed by identifying the range of intelligence methods in cyber domain, criteria influencing their applicability, and types of operatives utilizing cyber intelligence. The methods and criteria were refined into a hierarchical model. The existing conceptions of cyber intelligence were mapped through an extensive literature study on a wide variety of sources. The established understanding was further developed through 15 semi-structured interviews with experts of different backgrounds, whose wide range of points of view proved to substantially enhance the perspective on the subject. Four of the interviewed experts participated in a relatively extensive survey based on the constructed hierarchical model on cyber intelligence that was formulated in to an AHP hierarchy and executed in the Expert Choice Comparion online application. It was concluded that Intelligence in cyber domain is an endorsing, cross-cutting intelligence discipline that adds value to all aspects of conventional intelligence and furthermore that it bears a substantial amount of characteristic traits – both advantageous and disadvantageous – and furthermore that the applicability of cyber intelligence methods is partly circumstantially limited.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this thesis was to examine how aquatic organisms, such as fish, behave in an altered environmental condition. Many species of fish use vision as their primary tool to gain information about their surrounding environment. The visual conditions of aquatic habitats are often altered as a result of anthropogenic disturbance, such as eutrophication that initiates algal turbidity. In general, turbidity reduces the visibility and can be hypothesized to have an influence on the behaviour of fish. I used the three-spined stickleback (Gasterosteus aculeatus) as a model species and conducted four studies in the laboratory to test how algal turbidity affects its behaviour. In this thesis, two major behavioural aspects are discussed. The first is antipredator behaviour. In study I, the combined effects of turbidity and shoot density on habitat choice (shelter vs open) behaviour was tested on a group of sticklebacks (20 fish) in the presence and absence of piscivorous perch (Perca fluviatilis). In study II, I examined the behavioural responses of feeding sticklebacks when they were exposed to the sudden appearance of an avian predator (the silhouette of a common tern, Sterna hirundo). The study was done in turbid and clear water using three different groups sizes (1, 3 and 6 fish). The second aspect is foraging behaviour. Study III & IV focused on the effects of algal turbidity on the foraging performance of sticklebacks. In study III, I conducted two separate experiments to examine the effects of turbidity on prey consumption and prey choice of sticklebacks. In this experiment turbidity levels and the proportion of large and small prey (Daphnia spp.) were manipulated. In study IV, I studied whether a group of six sticklebacks can distribute themselves according to food input at two feeding stations in a way that provided each fish with the same amount of food in clear and turbid water. I also observed whether the fish can follow changes in resource distribution between the foraging patches. My results indicate an overall influence of algal turbidity on the antipredator and foraging behaviour of sticklebacks. In the presence of a potential predator, the use of the sheltered habitat was more pronounced at higher turbidity. Besides this, sticklebacks reduced their activity levels with predator presence at higher turbidity and shoot density levels, suggesting a possible antipredator adaptation to avoid a predator. When exposed to a sudden appearance of an avian predator, sticklebacks showed a weaker antipredator response in turbid water, which suggests that turbidity degrades the risk assessment capabilities of sticklebacks. I found an effect of group size but not turbidity in the proportion of sticklebacks that fled to the shelter area, which indicates that sticklebacks are able to communicate among group members at the experimental turbidity levels. I found an overall negative effect of turbidity on food intake. Both turbidity and changes in the proportion of prey sizes played a significant role in a stickleback’s prey selection. At lower turbidity levels (clear <1 and 5 NTU) sticklebacks showed preferences for large prey, whereas in more turbid conditions and when the proportion of large to small prey increased sticklebacks became increasingly random in their prey selection. Finally, my results showed that groups of sticklebacks disperse themselves between feeding stations according to the reward ratios following the predictions of the ideal free distribution theory. However, they took a significantly longer time to reach the equilibrium distribution in turbid water than in clear water. In addition, they showed a slower response to changes in resource distribution in a turbid environment. These findings suggest that turbidity interferes with the information transfer among group foragers. It is important to understand that aquatic animals are often exposed to a degraded environment. The findings of this thesis suggest that algal turbidity negatively affects their behavioural performance. The results also shed light on the underlying behavioural strategies of sticklebacks in turbid conditions that might help them adapt to an altered environmental situation and increase their survival. In conclusion, I hold that although algal turbidity has detrimental effects on the antipredator and foraging behaviour of sticklebacks, their behavioural adjustment might help them adapt to a changing environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis presents security issues and vulnerabilities in home and small office local area networks that can be used in cyber-attacks. There is previous research done on single vulnerabilities and attack vectors, but not many papers present full scale attack examples towards LAN. First this thesis categorizes different security threads and later in the paper methods to launch the attacks are shown by example. Offensive security and penetration testing is used as research methods in this thesis. As a result of this thesis an attack is conducted using vulnerabilities in WLAN, ARP protocol, browser as well as methods of social engineering. In the end reverse shell access is gained to the target machine. Ready-made tools are used in the attack and their inner workings are described. Prevention methods are presented towards the attacks in the end of the thesis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since his inauguration, President Barack Obama has emphasized the need for a new cybersecurity policy, pledging to make it a "national security priority". This is a significant change in security discourse after an eight-year war on terror – a term Obama announced to be no longer in use. After several white papers, reports and the release of the so-called 60-day Cybersecurity Review, Obama announced the creation of a "cyber czar" position and a new military cyber command to coordinate American cyber defence and warfare. China, as an alleged cyber rival, has played an important role in the discourse that introduced the need for the new office and the proposals for changes in legislation. Research conducted before this study suggest the dominance of state-centric enemy descriptions paused briefly after 9/11, but returned soon into threat discourse. The focus on China's cyber activities fits this trend. The aim of this study is to analyze the type of modern threat scenarios through a linguistic case study on the reporting on Chinese hackers. The methodology of this threat analysis is based on the systemic functional language theory, and realizes as an analysis of action and being descriptions (verbs) used by the American authorities. The main sources of data include the Cybersecurity Act 2009, Securing Cyberspace for the 44th Presidency, and 2008 Report to Congress of the U.S. - China Economic and Security Review Commission. Contrary to the prevailing and popularized terrorism discourse, the results show the comeback of Cold War rhetoric as well as the establishment of a state-centric threat perception in cyber discourse. Cyber adversaries are referred to with descriptions of capacity, technological superiority and untrustworthiness, whereas the ‘self’ is described as vulnerable and weak. The threat of cyber attacks is compared to physical attacks on critical military and civilian infrastructure. The authorities and the media form a cycle, in which both sides quote each other and foster each other’s distrust and rhetoric. The white papers present China's cyber army as an existential threat. This leads to cyber discourse turning into a school-book example of a securitization process. The need for security demands action descriptions, which makes new rules and regulations acceptable. Cyber discourse has motives and agendas that are separate from real security discourse: the arms race of the 21st century is about unmanned war.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Drawing from strategic theory, this study investigates the strategic roles of commercial companies providing military services, frequently referred to as private military companies. Theoretically, the thesis analyzes how states organize its military capabilities in order to be able to wield power within the international system while empirically, it examines the character and role of commercial companies that provide military training services to the United States Government and partner nations. The reason for this rather instrumental and functional, rather than critical, approach is that this work is written within the discipline known as War Studies. Strategic theory is used first to logically organize the empirical findings in two case studies and then to develop an analytical framework with which the strategic roles of companies providing military services can be investigated. The analysis has been conducted using both new and hitherto unknown sources in the shape of interviews as well as previously classified telegrams, but also draws on previous research and other secondary sources. The main findings are that commercial companies have five typical strategic roles: first, they cloak the state by substituting traditional uniformed troops; second, they act as trailblazers by securing US influence in new regions and by breaking new ground by contributing to the build-up of new partners; third, they act as scene setters by preparing the ground for military exit out of a theater of operations or by facilitating inter-operability between foreign militaries and the US military; fourth, they can be used to infiltrate the security structures of foreign countries; fifth and finally, they can be used to provide offensive capabilities by providing either kinetic or cyber warfare effects. Another finding is that military service contracting is an important part of the US strategic culture.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Increased emissions of greenhouse gases into the atmosphere are causing an anthropogenic climate change. The resulting global warming challenges the ability of organisms to adapt to the new temperature conditions. However, warming is not the only major threat. In marine environments, dissolution of carbon dioxide from the atmosphere causes a decrease in surface water pH, the so called ocean acidification. The temperature and acidification effects can interact, and create even larger problems for the marine flora and fauna than either of the effects would cause alone. I have used Baltic calanoid copepods (crustacean zooplankton) as my research object and studied their growth and stress responses using climate predictions projected for the next century. I have studied both direct temperature and pH effects on copepods, and indirect effects via their food: the changing phytoplankton spring bloom composition and toxic cyanobacterium. The main aims of my thesis were: 1) to find out how warming and acidification combined with a toxic cyanobacterium affect copepod reproductive success (egg production, egg viability, egg hatching success, offspring development) and oxidative balance (antioxidant capacity, oxidative damage), and 2) to reveal the possible food quality effects of spring phytoplankton bloom composition dominated by diatoms or dinoflagellates on reproducing copepods (egg production, egg hatching, RNA:DNA ratio). The two copepod genera used, Acartia sp. and Eurytemora affinis are the dominating mesozooplankton taxa (0.2 – 2 mm) in my study area the Gulf of Finland. The 20°C temperature seems to be within the tolerance limits of Acartia spp., because copepods can adapt to the temperature phenotypically by adjusting their body size. Copepods are also able to tolerate a pH decrease of 0.4 from present values, but the combination of warm water and decreased pH causes problems for them. In my studies, the copepod oxidative balance was negatively influenced by the interaction of these two environmental factors, and egg and nauplii production were lower at 20°C and lower pH, than at 20°C and ambient pH. However, presence of toxic cyanobacterium Nodularia spumigena improved the copepod oxidative balance and helped to resist the environmental stress, in question. In addition, adaptive maternal effects seem to be an important adaptation mechanism in a changing environment, but it depends on the condition of the female copepod and her diet how much she can invest in her offspring. I did not find systematic food quality difference between diatoms and dinoflagellates. There are both good and bad diatom and dinoflagellate species. Instead, the dominating species in the phytoplankton bloom composition has a central role in determining the food quality, although copepods aim at obtaining as a balanced diet as possible by foraging on several species. If the dominating species is of poor quality it can cause stress when ingested, or lead to non-optimal foraging if rejected. My thesis demonstrates that climate change induced water temperature and pH changes can cause problems to Baltic Sea copepod communities. However, their resilience depends substantially on their diet, and therefore the response of phytoplankton to the environmental changes. As copepods are an important link in pelagic food webs, their future success can have far reaching consequences, for example on fish stocks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this thesis is to propose a novel control method for teleoperated electrohydraulic servo systems that implements a reliable haptic sense between the human and manipulator interaction, and an ideal position control between the manipulator and the task environment interaction. The proposed method has the characteristics of a universal technique independent of the actual control algorithm and it can be applied with other suitable control methods as a real-time control strategy. The motivation to develop this control method is the necessity for a reliable real-time controller for teleoperated electrohydraulic servo systems that provides highly accurate position control based on joystick inputs with haptic capabilities. The contribution of the research is that the proposed control method combines a directed random search method and a real-time simulation to develop an intelligent controller in which each generation of parameters is tested on-line by the real-time simulator before being applied to the real process. The controller was evaluated on a hydraulic position servo system. The simulator of the hydraulic system was built based on Markov chain Monte Carlo (MCMC) method. A Particle Swarm Optimization algorithm combined with the foraging behavior of E. coli bacteria was utilized as the directed random search engine. The control strategy allows the operator to be plugged into the work environment dynamically and kinetically. This helps to ensure the system has haptic sense with high stability, without abstracting away the dynamics of the hydraulic system. The new control algorithm provides asymptotically exact tracking of both, the position and the contact force. In addition, this research proposes a novel method for re-calibration of multi-axis force/torque sensors. The method makes several improvements to traditional methods. It can be used without dismantling the sensor from its application and it requires smaller number of standard loads for calibration. It is also more cost efficient and faster in comparison to traditional calibration methods. The proposed method was developed in response to re-calibration issues with the force sensors utilized in teleoperated systems. The new approach aimed to avoid dismantling of the sensors from their applications for applying calibration. A major complication with many manipulators is the difficulty accessing them when they operate inside a non-accessible environment; especially if those environments are harsh; such as in radioactive areas. The proposed technique is based on design of experiment methodology. It has been successfully applied to different force/torque sensors and this research presents experimental validation of use of the calibration method with one of the force sensors which method has been applied to.