50 resultados para MAFIC INTRUSION

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Advanced high strength steels (AHSS), in particular, are an attractive group materials, offering higher strength for improved energy absorption and the opportunity to reduce weight through the use of thinner gauges. High pressure tube hydroforming (HPTH) has been used to produce safety components for these steels, but it is expensive. Low pressure tube hydroforming (LPTH) is a lower cost alternative to form the safety components in the car. The side intrusion beam is the second most critical part after front rail in the car structure for passenger safety during crash. The forming as well as crash behaviour of a square side intrusion beam from both processes was investigated using numerical simulation. This paper investigated the interaction between the forming and crash response of these materials in order to evaluate their potential for use in vehicle design for crashworthiness. The energy absorption characteristics of the different tubes were calculated and the results from the numerical analyses compared for both hydroforming process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present some practical experience on implementing an alert fusion mechanism from our project. After investigation on most of the existing alert fusion systems, we found the current body of work alternatively weighed down in the mire of insecure design or rarely deployed because of their complexity. As confirmed by our experimental analysis, unsuitable mechanisms could easily be submerged by an abundance of useless alerts. Even with the use of methods that achieve a high fusion rate and low false positives, attack is also possible. To find the solution, we carried out analysis on a series of alerts generated by well-known datasets as well as realistic alerts from the Australian Honey-Pot. One important finding is that one alert has more than an 85% chance of being fused in the following 5 alerts. Of particular importance is our design of a novel lightweight Cache-based Alert Fusion Scheme, called CAFS. CAFS has the capacity to not only reduce the quantity of useless alerts generated by IDS (Intrusion Detection System), but also enhance the accuracy of alerts, therefore greatly reducing the cost of fusion processing. We also present reasonable and practical specifications for the target-oriented fusion policy that provides a quality guarantee on alert fusion, and as a result seamlessly satisfies the process of successive correlation. Our experimental results showed that the CAFS easily attained the desired level of survivable, inescapable alert fusion design. Furthermore, as a lightweight scheme, CAFS can easily be deployed and excel in a large amount of alert fusions, which go towards improving the usability of system resources. To the best of our knowledge, our work is a novel exploration in addressing these problems from a survivable, inescapable and deployable point of view.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present some practical experiences on implementing an alert fusion mechanism from our project. After investigation on most of the existing alert fusion systems, we found the current body of work alternatively weighed down in the mire of insecure design or rarely deployed because of their complexity. As confirmed by our experimental analysis, unsuitable mechanisms could easily be submerged by an abundance of useless alerts. Even with the use of methods that achieve a high fusion rate and low false positives, attack is also possible. To find the solution, we carried out analysis on a series of alerts generated by well-known datasets as well as realistic alerts from the Australian Honey-Pot. One important finding is that one alert has more than an 85% chance of being fused in the following five alerts. Of particular importance is our design of a novel lightweight Cache-based Alert Fusion Scheme, called CAFS. CAFS has the capacity to not only reduce the quantity of useless alerts generated by intrusion detection system, but also enhance the accuracy of alerts, therefore greatly reducing the cost of fusion processing. We also present reasonable and practical specifications for the target-oriented fusion policy that provides a quality guarantee on alert fusion, and as a result seamlessly satisfies the process of successive correlation. Our experiments compared CAFS with traditional centralized fusion. The results showed that the CAFS easily attained the desired level of simple, counter-escapable alert fusion design. Furthermore, as a lightweight scheme, CAFS can easily be deployed and excel in a large amount of alert fusions, which go towards improving the usability of system resources. To the best of our knowledge, our work is a practical exploration in addressing problems from the academic point of view. Copyright © 2011 John Wiley & Sons, Ltd.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The effect of separation by biogeographic features followed by secondary contact can blur taxonomic boundaries and produce complex genetic signatures. We analyzed population structure and gene flow across the range of the long-tailed finch (Poephila acuticauda) in northern Australia (1) to test the hypothesis that Ord Arid Intrusion acted as the causative barrier that led to divergence of P. acuticauda subspecies, (2) to determine whether genetic data support the presence of a gradual cline across the range or a sudden shift, both of which have been suggested based on morphological data, and (3) to estimate levels of contemporary gene flow within this species complex. We collected samples from 302 individuals from 10 localities. Analyses of 12 microsatellite loci and sequence data from 333 base pairs of the mitochondrial control region were used to estimate population structure and gene flow, using analysis of molecular variance (AMOVA), haplotype network analysis, frequency statistics, and clustering methods. Mitochondrial sequence data indicated the presence of three genetic groups (regions) across the range of P. acuticauda. Genetic diversity was highest in the east and lowest in the west. The Ord Arid Intrusion appears to have functioned as a biogeographic barrier in the past, according to mtDNA evidence presented here and evidence from previous studies. The absence of isolation by distance between adjacent regions and the lack of population genetic structure of mtDNA within regions indicates that genetic changes across the range of P. acuticauda subspecies are characterized by discrete breaks between regions. While microsatellite data indicate a complete absence of genetic structure across this species’ range, it appears unlikely that this results from high levels of gene flow. Mitochondrial data do not support the presence of contemporary gene flow across the range of this species.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A good intrusion system gives an accurate and efficient classification results. This ability is an essential functionality to build an intrusion detection system. In this paper, we focused on using various training functions with feature selection to achieve high accurate results. The data we used in our experiments are NSL-KDD. However, the training and testing time to build the model is very high. To address this, we proposed feature selection based on information gain, which can detect several attack types with high accurate result and low false rate. Moreover, we executed experiments to category each of the five classes (probe, denial of service (DoS), user to super-user (U2R), and remote to local (R2L), normal). Our proposed outperform other state-of-art methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus. In this paper we present a survey on the recent progression of multiagent intrusion detection systems. We survey the existing types, techniques and architectures of Intrusion Detection Systems in the literature. Finally we outline the present research challenges and issues

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Anomaly detection as a kind of intrusion detection is good at detecting the unknown attacks or new attacks, and it has attracted much attention during recent years. In this paper, a new hierarchy anomaly intrusion detection model that combines the fuzzy c-means (FCM) based on genetic algorithm and SVM is proposed. During the process of detecting intrusion, the membership function and the fuzzy interval are applied to it, and the process is extended to soft classification from the previous hard classification. Then a fuzzy error correction sub interval is introduced, so when the detection result of a data instance belongs to this range, the data will be re-detected in order to improve the effectiveness of intrusion detection. Experimental results show that the proposed model can effectively detect the vast majority of network attack types, which provides a feasible solution for solving the problems of false alarm rate and detection rate in anomaly intrusion detection model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recently high-speed networks have been utilized by attackers as Distributed Denial of Service (DDoS) attack infrastructure. Services on high-speed networks also have been attacked by successive waves of the DDoS attacks. How to sensitively and accurately detect the attack traffic, and quickly filter out the attack packets are still the major challenges in DDoS defense. Unfortunately most current defense approaches can not efficiently fulfill these tasks. Our approach is to find the network anomalies by using neural network and classify DDoS packets by a Bloom filter-based classifier (BFC). BFC is a set of spaceefficient data structures and algorithms for packet classification. The evaluation results show that the simple complexity, high classification speed and accuracy and low storage requirements of this classifier make it not only suitable for DDoS filtering in high-speed networks, but also suitable for other applications such as string matching for intrusion detection systems and IP lookup for programmable routers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Powerline corridors through forested ecosystems have been criticised due their potential to fragment the landscape and facilitate the intrusion of undesirable species into natural areas. This study investigates the effects of vegetation management (slashing), on: (1) timing of small mammal recolonisation; (2) vegetation characteristics that drive small mammal responses; and (3) the point where corridor resources are sufficient to provide functional habitat for native species. Small mammal trapping was undertaken within Bunyip State Park, Australia, across three sites, once a month from January 2001 to May 2002 and every 2 months thereafter until January 2004. Changes in vegetation around each trap station were assessed annually in the forest and bi-annually in the corridor. Principal components analysis on the vegetation structural complexity values produced factors for use in species abundance models. Native small mammal species recolonised the corridor 1.5–3.5 years after management and the corridor supported a breeding population of small mammals around 2.5 years post-management. Males however, generally recolonised the corridor first, resulting in a sex-biased population in these areas. Species corridor habitat models for five native and one introduced species suggested cover and shelter were more important in determining corridor use than plant species per se. Powerline corridors have the potential to create a mixture of different successional stages, enhancing habitat availability for many species. However, the intensity of current management needs to be reduced and an integrated approach to management needs to be undertaken if powerline corridors are to continuously provide habitat for native small mammal species.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last couple of months a large number of distributed denial of service (DDoS) attacks have occurred across the world, especially targeting those who provide Web services. IP traceback, a counter measure against DDoS, is the ability to trace IP packets back to the true source/s of the attack. In this paper, an IP traceback scheme using a machine learning technique called intelligent decision prototype (IDP), is proposed. IDP can be used on both probabilistic packet marking (PPM) and deterministic packet marking (DPM) traceback schemes to identify DDoS attacks. This will greatly reduce the packets that are marked and in effect make the system more efficient and effective at tracing the source of an attack compared with other methods. IDP can be applied to many security systems such as data mining, forensic analysis, intrusion detection systems (IDS) and DDoS defense systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper proposes to address the need for more innovation in organisational information security by adding a security requirement engineering focus. Based on the belief that any heavyweight security requirements process in organisational security will be doomed to fail, we developed a security requirement approach with three dimensions. The use of a simple security requirements process in the first dimension has been augmented by an agile security approach. However, introducing this second dimension of agile security does provide support for, but does not necessarily stimulate, innovation. A third dimension is, therefore, needed to ensure there is a proper focus in the organisation's efforts to identify potential new innovations in their security. To create this focus three common shortcomings in organisational information security have been identified. The resulting security approach that addresses these shortcomings is called Ubiquitous Information Security. This paper will demonstrate the potential of this new approach by briefly discussing its possible application in two areas: Ubiquitous Identity Management and Ubiquitous Wireless Security.